One note, prevention (results driven) is more than just deterrence (consequence driven.)
In the book Snow Crash by Neal Stephenson, malicious viral information is deliberately spread by a nefarious actor to infect computers and people’s brains. The virus is transmitted in a variety of ways: via bodily fluid exchange, exposure by observing code with your eyes, as an injected drug, and via computer
Source: Defending the Indefensible: A New Strategy for Stopping Information Operations – War on the Rocks
GDPR derogations will be applied throughout the EU. A few potential state-to-state variations will have implications for privacy and security.
Source: GDPR Derogations, ePrivacy, and the Evolving European Privacy Landscape
On Wednesday, NSA General Counsel Glenn Gerstell delivered the following remarks at the Georgetown Cybersecurity Law Institute in a speech entitled “Failing to Keep Pace: The Cyber Threat and Its Implications for Our Privacy Laws.”
Source: NSA General Counsel Glenn Gerstell Remarks to Georgetown Cybersecurity Law Institute
Oh what is a double or triple counting error. It is not like they know PhD researchers in Cambridge. May be their database got hacked!
On the serious side, it is a problem with no clear solution.
In an increasingly interconnected digital world, strong cybersecurity is essential to safeguarding private data, financial transactions, personal communications, and critical infrastructure. Encryption is one of the few technologies we have that reliably protects sensitive data from identity thieves, credit card fraud, and other criminal activity.Against this backdrop, high-ranking officials in the FBI and other law enforcement agencies have claimed for years that criminals are using strong encryption to frustrate information gathering in criminal investigations. They have dubbed this the “Going Dark” problem, conjuring a future in which criminals roam free from the reach of law enforcement.
Source: The FBI’s Gigantic Math Error
The FBI operation targets a piece of sophisticated malware linked to the same Russian hacking group that hit the Democratic National Committee in 2016.
Source: Exclusive: FBI Seizes Control of Russian Botnet
There are two kinds of dedicated radio listeners. Most are those who listen regularly to their FM or AM station of choice, or to a station that only broadcasts on the internet. The rest are dedicated to other frequency scales: high frequency (also known as shortwave), followed by very high frequency and, after that, the ultra high frequency range, which includes police scanner talk and even satellite signals.
Source: Explaining the ‘Mystery’ of Numbers Stations
The Washington Post reports that the FBI has repeatedly overstated the number of devices it can’t unlock.
Source: The FBI’s Mistake on Encryption
The root cause of the cyber dilemma (military, technical, legal) is that it does not lend itself to clear conceptualizations and definitions required by current frameworks that delineate boundaries and restrain or enable responses.
UK attorney general articulated ground rule positions on otherwise contentious issues that suggest some over analyzing and complicating of current debates.
Healey’s article is about Cybercom and it recommends restricted experimentation/baseline (sunset-able authorizations) of military escalation control.
At the core, the issue is not one of authorizations or capabilities but of definitions. It seems setting some ground rules like the UK, even if on a temporary basis, addresses both at a higher baseline. The required agility will be an immediate and coherent result. The advantage of that enabling approach is that it deals with a wild west of pests not by playing and fine-tuning capabilities in a whack-a-mole game but defining, isolating and clearing the ground first or at least concurrently.
Mr. President, as you know the United States has faced cyber attacks of increasing frequency and viciousness from our adversaries. Your NSC is about to bring you both a new cyber strategy and a proposal to modify a previous NSC document called PPD-20 to give US Cyber Command more authority to interfere with these adversary attacks without checking back with you and the NSC as much.
Source: Memo to POTUS: Responding to Cyber Attacks and PPD-20
Eight key takeaways on the United Kingdom’s position on international law and cyberspace, presented at Chatham House on 23 May 2018.
Source: United Kingdom Att’y General’s Speech on International Law and Cyber: Key Highlights
A former U.S. official calls the 2017 Pentagon policy document an ‘exercise to legally justify a potential attack on a North Korean missile on the launchpad.’
Source: Revealed: Pentagon Push to Hack Nuke Missiles Before They Launch