China has increasingly relied on contractors for its hacking, which opens the door to all kinds of criminal behavior.Read More
The full extent of the SolarWinds hack and Hafnium’s attack on Microsoft Exchange Server may never be known.Read More
The country’s cyber forces have raked in billions of dollars for the regime by pulling off schemes ranging from A.T.M. heists to cryptocurrency thefts. Can they be stopped?Read More
We learned that we cannot afford to wait for cyber attacks to affect our military networks. We learned that defending our military networks requires executing operations outside our military networks. The threat evolved, and we evolved to meet it.Read More
Few national-security threats are as potent—or as nebulous—as cyber attacks. Ben Buchanan reveals how hackers are transforming spycraft and statecraft, catching us all in the crossfire, whether we know it or not.Read More
An oral history of a devastating strike that hasn’t happened yet.Read More
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it.Read More
The message shared perhaps the worst possible news Oh could have received at that exact moment: Something was shutting down every domain controller in the Seoul data centers, the servers that formed the backbone of the Olympics’ IT infrastructure.Read More
Cyber Strategy: Summary, 2018
U.S. Department of Defense
“American prosperity, liberty, and security depend upon open and reliable access to information. The Internet empowers us and enriches our lives by providing ever-greater access to new knowledge, businesses, and services. Computers and network technologies underpin U.S. military warfighting superiority by enabling the Joint Force to gain the information advantage, strike at long distance, and exercise global command and control.”Read More
Published by Penguin Random House, June 19, 2018
By David E. Sanger
“The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists.”Read More
“The inside story of how America’s enemies launched a cyber war against us-and how we’ve learned to fight back…”
Includes links to:
“The Lawfare Podcast: John Carlin on ‘Dawn of the Code War’“ by Jen Patja Howell. Saturday, November 24, 2018.
A discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15, 2019 at the Center for Strategic & International Studies.
John Carlin on “Stay Tuned with Preet” Dec. 4, 2018.