Latest in Cybersecurity

Cybersecurity

Breaking WPA2

Sometimes we are reminded that the "noise" of policy drowns out important practical news.  Today is one of those days.  While we sit around worrying about Harvey Weinstein and Trump's latest tweet, it turns out that the encryption protocol at the core over almost all WiFi is vulnerable to attack. 

Cybersecurity

Protecting Electoral Infrastructure–Klobuchar/Graham and the NDAA

Our electoral infrastructure consists of two distinct pieces (or so it seems to me): a broader public context in which elections occur and a narrower system of election management. To date, almost everything we know about Russian electoral interference has dealt with the larger broader contextfake news, Russian troll factories, the hack of the DNC and other efforts to spread disinformation. As

Cyber Command

Separating NSA and CYBERCOM? Be Careful When Reading the GAO Report

The Government Accountability Office last week published a report that, among other things, weighs in on the pros and cons of the NSA/CYBERCOM “dual-hat” system (pursuant to which the director of the NSA/CSS and commander of CYBERCOM are the same person). The report deserves attention but also some criticism and context. Here’s a bit of all three.

1. What is the “dual-hat” issue?

Subscribe to Lawfare

EmailRSSKindle