Archives
CYBERCOM Moving Toward Command Elevation: DefenseNews
While I’m here and talking military, I figured I’d post this article from DefenseNews’ Zachary Fryer-Biggs on how U.S. Cyber Command is headed to unified combatant command status. It looks like the time frame is unclear, but the upgrade will happen.
Claiming the Lost Cyber Heritage: Jason Healey
I was trolling around Twitter and came across a link from Jason Healey (@Jason_Healey), the director of the Cyber Statecraft Initiative at the Atlantic Council. The tweet linked an article that Healey had written for the Fall 2012 Strategic Studies Quarterly; the article was titled “Claiming the Lost Cyber Heritage.” It was fantastic. Anyone who […]
Obama Weighs Broad Program to Defend Networks From Cyber Attacks: Bloomberg Businessweek
On August 30th, 2012, Chris Strohm reported for Bloomberg Businessweek about the possibility of an executive order or Presidential directive addressing cybersecurity. When cybersecurity legislation floundered earlier this summer, a few people floated the idea of President Obama issuing an executive order to achieve the same effect. The Bloomberg article expands on that idea and […]
Cyber spying expands in Iran: Reuters
On August 29th, 2012, Jim Finkle reported for Reuters on the cyber espionage campaign targeting the Middle East. Notably, the article described the Mahdi Trojan, a less sophisticated piece of malware that “lets remote attackers steal files from infected PCs and monitor emails as well as instant messages.” Mahdi has mostly gone after firms and […]
U.S. Talks Openly About Hacking Foes: Wired
Noah Shachtman wrote an interesting article for Wired on the U.S. military’s new openness regarding offensive cyber operations. Noting the Pentagon’s previous reticence on offensive cyber operations, Shachtman explained how “America’s armed forces [now] can’t stop talking about it.” Shactman specifically pointed to Gen. Mill’s recent comments on U.S. military offensive cyber operations, DARPA’s Plan […]
Hacking the mind: CNet
A bit outside of our normal fare, but something that caught my eye. Tim Hornyak wrote an interesting article for CNet on how scientists have demonstrated that cheap EEG gear can “hack the mind.” The article explored a particular EEG headset which allowed users to “interact with computers using their thoughts alone.” Using these headsets, […]
US General Claims To Have Hacked The Enemy: HuffPo
Hello again! After a short hiatus, I’m back and blogging at Crossroads. This blog will be updated regularly from here on out, so please keep visiting! And what better way to return to blogging than to consider this interesting story from Raphael Satter and posted to the Huffington Post. According to Mr. Satter, Marine Lt. […]
Accepting Applications for Online Course Cyber Security Law and Policy
Course is October 1 to November 18, 2012 Once again, the Institute for National Security and Counter-Terrorism (INSCT) will be offering the online course "Cyber Security Law and Policy," which tackles one of the most critical national security threats of our time. INSCT is an innovative interdisciplinary research center that addresses key national and international […]
Cybersecurity at Risk – NYTimes.com
In an editorial entitled “Cybersecurity at Risk” published in the print edition on August 1, 2012, the New York Times argues: The Lieberman-Collins bill should be voted by the Senate this week and then merged with the House version so a law can be enacted this year. If not, and a catastrophic cyberattack occurs, Americans […]