Defending the Indefensible: A New Strategy for Stopping Information Operations – War on the Rocks

One note, prevention (results driven) is more than just deterrence (consequence driven.)

In the book Snow Crash by Neal Stephenson, malicious viral information is deliberately spread by a nefarious actor to infect computers and people’s brains. The virus is transmitted in a variety of ways: via bodily fluid exchange, exposure by observing code with your eyes, as an injected drug, and via computer

Source: Defending the Indefensible: A New Strategy for Stopping Information Operations – War on the Rocks

Advertisements

GDPR Derogations, ePrivacy, and the Evolving European Privacy Landscape

GDPR derogations will be applied throughout the EU. A few potential state-to-state variations will have implications for privacy and security.

Source: GDPR Derogations, ePrivacy, and the Evolving European Privacy Landscape

NSA General Counsel Glenn Gerstell Remarks to Georgetown Cybersecurity Law Institute

On Wednesday, NSA General Counsel Glenn Gerstell delivered the following remarks at the Georgetown Cybersecurity Law Institute in a speech entitled “Failing to Keep Pace: The Cyber Threat and Its Implications for Our Privacy Laws.”

Source: NSA General Counsel Glenn Gerstell Remarks to Georgetown Cybersecurity Law Institute

The FBI’s Gigantic Math Error

Oh what is a double or triple counting error. It is not like they know PhD researchers in Cambridge. May be their database got hacked!

On the serious side, it is a problem with no clear solution.

In an increasingly interconnected digital world, strong cybersecurity is essential to safeguarding private data, financial transactions, personal communications, and critical infrastructure. Encryption is one of the few technologies we have that reliably protects sensitive data from identity thieves, credit card fraud, and other criminal activity.Against this backdrop, high-ranking officials in the FBI and other law enforcement agencies have claimed for years that criminals are using strong encryption to frustrate information gathering in criminal investigations. They have dubbed this the “Going Dark” problem, conjuring a future in which criminals roam free from the reach of law enforcement.

Source: The FBI’s Gigantic Math Error

Explaining the ‘Mystery’ of Numbers Stations

There are two kinds of dedicated radio listeners. Most are those who listen regularly to their FM or AM station of choice, or to a station that only broadcasts on the internet. The rest are dedicated to other frequency scales: high frequency (also known as shortwave), followed by very high frequency and, after that, the ultra high frequency range, which includes police scanner talk and even satellite signals.

Source: Explaining the ‘Mystery’ of Numbers Stations

Memo to POTUS: Responding to Cyber Attacks and PPD-20

The root cause of the cyber dilemma (military, technical, legal) is that it does not lend itself to clear conceptualizations and definitions required by current frameworks that delineate boundaries and restrain or enable responses.

UK attorney general articulated ground rule positions on otherwise contentious issues that suggest some over analyzing and complicating of current debates.

Healey’s article is about Cybercom and it recommends restricted experimentation/baseline (sunset-able authorizations) of military escalation control.

At the core, the issue is not one of authorizations or capabilities but of definitions. It seems setting some ground rules like the UK, even if on a temporary basis, addresses both at a higher baseline. The required agility will be an immediate and coherent result. The advantage of that enabling approach is that it deals with a wild west of pests not by playing and fine-tuning capabilities in a whack-a-mole game but defining, isolating and clearing the ground first or at least concurrently.

Mr. President, as you know the United States has faced cyber attacks of increasing frequency and viciousness from our adversaries. Your NSC is about to bring you both a new cyber strategy and a proposal to modify a previous NSC document called PPD-20 to give US Cyber Command more authority to interfere with these adversary attacks without checking back with you and the NSC as much.

Source: Memo to POTUS: Responding to Cyber Attacks and PPD-20

United Kingdom Att’y General’s Speech on International Law and Cyber: Key Highlights

Eight key takeaways on the United Kingdom’s position on international law and cyberspace, presented at Chatham House on 23 May 2018.

Source: United Kingdom Att’y General’s Speech on International Law and Cyber: Key Highlights