Cyber Security

The Cybersecurity Dilemma

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. 

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions.

Bridging the Gaps in Cybersecurity Policy

 

Major questions impacting key cybersecurity policy decisions remain unanswered.  As a new Administration takes office, how should key stakeholders think about gaps like the capabilities of non-state actors to do harm in the digital space?  Will other nations follow Russia’s lead and steal and leak information against foes? Is the future of the public-private partnership – especially in protecting America’s critical infrastructure – a promising one?  And what’s the state of play in development of international norms?  Can the U.S. provide meaningful input?

The Spy Who Couldn't Spell: A Dyslexic Traitor, an Unbreakable Code, and the FBI's Hunt for America's Stolen Secrets

The thrilling, true-life account of the FBI’s hunt for the ingenious traitor Brian Regan—known as the Spy Who Couldn’t Spell.
 
Before Edward Snowden’s infamous data breach, the largest theft of government secrets was committed by an ingenious traitor whose intricate espionage scheme and complex system of coded messages were made even more baffling by his dyslexia. His name is Brian Regan, but he came to be known as The Spy Who Couldn’t Spell.
 

U.S.-China Cybersecurity Cooperation Needs to Move More Rapidly

The United States and China have wildly different visions for the future of the Internet. But they have shared interests in a secure, dynamic digital economy, Microsoft’s Jing de Jong-Chen argues – enough common ground to make progress on international norms.

 

A National Debate on Encryption — Now

The battle over the iPhone involved in the San Bernardino, Calif., shooting last year has ended in a truce. Hours before Apple and the Justice Department would have faced off in court, the FBI announced it had found a new way to get data off the device. In Silicon Valley — and far beyond — many sighed with relief.

Codex - Safeguards

1. Encryption
a. A method of securing data, either for storage or for communication, that better
protects its confidentiality and integrity
b. Example: Windows’ BitLocker can be used to encrypt hard disks so that the data
cannot be read by unauthorized users.
 
2. End-to-End Encryption

Pages