The United States is under a growing and constant threat of cyberattack. US cybersecurity strategy has evolved in response, adapting to the new threat climate by committing US Cyber Command to more aggressive and persistent peacetime cyber operations. However, the Department of Defense Cyber Mission Force (CMF) has been stretched thin attempting to carry out… Continue reading Outsourcing the Cyber Kill Chain: Reinforcing the Cyber Mission Force and Allowing Increased Contractor Support of Cyber Operations
Tag: Cybersecurity
Active Cyber Measures: Reviving Cold War Debunking and Deterrence Strategy
Department of Justice and National Intelligence Center reports on active cyber measures (ACMs) carried out by U.S. adversaries on social media display a staggering manipulation of American conversations, journalism, and electoral processes. Unlike Cold War active measures conducted through human intelligence (HUMINT) operations, creating or manipulating an online intelligence asset requires exponentially fewer resources and… Continue reading Active Cyber Measures: Reviving Cold War Debunking and Deterrence Strategy
Comparing the Strength of SEP Patent Portfolios: Leadership Intelligence for the Intelligence Community
The next generation of mobile broadband, 5G, is emerging as a major area of competition between the United States and China. 5G technology promises vast improvements not only to the speed of commercial cellular connections, but also to governments’ intelligence, surveillance, and reconnaissance capabilities. Leadership in the development of 5G technology has thus been deemed… Continue reading Comparing the Strength of SEP Patent Portfolios: Leadership Intelligence for the Intelligence Community