Defense Systems

Are there new rules for cyberwar?

Reports that the Trump administration has rescinded an Obama-era directive guiding the use of offensive cyber operations has cybersecurity experts pondering what, if anything, has replaced it.

Defense Systems

Marines get into the bug-bounty game

At the Las Vegas event, ethical hackers identified and reported 75 unique vulnerabilities and were awarded over $80,000 for their efforts.

Threats

An 11-Year-Old Hacked a Mock Florida Election Site in 10 Minutes

The hacking event was part of a hands-on workshop within the larger cybersecurity conference.

Science & Tech

The NGA Plans to Lock Employees In a Room Until They Learn Cyber Hygiene

The National Geospatial-Intelligence Agency will be locking employees in escape rooms to test their knowledge of cybersecurity.

Science & Tech

Hackers Find Scores of Vulnerabilities in Marine Corps Websites

The Pentagon’s latest bug-bounty contest continues a successful run of hack-the-military efforts.

Science & Tech

Russian Military Spy Software is on Hundreds of Thousands of Home Routers

In May, the Justice Department told Americans to reboot their routers. But there's more to do — and NSA says it's up to device makers and the public.

Science & Tech

California Is Automating Cyber-Threat Information Sharing

The state wants to add every city and county government to its automated threat feed program in the next three to four years.

Science & Tech

Flaw in Some Satellite Communication Terminals Can Expose US Troops’ Location

Vulnerabilities in certain brands of communications terminals can be used to access GPS data on forward-deployed troops.

Defense Systems

DOD sharply restricts use of geolocation devices and services

The Defense Department now prohibits personnel from using geolocation devices, applications or services in any area where military operations are being conducted.

Defense Systems

Wholesale shift of NBIB to DOD looks likely

National Background Investigations Bureau Director Charles Phalen discusses the Trump administration's plan to move the organization under the Defense Department.

Science & Tech

The Future Airman is a Hacker

Air Force recruiters will prize computer skills more highly, while the service will encourage airmen to experiment with their own solutions.

Science & Tech

Pentagon Prohibits Personnel From Using GPS Services in All ‘Operational Areas’

The device-agnostic policy applies to smartphones, tablets, fitness trackers, smartwatches and all other applications with geolocation features.

Science & Tech

Mike Pence’s Cybersecurity Speech, Annotated

The vice president delivered a fiery campaign-style cybersecurity speech at a Homeland Security cyber conference Tuesday. Here’s an explainer.

Science & Tech

How Russian Hackers Amplified the Seth Rich Conspiracy Until it Reached Donald Trump and the CIA

A new report claims that Russian hackers altered dates in stolen documents to frame the DNC staffer for the theft.

Policy

DHS Creates Cyber Risk Center to Protect High-Value Targets

The center will free up NCCIC to work on cyber threat sharing and incident response, officials say.

Defense Systems

Army seeks support for cyber risk management

The Army wants industry help to support its Defensive Cyberspace Operations organization with cybersecurity risk management services.

Science & Tech

Kremlin Hackers Take Aim at the Swiss Lab That’s Working the Skripal Poisoning Case

The group that attacked Ukraine's power grid is phishing a chemical-weapons lab critical to the Skripal case.

Defense Systems

NDAA calls for cyber warfare strategy

The final 2019 National Defense Authorization Act could bring the U.S. one step closer to developing a cyber warfare doctrine.

Threats

Pentagon Creates ‘Do Not Buy’ List of Russian, Chinese Software

Increasingly alarmed at foreign hacking, DOD and intelligence officials are racing to educate the military and defense contractors.

Science & Tech

China Is Still Stealing America’s Business Secrets, US Officials Say

The 2015 agreement between Xi and Obama produced only a lull in Beijing’s economic espionage.