Understanding just how extensive and coordinated Russia’s operations against the West are represents the first step in confronting—and defeating—Putin’s increased aggression, particularly as it becomes clear that the 2016 election interference was just a starting point.A Guide to Russia’s High Tech Tool Box for Subverting US Democracy Read More
An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage Read More
Shalev Hulio, co-founder and CEO of NSO, says his industry is full of companies trying to avoid scrutiny.The man who built a spyware empire says it’s time to come out of the shadows Read More
Author’s Note: Have you been looking for a detailed-but-accessible case study of the Russian cyberespionage campaign that targeted SolarWinds (among others)? The following piece is adapted from my newly-released eCasebook “Cybersecurity Law, Policy, and Institutions” (v.3.1).SolarWinds and the Holiday Bear Campaign: A Case Study for the Classroom Read More
It requires that we look with clear eyes at the growing threats we face and commit to more effective and collaborative leadership by the government and the tech sector in the United States to spearhead a strong and coordinated global cybersecurity response.A moment of reckoning: the need for a strong and global cybersecurity response Read More
More than 12 government-backed groups are using the pandemic as cover for digital reconnaissance and espionage, according to a new report.Google Sees State-Sponsored Hackers Ramping Up Coronavirus Attacks Read More
The FBI and DHS say that Beijing’s hacking “jeopardizes” the delivery of much-needed Covid-19 treatment options.The US Says Chinese Hackers Went Too Far During the Covid-19 Crisis Read More
As our lives become increasingly dependent upon computer systems and cyber technologies grow ever more sophisticated, the internet has emerged as the new battleground of the 21st century. From criminals’ stealing credit card and social security number information to foreign governments’ hacking into American companies’ information systems, cyber attacks can take on myriad forms, prompting the government to formulate new measures to protect online security. Since cyberwarfare knows no territorial bounds, ensuring cybersecurity will also require international cooperation and an updated understanding of jus ad bellum, as it applies to cyber attacks.Lawfare Blog – Cybersecurity Read More
DayZero dives deep in cybersecurity vulnerabilities, and the crime, espionage, and warfare taking place on networked computers. We look at legislation, practice, and litigation over how to keep our networks and critical infrastructure secure; new and emerging threats and how the policy process responds to them; the relationship between cybersecurity other security goods; and cybersecurity in American relations with foreign adversaries and allies.DayZero: Cybersecurity Law and Policy Read More
“The inside story of how America’s enemies launched a cyber war against us-and how we’ve learned to fight back…”
Includes links to:
“The Lawfare Podcast: John Carlin on ‘Dawn of the Code War’“ by Jen Patja Howell. Saturday, November 24, 2018.
A discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15, 2019 at the Center for Strategic & International Studies.
John Carlin on “Stay Tuned with Preet” Dec. 4, 2018.