Back in the mid-1990s senior leaders in the U.S. Air Force were deeply enmeshed in a debate—one that, as General (Ret.) Michael Hayden describes it, was almost Jesuitical in its seeming abstruseness. The Air Force, on the cutting edge of new computer-enabled capabilities, was trying to decide whether this new domain of activity was one of “cyber” operations or one of “information” operations.
Source: The Death of Cyber Utopia
Iran’s telecommunications minister accused Israel on Monday of a new cyber attack on its telecommunications infrastructure, and vowed to respond with legal action.
Most of the infrastructure is common and will be unnecessary and redundant to duplicate. Intrusion is intrusion and payload is payload whether disruptive, destructive or persistent ISR.
The split stems from the different missions of the two agencies, according to Capt. Ed Devinney, director of corporate partnerships and technology outreach at Cyber Command.
Source: Pentagon official: Cyber Command and NSA may split infrastructure
Tehran strategic networks attacked, Hadashot TV says, hours after Israel revealed it tipped off Denmark about Iran murder plot, and days after Rouhani’s phone was found bugged
Source: TV report: Israel silent as Iran hit by computer virus more violent than Stuxnet
“Hello, Ivan. This is U.S. Cyber Command. We can see your mouse from here.”
Source: Psy-Ops, Meet Cyber-Ops: U.S. Takes on Russian Trolls
The aggressive posture of the 2018 Department of Defense Cyber Strategy risks increasing insecurity and instability in the cyber realm.
Source: A Chinese Perspective on the Pentagon’s Cyber Strategy: From ‘Active
American operatives are messaging Russians working on disinformation campaigns to let them know they’ve been identified. It’s a measured step to keep Moscow from escalating.
Source: U.S. Begins First Cyberoperation Against Russia Aimed at Protecting Elections
Hackers with alleged ties to Russia have infected three companies in Eastern Europe with sophisticated malware attacks, a cybersecurity firm revealed on Wednesday.
Source: Hackers linked to Russia infect three companies in Ukraine, Poland: cybersecurity firm
It is near impossible to find any mention of the Chinese chip hacking story in Bloomberg Businessweek that does not use the words “bombshell” or “explosive” to describe the piece. These descriptions have become cliché. But the cliché is fitting because even if the story unravels amid vehement denials, its impact will be far-reaching, no matter what we learn about what actually occurred.
Source: The Ripple Effects of the China Chip Hacking Story