Cybersecurity and Cyberwarfare

The use of computers and the Internet in conducting warfare in cyberspace.

Russian Hackers Largely Skipped the Midterms, and No One Really Knows Why

After unleashing widespread cyberattacks and disinformation warfare on the US during the 2016 presidential election, Russia’s trolls and hackers mostly appeared to have sat on the sidelines during the campaign ahead of the midterm elections. No one is sure why.  Several factors may have reduced Moscow’s impact. Clint Watts, a senior fellow with the Foreign Policy Research Institute, said the diffuse nature of congressional and state races makes them a harder target than a single presidential election.

The Root of the Matter: Data and Duty

The time has come for a new set of guardrails for information capitalism that protect citizens and promote marketplace competition. The framework for such policies already exists and is embedded in the principles of common law. Companies have responsibilities: a “duty of care” to not cause harm, and a “duty to deal” to prevent monopoly bottlenecks. The harvesting of personal information – often without the individual’s knowledge – infringes on the sovereignty of the individual and their personal privacy.

The global threat of China’s digital authoritarianism

Officials in Beijing are providing governments around the world with technology and training that enable them to control their own citizens. As Chinese companies compete with their international counterparts in crucial fields such as artificial intelligence and 5G mobile service, the democratic norms that long governed the global Internet are falling by the wayside. When it comes to Internet freedom, many governments are eager to buy the restrictive model that China is selling.

Special Counsel probes Roger Stone’s interactions with Trump campaign and timing of WikiLeaks release of Podesta emails

The special counsel investigation is pressing witnesses about longtime Trump ally Roger Stone’s private interactions with senior campaign officials and whether he had knowledge of politically explosive Democratic emails that were released in October 2016. As part of his investigation into Russia’s interference in the 2016 campaign, special counsel Robert S. Mueller III appears to be focused on the question of whether WikiLeaks coordinated its activities with Stone and the campaign.

President Trump's refusal to give up his iPhone sets dangerous precedent

President Donald Trump’s reported refusal to give up his personal iPhone demonstrates the complications of keeping government officials secure at a time when they are increasingly tied to their phones by the time they take office.

FCC Chairman Pai: ‘Level playing field for old regulations and new tech a challenge’

A Q&A with Federal Communications Commission Chairman Ajit Pai. 

When Trump Phones Friends, the Chinese and the Russians Listen and Learn

When President Donald Trump calls old friends on one of his iPhones to gossip, gripe, or solicit their latest take on how he is doing, American intelligence reports indicate that Chinese spies are often listening — and putting to use invaluable insights into how to best work the president and affect administration policy, current and former American officials said. Trump’s aides have repeatedly warned him that his cellphone calls are not secure, and they have told him that Russian spies are routinely eavesdropping on the calls, as well.

Yahoo to pay $50 million in damages for massive security breach

Yahoo has agreed to pay $50 million in damages and provide two years of free credit-monitoring services to 200 million people whose email addresses and other personal information were stolen as part of the biggest security breach in history. The restitution hinges on federal court approval of a settlement filed Oct 22 in a 2-year-old lawsuit seeking to hold Yahoo accountable for digital burglaries that occurred in 2013 and 2014, but weren’t disclosed until 2016.

House Commerce Committee Releases Whitepaper on Coordinated Vulnerability Disclosure Cybersecurity Practices

The House Commerce Committee released a white paper detailing the committee’s investigation and recommendations regarding coordinated vulnerability disclosure (CVD) cybersecurity practices. The committee offers two main recommendations to support public and private sector organizations in their adoption of CVD programs as part of their cybersecurity risk management strategies.

US Begins First Cyberoperation Against Russia Aimed at Protecting Elections

The United States Cyber Command is targeting individual Russian operatives to try to deter them from spreading disinformation to interfere in elections, telling them that American operatives have identified them and are tracking their work, according to officials briefed on the operation. The campaign, which includes missions undertaken in recent days, is the first known overseas cyberoperation to protect American elections, including the Nov midterms.