While ISIL uses the Internet to recruit fighters and incite violence, the Anonymous counter initiative could lower the volume of the online echo chamber, and yield support for the war against ISIL and its extremist ilk.
Mobile phones collect and retain enormous amounts of information that can be useful in criminal investigations. However, state and local law enforcement face substantial challenges when accessing these data.
Existing cybersecurity measures in the EU are fragmented, largely due to gaps in operational capabilities as well as strategic priorities of Member States. However, there are many policy options that may improve the EU's overall cybersecurity approach.
Securing government networks is certainly necessary, but authorities should not lose sight of the need to couple their defense of America's networks with appropriate resources dedicated to combatting criminal, terrorist, and other threats in cyberspace.
The human element is the most unpredictable factor in cybersecurity. A social engineer aims to make people do what they want or give the social engineer information, often without the person considering the negative consequences.
While a U.S.-China cyberspace agreement is a welcome step, it also underscores the greater issues facing the United States and the international community in this largely ungoverned space. A precondition for securing U.S. networks should be the development of an overarching cyber doctrine that defines acceptable behavior and allows the U.S. to defend its networks against threats.
In this September 14th congressional briefing, Lillian Ablon discusses the basics of cyber and information security and provides insights into some of the complexities of cybersecurity policymaking. Topics include why software vulnerabilities are significant, the components of cyber risk beyond the threat, motivations of various cyber threats actors, and what they exploit.
The discussion of cybersecurity should not be trapped within narrow technical, national security, or legal stovepipes and should include an examination of economic, civil, and societal factors. With that goal in mind, RAND hosted an analytic exercise on cybersecurity.
RAND Europe has collected evidence from one of the largest-ever surveys of citizens' views across Europe on security, surveillance and privacy issues in three scenarios: train travel, internet use (described here), and storage of health records.
New Internet-based technology may aid criminal justice agencies through promising tools such as better criminal databases, remotely conducted trials, and electronic monitoring of parolees. But many of the developments raise issues related to civil rights, privacy, and cybersecurity that must be addressed.
New Internet-based technology may aid criminal justice agencies through promising tools, such as better criminal databases, remotely conducted trials, and electronic monitoring of parolees. But many of the developments raise issues related to civil rights, privacy, and cybersecurity that must be addressed.
Reports on an evaluation of online resources developed by the California Mental Health Services Authority's stigma and discrimination reduction initiative program partners and provides an overview of these resources and the use of partner websites.
Document submitted on July 31, 2015 as an addendum to testimony presented before the House Homeland Security Committee, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies on June 24, 2015.
While the U.S. Cyber Command is preparing the nation's defenses for the coming ramp-up in cyberwarfare-like attacks, the messages spread instantly by hordes of attackers through social media may not be receiving the attention they deserve.
Software tools created by the U.S. State Department to encourage the free flow of information online and on mobile phone networks are not likely to be used by criminals to pursue illegal activities. While some have the potential to be used for illicit purposes, there are numerous alternative technologies that are better suited.
Software tools created by the U.S. State Department to encourage the free flow of information online and on mobile phone networks are not likely to be used by criminals to pursue illegal activities. While some have the potential to be used for illicit purposes, there are alternative technologies that are better suited.
While worldwide spending on cybersecurity is close to $70 billion a year and growing, many chief information security officers believe that hackers may gain the upper hand in two to five years, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.