Going on eight years now, Raytheon has been mounting a strategic campaign in cyber security. This past April, the company spent $1.7 billion on Austin-based Websense, the 13th cyber business it has purchased since October 2007 (Defense Mergers & Acquisitions Daily, 20 April 2015). In Forbes, defense industry booster Loren Thompson called the transaction “bold”—the value roughly matched that of the 12 preceding deals. That pattern suggests that Raytheon has been learning along the way how to build a successful business. More recent evidence was Raytheon’s selection this month as a finalist in DARPA’s Cyber Grand Challenge, in which some of the top teams in the US have been working to create self-healing code. As Byron Callan of Capital Alpha Partners wrote, that alone “suggests it’s doing something right,” whatever misgivings investors and their analysts may have had about Raytheon’s long-running strategy. » More
The spotlight must be an uncomfortable position for intelligence organisations that would far prefer to remain in the shadows. But since Edward Snowden fled the United States in the summer of 2013, there has been an almost constant drip-feed of stories concerning the operations of the US National Security Agency (NSA) and the UK Government Communications Headquarters (GCHQ). Yet the most recent scoop – originating from Wikileaks – has shown that we would do well to consider these kinds of “revelations” with a little greater care.
At its heart, the claim that the NSA spied on French presidents Jacques Chirac, Nicolas Sarkozy and Francois Holland, effectively boils down to: “country A spied on country B”. As a piece of news, this surely sits alongside the Pope’s status as a Catholic. What else would we expect a national intelligence gathering agency to do? The fundamental purpose of such organisations is to seek out national advantage, in whatever field – whether it is political, economic, military, or otherwise. » More
This blog is the first in several leading up to the World Policy Institute Board trip to Cuba in May. The trip seeks to re-open a once highly effective dialogue with Cuban leaders. WPI plans to examine the achievements of 55 years of revolutionary society and explore ways to highlight what the U.S. and Cuba can learn from each other.
As the Obama administration and Cuban negotiators examine the 54-year-old unilateral embargo (or “blockade” as the Cubans refer to it), one obstacle—particularly painful for Cubans and extremely important to American interests—must be addressed: Cuba’s continued presence on the U.S. State Department’s list of state sponsors of terrorism.
President Obama directed the State Department to review this designation in December 2014, since Cuba’s removal from that list is entirely justified and long overdue. As a result, when the State Department issues its annual Country Reports on Terrorism on April 30, it is likely to be the first time in 33 years that Cuba is not designated a sponsor. » More
Brazil has embraced the digital age with more gusto than most countries. It is one of the top users of social media and recently signed-off on a bill of rights for the Internet, the marco civil. The country is also a leader in the development of online banking with more than 43% of web users engaging such services, and can be proud of a thriving software industry, including some world beating companies.
But as computer users around the world are beginning to grasp, the spread of the digital world has its downsides. Alongside all the great things the Internet offers, not least new forms of political and economic empowerment, it brings some very serious threats. » More
“Cyber incidents are a bit like a bar brawl – you might have a pretty good idea who started it, but you will never be absolutely sure”.
When it comes to managing contemporary cyber incidents and crises, the above statement couldn’t be more accurate. National cybersecurity strategies and international regimes are not only becoming increasingly common, they’re also proving difficult to implement and enforce. In this respect, some of the most pressing concerns are associated with key cybersecurity aspects like ‘terminology’, ‘perspective’ and ‘attribution’. » More