A state-owned Chinese company receives a contract to build and maintain the next generation of railcars that service Metro stations at the Pentagon, near the White House and Capitol Hill, and throughout the Washington, D.C., metro area. What could possibly go wrong?
Hackers impersonating journalists including slain Washington Post columnist Jamal Khashoggi reportedly attempted to deliver malicious software to a prominent Saudi dissident living in Washington D.C.
Jee if we had only thought about that in 2016 …
Russia and Spain have agreed to set up a joint cybersecurity group that aims to stop the spread of damaging disinformation campaigns that have begun to strain their relations, The Associated Press
Back in the mid-1990s senior leaders in the U.S. Air Force were deeply enmeshed in a debate—one that, as General (Ret.) Michael Hayden describes it, was almost Jesuitical in its seeming abstruseness. The Air Force, on the cutting edge of new computer-enabled capabilities, was trying to decide whether this new domain of activity was one of “cyber” operations or one of “information” operations.
Source: The Death of Cyber Utopia
Most of the infrastructure is common and will be unnecessary and redundant to duplicate. Intrusion is intrusion and payload is payload whether disruptive, destructive or persistent ISR.
The split stems from the different missions of the two agencies, according to Capt. Ed Devinney, director of corporate partnerships and technology outreach at Cyber Command.