Advertisements

looking beyond borders

foreign policy and global economy

Archive for the category “Cyber Security”

The Worldwide Struggle To Claim Cyber Sovereignty

much like economic globalisation and interdependence has slowly eroded the traditional concept of sovereignty, so has the expansion of the global internet. The physical infrastructure of cyberspace – the undersea fiber optic cables – is likely to continue connecting nations for trade and economic inclusion in global markets. But governments across the political spectrum – from Russia and China to Western liberal democracies – are now seeking to impose their sovereign authority on the content and data that transverse their borders across those very cables.

Read Here – The Cipher Brief

Advertisements

What The CIA’s Tech Director Wants From Artificial Intelligence

Should the U.S. fear growing Russian progress in artificial intelligence? Last week, Vladimir Putin  told students, “Whoever becomes the leader in this sphere will become the ruler of the world.” That caught the interest of noted AI phobe profiteer Elon Musk who tweeted, simply and ominously: “It begins…”

Read Here – Defense One

The Biggest Cybersecurity Disasters Of 2017 So Far

The first six months of 2017 have seen an inordinate number of cybersecurity meltdowns. And they weren’t just your standard corporate breaches. It’s only July, and already there’s been viral, state-sponsored ransomware, leaks of spy tools from US intelligence agencies, and full-on campaign hacking. And that’s just the beginning.

Read Here – Wired

The Problem Of Siloed Cyber Warriors

Cyber capabilities cannot be detached from other domains of warfare, such as electromagnetic, air, land, sea, and space. The future holds two potential battlefields that overlap: one fought between high-tech adversary militaries, and another, between highly specialised military units and insurgent forces in population-dense urban environments. In both situations, cyber capabilities must be integrated into all other domains of warfare.

Read Here – The Cipher Brief

Can the Intelligence Community Secure Its Own Hacking Tools?

In the case of the latest Wikileaks document dump, the first in a planned series from a cache the site has dubbed “Vault 7,” we have an apparent reversal of the formula: The un-coverup—the fact of the leak itself—is probably more significant than the substance of what has thus far been revealed.

Read Here – The Atlantic

India’s Cyber Potential: A Bridge Between East And West

While the most common points of reference to engagements in cyberspace are in the United States, Europe, Russia, and China, other countries are quickly realizing the importance of securing critical networks from crime, sabotage, subversion, and espionage. As the country with one of the world’s fastest-growing populations and economies, this realization is bearing down on India more than most.

Read Here – The Cipher Brief

 

Cybersecurity In The Gulf: The Middle East’s Virtual Frontline

The Middle East, particularly the Gulf states, are quickly recognizing the urgent need for better cybersecurity, while regional adversaries such as Iran have begun weaponizing code as an extension of broader strategic goals within the region. What, though, is the Gulf’s current cybersecurity atmosphere, and how does Iran’s emerging use of offensive cyber capabilities fit into its broader strategy in the Middle East?

Read Here – The Cipher Brief

Russia, China, And Cyber Espionage

Cyber operations are also an essentially asymmetric tool, in that they level the playing field between nations that may have wide disparities in terms of the effectiveness of their conventional forces. However, this cuts both ways, as the United States also conducts a considerable number of cyber operations in support of intelligence collection. This leads into the third primary advantage of cyber as it relates to espionage, which is that cyber-capabilities make exfiltrating large volumes of information much, much easier than would be the case otherwise.

Read Here – The Cipher Brief

Digital Armament

Besides the shiny world of social media, hard information technology work has been part of the U.S. governments for decades, but critics believe that the way the government deals with cyber issues is outdated or doesn’t even exist appropriately. Recently, the White House published the long-awaited Cybersecurity Strategy and Implementation Plan (CSIP), which aims to strengthen and protect the federal networks and systems.

Read Here – The European

Oops! Someone Just Leaked The Price List For Cyberwar

On Monday, the Italian company Hacking Team, which produces secret cyber weapons for law-enforcement and government clients around the world, became the victim of an embarrassing public disclosure: more than 400 gigabytes of internal data made its way online in a widely shared torrent file.

Read Here – Defense One

Post Navigation

%d bloggers like this: