New York Times: I Work for N.S.A. We Cannot Afford to Lose the Digital Revolution.

New York Times: I Work for N.S.A. We Cannot Afford to Lose the Digital Revolution. . “The digital revolution has urgent and profound implications for our federal national security agencies. It is almost impossible to overstate the challenges. If anything, we run the risk of thinking too conventionally about the future. The short period of time our nation has to prepare for the effects of this revolution is already upon us, and it could not come at a more perilous and complicated time for the National Security Agency, Central Intelligence Agency, National Geospatial-Intelligence Agency, Defense Intelligence Agency, Federal Bureau of Investigation and the other components of the intelligence community.”

Quartz: A cyber-attack in Japan could now bring the US into war

Quartz: A cyber-attack in Japan could now bring the US into war. “In a briefing yesterday in Washington, DC, US secretary of state Mike Pompeo declared that ‘a cyberattack could, in certain circumstances, constitute an armed attack under Article 5 of the US-Japan Security Treaty.’ The security agreement, ratified after World War II, guarantees the United States’ defense in the event of an attack on Japan.”

ZDNet: Source code of Iranian cyber-espionage tools leaked on Telegram

ZDNet: Source code of Iranian cyber-espionage tools leaked on Telegram. “In an incident reminiscent of the Shadow Brokers leak that exposed the NSA’s hacking tools, someone has now published similar hacking tools belonging to one of Iran’s elite cyber-espionage units, known as APT34, Oilrig, or HelixKitten. The hacking tools are nowhere near as sophisticated as the NSA tools leaked in 2017, but they are dangerous nevertheless.”

A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments (New York Times)

New York Times: A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments. “The man in charge of Saudi Arabia’s ruthless campaign to stifle dissent went searching for ways to spy on people he saw as threats to the kingdom. He knew where to go: a secretive Israeli company offering technology developed by former intelligence operatives.”

New York Times: Huge Trove of Leaked Russian Documents Is Published by Transparency Advocates

New York Times: Huge Trove of Leaked Russian Documents Is Published by Transparency Advocates. “A group of transparency advocates on Friday posted a mammoth collection of hacked and leaked documents from inside Russia, a release widely viewed as a sort of symbolic counterstrike against Russia’s dissemination of hacked emails to influence the American presidential election in 2016.”

Michigan State University: Putting Understudied Terrorists Under A Microscope

Michigan State University: Putting Understudied Terrorists Under A Microscope. “Bombs exploding, hostages taken and masked gunmen firing machine guns are all types of terrorist attacks we’ve seen. According to new Michigan State University research, it’s the attacks we don’t see – cyberattacks – that happen more often and can cause greater destruction.”

Reuters: Cyber firms warn on suspected Russian plan to attack Ukraine

Reuters: Cyber firms warn on suspected Russian plan to attack Ukraine. “Cisco Systems Inc (CSCO.O) on Wednesday warned that hackers have infected at least 500,000 routers and storage devices in dozens of countries with highly sophisticated malicious software, possibly in preparation for another massive cyber attack on Ukraine.”