<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="http://webfeeds.brookings.edu/feedblitz_rss.xslt"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"  version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0">
<channel>
	<title>Brookings Topics - Cybersecurity</title>
	<atom:link href="https://www.brookings.edu/topic/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.brookings.edu</link>
	<description>Brookings Topics - Cybersecurity</description>
	<lastBuildDate>Wed, 04 Jan 2017 17:56:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.7</generator>
<itunes:explicit>no</itunes:explicit>
<item>
<feedburner:origLink>https://www.brookings.edu/media-mentions/20161215-atlantic-pollack/</feedburner:origLink>
		<title>20161215 Atlantic Pollack</title>
		<link>http://webfeeds.brookings.edu/~/244365884/0/brookingsrss/topics/cybersecurity~Atlantic-Pollack/</link>
		<pubDate>Wed, 14 Dec 2016 19:13:48 +0000</pubDate>
		<dc:creator><![CDATA[Ian Merritt]]></dc:creator>
		
		<guid isPermaLink="false">https://www.brookings.edu/?post_type=media-mention&#038;p=348305</guid>
		<description><![CDATA[<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/244365884/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/244365884/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/244365884/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/244365884/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/244365884/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/244365884/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description>
				<content:encoded><![CDATA[<p></p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="http://webfeeds.brookings.edu/~/i/244365884/0/brookingsrss/topics/cybersecurity">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/244365884/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/244365884/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/244365884/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/244365884/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/244365884/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/244365884/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://www.brookings.edu/blog/order-from-chaos/2016/12/09/technology-and-the-third-offset-foster-innovation-for-the-force-of-the-future/</feedburner:origLink>
		<title>Technology and the “Third Offset” foster innovation for the force of the future</title>
		<link>http://webfeeds.brookings.edu/~/241263462/0/brookingsrss/topics/cybersecurity~Technology-and-the-%e2%80%9cThird-Offset%e2%80%9d-foster-innovation-for-the-force-of-the-future/</link>
		<pubDate>Fri, 09 Dec 2016 20:31:18 +0000</pubDate>
		<dc:creator><![CDATA[Ian Livingston]]></dc:creator>
		
		<guid isPermaLink="false">https://www.brookings.edu/?p=346330</guid>
		<description><![CDATA[The “Third Offset” strategy, officially launched with this year’s budget request, attempts to identify asymmetries between U.S. forces and those of potential adversaries. What role can military innovation play in enhancing U.S. military advantages? On December 5, the Brookings Center for 21st Century Security and Intelligence hosted an event discussing the future of U.S. military [&#8230;]<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/241263462/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/241263462/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/241263462/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/241263462/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/241263462/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/241263462/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description>
				<content:encoded><![CDATA[<p>The “Third Offset” strategy, officially launched with this year’s budget request, attempts to identify asymmetries between U.S. forces and those of potential adversaries. What role can military innovation play in enhancing U.S. military advantages?	<div class="inline-widget alignright">
		<h3>Author</h3>
			<div class="inline-widget-inner">
				
<article class="archive-view profile " itemscope itemtype="http://schema.org/Person">
			<div class="expert-image">
							<div class="image-wrapper small">
					<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/author/ian-livingston/"><span class="article-image-char">I</span></a>
				</div>
					</div>
	
	<div class="expert-info">
							<h2 class="name"><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/author/ian-livingston/">Ian Livingston</a></h2>
		
		<h3 class="title">Senior Research Assistant</h3>
					<div class="contact">
				<a class="twitter" href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.twitter.com/islivingston"><svg>		<title>Twitter</title>
		<use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#icon-social-twitter"></use></svg>islivingston</a>
			</div>
		
			
		
			</div>
</article>
			</div>
	</div>
	</p>
<p>On December 5, the Brookings <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/center/center-for-21st-century-security-and-intelligence/" target="_blank">Center for 21st Century Security and Intelligence</a> <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/events/investing-in-the-future-of-u-s-defense-during-a-time-of-transition-at-home-and-abroad/" target="_blank">hosted an event</a> discussing the future of U.S. military innovation with Deputy Secretary of Defense Robert Work. Alan Easterling of Northrop Grumman and Kelly Marchese of Deloitte Consulting also spoke, and Brookings Senior Fellow <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/experts/michael-e-ohanlon/" target="_blank">Michael O&#8217;Hanlon</a> moderated the event.</p>
<h2><strong>First, Second, Third Offsets</strong></h2>
<p>Secretary Work reminded the audience that the United States has enjoyed a conventional advantage over recent adversaries. Importantly, that advantage has been against small regional powers. There has been less worry about peer competitors since the end of the Cold War, he said, but that has changed again over the past decade.</p>
<p>With an ascendant China and a re-strengthened Russia, a new military strategy called the Third Offset “helps deter a conventional conflict with a large state power,” according to Work. A key facet is strengthening conventional deterrence. In short, the Third Offset is meant to help prevent war with a great power by ensuring that if we did ever fight, we would prevail. 
<div class="inline-widget alignleft">
	<h3>Related</h3>
	<ul>
			<li>
			<article class="archive-view report research has-image" itemscope itemtype="http://schema.org/Article">
	<figure class="article-image">
		<div class="image-wrapper">
			<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/research/50-facts-about-u-s-nuclear-weapons-today/" itemprop="url">
				<img class="lazyload size-post-list" data-sizes="auto" data-src="https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/06/nuclear_explosion001.jpg?w=234&#038;crop=0%2C12px%2C100%2C134px&#038;ssl=1" data-srcset="https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/06/nuclear_explosion001.jpg?w=234&#038;crop=0%2C12px%2C100%2C134px&#038;ssl=1 234w,https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/06/nuclear_explosion001.jpg?w=151&#038;crop=0%2C9px%2C100%2C85px&#038;ssl=1 151w,https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/06/nuclear_explosion001.jpg?w=135&#038;crop=0%2C8px%2C100%2C76px&#038;ssl=1 135w,https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/06/nuclear_explosion001.jpg?w=170&#038;crop=0%2C10px%2C100%2C96px&#038;ssl=1 170w,https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/06/nuclear_explosion001.jpg?w=168&#038;crop=0%2C9px%2C100%2C95px&#038;ssl=1 168w" alt="nuclear_explosion001" >																					</a>
		</div>
	</figure>
	<div class="article-info">
		
					<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/topic/arms-control/" class="label">Arms Control</a>
				<h4 class="title" itemprop="name"><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/research/50-facts-about-u-s-nuclear-weapons-today/">50 Facts About U.S. Nuclear Weapons Today</a></h4>
		<div class="meta">
										<time>Monday, April 28, 2014</time>
					</div>
		
			</div>
</article>
		</li>
			<li>
			<article class="archive-view report post has-image" itemscope itemtype="http://schema.org/Article">
	<figure class="article-image">
		<div class="image-wrapper">
			<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/blog/order-from-chaos/2016/12/13/an-open-letter-to-donald-trump-on-the-one-china-policy/" itemprop="url">
				<img class="lazyload size-post-list" data-sizes="auto" data-src="https://i2.wp.com/www.brookings.edu/wp-content/uploads/2016/12/china_taiwan_flags001-e1481639850685.jpg?w=234&#038;crop=0%2C0px%2C100%2C134px&#038;ssl=1" data-srcset="https://i2.wp.com/www.brookings.edu/wp-content/uploads/2016/12/china_taiwan_flags001-e1481639850685.jpg?w=234&#038;crop=0%2C0px%2C100%2C134px&#038;ssl=1 234w,https://i2.wp.com/www.brookings.edu/wp-content/uploads/2016/12/china_taiwan_flags001-e1481639850685.jpg?w=151&#038;crop=0%2C0px%2C100%2C85px&#038;ssl=1 151w,https://i2.wp.com/www.brookings.edu/wp-content/uploads/2016/12/china_taiwan_flags001-e1481639850685.jpg?w=135&#038;crop=0%2C0px%2C100%2C76px&#038;ssl=1 135w,https://i2.wp.com/www.brookings.edu/wp-content/uploads/2016/12/china_taiwan_flags001-e1481639850685.jpg?w=170&#038;crop=0%2C0px%2C100%2C96px&#038;ssl=1 170w,https://i2.wp.com/www.brookings.edu/wp-content/uploads/2016/12/china_taiwan_flags001-e1481639850685.jpg?w=168&#038;crop=0%2C0px%2C100%2C95px&#038;ssl=1 168w" alt="A pro-China supporter adjusts a China national flag during a rally calling for peaceful reunification, days before the inauguration ceremony of President-elect Tsai Ing-wen, in Taipei, Taiwan May 14, 2016. REUTERS/Tyrone Siu TPX IMAGES OF THE DAY - RTSEBXZ" >																					</a>
		</div>
	</figure>
	<div class="article-info">
		
					<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/blog/order-from-chaos/" class="label">Order from Chaos</a>
				<h4 class="title" itemprop="name"><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/blog/order-from-chaos/2016/12/13/an-open-letter-to-donald-trump-on-the-one-china-policy/">An open letter to Donald Trump on the One-China policy</a></h4>
		<div class="meta">
							<div class="authors"><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/experts/richard-c-bush/">Richard C. Bush</a></div>
										<time>Tuesday, December 13, 2016</time>
					</div>
		
			</div>
</article>
		</li>
			<li>
			<article class="archive-view report research has-image" itemscope itemtype="http://schema.org/Article">
	<figure class="article-image">
		<div class="image-wrapper">
			<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/research/dealing-with-a-nuclear-armed-north-korea/" itemprop="url">
				<img class="lazyload size-post-list" data-sizes="auto" data-src="https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/10/kim_jong_un_missile001.jpg?w=234&#038;crop=0%2C11px%2C100%2C134px&#038;ssl=1" data-srcset="https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/10/kim_jong_un_missile001.jpg?w=234&#038;crop=0%2C11px%2C100%2C134px&#038;ssl=1 234w,https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/10/kim_jong_un_missile001.jpg?w=151&#038;crop=0%2C8px%2C100%2C85px&#038;ssl=1 151w,https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/10/kim_jong_un_missile001.jpg?w=135&#038;crop=0%2C7px%2C100%2C76px&#038;ssl=1 135w,https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/10/kim_jong_un_missile001.jpg?w=170&#038;crop=0%2C8px%2C100%2C96px&#038;ssl=1 170w,https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/10/kim_jong_un_missile001.jpg?w=168&#038;crop=0%2C8px%2C100%2C95px&#038;ssl=1 168w" alt="North Korean leader Kim Jong Un watches the ballistic rocket launch drill of the Strategic Force of the Korean People&#039;s Army (KPA) at an unknown location, in this undated file photo released by North Korea&#039;s Korean Central News Agency (KCNA) in Pyongyang on March 11, 2016. REUTERS/KCNA/Files ATTENTION EDITORS - THIS PICTURE WAS PROVIDED BY A THIRD PARTY. REUTERS IS UNABLE TO INDEPENDENTLY VERIFY THE AUTHENTICITY, CONTENT, LOCATION OR DATE OF THIS IMAGE. FOR EDITORIAL USE ONLY. NOT FOR SALE FOR MARKETING OR ADVERTISING CAMPAIGNS. NO THIRD PARTY SALES. NOT FOR USE BY REUTERS THIRD PARTY DISTRIBUTORS. SOUTH KOREA OUT. NO COMMERCIAL OR EDITORIAL SALES IN SOUTH KOREA. THIS PICTURE IS DISTRIBUTED EXACTLY AS RECEIVED BY REUTERS, AS A SERVICE TO CLIENTS. TPX IMAGES OF THE DAY TPX IMAGES OF THE DAY - RTX29LRL" >																					</a>
		</div>
	</figure>
	<div class="article-info">
		
					<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/topic/arms-control/" class="label">Arms Control</a>
				<h4 class="title" itemprop="name"><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/research/dealing-with-a-nuclear-armed-north-korea/">Dealing with a nuclear-armed North Korea</a></h4>
		<div class="meta">
							<div class="authors"><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/experts/evans-j-r-revere/">Evans J.R. Revere</a></div>
										<time>Tuesday, October 4, 2016</time>
					</div>
		
			</div>
</article>
		</li>
		</ul>
</div>
</p>
<p>The First Offset, as O’Hanlon outlined, covers the full range of U.S. nuclear capabilities in the 1950s. The Second Offset is more focused on precision weaponry and air-land battle concepts from the 1970s and 1980s. All offsets, Work noted, “are focused on operational and organizational constructs that provide an advantage at the operational level of war.” But the Third Offset is more open-ended, long-term, and diffuse, compared to the first and second offsets. While we knew the end game of the First Offset and the Second Offset as they were developed, we do not necessarily know the end state when it comes to the Third Offset.</p>
<p>We do know that technology—specifically its connectedness to military organizations and to military doctrine—provide the key to the Third Offset. Secretary Work highlighted five areas of focus:</p>
<ul>
<li>Learning machines</li>
<li>Human-machine collaboration</li>
<li>Assisted human operations (such as exoskeletons and wearables)</li>
<li>Man-unmanned combat teaming</li>
<li>Better autonomous weapons</li>
</ul>
<p>Work stressed the criticalness of Artificial Intelligence (AI) and autonomy. “Putting AI and autonomy into the battle network is the most important thing we can do first,” he said. Missile defense, robotics, and unmanned systems also fit into the Third Offset framework, and Work said these systems can be thought of as “assisted human ops” (as distinct from “enhanced human ops,” which involve genetically modifying the soldier; that’s not something the United States is pursuing, but it is possible competitors may try). There is also a clear cyber element to the Third Offset—for one, autonomous machines driven by AI might be the first line of defense in a cyberattack.</p>
<p>What about possible ethical concerns of these military systems? O’Hanlon queried Secretary Work on the potential for machines making their own decision to shoot. Work indicated that was more likely to happen under authoritarian governments—pointing, for example, to a Soviet conception that was totally automatic. In the United States, he said, our focus has been on enabling better communications and network capabilities for the human warfighters.</p>
<p>The Third Offset, in Work’s view, is not unlike other major revolutions that started in the commercial technology space, such as the telegraph and railroad, which ultimately transformed war.</p>
<h2><strong>By land and by sea</strong></h2>
<p>Kelly Marchese reminded the audience that the Third Offset is not just about technology, highlighting the importance of overall architecture and integration. According to Marchese, the most important aspects are “operational and organizational constructs.” Since technology changes so rapidly, improving agility and the way technologies interact in a network are also key. Marchese expressed concern that networking standards have not been set.</p>
<p>O’Hanlon pointed out that many networks are unlikely to survive a cyber attack. Could much of our technology be rendered useless in such incidents?, he wondered. Marchese responded: “The good news is much of this technology is still not connected. The bad news is it needs to be connected to operate as effectively as we want.”
<div class="inline-widget alignleft">
	<h3>Related Books</h3>
	<ul>
			<li>
			
<article class="archive-view book " itemscope itemtype="http://schema.org/Book">
	<figure class="article-image">
		<div class="image-wrapper">
							<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/book/a-glass-half-full/" itemprop="url"><span class="article-image-char">A</span></a>
					</div>
	</figure>
	<div class="article-info">
					<span class="label">Upcoming</span>
				<h4 class="title"><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/book/a-glass-half-full/">A Glass Half Full</a></h4>
					<div class="meta">
									<div class="authors">
						By <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/experts/michael-e-ohanlon/">Michael E. O&#8217;Hanlon</a> and <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/search/James+Steinberg/">James Steinberg</a>					</div>
													<time>2017</time>
							</div>
				</div>
</article>
		</li>
			<li>
			
<article class="archive-view book " itemscope itemtype="http://schema.org/Book">
	<figure class="article-image">
		<div class="image-wrapper">
							<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/book/pla-system-of-systems-operations-enabling-joint-operations/" itemprop="url"><span class="article-image-char">P</span></a>
					</div>
	</figure>
	<div class="article-info">
					<span class="label">Upcoming</span>
				<h4 class="title"><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/book/pla-system-of-systems-operations-enabling-joint-operations/">PLA System of Systems Operations</a></h4>
					<div class="meta">
									<div class="authors">
						By <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/search/Kevin+McCauley/">Kevin McCauley</a>					</div>
													<time>2017</time>
							</div>
				</div>
</article>
		</li>
			<li>
			
<article class="archive-view book " itemscope itemtype="http://schema.org/Book">
	<figure class="article-image">
		<div class="image-wrapper">
							<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/book/americas-national-security-architecture/" itemprop="url"><span class="article-image-char">A</span></a>
					</div>
	</figure>
	<div class="article-info">
					<span class="label">Upcoming</span>
				<h4 class="title"><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/book/americas-national-security-architecture/">America&#8217;s National Security Architecture</a></h4>
					<div class="meta">
									<div class="authors">
						Edited by <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/search/Nicholas+Burns/">Nicholas Burns</a> and <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/search/Jonathon+Price/">Jonathon Price</a>					</div>
													<time>2017</time>
							</div>
				</div>
</article>
		</li>
		</ul>
</div>
</p>
<p>Turning to more traditional means of warfighting, O’Hanlon asked Alan Easterling about the oceans, adding that they are thought of as an “area of great promise” in the international arena. Easterling agreed, but emphasized that there’s a problem with ships. Modern ships are very vulnerable, he said—during the Falklands War of 1982, for example, superior British ships proved little match for advanced missiles. That is very much the story today, Easterling added, saying: “Any surface vessel within 1,200 miles of determined opponent is at risk.” And this problem tends to push everyone underwater. In many ways, he said, submarines are the “last bastion of stealth.” There are still unresolved difficulties under water, though (including communication), and concluded that combining above and below water assets remains key.</p>
<p>Finally, O’Hanlon turned to land bases and their vulnerability. He pointed out that there are things we can do like hardening, dispersal, and retaining short-takeoff aircraft to help overcome the issues. But is this enough? Easterling argued that the best strategy is distribution, and that forward bases are often quickly overwhelmed, adding: the “age of the medium range ballistic missile changes everything.” Circling back to remarks by Secretary Work, Easterling remarked that the United States has not faced a foe with this kind of capability, and that it is of great potential concern.</p>
<p>While some challenges lie ahead, the overall message of the event was that the Third Offset strategy or its natural successor, whatever that may be called (but which will likely preserve many elements of the Third Offset), will offer considerable hope for the United States in the decades ahead. 	<section class="newsletter newsletter-module inline">
		<div class="cta">Get daily updates from Brookings
</div>
		<div class="newsletter-content hubspot-contacts">
		<div class="newsletter-form">
			<div class="messages"></div>
			<form method="post" action="/newsletter" data-hubspot-ajax-action="hubspot_contacts_update" data-hubspot-custom-list="false">
				<input type="hidden" id="hubspot_contacts_nonce" name="hubspot_contacts_nonce" value="7ecada1047" /><input type="hidden" name="_wp_http_referer" value="/topic/cybersecurity/feed/" /><span></span> <input type="hidden" name="hubspot_contact[nl_brookingsbrief]" value="true" class="hubspot_var_list" default="" /><span></span> <input type="hidden" name="hubspot_contact[vid]" default="" /><span></span> <input type="hidden" name="hubspot_contact[single]" value="nl_brookingsbrief" class="hubspot_single_input" default="" />				<label for="newsletterInput">
					<span class="visuallyhidden">Enter Email</span>
					<span></span> <input type="email" name="hubspot_contact[email]" class="form-control" id="newsletterInput" required="required" placeholder="Enter Email" default="" />				</label>
				<input type="submit" value="Subscribe">
			</form>
		</div>
					</div>
	</section>
</p>
<Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="http://webfeeds.brookings.edu/~/i/241263462/0/brookingsrss/topics/cybersecurity">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/241263462/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/241263462/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/241263462/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/241263462/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/241263462/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/241263462/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded>
		<enclosure url="http://webfeeds.brookings.edu/-/241263460/0/brookingsrss/topics/cybersecurity.jpg" type="image/jpeg" />
<feedburner:origEnclosureLink>https://www.brookings.edu/wp-content/uploads/2016/12/cyberwar_center001.jpg?w=293</feedburner:origEnclosureLink>
<itunes:summary>The &#8220;Third Offset&#8221; strategy, officially launched with this year&#x2019;s budget request, attempts to identify asymmetries between U.S. forces and those of potential adversaries. What role can military innovation play in enhancing U.S. military advantages? 
Author I 
Ian Livingston 
Senior Research Assistant Twitter islivingston 
On December 5, the Brookings Center for 21st Century Security and Intelligence hosted an event discussing the future of U.S. military innovation with Deputy Secretary of Defense Robert Work. Alan Easterling of Northrop Grumman and Kelly Marchese of Deloitte Consulting also spoke, and Brookings Senior Fellow Michael O'Hanlon moderated the event. 
First, Second, Third Offsets 
Secretary Work reminded the audience that the United States has enjoyed a conventional advantage over recent adversaries. Importantly, that advantage has been against small regional powers. There has been less worry about peer competitors since the end of the Cold War, he said, but that has changed again over the past decade. 
With an ascendant China and a re-strengthened Russia, a new military strategy called the Third Offset &#8220;helps deter a conventional conflict with a large state power,&#8221; according to Work. A key facet is strengthening conventional deterrence. In short, the Third Offset is meant to help prevent war with a great power by ensuring that if we did ever fight, we would prevail.&#xA0;
 
Related 
- Arms Control 
50 Facts About U.S. Nuclear Weapons Today Monday, April 28, 2014 - Order from Chaos 
An open letter to Donald Trump on the One-China policy Richard C. Bush Tuesday, December 13, 2016 - Arms Control 
Dealing with a nuclear-armed North Korea Evans J.R. Revere Tuesday, October 4, 2016 
The First Offset, as O&#x2019;Hanlon outlined, covers the full range of U.S. nuclear capabilities in the 1950s. The Second Offset is more focused on precision weaponry and air-land battle concepts from the 1970s and 1980s. All offsets, Work noted, &#8220;are focused on operational and organizational constructs that provide an advantage at the operational level of war.&#8221; But the Third Offset is more open-ended, long-term, and diffuse, compared to the first and second offsets. While we knew the end game of the First Offset and the Second Offset as they were developed, we do not necessarily know the end state when it comes to the Third Offset. 
We do know that technology&#x2014;specifically its connectedness to military organizations and to military doctrine&#x2014;provide the key to the Third Offset. Secretary Work highlighted five areas of focus: 
- Learning machines - Human-machine collaboration - Assisted human operations (such as exoskeletons and wearables) - Man-unmanned combat teaming - Better autonomous weapons 
Work stressed the criticalness of Artificial Intelligence (AI) and autonomy. &#8220;Putting AI and autonomy into the battle network is the most important thing we can do first,&#8221; he said.&#xA0;Missile defense, robotics, and unmanned systems also fit into the Third Offset framework, and Work said these systems can be thought of as &#8220;assisted human ops&#8221; (as distinct from &#8220;enhanced human ops,&#8221; which involve genetically modifying the soldier; that&#x2019;s not something the United States is pursuing, but it is possible competitors may try). There is also a clear cyber element to the Third Offset&#x2014;for one, autonomous machines driven by AI might be the first line of defense in a cyberattack. 
What about possible ethical concerns of these military systems? O&#x2019;Hanlon queried Secretary Work on the potential for machines making their own decision to shoot. Work indicated that was more likely to happen under authoritarian governments&#x2014;pointing, for example, to a Soviet conception that was totally automatic. In the United States, he said, our focus has been on enabling better communications and network capabilities for the human ... </itunes:summary>
<itunes:subtitle>The &#8220;Third Offset&#8221; strategy, officially launched with this year&#x2019;s budget request, attempts to identify asymmetries between U.S. forces and those of potential adversaries. What role can military innovation play in enhancing U.</itunes:subtitle></item>
<item>
<feedburner:origLink>https://www.brookings.edu/events/technology-policy-and-the-trump-administration/</feedburner:origLink>
		<title>Technology policy and the Trump administration</title>
		<link>http://webfeeds.brookings.edu/~/236861210/0/brookingsrss/topics/cybersecurity~Technology-policy-and-the-Trump-administration/</link>
		<pubDate>Thu, 01 Dec 2016 19:28:45 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		
		<guid isPermaLink="false">https://www.brookings.edu/?post_type=event&#038;p=344648</guid>
		<description><![CDATA[Changes in technology have helped to modernize health care, governance, trade, and environmental protections throughout the twenty-first century. With the election of Donald Trump, there are questions about how the new administration will handle technology policy. What will the new president do to continue the legacy of innovation across all sectors? What can policymakers and [&#8230;]<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/11/rtx1yvai.jpg?w=287" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/11/rtx1yvai.jpg?w=287"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/236861210/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/236861210/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/236861210/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/236861210/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/236861210/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/236861210/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description>
				<content:encoded><![CDATA[<p>Changes in technology have helped to modernize health care, governance, trade, and environmental protections throughout the twenty-first century. With the election of Donald Trump, there are questions about how the new administration will handle technology policy. What will the new president do to continue the legacy of innovation across all sectors? What can policymakers and the general public expect from the administration moving forward?</p>
<p>On December 14, the Center for Technology Innovation at Brookings hosted a conversation about the future of technology policy under the Trump administration. A panel of experts discussed health information technology, telecommunications policy, competition, wireless issues, net neutrality, and cybersecurity.</p>
<Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="http://webfeeds.brookings.edu/~/i/236861210/0/brookingsrss/topics/cybersecurity">
<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/11/rtx1yvai.jpg?w=287" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/11/rtx1yvai.jpg?w=287"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/236861210/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/236861210/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/236861210/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/236861210/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/236861210/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/236861210/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded>
		<enclosure url="https://www.brookings.edu/wp-content/uploads/2016/11/rtx1yvai.jpg?w=287" type="image/jpeg" />
<itunes:summary>Changes in technology have helped to modernize health care, governance, trade, and environmental protections throughout the twenty-first century. With the election of Donald Trump, there are questions about how the new administration will handle technology policy. What will the new president do to continue the legacy of innovation across all sectors? What can policymakers and the general public expect from the administration moving forward? 
On December 14, the Center for Technology Innovation at Brookings hosted a conversation about the future of technology policy under the Trump administration. A panel of experts discussed health information technology, telecommunications policy, competition, wireless issues, net neutrality, and cybersecurity. </itunes:summary>
<itunes:subtitle>Changes in technology have helped to modernize health care, governance, trade, and environmental protections throughout the twenty-first century. With the election of Donald Trump, there are questions about how the new administration will handle ... </itunes:subtitle></item>
<item>
<feedburner:origLink>https://www.brookings.edu/blog/techtank/2016/11/22/the-future-of-health-information-technology-in-a-trump-presidency/</feedburner:origLink>
		<title>The future of health information technology in a Trump presidency</title>
		<link>http://webfeeds.brookings.edu/~/236346834/0/brookingsrss/topics/cybersecurity~The-future-of-health-information-technology-in-a-Trump-presidency/</link>
		<pubDate>Tue, 22 Nov 2016 12:30:37 +0000</pubDate>
		<dc:creator><![CDATA[Niam Yaraghi]]></dc:creator>
		
		<guid isPermaLink="false">https://www.brookings.edu/?p=343612</guid>
		<description><![CDATA[Under Trump’s administration, no other sector will undergo as many fundamental changes as healthcare. President-elect Trump’s healthcare policies have been particularly vague; although he is intent on repealing Affordable Care Act, we are not certain about his solutions for replacing it, other than the proposal to allow health insurers to compete in multiple states. While [&#8230;]<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/06/doctor_patient003-2.jpg?w=268" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/06/doctor_patient003-2.jpg?w=268"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/236346834/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/236346834/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/236346834/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/236346834/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/236346834/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/236346834/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description>
				<content:encoded><![CDATA[<p>Under Trump’s administration, no other sector will undergo as many fundamental changes as healthcare. President-elect Trump’s healthcare policies have been particularly vague; although he is intent on repealing Affordable Care Act, we are not certain about his solutions for replacing it, other than the proposal to allow health insurers to compete in multiple states.</p>
<p>While the exact outcomes of such proposal remain to be carefully analyzed, the idea behind it &#8211; <em>fostering competition and relying on the invisible hand of the free market</em> &#8211;  may be a sound solution to our nation’s health information technology challenges. Over the past decade, despite spending billions of dollars, government interference in the health IT market has only resulted in small victories and big failures. Although <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~dashboard.healthit.gov/evaluations/data-briefs/non-federal-acute-care-hospital-ehr-adoption-2008-2015.php" target="_blank">every medical provider is now using an Electronic Health Records (EHR) system</a>, physicians are <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.healthcareitnews.com/news/ehr-use-frustrating-time-suck-physicians-tell-american-medical-association" target="_blank">frustrated with their EHR systems</a>, <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.healthaffairs.org/healthpolicybriefs/brief.php?brief_id=122" target="_blank">exchanging medical data remains to be a major challenge</a> and <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/blog/techtank/2016/04/04/hospital-hacks-expose-security-weaknesses/" target="_blank">cyber-security attacks</a> undermine the <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/blog/techtank/2015/02/12/the-anthem-hack-shows-there-is-no-such-thing-as-privacy-in-the-health-care-industry/" target="_blank">privacy of patients</a> more than ever. Many of these challenges could have been addressed in the recently announced rules of Medicare and CHIP Reauthorizations Act (MACRA). However, <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~healthaffairs.org/blog/2016/10/12/macra-proposed-rule-creates-more-problems-than-it-solves/" target="_blank">CMS lost this golden opportunity</a> by making a set of extremely complicated rules that ignore both <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/blog/techtank/2016/10/25/macra-final-rule-hype-or-hope/">medical practice and basic economics</a>.</p>
<p>In the following, I lay out a set of recommendations for fostering interoperability and protecting patient privacy as the two most important challenges in the health IT domain over the next four years.</p>
<h2>Interoperability</h2>
<p>More than a decade ago, <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.presidency.ucsb.edu/ws/?pid=61429" target="_blank">President Bush established</a> the <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.healthit.gov/" target="_blank">Office of the National Coordinator for Health IT</a> (ONC) and assigned it with spearheading the efforts to create a nationwide system in which medical data of all Americans are securely stored and privately exchanged between those physicians who need to access such data to provide better medical care at lower cost. Achieving these goals could have resulted in over <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.ncbi.nlm.nih.gov/pubmed/15659453" target="_blank">$78 billion dollars of annual savings</a>. Despite significant support from the Obama administration, we are still <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~healthaffairs.org/blog/2015/03/04/where-is-hitechs-35-billion-dollar-investment-going/" target="_blank">very far from achieving those goals</a>. While the entire US health care system is now <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~dashboard.healthit.gov/evaluations/data-briefs/non-federal-acute-care-hospital-ehr-adoption-2008-2015.php" target="_blank">digitized</a>, most electronic health records (EHR) systems fail to interoperate. That is, they archive medical data electronically but cannot exchange such data with EHRs used by other providers. The situation is akin to a system of disconnected computers that work independently but cannot send and receive data to and from other computers.</p>
<h3><strong>The lack of interoperability is purely an economic problem</strong></h3>
<p>Health information will not be exchanged unless all of the involved parties have a clear financial incentive to do so. The reason that information exchange in the health care system has lagged behind other industries is the fact that <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://oig.hhs.gov/compliance/alerts/guidance/policy-reminder-100615.pdf" target="_blank">anti-kickback laws</a> prevent the healthcare industry to treat information as a commodity and therefore eliminate the incentive to trade information.</p>
<p>Consider the <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.modernhealthcare.com/article/20150418/MAGAZINE/304189951" target="_blank">financial industry</a> as an example. Credit card holders can swipe their card at almost any location in the world and exchange a part of their financial information with a vendor. Two parties exchange information as long as they both benefit from doing so. For instance, if the vendor charges extra for credit card payments, some users may prefer to pay in cash rather than exchanging information via their credit cards. More importantly, since banks are legally allowed to charge the vendor and the card holder a service fee, they also have a clear financial incentive for enabling and fostering the exchange of information.</p>
<p>Anti-kickback laws largely limit similar business models in the health care industry. Although <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/blog/techtank/2015/04/28/your-medical-data-you-dont-own-it-but-you-can-have-it/">ownership of medial data belongs to providers</a>, they are not allowed to charge others for allowing access to such data. This lack of incentives creates an imbalance in the information market. While there is a large demand for medical data, supply is limited because there is no incentive for physicians and hospitals who have these data to provide data to those who need them. More importantly, the intermediaries such as electronic health record vendors have disincentives to remove the technical barriers of exchange simply because they are not get paid to do so.</p>
<h3><strong>Data blocking is not the reason for the lack of interoperability </strong></h3>
<p>ONC has <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.healthit.gov/sites/default/files/reports/info_blocking_040915.pdf" target="_blank">coined the term “data blocking”</a> to describe the technical obstacles that EHR vendors intentionally create to limit information exchange. ONC’s <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://s3.amazonaws.com/public-inspection.federalregister.gov/2016-24908.pdf" target="_blank">solution to data-blocking</a> is to conduct in-the-field surveillance and check <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.federalregister.gov/documents/2016/11/04/2016-25240/medicare-program-merit-based-incentive-payment-system-mips-and-alternative-payment-model-apm#p-247" target="_blank">EHRs at the location of hospitals and physicians’ offices</a> to make sure that they are interoperable and are not limiting data exchange. This solution is impractical, extremely expensive and seriously threatens patients’ privacy.</p>
<p>ONC ignores the fact that exchanging information is not in the best interests of many medical providers. The “inability to exchange” is actually a preferred feature of an EHR system for many providers as it enables providers to keep their patients and prevent them from migrating to other providers. <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.mitpressjournals.org/doi/full/10.1162/AJHE_a_00004#.WC37ZoMrJpg" target="_blank">Recent studies</a> show in the states where it is easier and cheaper for patients to obtain their medical records, the proportion of patients who switch their primary care physicians and specialists increases by 11% and 13%, respectively. <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2525084" target="_blank">Prior research</a> also identifies competition among medical providers as a barrier to their engagement in exchanging health information and <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.sciencedirect.com/science/article/pii/S2213076414000025" target="_blank">shows</a> that providers who are more competitive, such as for-profit hospitals and those with smaller market shares, are much less likely to exchange health information with others. In many instances where data flows smoothly and providers can access data if they choose to, access to information barely happens. For example, while research shows that looking up patients’ information can significantly lower the number of test orders, clinicians do so in less than <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3168326/" target="_blank">10% of the ED counters</a>, even when there is no technical barrier to block the data exchange.</p>
<h3><strong>To enable interoperability, anti-kickback laws should be repealed </strong></h3>
<p>To create interoperability and enable data exchange, we should follow the solutions that have been proven to be successful in every other industry. In the current system, providers have very little incentive to receive data and absolutely no incentive to send data. The current safe harbors of anti-kickback laws result in information silos with even thicker walls and lead smaller practices and individual physicians to adopt an EHR system which is subsidized by a larger hospital.  Such laws coupled with the ill-designed payment systems have turned medical data into a property that serves the interests of its owners only if kept private and not shared.  I have previously discussed how to solve this problem by designing business models that encourage the exchange of information through both <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/blog/techtank/2016/02/17/you-should-control-your-own-health-care-data/" target="_blank">patient mediated solutions</a> and <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/research/a-sustainable-business-model-for-health-information-exchange-platforms-the-solution-to-interoperability-in-health-care-it/" target="_blank">centralized health information exchange platforms</a>. These market based proposals would eliminate the most important barriers to interoperability and significantly enhance health information exchange. However, to implement these solutions, the government should allow medical providers to meet the demand for information by charging a fee for supplying it.</p>
<h2><strong>Cyber-security &amp; Privacy</strong></h2>
<p>Privacy breaches are more likely to happen in the <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.idtheftcenter.org/ITRC-Surveys-Studies/2015databreaches.html" target="_blank">health care industry than any other sector.</a> According to the <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf" target="_blank">data provided by the Office for Civil Rights</a> (OCR), since late 2009, the medical information of more than 155 million American citizens has been exposed without their permission through about <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/blog/techtank/2015/02/12/the-anthem-hack-shows-there-is-no-such-thing-as-privacy-in-the-health-care-industry/">1,500 breach incidents</a>. Heavy reliance of US hospitals on EHR systems and their weak cyber-security practices have turned them into lucrative and easy targets for <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/blog/techtank/2016/04/04/hospital-hacks-expose-security-weaknesses/">ransomware attacks</a> in which hackers lock down the computer systems of hospitals and ask for a ransom to allow hospitals to have access to their own computers.</p>
<p>To prevent these breaches and protect patient privacy, OCR should allow the healthcare industry to <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/blog/techtank/2016/03/08/tear-down-this-health-care-information-breach-wall-of-shame/" target="_blank">learn from its failures</a> and create larger incentives for medical providers and their business associates to protect patient privacy. In the long run, a <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.researchgate.net/profile/Jay_Kesan/publication/228669949_Cyberinsurance_as_a_market-based_solution_to_the_problem_of_cybersecurity_a_case_study/links/00b495248e89c569f9000000.pdf" target="_blank">cyber-insurance market</a> will ensure the privacy of patients by creating incentives for different entities of the healthcare sector to prioritize security practices and privacy policies.  In a previous post, I <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/research/hackers-phishers-and-disappearing-thumb-drives-lessons-learned-from-major-health-care-data-breaches/" target="_blank">discussed the following solutions</a> in detail.</p>
<h3><strong>Increase penalties of data breaches </strong></h3>
<p>Protecting customer privacy is among the most important activities of businesses in every industry, except the health care industry. For most companies, spending on digital security is considered a strategic investment. It is a necessity without which many of the current businesses will immediately vanish. Due to limited competition and the nature of their services, medical providers and their business associates have little financial incentive to safeguard their patients’ privacy.  The only major consequence of breaches are the subsequent OCR audits and the possible penalties.  It is therefore necessary for OCR to create a strong incentive for the healthcare industry to invest in digital security and protect patient privacy by increasing the penalties of data breaches.</p>
<h3><strong>Allow healthcare industry to learn from its failures </strong></h3>
<p>After a breach happens, OCR conducts a thorough investigation to identify its causes. Through these audits, OCR also ensures that the victim organization has put corrective and preventive policies in place to avoid future incidents. Although the lessons learned from each breach can prevent other similar incidents, OCR does not share the details of its investigations. OCR should provide detailed reports on how each breach happened, and how other health care organizations can avoid similar occurrences.</p>
<h3><strong>Promote cyber-insurance in the healthcare industry </strong></h3>
<p>In the long run, the cyber-insurance market can fundamentally improve how patient privacy is viewed and managed in the health care sector. To underwrite the privacy risk of health care organizations, cyber insurance companies will be willing and able to conduct timely and efficient audits and proactively manage their clients’ privacy protection efforts. Health care organizations will also have a direct economic incentive to reduce their cyber insurance premiums by addressing their security weaknesses and preventing privacy breaches.</p>
<Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="http://webfeeds.brookings.edu/~/i/236346834/0/brookingsrss/topics/cybersecurity">
<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/06/doctor_patient003-2.jpg?w=268" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/06/doctor_patient003-2.jpg?w=268"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/236346834/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/236346834/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/236346834/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/236346834/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/236346834/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/236346834/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded>
		<enclosure url="https://www.brookings.edu/wp-content/uploads/2016/06/doctor_patient003-2.jpg?w=268" type="image/jpeg" />
<itunes:summary>Under Trump&#x2019;s administration, no other sector will undergo as many fundamental changes as healthcare. President-elect Trump&#x2019;s healthcare policies have been particularly vague; although he is intent on repealing Affordable Care Act, we are not certain about his solutions for replacing it, other than the proposal to allow health insurers to compete in multiple states.
While the exact outcomes of such proposal remain to be carefully analyzed, the idea behind it &#x2013; fostering competition and relying on the invisible hand of the free market &#x2013;&#xA0; may be a sound solution to our nation&#x2019;s health information technology challenges. Over the past decade, despite spending billions of dollars, government interference in the health IT market has only resulted in small victories and big failures. Although every medical provider is now using an Electronic Health Records (EHR) system, physicians are frustrated with their EHR systems, exchanging medical data remains to be a major challenge and cyber-security attacks undermine the privacy of patients more than ever. Many of these challenges could have been addressed in the recently announced rules of Medicare and CHIP Reauthorizations Act (MACRA). However, CMS lost this golden opportunity by making a set of extremely complicated rules that ignore both medical practice and basic economics. 
In the following, I lay out a set of recommendations for fostering interoperability and protecting patient privacy as the two most important challenges in the health IT domain over the next four years. 
Interoperability 
More than a decade ago, President Bush established the Office of the National Coordinator for Health IT (ONC) and assigned it with spearheading the efforts to create a nationwide system in which medical data of all Americans are securely stored and privately exchanged between those physicians who need to access such data to provide better medical care at lower cost. Achieving these goals could have resulted in over $78 billion dollars of annual savings. Despite significant support from the Obama administration, we are still very far from achieving those goals. While the entire US health care system is now digitized, most electronic health records (EHR) systems fail to interoperate. That is, they archive medical data electronically but cannot exchange such data with EHRs used by other providers. The situation is akin to a system of disconnected computers that work independently but cannot send and receive data to and from other computers. 
The lack of interoperability is purely an economic problem 
Health information will not be exchanged unless all of the involved parties have a clear financial incentive to do so. The reason that information exchange in the health care system has lagged behind other industries is the fact that anti-kickback laws prevent the healthcare industry to treat information as a commodity and therefore eliminate the incentive to trade information. 
Consider the financial industry as an example. Credit card holders can swipe their card at almost any location in the world and exchange a part of their financial information with a vendor. Two parties exchange information as long as they both benefit from doing so. For instance, if the vendor charges extra for credit card payments, some users may prefer to pay in cash rather than exchanging information via their credit cards. More importantly, since banks are legally allowed to charge the vendor and the card holder a service fee, they also have a clear financial incentive for enabling and fostering the exchange of information. 
Anti-kickback laws largely limit similar business models in the health care industry. Although ownership of medial data belongs to providers, they are not allowed to charge others for allowing access to such data. This lack of incentives creates an imbalance in the information market. While there is a large demand for medical data, supply is limited ... </itunes:summary>
<itunes:subtitle>Under Trump&#x2019;s administration, no other sector will undergo as many fundamental changes as healthcare. President-elect Trump&#x2019;s healthcare policies have been particularly vague; although he is intent on repealing Affordable Care Act, we ... </itunes:subtitle></item>
<item>
<feedburner:origLink>https://www.brookings.edu/blog/techtank/2016/10/10/how-the-next-president-can-bridge-the-internet-cyber-gap/</feedburner:origLink>
		<title>How the next president can bridge the internet-cyber gap</title>
		<link>http://webfeeds.brookings.edu/~/209584934/0/brookingsrss/topics/cybersecurity~How-the-next-president-can-bridge-the-internetcyber-gap/</link>
		<pubDate>Mon, 10 Oct 2016 11:30:38 +0000</pubDate>
		<dc:creator><![CDATA[Cameron F. Kerry]]></dc:creator>
		
		<guid isPermaLink="false">https://www.brookings.edu/?p=336329</guid>
		<description><![CDATA[In a recent paper, I reflect on my experience in the Obama administration and draw lessons about policymaking on issues for that space.  As the General Counsel at the Commerce Department—where I performed the duties of the Deputy Secretary for the majority of the more than four years I was there, and those of the [&#8230;]<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/10/obama_cybersecurity5.png?w=270" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/10/obama_cybersecurity5.png?w=270"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/209584934/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/209584934/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/209584934/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/209584934/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/209584934/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/209584934/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description>
				<content:encoded><![CDATA[
<p>In a <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/research/bridging-the-internet-cyber-gap-digital-policy-lessons-for-the-next-administration/">recent paper</a>, I reflect on my experience in the Obama administration and draw lessons about policymaking on issues for that space.  As the General Counsel at the Commerce Department—where I performed the duties of the Deputy Secretary for the majority of the more than four years I was there, and those of the acting Secretary for a spell—I found myself drawn into issues like surveillance, norms for state behavior, and security far more than I could have anticipated going in.  These matters have significant effects on other issues that are core to the Commerce Department mission, such as technological innovation, competitiveness and international data flows, and global internet governance.</p>
<p>The paper is entitled “Bridging the Internet-Cyber gap: lessons in digital policy for the next administration.” That’s an allusion to an observation by Danny Weitzner, then Deputy Chief Technology Officer at the White House Office of Science &amp; Technology Policy, at a meeting of economic and security agencies that, “this world is divided into people who call it ‘the Internet’ and those who call it ‘cyber.’”  The former tend to be techno-optimists who focus on the economic and human potential of information and communications technology, whereas the latter focus on the darker side of that technology—threats, exploits, bad actors, and applications to warfare.</p>
<p>We saw that divide in the initial response to the Snowden leaks in 2013. Almost immediately, President Obama sought to assuage concerns about the Section 215 program by saying that “nobody is listening to your phone calls” and stated that PRISM surveillance under Section 702 “does not apply to U.S. citizens and it does not apply to people living in the United States.” These responses were fighting the last war, aimed at distinguishing the Snowden revelations from the decades-earlier revelations about FBI and CIA domestic surveillance that led to the creation of the Foreign Intelligence Surveillance Act in 1978.</p>
<p>The President’s response did not address the impact of the leaks on companies identified in the documents released by Snowden and on international issues from trade to privacy and internet governance. This omission waved a red flag to those outside the United States. The resulting firestorm hastened the demise of the Safe Harbor transatlantic data transfer framework at the hands of the Court of Justice of the European Union and saw allies join less friendly nations in considering data localization and some kind of multinational takeover of internet governance.</p>
<p>Three years later, the landscape is different. The Obama administration has learned a lot from its experience of managing the Snowden disclosures and has taken numerous steps to restore trust and integrate a broader outlook into its policymaking in the digital arena.</p>
<p>We’ve seen reports from the president’s special review board on surveillance as well as the Privacy and Civil Liberties Oversight Board; President Obama’s January 2014 announcement of surveillance reforms and Presidential Policy Directive 28 declaring that foreign citizens outside the U.S. should receive protections for privacy and dignity comparable to those for American citizens; a transformation in transparency about intelligence programs; the enactment of the USA FREEDOM Act and Redress Act, among other things. We’ve also seen the White House expand and empower its technology staff and involve them, and other agencies, in decisionmaking on issues in the traditional national security (or “cyber” as opposed to “internet”) sphere.</p>
<p>Issues surrounding the digital economy and technology have become mainstream. For most of my time in the administration, I was the senior official focusing on international and commercial privacy issues. Now that official is the president.</p>
<p>My paper asks, “What will the Obama administration leave behind? How much will the collective understanding developed over the course of the current administration survive the senior officials who leave? Or will entropy set in?”</p>
<p>Drawing on my observations and experience as well as discussion with participants and stakeholders, I make the following recommendations about how to ensure the next administration learns from these successes and failures:</p>
<ol>
<li><strong>National security policymaking needs to reflect the importance of economic issues in general and the digital economy in particular. </strong>We pay lip service to the relationship of the economy to national security. We need to do more to reflect it. The digital economy is more resilient and faster-growing than the economy as a whole. That will continue, and it will present great opportunities and challenges (think autonomous vehicles, for one example). The health and wellness of the digital economy and the systems and technology that support it are vital U.S.  interests.</li>
<li><strong>The president and other top leaders need champion an interconnected world.</strong> It took President Obama’s personal engagement to change the trajectory of damage from the Snowden disclosures. It will take advocacy and engagement from the next president and cabinet officers to press these vital interests and promote the benefits of a digital economy and open, interoperable networks around the world.</li>
<li><strong>The organization of the executive branch around digital issues should reflect their scope and significance.</strong> Advocacy and engagement at the top needs to be supported throughout the government, and economic issues integrated with national security:
<ol>
<li><strong>White House decision-making should reflect the breadth of issues involved</strong>. The National Security Act of 1947 gives the president the authority to establish who participates in the National Security Council. The Obama Administration established the position of Deputy National Security Adviser for International Economics, and its directive on NSC operations says this adviser, along with the National Economic Council, the Trade Representative, and the secretaries of Commerce and Treasury shall participate in the NSC when “international economic issues are on the agenda.”  There should be a presumption that these agencies will participate in the NSC and its interagency processes. Executive orders spelling out more of the processes of the NEC, Domestic Policy Council, and National Science &amp; Technology Council and how their work relates to national security and digital issues would help put them more on a par with the NEC.</li>
<li><strong>Every agency needs to be part of the digital agenda. </strong>The Commerce and State Departments have senior advisers on digital issues reporting directly to the secretaries and coordinating across their agencies. Commerce Secretary Penny Pritzker has made the digital economy a top priority. Every agency needs to consider how will engage in this arena.</li>
</ol>
</li>
<li><strong>Open the architecture of decision-making affecting the digital economy and the ecology of the internet.</strong>  Multi-stakeholder, iterative, and adaptive decision-making works in this space because it is complex and continuously changing. The agencies that have been effective are those that have a great deal of interaction with outside stakeholders—businesses, academics, civil society, and foreign governments.</li>
<li><strong>Personnel is policy</strong>. Structural changes in decisionmaking will work only if the right people are in the right places. Increasingly, understanding of things like the architecture of the internet, the mechanisms of cybersecurity threats, and the role of information and technology in the future are as necessary as some basic understanding of economics or how a bill is passed. More and more government positions will demand this literacy. The paper includes as an appendix a “Digital Policy Plum Book” identifying positions in the executive branch where this applies, including many where digital fluency is essential to the job.</li>
</ol>
<Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="http://webfeeds.brookings.edu/~/i/209584934/0/brookingsrss/topics/cybersecurity">
<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/10/obama_cybersecurity5.png?w=270" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/10/obama_cybersecurity5.png?w=270"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/209584934/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/209584934/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/209584934/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/209584934/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/209584934/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/209584934/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded>
		<enclosure url="https://www.brookings.edu/wp-content/uploads/2016/10/obama_cybersecurity5.png?w=270" type="image/png" />
<itunes:summary> 
In a recent paper, I reflect on my experience in the Obama administration and draw lessons about policymaking on issues for that space.&#xA0; As the General Counsel at the Commerce Department&#x2014;where I performed the duties of the Deputy Secretary for the majority of the more than four years I was there, and those of the acting Secretary for a spell&#x2014;I found myself drawn into issues like surveillance, norms for state behavior, and security far more than I could have anticipated going in.&#xA0; These matters have significant effects on other issues that are core to the Commerce Department mission, such as technological innovation, competitiveness and international data flows, and global internet governance. 
The paper is entitled &#8220;Bridging the Internet-Cyber gap: lessons in digital policy for the next administration.&#8221; That&#x2019;s an allusion to an observation by Danny Weitzner, then Deputy Chief Technology Officer at the White House Office of Science &amp; Technology Policy, at a meeting of economic and security agencies that, &#8220;this world is divided into people who call it &#x2018;the Internet&#x2019; and those who call it &#x2018;cyber.&#x2019;&#8221;&#xA0; The former tend to be techno-optimists who focus on the economic and human potential of information and communications technology, whereas the latter focus on the darker side of that technology&#x2014;threats, exploits, bad actors, and applications to warfare. 
We saw that divide in the initial response to the Snowden leaks in 2013. Almost immediately, President Obama sought to assuage concerns about the Section 215 program by saying that &#8220;nobody is listening to your phone calls&#8221; and stated that PRISM surveillance under Section 702 &#8220;does not apply to U.S. citizens and it does not apply to people living in the United States.&#8221; These responses were fighting the last war, aimed at distinguishing the Snowden revelations from the decades-earlier revelations about FBI and CIA domestic surveillance that led to the creation of the Foreign Intelligence Surveillance Act in 1978.
The President&#x2019;s response did not address the impact of the leaks on companies identified in the documents released by Snowden and on international issues from trade to privacy and internet governance. This omission waved a red flag to those outside the United States. The resulting firestorm hastened the demise of the Safe Harbor transatlantic data transfer framework at the hands of the Court of Justice of the European Union and saw allies join less friendly nations in considering data localization and some kind of multinational takeover of internet governance. 
Three years later, the landscape is different. The Obama administration has learned a lot from its experience of managing the Snowden disclosures and has taken numerous steps to restore trust and integrate a broader outlook into its policymaking in the digital arena. 
We&#x2019;ve seen reports from the president&#x2019;s special review board on surveillance as well as the Privacy and Civil Liberties Oversight Board; President Obama&#x2019;s January 2014 announcement of surveillance reforms and Presidential Policy Directive 28 declaring that foreign citizens outside the U.S. should receive protections for privacy and dignity comparable to those for American citizens; a transformation in transparency about intelligence programs; the enactment of the USA FREEDOM Act and Redress Act, among other things. We&#x2019;ve also seen the White House expand and empower its technology staff and involve them, and other agencies, in decisionmaking on issues in the traditional national security (or &#8220;cyber&#8221; as opposed to &#8220;internet&#8221;) sphere. 
Issues surrounding the digital economy and technology have become mainstream. For most of my time in the administration, I was the senior official focusing on international and commercial privacy issues. Now that official is the ... </itunes:summary>
<itunes:subtitle>In a recent paper, I reflect on my experience in the Obama administration and draw lessons about policymaking on issues for that space.&#xA0; As the General Counsel at the Commerce Department&#x2014;where I performed the duties of the Deputy ... </itunes:subtitle></item>
<item>
<feedburner:origLink>https://www.brookings.edu/research/lawful-hacking-and-the-case-for-a-strategic-approach-to-going-dark/</feedburner:origLink>
		<title>Lawful hacking and the case for a strategic approach to “Going Dark”</title>
		<link>http://webfeeds.brookings.edu/~/208409786/0/brookingsrss/topics/cybersecurity~Lawful-hacking-and-the-case-for-a-strategic-approach-to-%e2%80%9cGoing-Dark%e2%80%9d/</link>
		<pubDate>Fri, 07 Oct 2016 18:13:32 +0000</pubDate>
		<dc:creator><![CDATA[Susan Hennessey]]></dc:creator>
		
		<guid isPermaLink="false">https://www.brookings.edu/?post_type=research&#038;p=336145</guid>
		<description><![CDATA[Executive Summary After two years of intense discussion and a series of mutually-bruising legal stand-offs, the U.S. government and Silicon Valley are no closer to resolving the “Going Dark” debate. Going Dark refers to the phenomenon by which government agencies have a legal right to access particular communications but lack the technical ability to do [&#8230;]<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/208409786/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/208409786/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/208409786/BrookingsRSS/topics/cybersecurity,https%3a%2f%2fi0.wp.com%2fwww.brookings.edu%2fwp-content%2fuploads%2f2016%2f09%2famericafuture.jpeg%3fw%3d768%26amp%3bcrop%3d0%252C0px%252C100%252C9999px%26amp%3bssl%3d1"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/208409786/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/208409786/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/208409786/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description>
				<content:encoded><![CDATA[<p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/series/election-2016-and-americas-future/"><img class="lazyautosizes aligncenter lazyload" src="https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/09/americafuture.jpeg?w=768&amp;crop=0%2C0px%2C100%2C9999px&amp;ssl=1" sizes="739px" srcset="https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/09/americafuture.jpeg?w=768&amp;crop=0%2C0px%2C100%2C9999px&amp;ssl=1 768w,https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/09/americafuture.jpeg?fit=600%2C9999px&amp;ssl=1 600w,https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/09/americafuture.jpeg?fit=400%2C9999px&amp;ssl=1 400w,https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/09/americafuture.jpeg?fit=512%2C9999px&amp;ssl=1 512w" alt="Election 2016 and America's Future" width="739" height="335" data-src="https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/09/americafuture.jpeg?w=768&amp;crop=0%2C0px%2C100%2C9999px&amp;ssl=1" data-srcset="https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/09/americafuture.jpeg?w=768&amp;crop=0%2C0px%2C100%2C9999px&amp;ssl=1 768w,https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/09/americafuture.jpeg?fit=600%2C9999px&amp;ssl=1 600w,https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/09/americafuture.jpeg?fit=400%2C9999px&amp;ssl=1 400w,https://i0.wp.com/www.brookings.edu/wp-content/uploads/2016/09/americafuture.jpeg?fit=512%2C9999px&amp;ssl=1 512w" /></a></p>
<h2>Executive Summary</h2>
<p>After two years of intense discussion and a series of mutually-bruising legal stand-offs, the U.S. government and Silicon Valley are no closer to resolving the “Going Dark” debate. Going Dark refers to the phenomenon by which government agencies have a legal right to access particular communications but lack the technical ability to do so, often because of the deployment of strong encryption by technology companies. Not only are the various participants unable to find a resolution to the problem, they are unable to agree on the proper analogy for it—or even whether there actually is a problem.</p>
<p>Legislative efforts have failed. Legal battles ended without producing additional clarity. Attempts at voluntary cooperation have gone nowhere. Finding a more productive path is critical to the future public-private cooperation which will be necessary for many unrelated cybersecurity efforts. A new approach is needed.</p>
<p>Here, I argue that the federal government in a new administration should adopt and articulate a pragmatic approach that fully embraces lawful hacking as a possible alternative to legislative mandates. A coordinated interagency position should clearly communicate the trade-offs, stakes, and strategic aims. And recognizing that future legislative efforts may be required, the government should seek to develop empirical data to inform long-term decision making.</p>
<h2><strong>Background</strong></h2>
<p>In 2011, then-FBI General Counsel Valerie Caproni used the term “going dark” to describe “a potentially widening gap between our legal authority to intercept electronic communications pursuant to court order and our practical ability to actually intercept those communications.”<a href="#_edn1" name="_ednref1">[i]</a> That prediction has proved largely accurate. Although some technological developments and trends have assisted law enforcement collection, a variety of pressures place ever more communications content beyond the reach of a warrant. The underlying factors include broader adoption of end-to-end encryption, full disk encryption, and stronger security defaults, but also extend to widely-available anonymization tools, trends toward data localization, and the availability of large-storage removable media devices, among others. In short, the factors underlying the phenomenon are varied and not limited to technological developments alone.</p>
<p>While going dark also impacts intelligence collection, the most pressing concerns arise in the context of law enforcement. In ordinary criminal investigations, end-to-end encrypted messaging, stronger device encryption, and IP anonymization tools present acute challenges.</p>
<p>And the problem’s scale has increased dramatically over the past few years, as a number of major communications providers have taken steps towards offering end-to-end encrypted messaging and sophisticated device encryption broadly and by default.<a href="#_edn2" name="_ednref2">[ii]</a> Anyone not holding the required keys, including the providers themselves, is unable to access communications sent using those platforms or stored on those devices. Unquestionably, these features offer substantial security benefits to consumers. But the effect—whether intentional or unintended—is that even when law enforcement obtains a warrant, the content is inaccessible unless investigators can obtain the keys directly from individuals.</p>
<p>What had been a simmering tension between the government and technology companies boiled over into a heated public debate in February 2016. That month, the Department of Justice sought a court order to compel Apple to assist the government in unlocking an iPhone belonging to San Bernardino terrorist Sayed Farook. The precise legal questions centered on whether a court could require Apple to provide a particular form of technical assistance, where it unquestionably retained the capacity to do so. The case resolved itself out of court when a third party demonstrated the ability to unlock the phone at issue and the government withdrew its motion. While the San Bernardino case was actually about what technical assistance a company must provide to the government where it is able, the public debate centered on a distinct, and important, question: should companies be required to ensure the government has access to communications content when required for an investigation?</p>
<blockquote class="pullquote"><p>At issue is the relative risks and merits of requiring “exceptional access” for law enforcement, which is often characterized by opponents as a “backdoor.”</p></blockquote>
<p>Broadly speaking, at issue is the relative risks and merits of requiring “exceptional access” for law enforcement, which is often characterized by opponents as a “backdoor.” Most notably, Senators Dianne Feinstein and Richard Burr advanced draft legislation to require companies to retain the technical capacity to comply with court orders to produce plain text communications.<a href="#_edn3" name="_ednref3">[iii]</a> This legislation would, in effect, prohibit companies from deploying security features that place communications content beyond their own reach. Critics decried the draft as technologically illiterate and dangerous, arguing that it compromised user security overall.</p>
<p>Unsurprisingly, the heated rhetoric allowed little room for facts and common sense. Most of the public engagements consisted of each side assuming away the other side’s concerns, either by insisting that exceptional access does not necessarily compromise information security or by alleging that law enforcement overstates its need to see communications content.</p>
<p>One strain of criticism to “backdoors,” however, recognized law enforcement’s concerns and offered a potential solution: so-called “lawful hacking.”<a href="#_edn4" name="_ednref4">[iv]</a> Instead of creating additional vulnerabilities to an already-fragile security ecosystem in the form of exceptional access, these commentators argued that law enforcement should exploit existing vulnerabilities in software and hardware. In theory, the position offers a workable middle ground by which law enforcement is able to access a sufficient amount of communications and companies are unimpeded in designing secure systems. But in order for lawful hacking to be a meaningful alternative—as opposed to a diversionary tactic to delay government action—a number of questions must be addressed.</p>
<p>The government has employed hacking techniques since long before the Apple v. FBI controversy. And unsurprisingly, it faces opposition to those actions from many of the same groups that oppose exceptional access. Despite some express suggestions posing lawful hacking as an alternative to backdoors, the specific debates over the procedural rules, operational policies, and legal standards central to the feasibility of lawful hacking, have proceeded largely in parallel to the conversation regarding going dark.</p>
<p>In reality, the two are deeply related. Congress and the executive branch are accountable to a public that expects the government to discharge law enforcement functions. And despite critics declaring periodic victories or insisting that access to communications content is unnecessary for law enforcement, the going dark problem is not going away. Therefore, if the executive branch is unable to successfully develop lawful hacking tools to address a sufficient amount of the need for government access to communications to meet the expectations of the general public, it becomes dramatically more likely that it will feel compelled to seek comprehensive legislative solutions mandating exceptional access.</p>
<h2><strong>A strategic approach to moving forward</strong></h2>
<figure id="id=&quot;attachment_336188&quot; " class="wp-caption aligncenter size-article-inline"><img class=" lazyautosizes lazyload" src="https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/10/rtx1xxwu.jpg?w=768&amp;crop=0%2C0px%2C100%2C9999px&amp;ssl=1" sizes="879px" srcset="https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/10/rtx1xxwu.jpg?w=768&amp;crop=0%2C0px%2C100%2C9999px&amp;ssl=1 768w,https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/10/rtx1xxwu.jpg?fit=600%2C9999px&amp;ssl=1 600w,https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/10/rtx1xxwu.jpg?fit=400%2C9999px&amp;ssl=1 400w,https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/10/rtx1xxwu.jpg?fit=512%2C9999px&amp;ssl=1 512w" alt="FBI Director James Comey Jr. testifies at a Senate Judiciary Committee hearing on Capitol Hill" width="5321" data-src="https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/10/rtx1xxwu.jpg?w=768&amp;crop=0%2C0px%2C100%2C9999px&amp;ssl=1" data-srcset="https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/10/rtx1xxwu.jpg?w=768&amp;crop=0%2C0px%2C100%2C9999px&amp;ssl=1 768w,https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/10/rtx1xxwu.jpg?fit=600%2C9999px&amp;ssl=1 600w,https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/10/rtx1xxwu.jpg?fit=400%2C9999px&amp;ssl=1 400w,https://i1.wp.com/www.brookings.edu/wp-content/uploads/2016/10/rtx1xxwu.jpg?fit=512%2C9999px&amp;ssl=1 512w" /><figcaption class="wp-caption-text">FBI Director James Comey Jr. testifies at a Senate Judiciary Committee hearing on Capitol Hill in Washington December 9, 2015. The couple who killed 14 people in San Bernardino last week were radicalized before they met online and spoke of jihad and martyrdom to each other as early as late 2013, Comey said on Wednesday. REUTERS/Joshua Roberts &#8211; RTX1XXWU</figcaption></figure>
<p>Thus far, the Federal Bureau of Investigation has been the public face of the government’s engagement in the going dark debate. This has created ambiguity as to whether FBI Director Jim Comey speaks on behalf of the federal government, on behalf of law enforcement, or only for himself. The federal government is not monolithic, after all, and technological developments have uneven effects on the equities of different agencies. Therefore, it is not surprising that there is no consensus view even within government on the best way to address the problem. But the lack of any clear government position gives the impression of internecine battles and masks shared principles.</p>
<p>Stronger leadership is needed in order to clarify the government’s interests and goals. A coordinated interagency position does not require reaching agreement on the ultimate solution. Instead, the White House should coordinate a position that articulates the government’s view regarding the general scope and severity of the impact of going dark on law enforcement specifically.</p>
<p>Some forms of communication will always remain inaccessible, and the proper balance of information security and law enforcement needs will require trade-offs. But the government must be clear that the American people expect law enforcement to prevent, investigate, and prosecute crimes. It would be unacceptable and intolerable for the executive branch to simply accept that police function be significantly impaired, especially in the context of serious offenses. However, where experts agree that the most direct and comprehensive solution—a legislative decryption mandate—would have significant security downsides and potentially wide-ranging unintended consequences, prudence requires investigating potential alternatives.</p>
<blockquote class="pullquote"><p>It would be unacceptable and intolerable for the executive branch to simply accept that police function be significantly impaired, especially in the context of serious offenses.</p></blockquote>
<p>The executive branch should deliberately set itself to solving as much of going dark as is possible before resorting to costly and controversial legislation, especially since it is clear that a legislative solution is unlikely to become politically feasible any time soon. Under the best outcome, a genuine investment in varied alternative strategies—possibly coupled with technological developments favoring law enforcement equities—would create a stable situation moving forward. But even if it does not, exhausting alternatives is useful in demonstrating the necessity of comprehensive mandates.</p>
<p>Adopting a strategic position of pursuing alternatives also has the benefit of clarifying the opposition. Many companies and advocacy organizations state that they support law enforcement action and believe crimes should be fully investigated; their objection is only to making imprudent security sacrifices to that end. This strategy would present a good-faith attempt to reconcile those views by pursuing “least bad” alternatives. But those who oppose not only performance standard legislation, but also all feasible alternatives, in effect endorse a view that it is tolerable for law enforcement to be unable to detect, prevent, investigate, or prosecute certain offenses.</p>
<blockquote class="right-pullquote"><p>Lawful hacking should be viewed as the central element of a comprehensive alternative strategy.</p></blockquote>
<h2><strong>A national strategy on lawful hacking</strong></h2>
<p>Lawful hacking is a necessary, though possibly not sufficient, element of a workable solution without mandated exceptional access. Therefore, lawful hacking should be viewed as the central element of a comprehensive alternative strategy, which includes investments in using metadata and the emerging Internet of Things to offset the losses to communication content that make up the going dark problem.<a href="#_edn5" name="_ednref5">[v]</a></p>
<p>The ultimate utility of lawful hacking will depend as much on legal developments as technological ones. This series of complex and interrelated legal questions is central to the future of law enforcement and U.S. national security. Those questions should not be answered haphazardly or based on the expedient incentives of individual criminal cases, and instead must be given adequate thought.</p>
<p>To achieve this, the administration should direct the Department of Justice to develop a national strategy on lawful hacking. Below are recommendations for elements of an effective national strategy.</p>
<ol start="1">
<li>
<h3><strong> Coordinate lawful hacking investigations and prosecutions.</strong></h3>
</li>
</ol>
<ul>
<li>Categories of cases related to lawful hacking should be coordinated by Main Justice, including those involving the use of sensitive government tools, novel network investigative techniques, or where a single warrant is expected to result in prosecutions in numerous but unidentified jurisdictions. Coordination ensures consistent representation of the government’s position on the legal questions central to the success of this alternative strategy.</li>
<li>The Department’s litigation strategy should focus on obtaining the clearest possible answers, and not fear establishing unfavorable precedents. Here, the resolution of legal questions may be more important than the answers themselves. For example, one controversy currently being litigated is whether a defendant is entitled to review sensitive computer code related to law enforcement techniques. Hacking tools are necessarily perishable, but an obligation to disclose in court would dramatically reduce the useful lifespan. While some proponents advocate for law enforcement to temporarily exploit and then quickly disclose a vulnerability for patching, this is infeasible in practice and would significantly limit the efficacy of lawful hacking as a broader solution. The sooner the executive knows whether such code must be disclosed, the sooner it can strategically invest resources in further pursing the strategy or instead seeking legislation in Congress.</li>
</ul>
<ol start="2">
<li>
<h3> <strong>Support a technologically-informed judiciary.</strong></h3>
</li>
</ol>
<ul>
<li>The executive branch should call on the Federal Judicial Center to develop a reference manual on computer science aimed at empowering the federal judiciary to independently evaluate the relevance and materiality of evidence involving computer code and information technology systems. The executive branch has a significant interest in ensuring correct, technologically informed judicial decisions related to lawful hacking and should provide technical support, and expertise to aid the development of such a guide.</li>
<li>The executive branch should, to the extent possible, support the designation of independent court-appointed experts. Pursuant to federal evidence rules, courts are entitled to appoint experts of its choosing.<a href="#_edn6" name="_ednref6">[vi]</a> In the context of lawful hacking investigations, this would be valuable to assist judges in determining the relative credibility of defense and prosecution expert testimony. And where tools related to lawful hacking contain classified or highly-sensitive information, the government should seek to designate specially-cleared, impartial experts. This is a limited solution, but similar strategies have been successful mechanisms for independent assessment of highly-sensitive materials in the context of Foreign Intelligence Surveillance Court.<a href="#_edn7" name="_ednref7">[vii]</a></li>
</ul>
<ol start="3">
<li>
<h3><strong>Develop Ethical Use Guidelines for federal investigatory agencies</strong></h3>
</li>
</ol>
<ul>
<li>Policy guidelines should specify the circumstances in which the use of lawful hacking is permitted. Broadly, policies should ensure that hacking techniques are deployed only after less intrusive means have been exhausted, as is required when wiretapping.</li>
<li>Policy should also set guidelines, similar to those for undercover operations, governing lawful hacking that temporarily facilitates criminal activity. Standards should be set to balance probable harms and benefits and to ensure criminal activity is only facilitated where strictly necessary to prevent ongoing harm.</li>
</ul>
<ol start="4">
<li>
<h3><strong>Invest resources in investigating the most serious offenses.</strong></h3>
</li>
</ol>
<ul>
<li>Lawful hacking is resource intensive, both to develop or purchase the necessary tools and to properly coordinate investigations. Consequently, executive policy should invest these limited resources in investigations of the most serious offenses—violent crime, sexual offenses against children, large-scale narcotics trafficking, and terrorism. Limiting lawful hacking to serious cases ensures appropriate allocation of research and development resources, better protects tools, and facilitates coordinated prosecution strategies.</li>
</ul>
<ol start="5">
<li>
<h3><strong>  Embrace Mass Hacking</strong></h3>
</li>
</ol>
<ul>
<li>Lawful hacking often, though not always, constitutes a search under the Fourth Amendment and thus requires law enforcement to obtain a search warrant. Opponents of lawful hacking warn of the government’s ability to target thousands of computers pursuant to a single warrant, calling it “mass hacking.”<a href="#_edn8" name="_ednref8">[viii]</a> But the government should embrace mass hacking as an paradigm shift necessary for investigations to respond to going dark and the Justice Department should clearly articulate how warrants for such operations can satisfy all constitutional requirements. Individuals who use computers to facilitate the most serious offenses, particularly those related to child sexual exploitation, avail themselves of the most sophisticated available technologies to hide their identities and crimes. Because of better tools and stronger defaults, those offenders make fewer mistakes which limits available opportunities for law enforcement intervention. When opportunities to uncover serious crimes and rescue victims present—and warrants can be obtained—law enforcement should be encouraged to unmask as many offenders as possible.</li>
</ul>
<ol start="6">
<li>
<h3> <strong>Demand security in exchange for disclosure.</strong></h3>
</li>
</ol>
<ul>
<li>The government should clearly articulate the vulnerabilities equities process applicable to law enforcement hacking tools that rely on undisclosed flaws in commercial software. The public should have a clear understanding as to the considerations and safeguards in developing such tools and be confident that the balance between disclosure and use maximizes overall security benefits.<a href="#_edn9" name="_ednref9">[ix]</a></li>
<li>The government should mandate that technology companies that are notified of a vulnerability pursuant to the equities process either patch the flaw within a reasonable time period or provide periodic updates detailing the reason for their failure to protect consumers. This policy maximizes security benefits. The reason to disclose a vulnerability is so that it can be patched to eliminate the threat that bad actors will discover and exploit it, but disclosure represents some degree of loss to the security interests served by government use. Typically, that loss is more than offset by the ubiquitous information security gains of patching, but we should avoid the net harm that results when a vulnerability is disclosed and no patch is deployed.</li>
</ul>
<ol start="7">
<li>
<h3> <strong>Develop empirical data to inform long-term decision making.</strong></h3>
</li>
</ol>
<ul>
<li>The government should seek to develop data regarding the precise scope of going dark and the impact on law enforcement. This includes tracking instances in which law enforcement was unable to effectuate a court order to view communications content and the disposition of cases where such content could not be obtained.</li>
<li>The government should also support empirical research regarding the probable consequences of legislative options and lawful hacking methods. For example, while software updates might provide an existing mechanism to push, in effect, malicious updates to the target of a warrant, experts fear this could result in fewer individuals updating software and create widespread insecurity. Where probable behavioral responses are measurable propositions, the government should seek evidence to inform policy that promotes cybersecurity benefits—by avoiding more drastic and potentially harmful solutions—and minimizes harm. Similarly, research is needed into the genuine consequences of law enforcement retaining vulnerabilities, which is the most controversial element of lawful hacking.</li>
</ul>
<blockquote class="pullquote"><p>A strategic, solution-minded policy facilitates law enforcement function and allows for the development of much-needed evidence to inform law and policy choices.</p></blockquote>
<h2>Conclusion</h2>
<p>Going dark presents fundamental tradeoffs. Maximally secure information technology systems mean paying some real costs in terms of how effective law enforcement can be. Conversely, maximally efficient law enforcement may require some genuine compromise to our information system security. Ultimately, that choice will have to be made either all at once, in the form of comprehensive legislation, or continually over time as we refine the balance through “good enough” alternatives.</p>
<p>Standing still, however, is not an option. The continued evolution of technologies alters the available options over time—solutions that are available today may not be in the near future. The choices here are neither easy nor obvious, but it is not yet necessary to determine the ultimate conclusion.</p>
<p>A strategic, solution-minded policy facilitates law enforcement function and allows for the development of much-needed evidence to inform law and policy choices. What is required now is pragmatic and clear leadership. The stakes are too high to wait.</p>
<hr />
<p><a href="#_ednref1" name="_edn1">[i]</a> Valerie Caproni, Statement Before the House Judiciary Committee, February 17, 2011.
<br>
<a href="#_ednref2" name="_edn2">[ii]</a> Report of The Manhattan District Attorney’s Office on Smartphone Encryption and Public Safety, November 2015, p. 2-6.
<br>
<a href="#_ednref3" name="_edn3">[iii]</a> Compliance with Court Orders Act, 114<sup>th</sup> Congress (2016).
<br>
<a href="#_ednref4" name="_edn4">[iv]</a> Steven Bellovin et al., Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet, Northwestern Journal of Technology and Intellectual Property, Vol 12, Issue 1 (2014).
<br>
<a href="#_ednref5" name="_edn5">[v]</a> Matthew Olsen et al., Don’t Panic: Making Progress on the “Going Dark” Debate, Berkman Center for Internet &amp; Society at Harvard University (2016).
<br>
<a href="#_ednref6" name="_edn6">[vi]</a> Federal Rule of Evidence 706(a).
<br>
<a href="#_ednref7" name="_edn7">[vii]</a> 50 U.S.C. § 1803(i)(1).
<br>
<a href="#_ednref8" name="_edn8">[viii]</a> Ron Wyden, (2016) Wyden Calls For A Vote on SMH Act to Stop Massive Expansion of Government Hacking Into Americans’ Personal Devices [Press release].
<br>
<a href="#_ednref9" name="_edn9">[ix]</a> Ari Schwartz &amp; Rob Knake, Government’s Role in Vulnerability Disclosure, Belfer Center for Science and International Affairs, Harvard Kennedy School, p. 12-14.</p>
<Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="http://webfeeds.brookings.edu/~/i/208409786/0/brookingsrss/topics/cybersecurity">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/208409786/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/208409786/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/208409786/BrookingsRSS/topics/cybersecurity,https%3a%2f%2fi0.wp.com%2fwww.brookings.edu%2fwp-content%2fuploads%2f2016%2f09%2famericafuture.jpeg%3fw%3d768%26amp%3bcrop%3d0%252C0px%252C100%252C9999px%26amp%3bssl%3d1"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/208409786/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/208409786/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/208409786/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded>
		<enclosure url="http://webfeeds.brookings.edu/-/236347674/0/brookingsrss/topics/cybersecurity.jpg" type="image/jpeg" />
<feedburner:origEnclosureLink>https://www.brookings.edu/wp-content/uploads/2016/10/rtsc2xr.jpg?w=270</feedburner:origEnclosureLink>
<itunes:summary>** Executive Summary 
After two years of intense discussion and a series of mutually-bruising legal stand-offs, the U.S. government and Silicon Valley are no closer to resolving the &#8220;Going Dark&#8221; debate. Going Dark refers to the phenomenon by which government agencies have a legal right to access particular communications but lack the technical ability to do so, often because of the deployment of strong encryption by technology companies. Not only are the various participants unable to find a resolution to the problem, they are unable to agree on the proper analogy for it&#x2014;or even whether there actually is a problem. 
Legislative efforts have failed. Legal battles ended without producing additional clarity. Attempts at voluntary cooperation have gone nowhere. Finding a more productive path is critical to the future public-private cooperation which will be necessary for many unrelated cybersecurity efforts. A new approach is needed. 
Here, I argue that the federal government in a new administration should adopt and articulate a pragmatic approach that fully embraces lawful hacking as a possible alternative to legislative mandates. A coordinated interagency position should clearly communicate the trade-offs, stakes, and strategic aims. And recognizing that future legislative efforts may be required, the government should seek to develop empirical data to inform long-term decision making. 
Background 
In 2011, then-FBI General Counsel Valerie Caproni used the term &#8220;going dark&#8221; to describe &#8220;a potentially widening gap between our legal authority to intercept electronic communications pursuant to court order and our practical ability to actually intercept those communications.&#8221;[i] That prediction has proved largely accurate. Although some technological developments and trends have assisted law enforcement collection, a variety of pressures place ever more communications content beyond the reach of a warrant. The underlying factors include broader adoption of end-to-end encryption, full disk encryption, and stronger security defaults, but also extend to widely-available anonymization tools, trends toward data localization, and the availability of large-storage removable media devices, among others. In short, the factors underlying the phenomenon are varied and not limited to technological developments alone. 
While going dark also impacts intelligence collection, the most pressing concerns arise in the context of law enforcement. In ordinary criminal investigations, end-to-end encrypted messaging, stronger device encryption, and IP anonymization tools present acute challenges. 
And the problem&#x2019;s scale has increased dramatically over the past few years, as a number of major communications providers have taken steps towards offering end-to-end encrypted messaging and sophisticated device encryption broadly and by default.[ii] Anyone not holding the required keys, including the providers themselves, is unable to access communications sent using those platforms or stored on those devices. Unquestionably, these features offer substantial security benefits to consumers. But the effect&#x2014;whether intentional or unintended&#x2014;is that even when law enforcement obtains a warrant, the content is inaccessible unless investigators can obtain the keys directly from individuals. 
What had been a simmering tension between the government and technology companies boiled over into a heated public debate in February 2016. That month, the Department of Justice sought a court order to compel Apple to assist the government in unlocking an iPhone belonging to San Bernardino terrorist Sayed Farook. The precise legal questions centered on whether a court could require Apple to provide a particular form of technical assistance, where it unquestionably retained the capacity to do so. The case resolved itself out of court when a third party demonstrated the ability to unlock the phone at issue ... </itunes:summary>
<itunes:subtitle>** Executive Summary 
After two years of intense discussion and a series of mutually-bruising legal stand-offs, the U.S. government and Silicon Valley are no closer to resolving the &#8220;Going Dark&#8221; debate. Going Dark refers to the ... </itunes:subtitle></item>
<item>
<feedburner:origLink>https://www.brookings.edu/blog/techtank/2016/09/14/cyber-grand-challenge-contrasts-todays-cybersecurity-risks/</feedburner:origLink>
		<title>Cyber Grand Challenge contrasts today’s cybersecurity risks</title>
		<link>http://webfeeds.brookings.edu/~/196764212/0/brookingsrss/topics/cybersecurity~Cyber-Grand-Challenge-contrasts-today%e2%80%99s-cybersecurity-risks/</link>
		<pubDate>Wed, 14 Sep 2016 12:08:50 +0000</pubDate>
		<dc:creator><![CDATA[Richard Bejtlich]]></dc:creator>
		
		<guid isPermaLink="false">https://www.brookings.edu/?p=331258</guid>
		<description><![CDATA[Cade Metz’s article for Wired titled “Hackers Don’t Have to Be Human Anymore. This Bot Battle Proves It” described a curious event that took place in Las Vegas on August 4, 2016. The first Defense Advanced Research Projects Agency (DARPA) Cyber Grand Challenge witnessed seven teams compete for cyber security supremacy. Unlike traditional hacking contests, [&#8230;]<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/06/supercomputer_european_union.jpg?w=320" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/06/supercomputer_european_union.jpg?w=320"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/196764212/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/196764212/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/196764212/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/196764212/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/196764212/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/196764212/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description>
				<content:encoded><![CDATA[<p>Cade Metz’s <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.wired.com/2016/08/security-bots-show-hacking-isnt-just-humans/" target="_blank">article for Wired</a> titled “Hackers Don’t Have to Be Human Anymore. This Bot Battle Proves It” described a curious event that took place in Las Vegas on August 4, 2016. The first Defense Advanced Research Projects Agency (DARPA) Cyber Grand Challenge witnessed seven teams compete for cyber security supremacy. Unlike traditional hacking contests, however, the participants engaging in digital combat were autonomous programs running on super computers, and the targets were the other digital participants. In other words, this was not a human versus human contest, but a “bot” (short for “robot”) versus bot competition. <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.cybergrandchallenge.com/" target="_blank">According to DARPA</a>, “[f]or nearly twelve hours teams were scored based on how capably their systems protected hosts, scanned the network for vulnerabilities and maintained the correct function of software.” This was clearly an innovative and creative event, which was ultimately won by “Mayhem,” software created by a startup called ForAllSecure. Just how relevant is it to the challenges facing organizations, governments, and individuals in cyberspace?</p>
<h2><strong>Opportunity and a threat</strong></h2>
<p>From the perspective of attackers, the Challenge is an opportunity and a threat. As an opportunity, the contest demonstrates that software can be programmed to identify and exploit previously unknown vulnerabilities in previously unseen code bases. This is a force multiplier for offensive security teams, although it is not an unprecedented development. For years offensive security teams have relied upon a variety of automated tools to hunt for code flaws. Code from the Challenge may accelerate the bug hunting process.</p>
<p>As a threat, some might wonder if automated code could put some offensive security personnel out of business. Could a high-priced “red team,” paid to simulate potential adversaries, be replaced by a cheaper bot? In the short-to-medium term, this seems unlikely. There is much more to security research and professional consulting engagements than grinding away to identify and exploit vulnerabilities. A human touch will remain a key component, if only for liability reasons, for the foreseeable future.</p>
<h2><strong>Problems are seldom technological</strong></h2>
<p>From the perspective of defenders, the Challenge is less helpful. At first glance it would seem that the bots’ capability to identify and patch vulnerabilities would be a benefit to defensive security teams. While rapid patching is a key element of proper defense, the problem facing enterprise security staffs is seldom technological. The problems are complex and sometimes interrelated. First, software vendors may be slow to provide patches, and they seldom allow customers to alter or even access code, as might be the case with open source alternatives. Therefore, a security bot that finds a vulnerability will not have the ability to fix it until the vendor codes and publishes a patch. Discovering a vulnerability may prompt the security team to implement their own work-arounds, such as limiting access via network-based controls, but that process can be cumbersome or ultimately ineffective.</p>
<blockquote class="right-pullquote"><p>While rapid patching is a key element of proper defense, the problem facing enterprise security staffs is seldom technological.</p></blockquote>
<p>Second, security teams are creatures of the business or organization hosting them. They are not free to act on their security programs independently. On occasion they may be able to rush the deployment of a security countermeasure or software patch when it presents sufficient risk or it has received extreme media attention. More often, the security team must wait to apply patches or configuration changes, and weekly or even monthly change windows are standard.</p>
<p>Third, security teams are usually not allowed to have free reign on their business or organization networks. They must gingerly step around potential landmines, where disruption to a fragile but important server or application could cause millions in lost revenue. To this day there remain networks where it is forbidden to run standard network mapping or scanning tools for fear they will “knock over” that server in the closet that does something important, though no one is quite sure what. Unfortunately, the world beyond corporate enterprise computing is even worse, with so-called Internet of Things and Industrial Control Systems networks running code that dates to the 1990s and earlier.</p>
<h2><strong>A hodge-podge of equipment and code</strong></h2>
<p>The DARPA Cyber Grand Challenge, then, could be viewed as the technology demonstration project that it was, and not necessarily a model for future security paradigms. The biggest problems in real-life networks are based upon the fact that they are a hodge-podge of legacy equipment running an assortment of mix-and-match code, administered by staff struggling to perform basic functions like inventory management and so-called “cyber hygiene.” The high-tech world of “bot-on-bot” combat will remain largely separate, although elements of that world have already been present in cyberspace for decades. Anyone remembering the outbreaks of so-called network “worms” in the 1990s and early 2000s may wonder about the fuss over the DARPA Cyber Grand Challenge. However, it is worth congratulating the seven participating teams for pushing the limits of automation to show how creative programming can interact in offensive and defensive ways in artificial environments.</p>
<Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="http://webfeeds.brookings.edu/~/i/196764212/0/brookingsrss/topics/cybersecurity">
<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/06/supercomputer_european_union.jpg?w=320" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/06/supercomputer_european_union.jpg?w=320"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/196764212/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/196764212/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/196764212/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/196764212/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/196764212/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/196764212/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded>
		<enclosure url="https://www.brookings.edu/wp-content/uploads/2016/06/supercomputer_european_union.jpg?w=320" type="image/jpeg" />
<itunes:summary>Cade Metz&#x2019;s article for Wired titled &#8220;Hackers Don&#x2019;t Have to Be Human Anymore. This Bot Battle Proves It&#8221; described a curious event that took place in Las Vegas on August 4, 2016. The first Defense Advanced Research Projects Agency (DARPA) Cyber Grand Challenge witnessed seven teams compete for cyber security supremacy. Unlike traditional hacking contests, however, the participants engaging in digital combat were autonomous programs running on super computers, and the targets were the other digital participants. In other words, this was not a human versus human contest, but a &#8220;bot&#8221; (short for &#8220;robot&#8221;) versus bot competition. According to DARPA, &#8220;[f]or nearly twelve hours teams were scored based on how capably their systems protected hosts, scanned the network for vulnerabilities and maintained the correct function of software.&#8221; This was clearly an innovative and creative event, which was ultimately won by &#8220;Mayhem,&#8221; software created by a startup called ForAllSecure. Just how relevant is it to the challenges facing organizations, governments, and individuals in cyberspace? 
Opportunity and a threat 
From the perspective of attackers, the Challenge is an opportunity and a threat. As an opportunity, the contest demonstrates that software can be programmed to identify and exploit previously unknown vulnerabilities in previously unseen code bases. This is a force multiplier for offensive security teams, although it is not an unprecedented development. For years offensive security teams have relied upon a variety of automated tools to hunt for code flaws. Code from the Challenge may accelerate the bug hunting process. 
As a threat, some might wonder if automated code could put some offensive security personnel out of business. Could a high-priced &#8220;red team,&#8221; paid to simulate potential adversaries, be replaced by a cheaper bot? In the short-to-medium term, this seems unlikely. There is much more to security research and professional consulting engagements than grinding away to identify and exploit vulnerabilities. A human touch will remain a key component, if only for liability reasons, for the foreseeable future.
Problems are seldom technological 
From the perspective of defenders, the Challenge is less helpful. At first glance it would seem that the bots&#x2019; capability to identify and patch vulnerabilities would be a benefit to defensive security teams. While rapid patching is a key element of proper defense, the problem facing enterprise security staffs is seldom technological. The problems are complex and sometimes interrelated. First, software vendors may be slow to provide patches, and they seldom allow customers to alter or even access code, as might be the case with open source alternatives. Therefore, a security bot that finds a vulnerability will not have the ability to fix it until the vendor codes and publishes a patch. Discovering a vulnerability may prompt the security team to implement their own work-arounds, such as limiting access via network-based controls, but that process can be cumbersome or ultimately ineffective. 
While rapid patching is a key element of proper defense, the problem facing enterprise security staffs is seldom technological. 
Second, security teams are creatures of the business or organization hosting them. They are not free to act on their security programs independently. On occasion they may be able to rush the deployment of a security countermeasure or software patch when it presents sufficient risk or it has received extreme media attention. More often, the security team must wait to apply patches or configuration changes, and weekly or even monthly change windows are standard. 
Third, security teams are usually not allowed to have free reign on their business or organization networks. They must gingerly step around potential landmines, where disruption to a fragile but important server or ... </itunes:summary>
<itunes:subtitle>Cade Metz&#x2019;s article for Wired titled &#8220;Hackers Don&#x2019;t Have to Be Human Anymore. This Bot Battle Proves It&#8221; described a curious event that took place in Las Vegas on August 4, 2016. The first Defense Advanced Research Projects ... </itunes:subtitle></item>
<item>
<feedburner:origLink>https://www.brookings.edu/blog/techtank/2016/08/16/to-mitigate-medical-hacks-identify-incentives-for-hackers/</feedburner:origLink>
		<title>To mitigate medical hacks, identify incentives for hackers</title>
		<link>http://webfeeds.brookings.edu/~/181021674/0/brookingsrss/topics/cybersecurity~To-mitigate-medical-hacks-identify-incentives-for-hackers/</link>
		<pubDate>Tue, 16 Aug 2016 11:30:36 +0000</pubDate>
		<dc:creator><![CDATA[Niam Yaraghi]]></dc:creator>
		
		<guid isPermaLink="false">https://www.brookings.edu/?p=327177</guid>
		<description><![CDATA[Privacy breaches are extremely ubiquitous in the health care industry. Over the last six years, medical data of more than 155 million Americans have been potentially exposed through nearly 1,500 breach incidents. While there are notable ongoing efforts among health care organizations to prevent these incidents, the strategies to mitigate the consequences of privacy breaches after they happen [&#8230;]<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/06/medical_data.jpg?w=270" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/06/medical_data.jpg?w=270"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/181021674/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/181021674/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/181021674/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/181021674/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/181021674/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/181021674/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description>
				<content:encoded><![CDATA[<p>Privacy breaches are extremely ubiquitous in the health care industry. Over the last six years, medical data of more than 155 million Americans have been potentially exposed through nearly 1,500 breach <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf" target="_blank">incidents</a>. While there are notable <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.brookings.edu/research/hackers-phishers-and-disappearing-thumb-drives-lessons-learned-from-major-health-care-data-breaches/" target="_blank">ongoing efforts</a> among health care organizations to prevent these incidents, the strategies to mitigate the consequences of privacy breaches after they happen are entirely neglected.</p>
<p>A privacy breach is a risk that has two components: probability and consequence. To effectively mitigate the risk, both of the components should be curbed. That is, we should not only try to prevent the privacy breaches, but also should have a plan to mitigate the negative consequences of such breaches in case they happen.</p>
<p>Unlike health care organizations, the banking sector has mastered the art of mitigating the consequences of privacy breaches. Immediately after the breach of credit card data, all affected consumers are notified, their old credit cards are frozen and new ones are issued. The process is so quick and efficient that consumers often face considerably less harm from a credit card data breach, especially because many credit card issuers now provide fraud liability coverage to their consumers and insure them against fraudulent charges.</p>
<p>On the other hand, the response of health care organizations to a data breach only consists of panic, mandatory reporting, and in some cases, provision of identity theft protection. Despite the fact that medical data breaches can be disastrous for patients, health care organizations have no viable strategy or technology to effectively reduce the negative consequences of data breaches.</p>
<p>To mitigate the consequences of privacy incidents, we should first know exactly how the breached data could be misused by hackers or unauthorized users; to block a road, one should first know where the road is located. Banks can often prevent hackers from using stolen credit card information simply because they are better versed in how hackers monetize that data, and thus have designed strategies to combat it. Despite the public concerns over health care privacy breaches, we do not know exactly why hackers are interested in stealing medical data or how exactly they monetize it.</p>
<p>In many cases, hackers aren&#8217;t really after health care data; they want patients&#8217; credit card information, which due to poor information technology practices, is stored on the same network as many patients&#8217; health records. Hacking the financial part of the data also opens the door to medical data.</p>
<p>In other cases, hackers want the medical data of one or a few individuals. As soon as a celebrity is admitted to a hospital, the hacking attacks on the specific hospital skyrocket. Many people are interested in such data and are willing to pay top dollar for it, which creates a strong financial incentive for hackers to try to steal the celebrity&#8217;s medical records.</p>
<p>While it is very easy to follow the money and figure out why hackers may be interested in getting their hands on the medical records of a celebrity or other specific individuals to commit insurance fraud, it is very difficult to imagine how a criminal organization may be able to monetize the medical data of say <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.dailydot.com/layer8/655000-patient-records-dark-net/" target="_blank">655,000 Americans</a>. There is still even a great deal of confusion about the value of stolen medical data in the black market as the range of reported value for one record of stolen data varies from under <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.dailydot.com/layer8/655000-patient-records-dark-net/" target="_blank">$1</a> to almost <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.npr.org/sections/alltechconsidered/2015/02/13/385901377/the-black-market-for-stolen-health-care-data" target="_blank">$500</a>.</p>
<p>The first step to overcome this limitation and better protect patients&#8217; privacy is to identify the incentives behind hacking attacks and classify all the possible ways through which the stolen medical data could be misused. Independent research institutes are uniquely situated to solicit the experiences of patients who have been the victim of medical data breaches and uncover the different ways through which hackers monetized the stolen data. The expertise and experience of law enforcement agencies such as the FBI&#8217;s cybercrime division or the Health and Human Services&#8217; inspector general can also shed considerable light on other ways through which criminal organizations use stolen medical data to commit fraud.</p>
<p>We still have much to learn about why hackers go after medical data and how they monetize it. These government agencies could help us do just that.</p>
<Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="http://webfeeds.brookings.edu/~/i/181021674/0/brookingsrss/topics/cybersecurity">
<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/06/medical_data.jpg?w=270" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/06/medical_data.jpg?w=270"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/181021674/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/181021674/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/181021674/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/181021674/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/181021674/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/181021674/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded>
		<enclosure url="https://www.brookings.edu/wp-content/uploads/2016/06/medical_data.jpg?w=270" type="image/jpeg" />
<itunes:summary>Privacy breaches are extremely ubiquitous in the health care industry. Over the last six years, medical data of more than 155 million Americans have been potentially exposed through nearly 1,500 breach&#xA0;incidents. While there are notable&#xA0;ongoing efforts&#xA0;among health care organizations to prevent these incidents, the strategies to mitigate the consequences of privacy breaches after they happen are entirely neglected. 
A privacy breach is a risk that has two components: probability and consequence. To effectively mitigate the risk, both of the components should be curbed. That is, we should not only try to prevent the privacy breaches, but also should have a plan to mitigate the negative consequences of such breaches in case they happen. 
Unlike health care organizations, the banking sector has mastered the art of mitigating the consequences of privacy breaches. Immediately after the breach of credit card data, all affected consumers are notified, their old credit cards are frozen and new ones are issued. The process is so quick and efficient that consumers often face considerably less harm from a credit card data breach, especially because many credit card issuers now provide fraud liability coverage to their consumers and insure them against fraudulent charges.
On the other hand, the response of health care organizations to a data breach only consists of panic, mandatory reporting, and in some cases, provision of identity theft protection. Despite the fact that medical data breaches can be disastrous for patients, health care organizations have no viable strategy or technology to effectively reduce the negative consequences of data breaches. 
To mitigate the consequences of privacy incidents, we should first know exactly how the breached data could be misused by hackers or unauthorized users; to block a road, one should first know where the road is located. Banks can often prevent hackers from using stolen credit card information simply because they are better versed in how hackers monetize that data, and thus have designed strategies to combat it. Despite the public concerns over health care privacy breaches, we do not know exactly why hackers are interested in stealing medical data or how exactly they monetize it. 
In many cases, hackers aren't really after health care data; they want patients' credit card information, which due to poor information technology practices, is stored on the same network as many patients' health records. Hacking the financial part of the data also opens the door to medical data. 
In other cases, hackers want the medical data of one or a few individuals. As soon as a celebrity is admitted to a hospital, the hacking attacks on the specific hospital skyrocket. Many people are interested in such data and are willing to pay top dollar for it, which creates a strong financial incentive for hackers to try to steal the celebrity's medical records.
While it is very easy to follow the money and figure out why hackers may be interested in getting their hands on the medical records of a celebrity or other specific individuals to commit insurance fraud, it is very difficult to imagine how a criminal organization may be able to monetize the medical data of say&#xA0;655,000 Americans. There is still even a great deal of confusion about the value of stolen medical data in the black market as the range of reported value for one record of stolen data varies from under&#xA0;$1&#xA0;to almost&#xA0;$500. 
The first step to overcome this limitation and better protect patients' privacy is to identify the incentives behind hacking attacks and classify all the possible ways through which the stolen medical data could be misused. Independent research institutes are uniquely situated to solicit the experiences of patients who have been the victim of medical data breaches and uncover the different ways through which hackers monetized the stolen data. The expertise and experience of law ... </itunes:summary>
<itunes:subtitle>Privacy breaches are extremely ubiquitous in the health care industry. Over the last six years, medical data of more than 155 million Americans have been potentially exposed through nearly 1,500 breach&#xA0;incidents. While there are notable&#xA0;</itunes:subtitle></item>
<item>
<feedburner:origLink>https://www.brookings.edu/blog/order-from-chaos/2016/08/03/3-reasons-russias-vladimir-putin-might-want-to-interfere-in-the-u-s-presidential-elections/</feedburner:origLink>
		<title>3 reasons Russia’s Vladimir Putin might want to interfere in the U.S. presidential elections</title>
		<link>http://webfeeds.brookings.edu/~/181021602/0/brookingsrss/topics/cybersecurity~reasons-Russia%e2%80%99s-Vladimir-Putin-might-want-to-interfere-in-the-US-presidential-elections/</link>
		<pubDate>Wed, 03 Aug 2016 13:00:26 +0000</pubDate>
		<dc:creator><![CDATA[Fiona Hill]]></dc:creator>
		
		<guid isPermaLink="false">https://www.brookings.edu/?p=250906</guid>
		<description><![CDATA[The Clinton campaign, among others, has accused Vladimir Putin of encouraging Russian intelligence to hack the Democratic National Committee (DNC) files and hand over thousands of emails to WikiLeaks as part of a broader scheme to get Donald Trump elected president. But why would Putin even want to influence the U.S. presidential election? There are several [&#8230;]<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/08/putin_vladimir001-e1470165485942.jpg?w=320" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/08/putin_vladimir001-e1470165485942.jpg?w=320"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/181021602/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/181021602/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/181021602/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/181021602/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/181021602/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/181021602/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description>
				<content:encoded><![CDATA[<p>The Clinton campaign, <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.nytimes.com/2016/07/27/us/politics/spy-agency-consensus-grows-that-russia-hacked-dnc.html" target="_blank">among others</a>, has accused Vladimir Putin of encouraging Russian intelligence to hack the Democratic National Committee (DNC) files and hand over thousands of emails to WikiLeaks as part of a broader scheme to get Donald Trump elected president.</p>
<p>But why would Putin even want to influence the U.S. presidential election? There are several reasons Russia might want stir up trouble in an already contentious campaign. Russian views of the United States are at a low point; Putin believes the U.S. plays its own nefarious games in Russian politics; and Moscow would like to undermine U.S. international credibility by highlighting the deficiencies in American party politics.</p>
<h2><strong>Putin thinks the U.S. already did it to him first</strong></h2>
<p>As far as Putin and his inner circle are concerned, it was the United States that moved first to meddle in Russian politics when Putin decided to return for a third term. In 2011-’12, Russian demonstrators took to the streets to protest electoral violations in the parliamentary elections and the lack of alternative candidates to Putin in the presidential election. Putin and his inner circle believed the U.S. was to blame. Putin even asserted that then-Secretary of State Hillary Clinton had either incited or directly financed the demonstrations.</p>
<p>In Putin’s mindset, the West always tries to bring Russia down. Next year will be the 100th anniversary of the Russian Revolution, and this year marks the 25th anniversary of the dissolution of the Soviet Union. In the Russian worldview, first Germany in World War I and then the United States in the Cold War took advantage of domestic divisions and vulnerabilities and the Russian state collapsed twice in one century.</p>
<p>So one of Putin’s primary objectives is to force Western leaders to back off in order to make sure this doesn’t happen again. Putin wants the United States and other Western governments to stop funding, as part of their foreign policies, organizations that promote political and economic transformations in Russia. He also wants to block U.S. officials from meeting with opposition figures and parties. From Putin’s perspective, democracy promotion is just a cover for regime change.</p>
<h2><strong>Putin thinks and acts like a KGB operative</strong></h2>
<p>Before he was the leader of Russia, <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.brookings.edu/research/reports2/2015/01/mr-putin" target="_blank">Vladimir Putin was an officer in the KGB</a>, the Soviet-era secret intelligence service, and that experience continues to shape his views and actions. Putin approaches his dealings with the United States with the logic of a covert operative, steeped in plots and conspiracies. He also uses an intelligence operative’s tools. He’s prepared to fight dirty, and he relies on the element of tactical surprise to ensure maximum effect.</p>
<p>Putin has two features that distinguish him from other world leaders. As he puts it, he knows how to “work with people” and “work with information.” In the KGB, Putin learned how to probe people’s vulnerabilities, uncover their secrets, and use compromising information against them. In other words, blackmail and intimidation are part of his stock in trade.</p>
<p>In his view, other world leaders are essentially “targets.” He gathers information and carefully tailors his approach to each leader to see how he can outmaneuver them. In one infamous and blatant episode, Putin played on German Chancellor Angela Merkel’s fear of dogs to put her edge during a one-on-one meeting at his dacha. He allowed his black Labrador to sniff around and lie at her feet. On numerous other occasions, Putin has signaled to visiting Western officials that he knows personal information from “their” old KGB files.</p>
<p>Putin also knows how to <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.amazon.com/Nothing-True-Everything-Possible-Surreal/dp/1610394550" target="_blank">play the media</a>. Russia already has a long tradition of propaganda and information warfare, but Putin is a master manipulator. <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.tandfonline.com/doi/abs/10.1080/10758216.2001.11655947?journalCode=mppc20" target="_blank">Early in his presidency</a>, he described the press as an instrument that he would deploy in the service of the state. The Kremlin has trained its own bloggers to create content on the internet. It has hired public relations firms to improve its media strategy. Kremlin-sponsored focus groups have helped hone messaging. As lies are part of the coin of the intelligence operative and facts are fungible, there have been few constraints on creative content.</p>
<p>The Russian media machine functions as a huge psychological operation, a kind of massive pro-Putin Super PAC. At home, it rallies the Russian public around the flag by publicizing the damage Russia’s enemies are trying to inflict. Abroad, it focuses on scandals that underscore the hubris, hypocrisy, and failings of Western political systems.</p>
<p>The DNC files may not have been given to WikiLeaks by Russian intelligence, but the selective release of email caches, at a juncture when they are likely to gain the greatest international media attention and have the most negative political impact in the United States, does have the hallmarks of a carefully considered operation. For Vladimir Putin, who sees himself as locked in a struggle for influence with the United States, this would all be fair game.</p>
<h2><strong>Putin wants a weakened U.S. presidency</strong></h2>
<p>There is much speculation that Putin may see Donald Trump as someone he can do business with, and that he has a grudge against Hillary Clinton. Trump’s praise of Putin as a “strong leader” is a notable break with the general trend of U.S. politicians and opinion leaders castigating Putin and criticizing Russia, and Putin has made seemingly complimentary comments about Trump in return.</p>
<p>In contrast, in public and private, Putin and other Russian officials have made it clear that they have a negative opinion of Clinton. In <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~en.kremlin.ru/events/president/news/45832" target="_blank">a 2014 interview with French television</a>, for example, Putin lambasted Clinton for remarks she had made about him, noting that it was “better not to argue with women” and that Clinton was never “too graceful in her statements.”</p>
<p>Whatever his personal preferences, though, Putin cannot reasonably expect to influence the outcome of the U.S. presidential election. The best he can hope for is to reduce the ability of whoever comes into the Oval Office to pursue policies that are detrimental to Putin’s and Russia’s interests.</p>
<p>Right now, Putin wants the U.S. to remove sanctions imposed on Russia after its annexation of Crimea in March 2014. Perhaps even more importantly, Russia has parliamentary elections this September, and presidential elections again in 2018, when Putin is expected to run for a fourth term. The Kremlin does not want a repeat of the protests of 2011-’12, and certainly no pronouncements from the U.S. about whether the elections are free and fair or whether Putin has a genuine popular mandate for his next presidency.</p>
<p>Against this backdrop, the information from the DNC files underscores for the Russian public, and the outside world, that U.S. party politics is just as dirty as in Russia or anywhere else. The U.S. looks a lot less credible as the moral authority on the conduct of elections.</p>
<p>Irrespective of whether Donald Trump or Hillary Clinton is elected, from Moscow’s perspective, at the end of this ruinous political campaign, the new U.S. president will look as wounded as Putin did when he took office again in 2012. A U.S. president who is elected amid controversy and recrimination, reviled by a large segment of the electorate, and mired in domestic crises will be hard-pressed to forge a coherent foreign policy and challenge Russia.</p>
<Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="http://webfeeds.brookings.edu/~/i/181021602/0/brookingsrss/topics/cybersecurity">
<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/08/putin_vladimir001-e1470165485942.jpg?w=320" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/08/putin_vladimir001-e1470165485942.jpg?w=320"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/181021602/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/181021602/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/181021602/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/181021602/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/181021602/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/181021602/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded>
		<enclosure url="https://www.brookings.edu/wp-content/uploads/2016/08/putin_vladimir001-e1470165485942.jpg?w=320" type="image/jpeg" />
<itunes:summary>The Clinton campaign,&#xA0;among others, has accused Vladimir Putin of encouraging Russian intelligence to hack the Democratic National Committee (DNC) files and hand over thousands of emails to WikiLeaks as part of a broader scheme to get Donald Trump elected president. 
But why would Putin even want to influence the U.S. presidential election? There are several reasons Russia might want stir up trouble in an already contentious campaign. Russian views of the United States are at a low point; Putin believes the U.S. plays its own nefarious games in Russian politics; and Moscow would like to undermine U.S. international credibility by highlighting the deficiencies in American party politics. 
Putin thinks the U.S. already did it to him first 
As far as Putin and his inner circle are concerned, it was the United States that moved first to meddle in Russian politics when Putin decided to return for a third term. In 2011-&#x2019;12, Russian demonstrators took to the streets to protest electoral violations in the parliamentary elections and the lack of alternative candidates to Putin in the presidential election. Putin and his inner circle believed the U.S. was to blame. Putin even asserted that then-Secretary of State Hillary Clinton had either incited or directly financed the demonstrations. 
In Putin&#x2019;s mindset, the West always tries to bring Russia down. Next year will be the 100th anniversary of the Russian Revolution, and this year marks the 25th anniversary of the dissolution of the Soviet Union. In the Russian worldview, first Germany in World War I and then the United States in the Cold War took advantage of domestic divisions and vulnerabilities and the Russian state collapsed twice in one century. 
So one of Putin&#x2019;s primary objectives is to force Western leaders to back off in order to make sure this doesn&#x2019;t happen again. Putin wants the United States and other Western governments to stop funding, as part of their foreign policies, organizations that promote political and economic transformations in Russia. He also wants to block U.S. officials from meeting with opposition figures and parties. From Putin&#x2019;s perspective, democracy promotion is just a cover for regime change. 
Putin thinks and acts like a KGB operative 
Before he was the leader of Russia,&#xA0;Vladimir Putin was an officer in the KGB, the Soviet-era secret intelligence service, and that experience continues to shape his views and actions. Putin approaches his dealings with the United States with the logic of a covert operative, steeped in plots and conspiracies. He also uses an intelligence operative&#x2019;s tools. He&#x2019;s prepared to fight dirty, and he relies on the element of tactical surprise to ensure maximum effect. 
Putin has two features that distinguish him from other world leaders. As he puts it, he knows how to &#8220;work with people&#8221; and &#8220;work with information.&#8221; In the KGB, Putin learned how to probe people&#x2019;s vulnerabilities, uncover their secrets, and use compromising information against them. In other words, blackmail and intimidation are part of his stock in trade. 
In his view, other world leaders are essentially &#8220;targets.&#8221; He gathers information and carefully tailors his approach to each leader to see how he can outmaneuver them. In one infamous and blatant episode, Putin played on German Chancellor Angela Merkel&#x2019;s fear of dogs to put her edge during a one-on-one meeting at his dacha. He allowed his black Labrador to sniff around and lie at her feet. On numerous other occasions, Putin has signaled to visiting Western officials that he knows personal information from &#8220;their&#8221; old KGB files. 
Putin also knows how to&#xA0;play the media. Russia already has a long tradition of propaganda and information warfare, but Putin is a master manipulator.&#xA0;Early in his presidency, he described the press as an instrument that he would deploy in ... </itunes:summary>
<itunes:subtitle>The Clinton campaign,&#xA0;among others, has accused Vladimir Putin of encouraging Russian intelligence to hack the Democratic National Committee (DNC) files and hand over thousands of emails to WikiLeaks as part of a broader scheme to get Donald ... </itunes:subtitle></item>
<item>
<feedburner:origLink>https://www.brookings.edu/blog/techtank/2016/07/25/what-does-the-u-s-government-know-about-russia-and-the-dnc-hack/</feedburner:origLink>
		<title>What does the U.S. government know about Russia and the DNC hack?</title>
		<link>http://webfeeds.brookings.edu/~/181022930/0/brookingsrss/topics/cybersecurity~What-does-the-US-government-know-about-Russia-and-the-DNC-hack/</link>
		<comments>http://webfeeds.brookings.edu/~/181022930/0/brookingsrss/topics/cybersecurity~What-does-the-US-government-know-about-Russia-and-the-DNC-hack/#respond</comments>
		<pubDate>Mon, 30 Nov -0001 00:00:00 +0000</pubDate>
		<dc:creator><![CDATA[Susan Hennessey]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.brookings.edu?p=172886&#038;preview_id=172886</guid>
		<description><![CDATA[<p>Susan Hennessey discusses the evidence that individuals coordinating with Russia are attempting to use&#160;cyberattacks&#160;to influence the United States presidential election. Mitigating the harm from the hack and leaks of Democratic National Committee emails will require sufficiently strong public attribution.</p><div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/06/computer_technology.jpg?w=263" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/06/computer_technology.jpg?w=263"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/181022930/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/181022930/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/181022930/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/181022930/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/181022930/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/181022930/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a rel="NOFOLLOW" title="View Comments" href="https://www.brookings.edu/blog/techtank/2016/07/25/what-does-the-u-s-government-know-about-russia-and-the-dnc-hack/#respond"><img height="20" style="border:0;margin:0;padding:0;" src="http://assets.feedblitz.com/i/comments20.png"></a>&#160;<a title="Follow Comments via RSS" href="https://www.brookings.edu/blog/techtank/2016/07/25/what-does-the-u-s-government-know-about-russia-and-the-dnc-hack/feed/"><img height="20" style="border:0;margin:0;padding:0;" src="http://assets.feedblitz.com/i/commentsrss20.png"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description>
				<content:encoded><![CDATA[<p>
  <em>This post originally appeared on the <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.lawfareblog.com/what-does-us-government-know-about-russia-and-dnc-hack" target="_blank">Lawfare blog</a>.</em>
</p>
<p>Potentially unpleasant news for Jim Comey: We need you to intervene in the 2016 election again.</p>
<p>There is significant evidence that individuals acting at the direction of or on the behalf of Russia—the degree of coordination is unclear—are attempting to use <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.schneier.com/blog/archives/2015/07/organizational_.html" target="_blank">organizational doxing</a> to influence the United States presidential election. As Harvard law professor Jack Goldsmith <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://lawfareblog.com/what-old-and-new-and-scary-russias-probable-dnc-hack" target="_blank">noted</a>, this raises a number of scary questions regarding preserving the integrity of U.S. election results. It is not entirely clear what is motivating the DNC document dumps or the apparent targeting of Hillary Clinton; some speculate the aim it to benefit Donald Trump, though a plausible goal might simply be to insert a degree of chaos into U.S. politics. Understanding the ultimate goal of the hack and leaks, however, is not all that important to deciding how exactly we should respond. What is critical to mitigating the harm is sufficiently strong public attribution.</p>
<p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.defenseone.com/technology/2016/07/how-putin-weaponized-wikileaks-influence-election-american-president/130163/" target="_blank">Defense One</a> lays out the powerful, though not definitive, public evidence of Russian involvement. The New York Times offers a somewhat more tempered <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.nytimes.com/2016/07/25/us/politics/donald-trump-russia-emails.html?hp&amp;action=click&amp;pgtype=Homepage&amp;clickSource=story-heading&amp;module=a-lede-package-region&amp;region=top-news&amp;WT.nav=top-news&amp;mtrref=undefined&amp;gwh=4B9B406606FD3FA62B4FAF7751B52D49&amp;gwt=pay" target="_blank">assessment</a>. It is important to recognize that the strongest evidence regarding attribution was made public long before the most recent batch of emails was released:</p>
<ul>
<li>Director of National Intelligence James Clapper <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.latimes.com/nation/la-na-hackers-campaign-20160518-snap-story.html" target="_blank">reported</a> in May that the intelligence community had evidence that foreign governments were targeting campaigns.</li>
<li>In June, Crowdstrike published <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/" target="_blank">its account</a>, specifically naming Russian state actors as behind the DNC hack.</li>
<li>While the Russians have <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://www.washingtonpost.com/opinions/the-danger-of-russian-disinformation/2016/05/06/b31d9718-12d5-11e6-8967-7ac733c56f12_story.html" target="_blank">long been known</a> to use information and disinformation campaigns to influence foreign elections, there was initial skepticism regarding the degree of Crowdstrike’s certainty. However, the <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~https://twitter.com/pwnallthethings/status/743197064843104257/photo/1?ref_src=twsrc%5Etfw" target="_blank">discovery of incriminating metadata</a>—first noticed by Matt Tait who tweets under <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~twitter.com/pwnallthethings">@pwnallthethings</a>—and other evidence quickly corroborated the Crowdstrike assessment.</li>
<li>There are well-documented connections between Wikileaks—the chosen vehicle for the leak release—its founder Julian Assange, and the Russian state apparatus.</li>
</ul>
<p>Paired with the technical indicators, the sum total of evidence is about as close to a smoking gun as can be expected where a sophisticated nation state is involved.  </p>
<p>The leaked DNC emails have already cost Debbie Wasserman Schultz her chairmanship of the DNC. Julian Assange<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.itv.com/news/update/2016-06-12/assange-on-peston-on-sunday-more-clinton-leaks-to-come/" target="_blank"> threatened</a> in a June interview that the leaks would lead to Hillary Clinton’s arrest. There is certainly nothing close to that in this batch of emails, and there is reason to doubt the validity of Assange’s claim; he has wildly exaggerated about the content of leaks in the past and there are strategic reasons to lead major leaks with the most damaging information. But we are almost certain to see a number of leaks aimed at damaging Hillary Clinton over the coming weeks and months.</p>
<p>This means, put simply, that actors outside the U.S. are using criminal means to influence the outcome of a U.S. election. That’s a problem.</p>
<p>The question before us now is how to construct a response to mitigate damage to our democratic institutions.</p>
<p>There is no exclusionary rule regarding media coverage of leaked or stolen information. The press cannot be asked to turn a blind eye out of patriotism to material released in the public domain. To the contrary, the strength of our system depends on an independent Fourth Estate that vigorously covers all information regarding political candidates. So Hillary is going to take whatever political hits she takes from the release of whatever this information contains.</p>
<p>However, it is crucial that the media not lose the thread that Russian state efforts to influence our democratic processes is the real story here. That story cannot vanish after an initial splash, and coverage of future leaked information should note the probable Russian involvement and involve analysis as to what the intended aims of leaking each new document might be. An informed public will need to evaluate new information situated in the context that it comes by means of a leak designed to manipulate the electorate’s opinions.</p>
<p>This careful persistent context will depend on strong attribution. The more speculative the claim is—though it isn’t all that speculative at this point—the less likely reporters are to view it as integral to coverage. Therefore, the U.S. government would be wise to go on the record with as much definitive information regarding attribution as it can.</p>
<p>This may require overcoming some governmental inertia to not comment. The non-political elements of the executive branch are hesitant to weigh in on matters related to elections, and the blowback following FBI Director Comey’s statement on the Clinton email investigation are a particularly fresh reminder of the perils. Beyond that, there is a fear that making even general claims of attribution may lead to calls for more concrete and sensitive evidence to be made public. In the early days following the hack and organizational doxing of Sony, the government went on the record that North Korea was behind the episode. After private industry experts questioned the strength of the technical evidence, the government was forced to disclose that it had additional information regarding DPRK involvement. Comey<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.cbsnews.com/news/sloppy-north-korean-hackers-left-a-trail-fbi-director-says/" target="_blank"> quelled doubts</a> regarding the Sony attribution by stating that he had “a very high confidence about this attribution to North Korea, as does the entire intelligence community” and pointing to additional malware indicators. As a result, the government may be more hesitant to make public claims regarding nation state attribution because they do not want to risk compromising intelligence sources and methods in order to convince the public.</p>
<p>Here, however, the stakes are far higher.</p>
<p>Over the weekend, Dave Aitel<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~arstechnica.com/security/2016/06/guest-editorial-the-dnc-hack-and-dump-is-what-cyberwar-looks-like/" target="_blank"> argued</a> that the “DNC hack and dump is what cyberwar looks like.” There is a decent case that information systems surrounding our elections should qualify as “critical infrastructure” and that malicious nation states should recognize that interfering with these systems risks serious consequences. The absolute minimum response should be to make credible public attribution.</p>
<p>The U.S. government is uniquely positioned to make the case for Russian attribution. The FBI and DHS have been<a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.nbcnews.com/tech/security/foreign-hackers-spying-u-s-presidential-candidates-spy-chief-n576146" target="_blank"> working directly with the campaigns</a> on cybersecurity, and the government has a combination of insight from both technical assessments of compromised networks and those intelligence information sources which the private sector lacks. And because the government has been historically very careful in stating conclusions regarding nation state involvement, it has a high degree of domestic and international credibility.  </p>
<p>The best way to mitigate damage is to provide a clear U.S. intelligence assessment as to whether there is Russian involvement and the degree of confidence. In May, Clapper was <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/topics/cybersecurity/~www.nbcnews.com/tech/security/foreign-hackers-spying-u-s-presidential-candidates-spy-chief-n576146" target="_blank">rather vague</a> in noting that the IC was “aware that campaigns and related organizations and individuals are targeted by actors with a variety of motivations.” With the implication to free and fair elections in the U.S., it is time for the FBI to get far more specific.</p>
<p>The Russian weapon is information. Our national values require that we not suppress information in the press, whatever its provenance. The solution is to fight fire with fire: our defense is more information. Protecting all sources and methods, the intelligence community and FBI should tell us who they think hacked and leaked the information. The rest of us can sort out why and whether that will matter on Election Day.</p>
<Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="http://webfeeds.brookings.edu/~/i/181022930/0/brookingsrss/topics/cybersecurity">
<div style="clear:left"><a href="https://www.brookings.edu/wp-content/uploads/2016/06/computer_technology.jpg?w=263" title="View image"><img border="0" style="max-width:100%" src="https://www.brookings.edu/wp-content/uploads/2016/06/computer_technology.jpg?w=263"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/181022930/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/181022930/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/181022930/BrookingsRSS/topics/cybersecurity,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/181022930/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/181022930/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/181022930/BrookingsRSS/topics/cybersecurity"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a rel="NOFOLLOW" title="View Comments" href="https://www.brookings.edu/blog/techtank/2016/07/25/what-does-the-u-s-government-know-about-russia-and-the-dnc-hack/#respond"><img height="20" style="border:0;margin:0;padding:0;" src="http://assets.feedblitz.com/i/comments20.png"></a>&#160;<a title="Follow Comments via RSS" href="https://www.brookings.edu/blog/techtank/2016/07/25/what-does-the-u-s-government-know-about-russia-and-the-dnc-hack/feed/"><img height="20" style="border:0;margin:0;padding:0;" src="http://assets.feedblitz.com/i/commentsrss20.png"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded>
			<wfw:commentRss>http://webfeeds.brookings.edu/~/181022930/0/brookingsrss/topics/cybersecurity~What-does-the-US-government-know-about-Russia-and-the-DNC-hack/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<enclosure url="https://www.brookings.edu/wp-content/uploads/2016/06/computer_technology.jpg?w=263" type="image/jpeg" />
<itunes:keywords>Uncategorized</itunes:keywords>
<itunes:summary> This post originally appeared on the Lawfare blog. 
Potentially unpleasant news for Jim Comey: We need you to intervene in the 2016 election again. 
There is significant evidence that individuals acting at the direction of or on the behalf of Russia&#x2014;the degree of coordination is unclear&#x2014;are attempting to use&#xA0;organizational doxing&#xA0;to influence the United States presidential election. As Harvard law professor Jack Goldsmith noted, this raises a number of scary questions regarding preserving the integrity of U.S. election results. It is not entirely clear what is motivating the DNC document dumps or the apparent targeting of Hillary Clinton; some speculate the aim it to benefit Donald Trump, though a plausible goal might simply be to insert a degree of chaos into U.S. politics. Understanding the ultimate goal of the hack and leaks, however, is not all that important to deciding how exactly we should respond. What is critical to mitigating the harm is sufficiently strong public attribution. 
Defense One&#xA0;lays out the powerful, though not definitive, public evidence of Russian involvement. The New York Times offers a somewhat more tempered assessment. It is important to recognize that the strongest evidence regarding attribution was made public long before the most recent batch of emails was released: 
- Director of National Intelligence James Clapper reported&#xA0;in May that the intelligence community had evidence that foreign governments were targeting campaigns. - In June, Crowdstrike published its account, specifically naming Russian state actors as behind the DNC hack. - While the Russians have long been known&#xA0;to use information and disinformation campaigns to influence foreign elections, there was initial skepticism regarding the degree of Crowdstrike&#x2019;s certainty. However, the&#xA0;discovery of incriminating metadata&#x2014;first noticed by Matt Tait who tweets under&#xA0;@pwnallthethings&#x2014;and other evidence quickly corroborated the Crowdstrike assessment. - There are well-documented connections between Wikileaks&#x2014;the chosen vehicle for the leak release&#x2014;its founder Julian Assange, and the Russian state apparatus. 
Paired with the technical indicators, the sum total of evidence is about as close to a smoking gun as can be expected where a sophisticated nation state is involved. &#xA0; 
The leaked DNC emails have already cost Debbie Wasserman Schultz her chairmanship of the DNC. Julian Assange&#xA0;threatened&#xA0;in a June interview that the leaks would lead to Hillary Clinton&#x2019;s arrest. There is certainly nothing close to that in this batch of emails, and there is reason to doubt the validity of Assange&#x2019;s claim; he has wildly exaggerated about the content of leaks in the past and there are strategic reasons to lead major leaks with the most damaging information. But we are almost certain to see a number of leaks aimed at damaging Hillary Clinton over the coming weeks and months. 
This means, put simply, that actors outside the U.S. are using criminal means to influence the outcome of a U.S. election. That&#x2019;s a problem. 
The question before us now is how to construct a response to mitigate damage to our democratic institutions. 
There is no exclusionary rule regarding media coverage of leaked or stolen information. The press cannot be asked to turn a blind eye out of patriotism to material released in the public domain. To the contrary, the strength of our system depends on an independent Fourth Estate that vigorously covers all information regarding political candidates. So Hillary is going to take whatever political hits she takes from the release of whatever this information contains. 
However, it is crucial that the media not lose the thread that Russian state efforts to influence our democratic processes is the real story here. That story cannot vanish after an initial splash, and coverage of future leaked information should ... </itunes:summary>
<itunes:subtitle>This post originally appeared on the Lawfare blog. 
Potentially unpleasant news for Jim Comey: We need you to intervene in the 2016 election again. 
There is significant evidence that individuals acting at the direction of or on the behalf of ... </itunes:subtitle></item>
</channel></rss>

