Analysis & Opinions - The Washington Post
WikiLeaks Doesn't Raise Doubts About Who Hacked the DNC. We Still Know it Was Russia.
Preview
"When WikiLeaks dropped its latest trove of documents on Tuesday — this time revealing CIA hacking operations — it highlighted an effort code-named “UMBRAGE.” A WikiLeaks tweet said, “CIA steals other groups virus and malware facilitating false flag attacks.” The group described how the program “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states,” as a way to “misdirect attribution” of a break-in. Attribution was once the subject of spirited academic debate, yet figuring out who is behind a computer hack has never been as essential a topic as it is now.
The stakes here are high..."
Want to Read More?
The full text of this publication is available via the original publication source.
For more information on this publication:
Please contact
Cyber Project
For Academic Citation:
Buchanan, Ben .“WikiLeaks Doesn't Raise Doubts About Who Hacked the DNC. We Still Know it Was Russia..” The Washington Post, March 9, 2017.
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Video
- SNF Agora Institute
Election 2020 — Securing the Vote
Audio
- Pioneer Institute
Ballot Question 1: Risks & Regulations Regarding Right to Repair
Magazine Article
- Economist
Digital Dominance: A new global ranking of cyber-power throws up some surprises
In the Spotlight
Most Viewed
Policy Brief
- Quarterly Journal: International Security
The Future of U.S. Nuclear Policy: The Case for No First Use
Discussion Paper
- Belfer Center for Science and International Affairs, Harvard Kennedy School
Why the United States Should Spread Democracy
Preview
"When WikiLeaks dropped its latest trove of documents on Tuesday — this time revealing CIA hacking operations — it highlighted an effort code-named “UMBRAGE.” A WikiLeaks tweet said, “CIA steals other groups virus and malware facilitating false flag attacks.” The group described how the program “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states,” as a way to “misdirect attribution” of a break-in. Attribution was once the subject of spirited academic debate, yet figuring out who is behind a computer hack has never been as essential a topic as it is now.
The stakes here are high..."
Want to Read More?
The full text of this publication is available via the original publication source.- Recommended
- In the Spotlight
- Most Viewed
Recommended
Video - SNF Agora Institute
Election 2020 — Securing the Vote
Audio - Pioneer Institute
Ballot Question 1: Risks & Regulations Regarding Right to Repair
Magazine Article - Economist
Digital Dominance: A new global ranking of cyber-power throws up some surprises
In the Spotlight
Most Viewed
Policy Brief - Quarterly Journal: International Security
The Future of U.S. Nuclear Policy: The Case for No First Use
Discussion Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School
Why the United States Should Spread Democracy


