What cyber threat do China, Russia, and Iran present for the remainder of 2018 and 2019? Matt Devost provides some insight into the geopolitical elements influencing that answer.
The following overview of Russian espionage operations was extracted from the excellent Report on Russian Security Issues, released by the country of Estonia. As a discipline, cyber espionage in Russia is quite old. The KGB had top-level technical capabilities for spying on the West. Signals intelligence of the time encompassed
A new international security report produced by the country of Estonia is essential reading for anyone interested in Russian security issues, both in the cyber domain and in Eastern Europe. “Estonian security institutions have been talking for years about attempts on Russia’s part to splinter the unity and trust that
A recently released report reveals that in 2010 the Defense Intelligence Agency’s Defense Warning Office commissioned a report on Warp Drive, Dark Energy, and the Manipulation of Extra Dimensions. The report focused on the feasibility and science of these technologies and the potential implications for national security. “The idea that
A new report from the U.S. State Department Overseas Advisory Council (OSAC) warns U.S. executives of an increased threat of cyber espionage as a result of trade tariffs being imposed by the Trump Administration. The report notes that “some experts believe that one side effect of this simmering trade dispute
Remember the July 2008 Atlantic Article by Nicolas Carr titled “Is Google Making Us Stupid?” Turns out that article was very prescient in its observations that we are relying more and more on Google for our research and less on gained or retained knowledge. As a kid, I used to
The report of the European Union independent High level Group on fake news and online disinformation has been released. In the report, the experts convened argue that a broad societal understanding of misinformation tactics, beyond just the realm of just fake news. “When tackling disinformation online, four principles under- lie
Watching the conclusion of the DARPA Cyber Grand Challenge at Def Con in 2016 felt like getting a glimpse into the future. At the time, and in subsequent media interviews (New Scientist, Cipher Brief) I noted that I had been caught by surprise and went into the event expecting incremental