July 31, 2018 — Dr. Ronald J. Deibert’s book Black Code: Surveillance, Privacy, and the Dark Side of the Internet addresses growing concerns regarding international cyber threats and argues against current countries’ methods of responding to these threats. Deibert presents a solid, well-rounded argument, with intriguing evidence to support his assertions regarding our flawed cybersecurity environment, and closes Black Code with personal recommendations to secure and regulate the cyberspace domain. Readers receive a broad spectrum analysis of cyberspace and cybersecurity and are provided specific information on the actions and interactions of hackers, international governments, and related cyber industries. Black Code reads like a cyber novel; brilliantly crafted with a strong foundation and argument against current cybersecurity techniques and practices. Dr. Deibert is Professor of Political Science, and Director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. The Citizen Lab is described as “an interdisciplinary research and development laboratory working at the intersection of the digital technologies, global security, and human rights.” MORE
|
July 31, 2018 — Warfare in the physical world, both asymmetrical and conventional, has occurred throughout history. However, war in cyberspace is a more recent phenomenon, and there is still much to be explored and understood. Because cyberspace is inherently asymmetric, many lessons learned from asymmetric warfare in the physical world also apply to cyber conflicts.
This article will examine the online battle waged by Anonymous against ISIS and analyze five asymmetrical characteristics of cyber conflicts: the vulnerability of conventionally-powerful actors to attacks from relatively weaker adversaries, the unconventional nature of offensive tactics, the low level of intensity of those tactics, the ability of actors to organize and aggressively operate in an extremely decentralized manner, and the strategic goal of breaking willpower or forcing a change of policy. Understanding the asymmetrical nature of cyber conflicts and applying appropriate lessons learned will lead to a more effective defensive posture against cyber-aggressors and facilitate a more secure operating environment in cyberspace. MORE
|
July 31, 2018 — Deterrence, military strategy, and national power are taught at all our United States service academies. As a military officer, you will repeatedly study these subjects as you mature and grow into more senior positions. In this article, I would like to share with you my thoughts on deterrence, and what we have been doing to improve our ability in the Air Force to fly, fight and win–in, thru,
and from cyberspace. MORE
|
July 18, 2018 — ABSTRACTInnovation is critical to improving society and is key to the cyber domain. The rapid growth of the internet has meant that tools for operating in cyberspace have constantly evolved. It has often been said, however, that the only innovation taking place in cyber warfare is in offensive operations. So where is the innovation for the defense? MORE
|
February 26, 2018 — Science and technology have been an enormous part of America’s economic success since its formation. In the modern age, innovation lends itself to cyberspace, and more specifically, to financial technology (fintech). Global trade and investment are now increasingly tied to nation-state actors, with fintech playing a massive role in this connection MORE
|
December 7, 2017 — The report provides a detailed and robust look at the challenges Ukraine has faced, the perceptions of those involved in its security, defense, and education, and provides recommendations for future engagements. Our mission was to look beyond the headlines, to delve into the details, and give an unvarnished look at the utilization of cyber, EW, and IO in a hybrid conflict. MORE
|
August 1, 2017 — We all surrender privacy in some form and fashion and allow companies to gather data so these enterprises can better serve us. Our cell phone provider needs to know where we are to route calls to the appropriate cell tower. As consumers and users, we allow the cell phone company to track and follow our moves because the convenience of being able to receive a call is greater than our perceived loss of privacy. For the last twenty years, Americans have accepted that the benefit of convenience outweighs the loss of privacy. MORE
|
May 1, 2017 — In private industry, businesses identify employment needs, create job openings, and attempt to attract talent. Likewise, the U.S. Army created the Cyber branch in a similar manner. MORE
|
April 27, 2017 — Having joined Palo Alto Networks following a 35-year career in the U.S. military, the last decade of which I served in a variety of leadership positions in cyber operations, strategy and policy, I have found that many of the cybersecurity challenges we face from a national security perspective are the same in the broader global business environment.
This blog post series describes what I consider to be four major imperatives for cybersecurity success in the digital age, regardless of whether your organization is a part of the public or private sector. MORE
|
April 5, 2017 — Secretary of State Henry Stimson was famously quoted “Gentlemen don’t read each other’s mail” in 1929. Just a couple years later during the 1930-31 London Naval Conference and the 1932 Geneva Disarmament Conference, Secretary Stimson would come to understand and appreciate the value of national security intelligence and would reverse himself. MORE
|