
How China’s Hacking Entered a Reckless New Phase
China has increasingly relied on contractors for its hacking, which opens the door to all kinds of criminal behavior.
How China’s Hacking Entered a Reckless New Phase Read MoreChina has increasingly relied on contractors for its hacking, which opens the door to all kinds of criminal behavior.
How China’s Hacking Entered a Reckless New Phase Read MoreThe country’s cyber forces have raked in billions of dollars for the regime by pulling off schemes ranging from A.T.M. heists to cryptocurrency thefts. Can they be stopped?
The Incredible Rise of North Korea’s Hacking Army Read MoreWe learned that we cannot afford to wait for cyber attacks to affect our military networks. We learned that defending our military networks requires executing operations outside our military networks. The threat evolved, and we evolved to meet it.
How to Compete in Cyberspace Read MoreFew national-security threats are as potent—or as nebulous—as cyber attacks. Ben Buchanan reveals how hackers are transforming spycraft and statecraft, catching us all in the crossfire, whether we know it or not.
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Read MoreAn oral history of a devastating strike that hasn’t happened yet.
Imagine the US was just hit with a cyberattack. What happens next? Read MoreThe message shared perhaps the worst possible news Oh could have received at that exact moment: Something was shutting down every domain controller in the Seoul data centers, the servers that formed the backbone of the Olympics’ IT infrastructure.
The Untold Story of the 2018 Olympics Cyberattack, the Most Deceptive Hack in History Read MoreCyber Strategy: Summary, 2018
U.S. Department of Defense
“American prosperity, liberty, and security depend upon open and reliable access to information. The Internet empowers us and enriches our lives by providing ever-greater access to new knowledge, businesses, and services. Computers and network technologies underpin U.S. military warfighting superiority by enabling the Joint Force to gain the information advantage, strike at long distance, and exercise global command and control.”
DoD Cyber Strategy – 2018 Read MorePublished by Penguin Random House, June 19, 2018
By David E. Sanger
“The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists.”
The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age Read More“The inside story of how America’s enemies launched a cyber war against us-and how we’ve learned to fight back…”
Includes links to:
“The Lawfare Podcast: John Carlin on ‘Dawn of the Code War’“ by Jen Patja Howell. Saturday, November 24, 2018.
A discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15, 2019 at the Center for Strategic & International Studies.
John Carlin on “Stay Tuned with Preet” Dec. 4, 2018.