Active Cyber Measures: Reviving Cold War Debunking and Deterrence Strategy

Department of Justice and National Intelligence Center reports on active cyber measures (ACMs) carried out by U.S. adversaries on social media display a staggering manipulation of American conversations, journalism, and electoral processes. Unlike Cold War active measures conducted through human intelligence (HUMINT) operations, creating or manipulating an online intelligence asset requires exponentially fewer resources and… Continue reading Active Cyber Measures: Reviving Cold War Debunking and Deterrence Strategy

Cybercrime vs. Cyberwar: Paradigms for Addressing Malicious Cyber Activity

Although acts of cybercrime and cyberwar are different, the lines between the two have been become blurred over time. The nature of cyberspace has complicated the pre-existing doctrine for armed attacks, yet they are still being applied. Furthermore, the United States historically has responded to malicious cyber activity through a militarized lens. This tendency to… Continue reading Cybercrime vs. Cyberwar: Paradigms for Addressing Malicious Cyber Activity

Transnational Government Hacking

Cyber investigations often involve devices and data that cross or are located across international borders. This raises challenges for law enforcement which often finds itself limited by enforcement jurisdiction that stops at its territorial borders. What happens when law enforcement is seeking to access data or a device and the location is unknown? What about… Continue reading Transnational Government Hacking