Countering Russia’s Malign Influence Operations

in much of the Western world, including in the United States, we seem unable to fully grasp the fact that Russia is waging war on Western democracies.

Source: Countering Russia’s Malign Influence Operations

Advertisements

The Geopolitics of Information

To compete and thrive in the 21st century, democracies, and the United States in particular, must develop new national security and economic strategies that address the geopolitics of information. In the 20th century, market capitalist democracies geared infrastructure, energy, trade, and even social policy to protect and advance that era’s key source of power—manufacturing. In this century, democracies must better account for information geopolitics across all dimensions of domestic policy and national strategy.

Source: The Geopolitics of Information

Opinion | Deepfakes Are Coming. We Can No Longer Believe What We See.

It will soon be as easy to produce convincing fake video as it is to lie. We need to be prepared.

Source: Opinion | Deepfakes Are Coming. We Can No Longer Believe What We See.

Special Analysis of the May 2019 Superseding Indictment of Julian Assange

RCFP analyzes frequently asked questions this case raises, annotates the charges and breaks down the counts in the indictment.

Source: Special Analysis of the May 2019 Superseding Indictment of Julian Assange

N.S.A. Denies Its Cyberweapon Was Used in Baltimore Attack, Congressman Says

A stolen N.S.A. hacking tool was a component in a cyberattack on the city, people involved in the investigation have told The Times.

Source: N.S.A. Denies Its Cyberweapon Was Used in Baltimore Attack, Congressman Says

The GCHQ’s Vulnerabilities Equities Process

In scenario 3, how does the author make the jump that capturing alerted the attacker? 

The GCHQ’s disclosure of the “BlueKeep” vulnerability offers an opportunity for the U.S. to learn from how the British handle the question of vulnerabilities equities.

Source: The GCHQ’s Vulnerabilities Equities Process

Open Letter to GCHQ on the Threats Posed by the Ghost Proposal

The coalition letter outlines concerns that the proposal poses serious threats to cybersecurity and fundamental human rights including privacy and free expression.

Source: Open Letter to GCHQ on the Threats Posed by the Ghost Proposal

When Cyberweapons Escape

Bottom Line Up Front In 2017, the National Security Agency lost control of a cyberweapon known as EternalBlue, leaked online by a group known as ‘the Shadow Brokers.’ Malicious code can be traded and sold on the Dark Web, available to those with the resources to purchase it or in exchange for illicit products … Continue reading “When Cyberweapons Escape”

Source: When Cyberweapons Escape

An Open Letter to President Donald Trump on U.S. Tensions with Iran

Ooh, these guys are concerned! Knowing the subject matter is a good start when making grandiose gestures. You would think soldiers know their bearing, direction or heading … OK except second Lts. And the organization is a “college?” It is Persian Gulf as in here from an “institute.”

Editor’s Note: This letter was coordinated by the American College of National Security Leaders, a consortium consisting of retired admirals, generals, ambassadors, and senior government executives committed to strengthening America’s national security by informing the debate, influencing decision-makers, and educating the public.

Source: An Open Letter to President Donald Trump on U.S. Tensions with Iran