United States Cybersecurity Magazine

ProcessBolt
From the Fall 2015 Issue

If Information Sharing Is Such a Good Thing, Why Aren’t More Companies Doing It?

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

OUR NATIONAL SECURITY RELIES ON OUR ABILITY TO SHARE THE RIGHT INFORMATION, WITH THE RIGHT PEOPLE, AT THE RIGHT TIME. Our national security relies on our ability to share the right information, with the right people, at the right time.1 While the high-profile attacks against Target, e-Bay, Home Depot, Nieman Marcus, JPMorgan Chase, Sony Pictures … Read more

From the Spring 2015 Issue

The Problem of Attribution in Cyber Attacks: The Sony Example

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

At Fort Sumter, Union troops quickly identified the forces that were bombarding them as newly minted Confederate artillery. Similarly, at Pearl Harbor, the U.S. Navy immediately identified Japan as the source of the bombing raid because of the unmistakable markings on the low-flying aircraft overhead. In attacks involving conventional warfare, “attribution,” or the identification of … Read more

From the Fall 2014 Issue

INTERNATIONAL COOPERATION IN COMBATING CYBERTHREATS: THE U.S. – ISRAEL EXAMPLE

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

In recent years, two significant developments — (1) the sabotage of centrifuges and Programmable Logic Controllers at Iran’s secret Natanz nuclear fuel-enrichment facility by the Stuxnet worm, and (2) the accelerating growth in the tremendous investment by American information technology (“IT”) giants in Israel — have come to epitomize the close cooperation between the U.S. … Read more

From the Spring 2014 Issue

THE (SLOWLY) EVOLVING LANDSCAPE OF SECURITY CLEARANCES IN THE CYBERWORLD AFTER SNOWDEN

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

Shortly after Edward Snowden burst onto the scene in May 2013, we learned — too late — that there were multiple “red flags” in his background investigation that should have prevented him from gaining access to the countless numbers of classified National Security Agency (NSA) documents that he leaked. Although Snowden has caused untold damage … Read more