Persistent Enforcement: Criminal Charges as a Response to Nation-State Malicious Cyber Activity

Malicious cyber activities by foreign states present major challenges to the US government. Foreign governments steal intellectual property, attack election systems, wage influence campaigns, and cripple American companies. One tool brought to bear most recently against these state actors is the criminal indictment. This article reviews the use of criminal charges as a response to… Continue reading Persistent Enforcement: Criminal Charges as a Response to Nation-State Malicious Cyber Activity

Personal Information as an Attack Vector: Why Privacy Should Be an Operational Dimension of US National Security

The US government has always been keen on its ability to protect sensitive and classified information from its enemies, yet the majority of resources have focused on military and national security information, which has left other categories of information exposed. Capt. Christopher Dearing focuses the reader on the national security implications of personal information and… Continue reading Personal Information as an Attack Vector: Why Privacy Should Be an Operational Dimension of US National Security

Projecting Power: How States Use Proxies in Cyberspace

How and why do states use cyber proxies to project power? Why do some states lean closer to these proxies than others, and what does this distance reveal about how a state views them? In this article, Syed Hamza Mannan answers these questions in a review of Tim Maurer’s book, Cyber Mercenaries: The State, Hackers,… Continue reading Projecting Power: How States Use Proxies in Cyberspace