Header graphic for print
Steptoe Cyberblog

Tag Archives: cyberespionage

Steptoe Cyberlaw Podcast – Interview with Jim Lewis

Posted in Cybersecurity and Cyberwar, International, Privacy Regulation, Security Programs & Policies

This week’s cyberlaw podcast begins as always with the week in NSA. We suspect that a second tech exec meeting with the President (for two hours!) bodes ill for the intelligence community, or at least the 215 metadata program, as does the shifting position of usually stalwart NSA supporters like Dianne Feinstein and Dutch Ruppersberger…. Continue Reading

Intelligence Under Law – Judiciary Testimony

Posted in Cybersecurity and Cyberwar, Privacy Regulation, Security Programs & Policies

I will be testifying today to the full House Judiciary Committee about FISA, NSA and the Snowden flap. You can download my full prepared remarks here. In short I used this opportunity to muse on the resemblance between today and the waning Clinton era; I discuss the (surprisingly short) history of viewing intelligence as a… Continue Reading

Using Attribution to Deter Cyberespionage

Posted in China, Cybersecurity and Cyberwar, International, Security Programs & Policies

Foreign Policy has published my article on how attribution can be used to deter foreign governments’cyberespionage. Excerpts below: The Obama-Xi summit in Sunnylands ended without any Chinese concessions on cyber-espionage. This came as no surprise; cyber spying has been an indispensable accelerant for China’s military and economic rise. And though Beijing may someday agree that… Continue Reading

Hacking Hollywood

Posted in China, Cybersecurity and Cyberwar, Data Breach, International, Security Programs & Policies

That might sound like breaking news from 1983, but this time we’re not talking movie plots, we’re talking business. Specifically how Chinese cyberespionage could affect Hollywood’s bottom line. The Hollywood Reporter asked me to talk about that impact in a guest column, out this week. Here’s some of what I said: Hollywood might be blinded… Continue Reading

Up the Ladder We Go

Posted in China, Cybersecurity and Cyberwar, International, Security Programs & Policies

Once again, Ellen Nakashima of The Washington Post has broken a cybersecurity story: A new intelligence assessment has concluded that the United States is the target of a massive, sustained cyber-espionage campaign that is threatening the country’s economic competitiveness, according to individuals familiar with the report. The National Intelligence Estimate identifies China as the country… Continue Reading

Corporate Network Defense: When Seconds Count, the FBI is Years Behind

Posted in Cybersecurity and Cyberwar, Data Breach, Security Programs & Policies

The Washington Post’s Ellen Nakashima wrote another cutting-edge article on innovative approaches to network defense.  I’ve blogged before about honeytokens, deceptive files that leave hackers with false data while flagging the intrusion to defenders.  The article suggests that their use is growing, as other defensive techniques prove ineffective: Brown Printing Co…began planting fake data in… Continue Reading

Prosecuting Cyberespionage – Justice’s New Strategy

Posted in Cybersecurity and Cyberwar, International, Security Programs & Policies

The National Security Division of the Justice Department may be getting on the cyberspace attribution/retribution bandwagon — and in the process, reshaping US strategy for deterring cyberespionage. First, they are creating a new liaison position in US Attorney offices across the country — the National Security Cybersecurity Specialist, or NSCS (rhymes with “discus meniscus” for you… Continue Reading

The Hackback Debate

Posted in Cybersecurity and Cyberwar, Privacy Regulation, Security Programs & Policies

The vulnerability of computer networks to hacking grows more troubling every year. No network is safe, and hacking has evolved from an obscure hobby to a major national security concern. Cybercrime has cost consumers and banks billions of dollars. Yet few cyberspies or cybercriminals have been caught and punished. Law enforcement is overwhelmed both by… Continue Reading

China-US “Proxy” Cyberwar Negotiations?

Posted in China, Cybersecurity and Cyberwar, International

Over the past three years think tanks in China and in the US have been conducting what could be called “proxy” negotiations on cyberwar and cyberespionage. The China Institutes of Contemporary International Relations and the US Center for Strategic and International Studies are establishment institutions, with just enough independence from their governments to make the talks… Continue Reading