Cyber Security

Briefing with Admiral Michael Rogers, Commander of U.S. Cyber Command

“Digital security was just emerging as an issue when I was first elected to Congress,” said Wilson Center Director, President and CEO Jane Harman. “Today, it’s a priority nationwide — for government, for private enterprise, and for all of us here at the Wilson Center.” In that spirit, Admiral Mike Rogers, Commander of U.S. Cyber Command and Director of the National Security Agency, came to the Center to lay out his vision for the nation’s warfighting arm in cyberspace.

America is losing the digital war against the Islamic State

Two weeks ago in Boston, authorities stopped a disturbed young man before he could launch a terror attack; tragically, last week in Chattanooga, the story ended very differently. Law enforcement officials are scrambling to learn whether clues were missed that could have prevented the rampage and led to the alleged shooter, Mohammod Youssuf Abdulazeez. But in too many cases, the breadcrumb trail starts with suspicious ones and zeros — with digital propaganda that we still struggle to counter.

Terrorism in Cyberspace: The Next Generation

In a follow up to his previous book (Terror on the Internet), Gabriel Weimann’s newest work describes a growing and untamed cyberspace environment that is providing a natural and effective base of operations for the next generation of online terrorist. Are efforts to thwart those online efforts keeping pace with the level of threat? That’s the focus of this edition of Wilson Center NOW.

Confronting Terror-affiliated Hacktivists

The cyberthreat posed by terror groups today looks less like war than hacktivism—the use of online subversion or sabotage, often by loosely networked actors, to boost a political agenda. Within these opportunistic webs of affiliation, whether a hacker has an operational link to a terrorist organization is largely irrelevant. Any sympathizer can use digital tools to deface websites for propaganda value, encourage acts of violence, or cause economic disruption. In response, firms and governments can do more to improve defenses, educate users, and monitor hacktivist capabilities.

Beyond Google: The Dark Side of the Internet

Most people assume that a Google search can identify most of the information available on a given subject. But beyond the capabilities of Google or any other search engine, there is another online world. In fact, the number of non-indexed internet sites is estimated to be 500 times larger than what a search engine can reveal. And where the sun doesn’t shine, there exists a dark side of the Internet that is a conduit for all types of illegal and often dangerous activity.

The Estonia Model: A Conversation With President Toomas Hendrik Ilves on a Free and Secure Internet

The Republic of Estonia built a new government from the ground up, resulting in the world's most comprehensive and efficient “e-government.” Citizens are empowered by a free nationwide Wi-Fi network and a school program that boosts tech competence at every age level. But being an early adopter also has its risks. In 2007, Estonia was one of the first victims of a large-scale cyberattack that mostly targeted government websites and financial services. The attack provided the country's security experts with valuable experience and information in dealing with such incidents.

The Estonia Model: Why a Free and Secure Internet Matters

After regaining independence in 1991, the Republic of Estonia built a new government from the ground up. The result was the world's most comprehensive and efficient 'e-government': a digital administration with online IDs for every citizen, empowered by a free nationwide Wi-Fi network and a successful school program — called Tiger Leap — that boosts tech competence at every age level. While most nations still struggle to provide comprehensive Internet access, Estonia has made major progress towards a strong digital economy, along with robust protections for citizen rights.

Cyber Threats and Vulnerabilities

Cyber threats, and related vulnerabilities, are becoming more numerous and sophisticated. And the job of keeping one step ahead of the problem is a most daunting task. During a recent Director's Forum, Lisa Monaco, Assistant to the President for Homeland Security and Counterterrorism, delivered a keynote speech about the evolving threats and the Obama Administration's comprehensive strategy to address them. She also discussed the topic with Wilson Center Director, Jane Harman and fielded question from participants in the public forum. That’s the focus of this edition of REWIND.

How the CIA can get from spy to cyberspy

Agility and digital savvy traditionally haven't been the strong suits of government agencies, so it's encouraging that CIA Director John O. Brennan wants a big investment in cyberespionage and a new Directorate of Digital Innovation as part of what he calls a “bold” reorganization of the CIA. Brennan's overhaul is commendable, but it's urgent to do more to make his agency cyber literate.

A Conversation with Secretary of Homeland Security Jeh Johnson

Secretary of Homeland Security, Jeh Johnson, recently delivered a major address at the Wilson Center. Afterwards, he discussed the latest efforts to secure America from a myriad of threats ranging from terrorism to natural disasters with the Center’s director and president, Jane Harman. That’s the focus of this edition of REWIND.

Speakers
Jane Harman, Director, President and CEO, Wilson Center
Jeh Johson, Secretary, US Department of Homeland Security

Pages