12 Results for:

June 19, 2018

Cybersecurity
The Theft and Reuse of Advanced Offensive Cyber Weapons Pose A Growing Threat

Almost exactly a year ago, North Korea and Russia reused a vulnerability stolen from the U.S. government to conduct the WannaCry and NotPetya ransomware attacks. Is the theft and reuse of vulnerabili…

NSA

February 16, 2005

Iraq
IRAQ: Who’s in charge?

This publication is now archived. Who’s in charge of Iraq now?The U.S.-led occupation government has begun to gradually hand over power to the interim government named June 1, but it will remain the …

November 23, 2020

Cybersecurity
Indicting Russia's Most Destructive Cyberwar Unit: The Implications of Public Attribution

There are three main reasons behind publicly attributing these attacks to Russia.

Assistant Attorney General for National Security John C. Demers speaks during a virtual news conference at the Department of Justice.

January 27, 2005

Iraq
IRAQ: Grand Ayatollah Ali al-Sistani

This publication is now archived. Who is the Grand Ayatollah Ali al-Sistani?He is the most important Shiite cleric in Iraq, where the population is about 60 percent Shiite. The reclusive, Iranian-bor…

February 2, 2005

Iraq
IRAQ: The Role of Tribes

This publication is now archived. What part can tribes play in Iraqi politics?Experts disagree. U.S. military officials have sought the cooperation of many local tribal leaders, but it is difficult t…