ARTICLES

July 31, 2018

Book Review: Black Code: Surveillance, Privacy, and the Dark Side of the Internet

Dr. Ronald J. Deibert’s book Black Code: Surveillance, Privacy, and the Dark Side of the Internet addresses growing concerns regarding international cyber threats and argues against current countries’ methods of responding to these threats. Deibert presents a solid, well-rounded argument, with intriguing evidence to support his assertions regarding our flawed cybersecurity environment, and closes Black Code with personal recommendations to secure and regulate the cyberspace domain. Readers receive a broad spectrum analysis of cyberspace and cybersecurity and are provided specific information on the actions and interactions of hackers, international governments, and related cyber industries. Black Code reads like a cyber novel; brilliantly crafted with a strong foundation and argument against current cybersecurity techniques and practices. Dr. Deibert is Professor of Political Science, and Director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. The Citizen Lab is described as “an interdisciplinary research and development laboratory working at the intersection of the digital technologies, global security, and human rights.”

July 31, 2018

Anonymous’ Cyberwar Against ISIS and the Asymmetrical Nature of Cyber Conflicts

Warfare in the physical world, both asymmetrical and conventional, has occurred throughout history. However, war in cyberspace is a more recent phenomenon, and there is still much to be explored and understood. Because cyberspace is inherently asymmetric, many lessons learned from asymmetric warfare in the physical world also apply to cyber conflicts. This article will examine the online battle waged by Anonymous against ISIS and analyze five asymmetrical characteristics of cyber conflicts: the vulnerability of conventionally-powerful actors to attacks from relatively weaker adversaries, the unconventional nature of offensive tactics, the low level of intensity of those tactics, the ability of actors to organize and aggressively operate in an extremely decentralized manner, and the strategic goal of breaking willpower or forcing a change of policy. Understanding the asymmetrical nature of cyber conflicts and applying appropriate lessons learned will lead to a more effective defensive posture against cyber-aggressors and facilitate a more secure operating environment in cyberspace.

July 31, 2018

An Airman’s View on Deterrence and Cyberspace

Deterrence, military strategy, and national power are taught at all our United States service academies. As a military officer, you will repeatedly study these subjects as you mature and grow into more senior positions. In this article, I would like to share with you my thoughts on deterrence, and what we have been doing to improve our ability in the Air Force to fly, fight and win–in, thru, and from cyberspace.

July 18, 2018

Thinking Outside-the-Box for Cyber Defense: Introducing an Innovation Framework for the 21st Century

ABSTRACTInnovation is critical to improving society and is key to the cyber domain. The rapid growth of the internet has meant that tools for operating in cyberspace have constantly evolved. It has often been said, however, that the only innovation taking place in cyber warfare is in offensive operations. So where is the innovation for the defense?

Feb. 26, 2018

Virtual Currency in a Cashless Society: A Potential Window into Economic Cyberwarfare

Science and technology have been an enormous part of America’s economic success since its formation. In the modern age, innovation lends itself to cyberspace, and more specifically, to financial technology (fintech). Global trade and investment are now increasingly tied to nation-state actors, with fintech playing a massive role in this connection

Dec. 7, 2017

Stabilizing the Borderland: Confronting IO, EW and Cyber in Ukraine

The report provides a detailed and robust look at the challenges Ukraine has faced, the perceptions of those involved in its security, defense, and education, and provides recommendations for future engagements. Our mission was to look beyond the headlines, to delve into the details, and give an unvarnished look at the utilization of cyber, EW, and IO in a hybrid conflict.

Aug. 1, 2017

Book Review: Data and Goliath: The Hidden Battles to Collect Your Data and Control your World

We all surrender privacy in some form and fashion and allow companies to gather data so these enterprises can better serve us. Our cell phone provider needs to know where we are to route calls to the appropriate cell tower. As consumers and users, we allow the cell phone company to track and follow our moves because the convenience of being able to receive a call is greater than our perceived loss of privacy. For the last twenty years, Americans have accepted that the benefit of convenience outweighs the loss of privacy.

May 1, 2017

The Cyberspace Workforce: An Array of Opportunities

In private industry, businesses identify employment needs, create job openings, and attempt to attract talent. Likewise, the U.S. Army created the Cyber branch in a similar manner.

April 27, 2017

Four Imperatives for Cybersecurity Success in the Digital Age: Part 2

Having joined Palo Alto Networks following a 35-year career in the U.S. military, the last decade of which I served in a variety of leadership positions in cyber operations, strategy and policy, I have found that many of the cybersecurity challenges we face from a national security perspective are the same in the broader global business environment. This blog post series describes what I consider to be four major imperatives for cybersecurity success in the digital age, regardless of whether your organization is a part of the public or private sector.

April 5, 2017

The Value of Intelligence and Secrets

Secretary of State Henry Stimson was famously quoted “Gentlemen don’t read each other’s mail” in 1929. Just a couple years later during the 1930-31 London Naval Conference and the 1932 Geneva Disarmament Conference, Secretary Stimson would come to understand and appreciate the value of national security intelligence and would reverse himself.