Cyber Security

The Spy Who Couldn't Spell: A Dyslexic Traitor, an Unbreakable Code, and the FBI's Hunt for America's Stolen Secrets

The thrilling, true-life account of the FBI’s hunt for the ingenious traitor Brian Regan—known as the Spy Who Couldn’t Spell.
 
Before Edward Snowden’s infamous data breach, the largest theft of government secrets was committed by an ingenious traitor whose intricate espionage scheme and complex system of coded messages were made even more baffling by his dyslexia. His name is Brian Regan, but he came to be known as The Spy Who Couldn’t Spell.
 

U.S.-China Cybersecurity Cooperation Needs to Move More Rapidly

The United States and China have wildly different visions for the future of the Internet. But they have shared interests in a secure, dynamic digital economy, Microsoft’s Jing de Jong-Chen argues – enough common ground to make progress on international norms.

 

A National Debate on Encryption — Now

The battle over the iPhone involved in the San Bernardino, Calif., shooting last year has ended in a truce. Hours before Apple and the Justice Department would have faced off in court, the FBI announced it had found a new way to get data off the device. In Silicon Valley — and far beyond — many sighed with relief.

Codex - Safeguards

1. Encryption
a. A method of securing data, either for storage or for communication, that better
protects its confidentiality and integrity
b. Example: Windows’ BitLocker can be used to encrypt hard disks so that the data
cannot be read by unauthorized users.
 
2. End-to-End Encryption

Codex - A Common Language for Cybersecurity

For many who want to learn more about cybersecurity, knowing where to start can be difficult. Non-technical audiences—especially policymakers—are often separated from experts by a language gap ( just look at WillUsingThePrefixCyberMakeMeLookLikeAnIdiot.com).

Codex - Building Blocks

1. What is code?
a. Computer language consisting of instructions and information
b. Example: A software developer writes code for a new program in one of a variety of
languages, such as C#. Eventually, all instructions to the computer are converted to
binary machine language, zeros and ones.
 

2. What makes up a network?

FBI needs to offer Apple an olive branch

When the FBI announced that it had found a way to crack the San Bernardino, California, gunman's phone -- a path forward that wouldn't require conscripting Apple to produce custom software -- the stage seemed set for a thaw.

Pages