Quick Thoughts on the Russia Hack
Russian President Vladimir Putin and U.S. President Donald Trump at the 2017 G-7 Hamburg Summit. (President of the Russian Federation, https://tinyurl.com/ycb82mje; CC BY 4.0, https://creativecommons.org/licenses/by/4.0/deed.en)
David Sanger, building on a Reuters story, reports in the New York Times that some country, probably Russia, “broke into a range of key government networks, including in the Treasury and Commerce Departments, and had free access to their email systems.” The breach appears to be much broader. “[N]ational security-related agencies were also targeted, though it was not clear whether the systems contained highly classified material.” The Department of Homeland Security appears to be one of those agencies. Sanger says that the “intrusions have been underway for months” and that “the hackers have had free rein for much of the year.” The original Reuters story on Dec. 13 noted that people familiar with the hacks
Published 11 November 2020
The United States has one of the world’s strongest and most sophisticated capabilities to launch cyberattacks against adversaries. How does the U.S. Constitution allocate power to use that capability? And, Matthew Waxman asks, what does that allocation tell us about appropriate executive-legislative branch arrangements for setting and implementing cyber strategy?
The United States has one of the world’s strongest and most sophisticated capabilities to launch cyberattacks against adversaries. How does the U.S. Constitution allocate power to use that capability? And what does that allocation tell us about appropriate executive-legislative branch arrangements for setting and implementing cyber strategy? Matthew Waxman writes in
U.S. Cyber Command FORT GEORGE G. MEADE, Md. , –
Estonian and U.S. cyber commands jointly conducted a defensive cyber-operation on Estonian Defence Forces’ networks from September 23 to November 6. The operation, designed to counter malicious cyber actors, strengthened the cyber defense capability of both nation’s critical assets.
“Combined operations with our closest allies like U.S. are vital for ensuring security of our services. These kind of operations provide our operators an opportunity to exchange best practices as well as give us objective feedback on our current defense posture in cyber domain. This operation is another successful milestone in our cooperation with U.S. partners,” said Mihkel Tikk, Deputy Commander of Estonian Defense Forces Cyber Command.