This graphic maps the various landing stations of submarine cables in both the US and China. To find out about cybersecurity in Sino-American relations, see Marie Baezner’s recent addition to the CSS’ Analyses in Security Policy series here. For more CSS charts and graphs on defense policy, click here.
National Security Agency headquarters in Fort Meade, Maryland. Photo: National Security Agency/Wikimedia Commons.
Cybersecurity and Cyberwar: What Everyone Needs to Know
By: P. W. Singer and Allan Friedman
New York: Oxford University Press, 2014
The year 2013 saw a number of headline news stories featuring a variety of different actors and sectors, but all with their roots in the same place: the cyber world. Edward Snowden disclosed a series of classified NSA documents detailing the United States’ global surveillance apparatus, including Internet surveillance programs like PRISM. The US federal government launched the website healthcare.gov to facilitate enrollment in health care exchanges, and an acting assistant secretary of Homeland Security testified before congress in November that the site experienced a series of attempted hacks. Conspirators who hacked into the systems of Nasdaq, Visa, and J.C. Penney and other major companies were subsequently charged in relation to a $45 million bank heist that involved stolen account information. A group supporting Syria’s Assad regime hacked the Associated Press’ Twitter account, tweeting (falsely) that President Obama had been injured in White House explosions. And a report released by the US government reported that China’s People’s Liberation Army had carried out cyber attacks on US corporations. » More
Many people don't value a currency operating outside the traditional financial system. Photo: Zach Copley/flickr
Back in July 2011 we blogged
about Bitcoin, the world’s first digitalized, crypto-currency. At the time, many thought Bitcoin a flash in the pan, attracting attention simply because it was still relatively new and exciting – but imagined interest would soon wear off. After three years however, Bitcoin doesn’t show signs of slowing down. Our last post touched upon Bitcoin’s use for undertaking illicit activities and the lack of institutional involvement. I’m going to revisit these themes and also discuss Ripple – the next currency you’ve never heard of.
Due to the increased anonymity associated with transactions undertaken using Bitcoin, there has been a fear that illegal acts are being made a lot easier, and a lot safer to conduct. A recent article for PCPro claimed that Bitcoin “is now the currency of choice for the discerning cybercriminal.” This image problem has not been helped by articles associating bitcoins with Silk Road, an online ‘underground’ marketplace (accessible only via Tor) where all kinds of illicit goods may be purchased – weaponry, forgeries and drugs – and where the digital currency is the only accepted method of payment. This undoubtedly sullies Bitcoin’s reputation, and to a disproportionate degree: The Internet itself has facilitated commerce, and necessarily the crime which accompanies any marketplace. But security agencies can be just as resourceful as criminals, developing network analysis techniques based on statistical methodologies to detect suspicious transaction flows. Rather than a destructive force, the appearance of Bitcoin and its use for ‘bad’ as well as ‘good’ is simply another reiteration of the cat-and-mouse game played out every day between criminals and the law. » More