Logo - The White House - Barack Obama

Presidential Policy Directive 41 – United States Cyber Incident Coordination

While the vast majority of cyber incidents can be handled through existing policies, certain cyber incidents that have significant impacts on an entity, our national security, or the broader economy require a unique approach to response efforts. These significant cyber incidents demand unity of effort within the Federal Government and especially close coordination between the public and private sectors.

Read More
Nakasone testifying in Washington, D.C., February 2019 - U.S. Cyber Command

How to Compete in Cyberspace

We learned that we cannot afford to wait for cyber attacks to affect our military networks. We learned that defending our military networks requires executing operations outside our military networks. The threat evolved, and we evolved to meet it.

Read More
Book Cover - Dark Mirror by Barton Gellman

Dark Mirror: Edward Snowden and the American Surveillance State

Edward Snowden touched off a global debate in 2013 when he gave Barton Gellman, Laura Poitras and Glenn Greenwald each a vast and explosive archive of highly classified files revealing the extent of the American government’s access to our every communication. They shared the Pulitzer Prize that year for public service. For Gellman, who never stopped reporting, that was only the beginning. 

Read More
Workers at the Idaho National Laboratory’s Critical Infrastructure Test Range. (Flickr/Idaho National Laboratory, CC BY 2.0)

The Myth of Consumer-Grade Security

Schneier on Security, August 28, 2019
By Bruce Schneier

“The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. Yet that’s not possible, because there is no longer any difference between those categories of devices. Consumer devices are critical infrastructure. They affect national security. And it would be foolish to weaken them, even at the request of law enforcement.”

Read More
DoD Cyber Strategy - 2018

DoD Cyber Strategy – 2018

Cyber Strategy: Summary, 2018
U.S. Department of Defense

“American prosperity, liberty, and security depend upon open and reliable access to information.  The Internet empowers us and enriches our lives by providing ever-greater access to new knowledge, businesses, and services.  Computers and network technologies underpin U.S. military warfighting superiority by enabling the Joint Force to gain the information advantage, strike at long distance, and exercise global command and control.”

Read More