Cybersecurity and Cyberwarfare

The use of computers and the Internet in conducting warfare in cyberspace.

Sponsor: 

Silicon Flatirons
University of Colorado Law School

Date: 
Wed, 11/15/2017 - 20:00 to Thu, 11/16/2017 - 00:45

Society increasingly depends on computer networks and wireless systems. Yet, outages and adverse incidents are regular occurrences.  It has become essential for this technology to maintain an acceptable level of service—in other words, to be resilient.



Sponsor: 

Cybersecurity and Infrastructure Protection Subcommittee

Homeland Security Committee

Date: 
Wed, 11/15/2017 - 20:00 to 23:00

The purpose of this hearing is to explore ways the Department of Homeland Security can maximize the value of cyber threat information shared by the government and identify and utilize the most effective cyber threat information sharing partnerships, in order to increase the participation and volume of cyber threat information sharing with the private sector.



Security Breach and Spilled Secrets Have Shaken the NSA to Its Core

A serial leak of the National Security Agency’s cyberweapons has damaged morale, slowed intelligence operations and resulted in hacking attacks on businesses and civilians worldwide.

FBI can’t unlock Texas shooter’s phone

The FBI has confiscated the phone of the gunman who opened fire at a Texas church Nov 5 but is unable to access it for the ongoing investigation.  FBI Special Agent Christopher Combs, who is leading the investigation, told reporters that the bureau had flown the device to Quantico (VA) Nov 6 and that agents have been reviewing the phone but have not been able to get into it.  “It actually highlights an issue that you’ve all heard about before with advance of the phones and the technology and the encryption, law enforcement, whether it’s at the state, local or the federal level, is increasin

Reps Poe, Lofgren Seek to Slam Surveillance Back Door

Reps Ted Poe (R-TX) and Zoe Lofgren (D-CA) have proposed amending the USA Liberty Act to toughen protections against warrantless searches and seizures of emails and other online communications. In Oct, House Judiciary Committee Chair Bob Goodlatte (R-VA) and Ranking Member John Conyers (D-MI) introduced the USA Liberty Act, which would reform and reauthorize Sec. 702 of the Foreign Intelligence Surveillance Act, which authorizes the surveillance of communications from non-U.S. residents.

Donald Trump a victim of hackers years before election

Four years ago, well before the furor over allegations Moscow meddled in the 2016 election that put Donald Trump in the White House, at least 195 web addresses belonging to Trump, his family or his business empire were hijacked by hackers possibly operating out of Russia.  The Trump Organization denied the domain names were ever compromised. But a review of internet records by the AP and cybersecurity experts shows otherwise. And it was not until the week of Oct 30, after the Trump camp was asked about it by the AP, that the last of the tampered-with addresses were repaired.

Is Russian social media meddling 'cyberwarfare'?

US lawmakers say Russia's use of social media in the 2016 presidential election amounts to cyberwarfare. Sens Dianne Feinstein (D-CA) and Angus King (I-ME) both used that term to describe Russian accounts and advertising that sowed division among Americans by promoting fake news and even protests. "This country has to have some kind of cyberwarfare deterrent capacity," Sen King said. "Right now, there's no price to be paid for meddling in our democracy." But there's no explicit definition or legal framework in the United States for what constitutes cyberwar.

The rogue Twitter employee who deleted Trump’s account could face hacking charges

Despite some onlookers calling him — or her — a hero, the anonymous Twitter employee who pulled the plug on President Donald Trump's Twitter account before leaving the company may want to lawyer up, according to experts on computer law. Whether or not Twitter pursues legal action against its former worker, federal officials could be motivated to prosecute — if only to deter future cases, analysts say.

AG Sessions blasts tech firms for blocking access to encrypted evidence

Attorney General Jeff Sessions is taking aim at technology firms for preventing law enforcement from accessing encrypted evidence for ongoing terror investigations, warning that such actions could have “deadly consequences.”  The issue has become a point of tension between tech companies and federal investigators in high-profile cases, such as the 2016 dispute between the FBI and Apple over data stored on an iPhone belonging to a suspect in the 2015 San Bernardino terror attack.  Sessions, who delivered remarks on national security in New York City, said that over the past year the FBI was

U.S. Prosecutors Consider Charging Russian Officials in DNC Hacking Case

Apparently, the Justice Department has identified more than six members of the Russian government involved in hacking the Democratic National Committee’s computers and swiping sensitive information that became public during the 2016 presidential election. Prosecutors and agents have assembled evidence to charge the Russian officials and could bring a case in 2018. Discussions about the case are in the early stages, apparently. If filed, the case would provide the clearest picture yet of the actors behind the DNC intrusion. U.S.