Header graphic for print
Steptoe Cyberblog

Monthly Archives: June 2013

Using Attribution to Deter Cyberespionage

Posted in China, Cybersecurity and Cyberwar, International, Security Programs & Policies

Foreign Policy has published my article on how attribution can be used to deter foreign governments’cyberespionage. Excerpts below: The Obama-Xi summit in Sunnylands ended without any Chinese concessions on cyber-espionage. This came as no surprise; cyber spying has been an indispensable accelerant for China’s military and economic rise. And though Beijing may someday agree that… Continue Reading

“I’m shocked—shocked—to find that surveillance is going on in here.”

Posted in Privacy Regulation

It seems we can’t go a day without another bombshell in what we can now call the “Snowden Affair.” Many people are calling Edward Snowden a “whistleblower” for leaking two classified intelligence programs. But that term is usually reserved for someone who reveals government lies, law-breaking, or malfeasance. What Snowden revealed, though, are government activities… Continue Reading

Total Information Awareness, Redux

Posted in Privacy Regulation

There have been many critics of the Obama Administration’s aggressive pursuit of leakers. But today’s news offers a new line of attack on the Administration’s tactics: they’re apparently not working. The UK paper The Guardian was the beneficiary of a huge new leak, this one about a secret court order to a Verizon subsidiary ordering… Continue Reading