A Clear Deterrence Strategy Required for Cyber
by Terrence S. Allen
With the press of a button, a nation goes to war. Much of that nation’s livelihood will be destroyed with this button press. In the U.S. there is always an operator ready to hit their button, ensuring… Read More
Earlier this month, the Center for Strategic & International Studies (CSIS) published a report that provided a cybersecurity agenda for the incoming president. The CSIS Cyber Policy Task Force began working on the new agenda in late 2014, and provides recommendations on policies, organizational improvements, and resources needed in the… Read More
The Department of Homeland Security (DHS) is working on an updated version of the National Cyber Incident Response Plan (NCIRP). The current NCIRP has not been updated for six years.
The NCIRP provides a plan for the government’s response to major cyberattacks and is “a nationwide approach to cyber incidents,… Read More
Yesterday the Simons Center for Interagency Cooperation and the U.S. Army Command and General Staff School (CGSS) hosted the second lecture in their new InterAgency Brown-Bag Lecture Series. Over 65 students and faculty from the U.S. Army Command and General Staff College (CGSC) and other area universities attended the lecture.… Read More
Several U.S. intelligence and law enforcement agencies are investigating possible cyber-attacks aimed at November’s presidential election. While the agencies do not have conclusive proof that Russia is involved in a specific plot, officials from the FBI, CIA, National Security Agency (NSA), and Department of Homeland Security (DHS) are concerned.
One… Read More
On November 30, the House of Representative passed H.R. 3490, the Strengthening State and Local Cyber Crime Fighting Act. The bill was originally introduced in September of this year by Rep. John Ratcliffe (R-TX) befor being referred to the Committees on the Judiciary and Homeland Security.
The bill amends the… Read More
FBI Cyber Division Section IV Chief Gerald Bessette was recently interviewed about actions agencies should take before and after a cyber breach. During the interview, Bessette discussed the Cyber Division’s place within the FBI, trends in cyber intrusions and breeches, and the differences between cyber investigations and traditional probes.
Bessette… Read More
by Megan Penn, Joshua K. Miller and Jan Schwarzenberg
Violent extremist organizations have increased their online presence using the Internet to establish an online brand, communicate with members, and radicalize sympathizers. The regular use of online media, forums, and communications has altered the way that governments, non-governmental organizations (NGOs), and… Read More
Earlier this month, Congress passed four pieces of cybersecurity legislation. Among this legislation are two bills meant to facilitate greater cooperation between the federal government and the private sector...
Inside this issue: Losing Lessons at the Water’s Edge, Benjamin Cabana; Deep Analysis: Designing Complexity Into Our Understanding of Conflict, Thomas G. Matyók, Hannah Rose Mendoza and Cathryne Schmitz... and much more.