POLITICO
There’s a Big Gap in Our Cyber Defenses. Here’s How to Close It.
Foreign adversaries who use U.S. servers are hiding in plain sight, but we can unveil them without violating the Constitution.
Cyber Defense Exercise, 2013 | U.S. Army photo by Mike Strasser/USMA PAO
By GLENN S. GERSTELL
Link Copied
Glenn S. Gerstell served as general counsel of the National Security Agency from 2015 to 2020. He is currently a senior adviser at the Center for Strategic & International Studies.
The foreign hackers behind the massive cybersecurity failures dominating recent headlines had one critical strategy in common – they leased computers in the United States to burrow into their victim’s networks. Because U.S. cybersecurity systems don’t regard domestic connections as inherently suspect, the attackers were able to hide in plain sight. Like secretive investors deploying a series of shell companies and trusts to mask true ownership, Russia, China and other sophisticated nation
Supreme Court asked to give access to secretive court s work
journaltimes.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from journaltimes.com Daily Mail and Mail on Sunday newspapers.
Supreme Court asked to give access to secretive court s work
washingtontimes.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from washingtontimes.com Daily Mail and Mail on Sunday newspapers.
Supreme Court asked to give access to secretive court s work
gazettetimes.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from gazettetimes.com Daily Mail and Mail on Sunday newspapers.