For the last several years readers of this blog have pondered the challenge of effective law enforcement across national borders in the digital realm, an exercise that often pits American law enforcement against American companies and puts US law enforcement in potential conflict with foreign allies. On Thursday June 22 at 9 AM I will be hosting an event at The Heritage Foundation entitled: "
Latest in Cybersecurity: Crime and Espionage
The CrashOverride program represents the first-in-the-wild case of a generic automated attack: one that is designed to affect all systems of a given family, not just a particular installation. If someone were to couple this warhead to a self-propagating worm for delivery, it could constitute a global threat.
We've sold our one Bitcoin for a healthy profit.
The courts take up questions over authorization to access the third-party accounts of former employees, the CFAA's definition of "loss," and bitcoin.
I am a bit of an outlier in the cybersecurity community since I think that there are circumstances in which private actors ought to be allowed to more aggressively respond to intrusions on their systems (though I don't go "full postal" on the issue). For those who are interested in the subject I just published a piece at Heritage co-authored with my colleagues Steve Bucci and David Inserra, entitled "Next Steps for U.S.
Should tensions mount, there is a risk that China will loosen its restraint and again permit its military and state-owned enterprises to conduct cyber-enabled economic espionage against U.S. companies.
Charley Snyder and Michael Sulmeyer analyze the recent indictment of two Russian spies and two criminal hackers.
A grand jury has released an indictment against four defendants in the Yahoo hacking case, including two Russian FSB officers.
Lower courts on both the state and federal level are grappling with how Riley’s treatment of cellphones applies to the search of technology.
Three observations from a meeting of American academics and government representativeswith Chinese counterparts on contemporary issues in cybersecurity.