February 3, 2016

CLTC Announces $900,000 in Inaugural Research Grants

How can organizations better detect spear-phishing cyberattacks? How could neural signals be used as a method of online authentication? How effective are tactics such as financial account closures and asset seizures in deterring cyber criminals? What types of defenses could help protect at-risk activists and NGOs from state-level surveillance? These…

January 22, 2016

Center for Long-Term Cybersecurity Profiled in UC Berkeley Alumni Publication

The Center for Long-Term Cyberecurity (CLTC) is profiled in the Winter 2016 issue of The Promise of Berkeley, a publication produced “for alumni, parents, and friends who shape Cal’s future.” Published by University Development and Alumni Relations, this publication highlights compelling news stories from across the UC Berkeley campus and…

November 24, 2015

CLTC Hosts Conversation with Admiral Michael Rogers, Commander of U.S. Cyber Command

On October 20, the UC Berkeley Center for Long-Term Cybersecurity (CLTC) hosted a discussion with Admiral Michael Rogers, Commander of the United States Cyber Command and Director of the National Security Agency. In an hour-long event moderated by Steve Weber, Faculty Director of the CLTC, Admiral Rogers engaged in a…

October 27, 2015

Betsy Cooper Joins CLTC as Executive Director

The UC Berkeley Center for Long-Term Cybersecurity (CLTC) is pleased to announce the hiring of its first Executive Director, Betsy Cooper. “We are excited that Betsy Cooper has joined us at CLTC,” said Steve Weber, Faculty Director of the CLTC and Professor at the UC Berkeley School of Information. “She…

October 26, 2015

NY Times: “Russian Ships Near Data Cables Are Too Close for U.S. Comfort”

During a recent presentation for the Center for Long-Term Cybersecurity, Chris Demchak, Professor and RADM Grace M. Hopper Chair of Cybersecurity at the U.S. Naval War College, noted that one of the major vulnerabilities for the Internet lies in the international submarine cable network, the vast system of cables that…

October 26, 2015

Is Cybersecurity Insurance the Best Way to Encourage Secure Online Behavior?

In a blog post, Robert Morgus, a researcher and organizer for the New America Foundation’s Cybersecurity Initiative, raises the question: why is the market for cybersecurity insurance so underdeveloped? “Despite the narrative, the crux of our current cyber problem is largely not technical at all, but instead comes down to…

October 23, 2015

Congressional Innovation Fellows Wanted: November 1 Deadline

TechCongress, in partnership with The Open Technology Institute at New America, is looking for three tech-oriented thinkers for its first class of Congressional Innovation Fellows. Congress is struggling to keep up with technology in part because it doesn’t have a pipeline for tech talent. Relatively few staffers in the institution…

October 19, 2015

Jonathan Reiber Joins CLTC as Senior Fellow

The UC Berkeley Center for Long-Term Cybersecurity (CLTC) is pleased to announce that Jonathan Reiber will be joining our team as a Senior Fellow. Jonathan previously served as Chief Strategy Officer in the Office of Cyber Policy, in the Office of the Secretary of Defense. In this position, he led…

October 12, 2015

CLTC Seminar, 10/27, 12PM: Carey Nachenberg, Technical Fellow, Symantec

Carey Nachenberg Tuesday, October 27, 2015, 12:00 PM South Hall, Room 205 Light lunch will be served.   Members of the UC Berkeley community are invited to attend an upcoming seminar with Carey Nachenberg, a leading cybersecurity expert, author, and technical fellow at Symantec, the world’s largest computer security firm….

October 7, 2015

UK Program Recruits Cybersecurity Talent Through Online Games

Writing in Motherboard, a section of Vice.com, Victoria Turk reported on The Cyber Security Challenge UK, through which government and corporate organizations have created an online gaming platform designed to identify players with skills necessary for careers in cybersecurity.  The platform functions as a “gamified job application” that can help…

October 5, 2015

October is “Cybersecurity Awareness Month”

President Obama has once again designated October as “Cybersecurity Awareness Month,” which, according to the Department of Homeland Security’s website, is “designed to engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cybersecurity and increasing the resiliency of the nation…

September 29, 2015

Potential Blowback for Imposing Sanctions on China for Cyberattacks

Cybersecurity was a major point of discussion during a summit between President Obama and Chinese President Xi Jinping, with the U.S. leader calling on his counterpart to curtail government-sponsored cyberattacks on American organizations. As reported in the Guardian, President Obama announced in a speech that he “did indicate to President…

September 23, 2015

NYTimes, WSJ Report on Growth in the Field of “Threat Intelligence”

In the article, “Intelligence Start-Up Goes Behind Enemy Lines to Get Ahead of Hackers,” Nicole Perlroth of the New York Times described the work of iSight Partners, a company that “provides intelligence about threats to computer security in much the same way military scouts provide intelligence about enemy troops.” She…

September 21, 2015

Intelligence Officials Make Case for “Backdoor” Access to Encrypted Communications

In hearings last week, the House Intelligence Committee heard testimony from several government officials—including heads of the FBI, CIA, and National Security Agency—who argued that the Government needed to maintain “backdoor” access to encrypted data. Elias Groll of Foreign Policy summed up the argument by James Clapper, Director of National…

September 15, 2015

Dr. Chris Demchak of U.S. Naval War College Speaks at CLTC

On September 3, 2015, UC Berkeley’s Center for Long-Term Cybersecurity hosted Dr. Chris C. Demchak, Grace M. Hopper Chair of Cyber Security and Director of the Center for Cyber Conflict Studies in the Strategic Research Department of the U.S. Naval War College. In a presentation entitled “Political and Economic Coercion…

September 11, 2015

Russian Hackers Using Satellites to “Siphon Sensitive Data”

Multiple media outlets have reported that a group of Russian-speaking hackers are “exploiting commercial satellites to siphon sensitive data from diplomatic and military agencies in the United States and in Europe as well as to mask their location.” In covering the story in the Washington Post, Ellen Nakashima noted that…

September 11, 2015

Vast Data Troves At Risk: Web is “Most Perfect Surveillance System”

In a front-page story in the Wall Street Journal, “The Hacked Data Broker? Be Very Afraid,“ Christopher Mims reports on the potential for a massive exposure of data that would “make the hack of infidelity site Ashley Madison look like a footnote by comparison.” “Even more daunting,” he writes, “it…

August 24, 2015

Quantum Computing Advances: Is the Crypto-Apocalypse Coming?

Writing in Network World, Patrick Nelson reports on recent advances in quantum computing that could represent a step toward the so-called “cybersecurity Armageddon,” in which encryption is rendered useless in the face of staggeringly fast computers. “The number crunching behind cryptographic keys could one day become as painless to untangle…