Cyber
357 Articles

Weapons of Mass Consumerism: Why China Wants Your Personal Information
A new frontier in cyber insecurity is opening. Cyber powers, including China, are collecting and compiling data on private citizens, including Americans and other nationals. The…

Give Up the Ghost: A Backdoor by Another Name
Government Communications Headquarters (GCHQ,) the UK’s counterpart to the National Security Agency (NSA), has fired the latest shot in the crypto wars. In a post to Lawfare…

Russia’s Tightening Control of Cyberspace Within its Borders
Russian proposals to ban certain materials online and to block search engines that don’t comply with requests of state authorities highlight the need to beware of domestic policies…

The Huawei Arrest: How It Likely Happened and What Comes Next
The arrest and possible extradition of an executive of Chinese tech giant Huawei raises important questions about foreign policy cases and Justice Department autonomy.

Was Your Voting Machine Hacked? Without More User-Friendly Devices, We May Not Know
Election-technology monitoring during the midterms logged more than 900 individual reports of voting issues. But the problems weren’t the anticipated cyberattacks.

A Congressional Cybersecurity To-Do List
With a lame duck session pending, Congress may address a number of cybersecurity and data security issues before the end of the calendar year. Since it passed the “Cybersecurity…

Countering Russian Election Hacks
Explainer on the legal triggers, limits, and powers of Pentagon's new authority to prepare and conduct cyber response if Russia hacks into midterms votes.

Election Security is an Immediate National Security Concern
Democracy isn’t in the casting of the votes -- it’s in the counting. Georgia State Rep. Scott Holcomb says we need to ensure that our system is secure and every ballot is counted…

Psy-Ops, Meet Cyber-Ops: U.S. Takes on Russian Trolls
A Russian troll sits down at his desktop and logs into one of the social media accounts he uses to impersonate and radicalize Americans. Suddenly, a direct message appears: “Hello,…

Planning for ‘Cyber Fallout’ After the Iranian Nuclear Deal
Keep your cyber tools close, your history books closer. For some, the signing of the July 2015 Iran nuclear deal might appear as a “watershed moment” for abating the…

Exploring Gray Zones and LikeWar
"This is a book about how a new kind of communications became a new kind of war,” Peter Singer and Emerson Brooking write in their new book: LikeWar: The Weaponization of Social…

The Politics of Trump’s Mismatched Response to Election Interference
With just over a month until the midterm elections, President Donald Trump took to the UN Security Council to call out an adversary in the room for interfering in our elections.…