“The PRC’s goal is developing capabilities to disrupt critical infrastructure in the event of a future conflict,” NSA Cybersecurity Director Rob Joyce told Breaking Defense in a statement.
By Sydney J. Freedberg Jr.“It’s part of a larger diplomatic strategy,” cyber policy expert James Lewis said of the US attribution to China for Microsoft Exchange hacks earlier this year.
By Brad D. WilliamsSolarWinds threat actor reportedly accessed DHS emails and DoE schedules. Cyberespionage campaigns are “the types of things we should expect [Russia] to do,” one cybersecurity expert observed. “I’m not arguing we shouldn’t have a response. We should respond. …My only argument is that we should not overact.”
By Brad D. WilliamsA project called Hack the Air Force is paying “white hat” hackers over $130,000 for finding weak points in its websites, the service announced this morning. It’s the Defense Department’s third “bug bounty” – a high-profile initiative of Obama’s last Defense Secretary, Ashton Carter, that’s survived under Trump. [CORRECTED FIGURES} Hack the Pentagon found 138 unique,…
By Sydney J. Freedberg Jr.CAPITOL HILL: To rephrase Doctor Johnson for the 21st century, there’s nothing that concentrates the mind so wonderfully as the prospect of being hacked. In cyberspace, though, that threat goes both ways. While Americans are outraged over Chinese theft of US secrets both commercial and military, a leading expert told Congress yesterday, the Chinese are…
By Sydney J. Freedberg Jr.
NSA Monitoring Imbroglio: Much Ado About System That Works
I’ve been trying to figure out a way to address the subtleties that are being missed or ignored by most critics of the NSA’s recently revealed PRISM program, but it’s gotten lost in the process of readying for the Paris Air Show and covering those things that the famous Washington journalism pack isn’t following in…