On Thursday, State Department officials released a statement alleging that the GRU, a Russiam military intelligence agency, was responsible for cyberattacks that targeted Georgia in October. The attacks took down or defaced thousands of websites and disrupted the broadcasts of two television stations. Administration officials stated that the US and
“Russian government-affiliated actors launched coordinated cyber attacks against Ukrainian government and military targets before and during the attack and seizure of Ukrainian ships and sailors on November 25, a private intelligence firm announced this week. The attacks appeared to be aimed at stealing information that would have been relevant to planning
The U.S. is working to build a cyber deterrence policy and philosophy that will build coalitions and clearly communicate, through both word and deed, that cyber attacks against the U.S. and its allies will lead to severe consequences. Transparency in these efforts, however, poses a singular difficulty. While joining with
An OODA Loop interview with author P.W. Singer on his new book about information operations on social networks.
“Research conducted by the National Security Agency has found that after five hours of cyber operations, performance drops and frustration begins to increase among staffers. Those longer missions caused roughly 10 percent more fatigue and frustration compared to operations that lasted less than five hours, Celeste Paul, a senior researcher
While Cyber has been a recognized warfare domain for almost ten years, the U.S. is still working to improve information sharing relationships between traditional intelligence entities and cyber operations groups. The problem has been named an “item of special interest” for the DoD and efforts are currently under way to
The following overview of Russian espionage operations was extracted from the excellent Report on Russian Security Issues, released by the country of Estonia. As a discipline, cyber espionage in Russia is quite old. The KGB had top-level technical capabilities for spying on the West. Signals intelligence of the time encompassed