Cybersecurity
237 Articles

What the Dublin Tram System Hack Reveals about the Future of Hostage Taking
Imagine hackers commandeered a capital city’s transit system, holding it hostage for a cryptocurrency ransom. Consider the implications of this attack: beyond a data breach,…

Weapons of Mass Consumerism: Why China Wants Your Personal Information
A new frontier in cyber insecurity is opening. Cyber powers, including China, are collecting and compiling data on private citizens, including Americans and other nationals. The…

Give Up the Ghost: A Backdoor by Another Name
Government Communications Headquarters (GCHQ,) the UK’s counterpart to the National Security Agency (NSA), has fired the latest shot in the crypto wars. In a post to Lawfare…

Russia’s Tightening Control of Cyberspace Within its Borders
Russian proposals to ban certain materials online and to block search engines that don’t comply with requests of state authorities highlight the need to beware of domestic policies…

The Huawei Arrest: How It Likely Happened and What Comes Next
The arrest and possible extradition of an executive of Chinese tech giant Huawei raises important questions about foreign policy cases and Justice Department autonomy.

Was Your Voting Machine Hacked? Without More User-Friendly Devices, We May Not Know
Election-technology monitoring during the midterms logged more than 900 individual reports of voting issues. But the problems weren’t the anticipated cyberattacks.

A Congressional Cybersecurity To-Do List
With a lame duck session pending, Congress may address a number of cybersecurity and data security issues before the end of the calendar year. Since it passed the “Cybersecurity…

Countering Russian Election Hacks
Explainer on the legal triggers, limits, and powers of Pentagon's new authority to prepare and conduct cyber response if Russia hacks into midterms votes.

Election Security is an Immediate National Security Concern
Democracy isn’t in the casting of the votes -- it’s in the counting. Georgia State Rep. Scott Holcomb says we need to ensure that our system is secure and every ballot is counted…

17 Years Later: Applying Post-9/11 Lessons to Potential Cyber Attacks
Seventeen years ago today, Americans learned all too tragically that, as the 9/11 Commission later put it, “the system was blinking red” for a reason. Our country, we came…

Election Interference Is Just a Symptom. Evaporation of Trust is the Disease.
We need to recognize our cognitive infrastructure, on which trust is built, as a critical national asset that’s crumbling, and we need to shore it up—fast. It’s a challenge…

Locking in Transparency on the Vulnerabilities Equities Process
Eight months ago, the White House released a charter for the Vulnerabilities Equities Process (VEP), the interagency mechanism by which the federal government decides whether to…