-
As I mentioned earlier, this past week I was privileged to attend a conference on the State of the Field in the study of Cyber Conflict sponsored by the Columbia School of International and Public Affair...
-
Fred Kaplan joined me this week at the Hoover Book Soiree for a terrific discussion of his new book, Dark Territory: The Secret History of Cyber War:
-
Greg Miller has an interesting and seemingly quite well-sourced article in the Washington Post today documenting (and offering explanations for) a significant decline in CIA drone strikes. To be clear, ...
-
In 2003 the Cyber-Conflict Studies Association was founded to foster the academic study of a new discipline -- conflict in the cyber domain. At the time they were more in the nature of Cassandra's tryi...
-
Although we served as national security officials for Presidents from different parties, we stand united in our concern for the growing threat of a significant terrorist attack on our shores, due to the ...
-
There is an interesting exchange in the new Snowden FOIA release (h/t Marcy Wheeler) that has me concerned as a technologist. In it Snowden provides some technical support from NSA Hawaii to NSA headquar...
-
This week, Herb Lin and I are giving a joint talk about the suit-hoodie divide, and whether relations between Washington and Silicon Valley are getting worse (I think the answer is yes). Part of the prob...
-
CENTCOM has just released a summary of publicly-acknowledged airstrikes conducted against AQAP targets in Yemen over the first five months of 2016. The list includes three strikes from February and Marc...
-
The DOD airstrike that may have killed Taliban leader Mullah Mansour is interesting, from a legal perspective, at many levels.
-
In his recent post on sextortion as cybersecurity, Benjamin Wittes rightly points out that every webcam should have a physical cover or off-switch. I want to add an additional technical point: Even barri...
-
In the week since the release of our sextortion reports, there have been a number of encouraging signs of legislative interest in the problem. The day Brookings released the reports, Rep.
-
Like many of us on the internet, sextortionists rely on pseudonyms to carry out their work, whether in order to hide their identity online or to affirmatively present a false one.