10 Feb 2017

DHS enhanced analysis of Grizzly Steppe election hack

DHS analysts leverage the Cyber Kill Chain model to analyze, discuss, and dissect malicious cyber activity. The phases of the Cyber Kill Chain are Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions on the Objective. This section will provide a high-level overview of GRIZZLY STEPPE activity within this

04 Feb 2017

State Department Report on Gray Zone Conflict

The study addresses the challenges facing the United States from the increasing use by rivals and adversaries – state and non-state alike – of what have come to be called “Gray Zone” techniques. The term Gray Zone (“GZ”) denotes the use of techniques to achieve a nation’s goals and frustrate

04 Feb 2017

Baseline Comparison of US and Foreign Anarchist Extremist Movements

This joint DHS and FBI Assessment examines the possible reasons why anarchist extremist attacks in certain countries abroad and in the United States differ in the frequency of incidents and degree of lethality employed in order to determine ways US anarchist extremists actions might become more lethal in the future.

27 Jan 2017

ODNI Global Trends Report 2017 – Paradox of Progress

We are living a paradox: The achievements of the industrial and information ages are shaping a world to come that is both more dangerous and richer with opportunity than ever before. Whether promise or peril prevails will turn on the choices of humankind. The progress of the past decades is

06 Jan 2017

Intelligence Community Report on Election Hacking

Assessing Russian Activities and Intentions in Recent US Elections Russian efforts to influence the 2016 US presidential election represent the most recent expression of Moscow’s longstanding desire to undermine the US-led liberal democratic order, but these activities demonstrated a significant escalation in directness, level of activity, and scope of effort

29 Dec 2016

DHS-FBI Joint Analysis Report on GRIZZLY STEPPE Russian Malicious Cyber Activity

“This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks

07 Nov 2016

A FBI Primer on DarkNet Marketplaces

“Last week, the FBI joined a number of other U.S. law enforcement agencies in Operation Hyperion, a successful international action aimed at disrupting the operations and infrastructure of illicit DarkNet marketplaces. The initiative was the brainchild of the Five Eyes Law Enforcement Group (FELEG), an international coalition of law enforcement

04 Nov 2016

The U.S. Government and Zero-Day Vulnerabilities: From Pre-Heartbleed to Shadow Brokers

“In August 2016, a group calling itself Shadow Brokers released a cache of top secret cyber spying capabilities almost certainly belonging to the U.S. National Security Agency (NSA). Out of the fifteen exploits in the cache, several appear to be previously unknown vulnerabilities (a so-called zero day or 0day vulnerability).[1]

01 Nov 2016

UK National Cyber Security Strategy 2016-2021

The future of the UK’s security and prosperity rests on digital foundations. The challenge of our generation is to build a flourishing digital society that is both resilient to cyber threats, and equipped with the knowledge and capabilities required to maximise opportunities and manage risks. We are critically dependent on

31 Oct 2016

Into the Gray Zone: The Private Sector and Active Defense against Cyber Threats

A new report from the GW Center for Cyber and Homeland Security offers the most comprehensive assessment to date of the legal, policy and technological contexts that surround private sector cybersecurity and active defense measures to improve U.S. responses to evolving threats. The report provides a framework to develop active