15 Items

Engima machine

Wikimedia

Paper - Hoover Institution Press

Nobody But Us

    Author:
  • Ben Buchanan
| Aug. 30, 2017

In the modern era, there is great convergence in the technologies used by friendly nations and by hostile ones. Signals intelligence agencies find themselves penetrating the technologies that they also at times must protect. To ease this tension, the United States and its partners have relied on an approach sometimes called Nobody But Us, or NOBUS: target communications mechanisms using unique methods accessible only to the United States. This paper examines how the NOBUS approach works, its limits, and the challenging matter of what comes next.

A Defense Advanced Research Projects Agency image represents DARPA’s High-Assurance Cyber Military Systems program, which seeks to create technology for constructing systems that are functionally correct and satisfy safety and security properties.

Department of Defense

News - The Atlantic

Writing the Rules of Cyberwar

    Author:
  • Alyza Sebenius
| June 28, 2017

Postdoctoral Fellow Ben Buchanan was interviewed by Alyza Sebanius for The Atlantic on June 28, 2017. In his new book, The Cybersecurity Dilemma, Dr. Buchanan argues that the line between offensive and defensive attacks is far from clear.

teaser image

Analysis & Opinions - Lawfare

The Real Lesson from the WannaCry Ransomware

| May 12, 2017

Lawfare and others have spent an enormous amount of time discussing the intricacies of the Vulnerabilities Equities Process (VEP). Many policy conferences have been dedicated to the matter, and an even greater number of Twitter debates. The topic, in its own way, serves as a proxy for what one thinks of broader issues in information security and signals intelligence.

Today’s so-called WannaCry ransomware attack reveals the stakes, but more importantly the limits, of that debate.

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.

An overflow crowd listens to a panel discussion on the background and impact of Russian cyber attacks. (Bennett Craig)

(Bennett Craig)

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Russian Cyber Operations 2017

| Spring 2017

Cyber Security Project Director Dr. Michael Sulmeyer led a discussion on the future of Russian Cyber Operations with New York Times National Security Correspondent David Sanger, Director of the Center on the United States and Europe at the Brookings Institution Dr. Fiona Hill, and Cyber Security Project Fellow Dr. Ben Buchanan.

teaser image

Testimony - United States Senate

Prepared Testimony: The Modus Operandi and Toolbox of Russia and Other Autocracies for Undermining Democracies Throughout the World

    Author:
  • Ben Buchanan
| Mar. 15, 2017

Prepared Testimony and Statement for the Record of Ben Buchanan for the Subcommittee on Crime and Terrorism, United States Senate Committee on the Judiciary.