-
Emirati-backed Hackers Started Gulf Crisis, According to U.S. Intelligence
-
C4ISRNET recently published an interesting and useful four-part series exploring what U.S. Cyber Command will need to operate on its own, separate from the National Security Agency. (Part I is here and p...
-
Want a thorough backgrounder on the 2001 Authorization for Use of Military Force? This is the episode for you. (This also is the episode for you if what you want, instead, is an hour of legal blather fol...
-
This episode is dominated by IT procurement news. And it’s as irresistible as a twelve-car pileup on the Beltway. We open the news with an exploration of the federal de-listing of Kaspersky Labs, and h...
-
Don't look now, but a new front has opened in L'Affaire Russe. It will be a quiet one at first, but I suspect it won't stay quiet for long.
The new front is civil litigation.
-
U.S. intelligence officials say the United Arab Emirates was behind a hacking operation that falsely attributed inflammatory statements to the Emir of Qatar and subsequently created a diplomatic rift bet...
-
The recent WannaCry and NotPetya global cyber incidents have fueled the debate already raging over the role of and limits on corporate self-defense in cyberspace. The emerging international practice of “...
-
Event Announcements (More details on the Events Calendar)
-
President Trump has given his reasons why he does not worry, nor should we, about Donald Trump, Jr.’s meeting with Russians. He has not long been in politics, Mr. Trump says, but he knows it’s not a “nic...
-
The Washington Post has yet another great informative story -- this time about the suspicion that the UAE is behind a hack of Qatar and that the hack was, itself, part of a plan to stir up the Gulf.
-
In a July 11 posting, Paul Rosenzweig argued that cyber cooperation with bad actors is always a bad idea, specifically referring to the President’s incomprehensible idea to form with Russia “an impenetra...
-
According to published news reports, the Australian government plans to “introduce draft legislation that will attempt to force technology companies to break into end-to-end encrypted messages.”
-
Andrew Kent argues that in light of President Trump’s attempts to influence the FBI investigation into his campaign’s Russia connections, and his firing of James Comey, Congress should consider giving th...
-
Assessing the Impact One Year On, and Projecting What the Future May Hold
Photo: AFP
-
The University of California, Irvine’s new Cybersecurity Policy & Research Institute (CPRI), which opened last year under the directorship of Bryan Cunningham, launched several interesting new cybersecur...
-
Editor’s Note: The Obama administration's nuclear deal with Iran remains one of its most important, and most contentious, foreign-policy legacies. Much of the controversy in the United States stems from ...
-
At this point, it’s widely accepted that Russia interfered in the 2016 presidential election; the question is what the United States should do about it. At Third Way, Mieke Eoyang, Evelyn Farkas, Ben Fre...
-
Yet another important story buried in the chaos of the Trump presidency. As the New York Times reports, China is moving to end Hong Kong's independence:
-
Benjamin Wittes, Jane Chong, and Quinta Jurecic examined how the Donald Trump Jr. email story and the recent news on Russian contacts from The Wall Street Journal expose the growing cracks in no-collusio...
-
Rinat Akhmetshin, a Russian-American lobbyist with reported Russian intelligence ties also attended the controversial meeting between Donald Trump Jr. and Russian attorney Natalia Veselnitskaya in June 2...