
Autonomous Vehicles Join the List of US National Security Threats
Lawmakers are growing concerned about a flood of data-hungry cars from China taking over American streets.
Autonomous Vehicles Join the List of US National Security Threats Read MoreLawmakers are growing concerned about a flood of data-hungry cars from China taking over American streets.
Autonomous Vehicles Join the List of US National Security Threats Read MoreIn his first interview as leader of the NSA’s Research Directorate, Gil Herrera lays out challenges in quantum computing, cybersecurity, and the technology American intelligence needs to master to secure and spy into the future.
Meet the NSA spies shaping the future Read MoreUnderstanding just how extensive and coordinated Russia’s operations against the West are represents the first step in confronting—and defeating—Putin’s increased aggression, particularly as it becomes clear that the 2016 election interference was just a starting point.
A Guide to Russia’s High Tech Tool Box for Subverting US Democracy Read MoreFrom Russian Olympic cyberattacks to billion-dollar North Korean malware, how one tech giant monitors nation-sponsored hackers everywhere on earth.
Inside the Microsoft team tracking the world’s most dangerous hackers Read MoreThe SolarWinds affair is simply another incident in a long pattern of intrusions.
The SolarWinds Hack Read MoreThese documents cover enhancing the Trusted Internet Connections (TIC) program to fully support the implementation of IPv6 in federal IT systems. This information is also applicable to the private business sector and those interested in improving Internet security.
CISA Releases Guidance: IPv6 Considerations for TIC 3.0 Read MoreThe country’s cyber forces have raked in billions of dollars for the regime by pulling off schemes ranging from A.T.M. heists to cryptocurrency thefts. Can they be stopped?
The Incredible Rise of North Korea’s Hacking Army Read MoreWe Have Root: Even More Advice from Schneier on Security By Bruce Schneier Published by John Wiley & Sons, Inc., September 2019. ISBN: 978-1-119-64301-2 “A collection of popular essays from security guru Bruce Schneier ” In his latest collection of …
We Have Root: Even More Advice from Schneier on Security Read MoreThe president dismissed the widely respected cybersecurity agency director Tuesday night for pushing back against election disinformation.
Firing Christopher Krebs Crosses a Line—Even for Trump Read MoreFew national-security threats are as potent—or as nebulous—as cyber attacks. Ben Buchanan reveals how hackers are transforming spycraft and statecraft, catching us all in the crossfire, whether we know it or not.
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Read MoreHumanity is facing thorny problems on all fronts. These folks are working to solve them—and trying to avoid the unintended consequences this time.
WIRED25: Stories of People Who Are Racing to Save Us Read More‘New York Times’ reporter David Sanger says the world’s leading producer of telecom equipment, China’s Huawei, will be central to the spread of a global 5G network — which could pose a major threat to U.S. national security. “The 5G …
The 5G Network & The Possible Threat To Cybersecurity Read MoreThe Lawfare Podcast is the weekly audio production of the Lawfare staff in cooperation with the Brookings Institution. Podcast episodes include interviews with policymakers, scholars, journalists, and analysts; events and panel discussions.
Lawfare Podcast Read MoreDemocracy Now!, July 8, 2015
By Juan González & Amy Goodman
Guest: Bruce Schneier
“FBI Director James Comey is set to testify against encryption before the Senate Intelligence Committee today, as the United States and Britain push for “exceptional access” to encrypted communications. Encryption refers to the scrambling of communications so they cannot be read without the correct key or password. The FBI and GCHQ have said they need access to encrypted communications to track criminals and terrorists. Fourteen of the world’s pre-eminent cryptographers, computer scientists and security specialists have issued a paper arguing there is no way to allow the government such access without endangering all confidential data, as well as the broader communications infrastructure. We speak with one of the authors of the paper, leading security technologist Bruce Schneier..”
The End of Encryption? NSA & FBI Seek New Backdoors Against Advice from Leading Security Experts Read MorePublished by Penguin Random House, June 19, 2018
By David E. Sanger
“The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists.”
The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age Read More