Header graphic for print
Steptoe Cyberblog

Tag Archives: cyberespionage

Steptoe Cyberlaw Podcast – Interview with Ambassador Sepulveda

Posted in China, Cybersecurity and Cyberwar, Data Breach, International, Privacy Regulation, Security Programs & Policies

Our guest this week is Ambassador Daniel Sepulveda, the man charged with managing the US relationship with the International Telecommunications Union.  The ambassador helps us make sense of the recent ITU meeting in Busan, South Korea, where efforts to validate a greater government role in internet affairs seem to have been turned back for another… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Peter Schaar

Posted in China, Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

Our podcast this week unpacks the European Court of Justice ruling on the right to be forgotten.  We interview Peter Schaar, a proponent of the right to be forgotten and an eminent former data protection chief.  From 2003 to 2013 Peter was the Federal Commissioner for Data Protection and Freedom of Information.  He is currently… Continue Reading

Steptoe Cyberlaw Podcast – Interview with Shane Harris

Posted in China, Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

For the first time, we begin the podcast not with NSA on the defensive, but with breaking news of an American counterattack on Chinese cyberspying – the indictment of several PLA members for breaking into US computers to steal commercial information. Our guest for the day, Shane Harris, is ideally suited to analyze the case…. Continue Reading

Steptoe Cyberlaw Podcast – Interview with Jim Lewis

Posted in Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

This week’s cyberlaw podcast begins as always with the week in NSA. We suspect that a second tech exec meeting with the President (for two hours!) bodes ill for the intelligence community, or at least the 215 metadata program, as does the shifting position of usually stalwart NSA supporters like Dianne Feinstein and Dutch Ruppersberger…. Continue Reading

Intelligence Under Law – Judiciary Testimony

Posted in Cybersecurity and Cyberwar, Privacy Regulation, Security Programs & Policies

I will be testifying today to the full House Judiciary Committee about FISA, NSA and the Snowden flap. You can download my full prepared remarks here. In short I used this opportunity to muse on the resemblance between today and the waning Clinton era; I discuss the (surprisingly short) history of viewing intelligence as a… Continue Reading

Using Attribution to Deter Cyberespionage

Posted in China, Cybersecurity and Cyberwar, International, Security Programs & Policies

Foreign Policy has published my article on how attribution can be used to deter foreign governments’cyberespionage. Excerpts below: The Obama-Xi summit in Sunnylands ended without any Chinese concessions on cyber-espionage. This came as no surprise; cyber spying has been an indispensable accelerant for China’s military and economic rise. And though Beijing may someday agree that… Continue Reading

Hacking Hollywood

Posted in China, Cybersecurity and Cyberwar, Data Breach, International, Security Programs & Policies

That might sound like breaking news from 1983, but this time we’re not talking movie plots, we’re talking business. Specifically how Chinese cyberespionage could affect Hollywood’s bottom line. The Hollywood Reporter asked me to talk about that impact in a guest column, out this week. Here’s some of what I said: Hollywood might be blinded… Continue Reading

Up the Ladder We Go

Posted in China, Cybersecurity and Cyberwar, International, Security Programs & Policies

Once again, Ellen Nakashima of The Washington Post has broken a cybersecurity story: A new intelligence assessment has concluded that the United States is the target of a massive, sustained cyber-espionage campaign that is threatening the country’s economic competitiveness, according to individuals familiar with the report. The National Intelligence Estimate identifies China as the country… Continue Reading

Corporate Network Defense: When Seconds Count, the FBI is Years Behind

Posted in Cybersecurity and Cyberwar, Data Breach, Security Programs & Policies

The Washington Post’s Ellen Nakashima wrote another cutting-edge article on innovative approaches to network defense.  I’ve blogged before about honeytokens, deceptive files that leave hackers with false data while flagging the intrusion to defenders.  The article suggests that their use is growing, as other defensive techniques prove ineffective: Brown Printing Co…began planting fake data in… Continue Reading

Prosecuting Cyberespionage – Justice’s New Strategy

Posted in Cybersecurity and Cyberwar, International, Security Programs & Policies

The National Security Division of the Justice Department may be getting on the cyberspace attribution/retribution bandwagon — and in the process, reshaping US strategy for deterring cyberespionage. First, they are creating a new liaison position in US Attorney offices across the country — the National Security Cybersecurity Specialist, or NSCS (rhymes with “discus meniscus” for you… Continue Reading

The Hackback Debate

Posted in Cybersecurity and Cyberwar, Privacy Regulation, Security Programs & Policies

The vulnerability of computer networks to hacking grows more troubling every year. No network is safe, and hacking has evolved from an obscure hobby to a major national security concern. Cybercrime has cost consumers and banks billions of dollars. Yet few cyberspies or cybercriminals have been caught and punished. Law enforcement is overwhelmed both by… Continue Reading

China-US “Proxy” Cyberwar Negotiations?

Posted in China, Cybersecurity and Cyberwar, International

Over the past three years think tanks in China and in the US have been conducting what could be called “proxy” negotiations on cyberwar and cyberespionage. The China Institutes of Contemporary International Relations and the US Center for Strategic and International Studies are establishment institutions, with just enough independence from their governments to make the talks… Continue Reading