In 2012, Congress ordered the creation of a dedicated communications network for public safety workers. Seven years later, here’s where it stands.
Latest in Cybersecurity and Deterrence
A response to Max Smeets.
In a letter released Wednesday, six former combatant commanders and intelligence chiefs outlined “grave concerns” about risks posed by Chinese-developed 5G networks, including espionage, constraints on U.S. military operations, and threats to democracy and human rights. The letter is available here and below.
The Office of the Inspector General for the Department of Justice released a report detailing an audit of the FBI process that notifies victims of cyber intrusion. The audit's findings criticize the bureau for notification delays, incomplete data collection and shortcomings in victim engagement. The report is available in full here and below.
The new challenge is to figure out what adversaries are allowed to do in cyberspace, not what they’re not allowed to do.
Deterrence needs to move out of the theoretical plane and into the real world.
Clarifying the art of the possible might be the operation’s real lasting success.
What’s in the new offensive cyber doctrine that France unveiled in February?
The concept of agreed competition allows for robust academic and policy analysis that, hopefully, will allow competition in cyberspace to evolve into a stable arena of global politics.
Debates about cyber attribution already divide the U.S. policy process. NATO is at risk of the same problem.