iOS app Android app

Cyber War

Post-Paris Politics: Countering and (Maybe) Defeating ISIS

William Bradley | Posted 11.23.2015 | Politics
William Bradley

More than a week of cacophonous media and political gabble after the shocking Isis attacks on Paris make it clear that US presidential campaigns are no place to look for answers on this shocking and complex episode of new world chaos.

Inflated Cybersecurity Threat Escalates US-China Mistrust

Jon R. Lindsay | Posted 05.18.2015 | World
Jon R. Lindsay

Many Western observers fear that cyber reform based on the principle of internet sovereignty might legitimize authoritarian control and undermine the cosmopolitan promise of the multistakeholder system. China, however, benefits too much from the current system to pose a credible alternative.

Is Cybersecurity Like Arms Control?

Joseph Nye | Posted 05.18.2015 | World
Joseph Nye

CAMBRIDGE - Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control.

Moving From Axis to Access of Evil

Stanley Weiss | Posted 04.08.2015 | World
Stanley Weiss

If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.

New + Safe Social Media Platform for Tweens and Teens - safeDIGZ

Alan W. Silberberg | Posted 03.22.2015 | Impact
Alan W. Silberberg

We have the social network built, tested and it is jam packed with anti-bullying technology and new uses of anti-cyber war technology and processes to eliminate fake accounts and protect kids online.

South Korea: North Korea Has 6,000-Member Cyber Army

AP | Posted 03.08.2015 | World

SEOUL, South Korea (AP) — South Korea said Tuesday that rival North Korea has a 6,000-member cyber army dedicated to disrupting the South's military...

Sony Hack Attacks Presage New Warfare: The Weaponization of Code

Alec Ross | Posted 02.15.2015 | World
Alec Ross

What is important is that these hacks presage what is going to happen for years to come and at far greater cost than what is being imposed on Sony. The weaponization of code is the most significant development in warfare since the weaponization of fissile material.

China's Internet Chief To U.S.: We Need Mutual Governance Of The Internet

China Daily | Chen Weihua | Posted 12.03.2014 | World

While the China-US working group on cyber security has been suspended following the US decision in May to indict five People's Liberation Army officer...

Cyber Retaliation: A Byte for a Byte?

Rebecca Abrahams | Posted 01.06.2015 | Technology
Rebecca Abrahams

Co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag Systems The Pentagon has Plan X --a scheme to retaliate against cyber attacks. No one knows...

The Cyber War on Women: Anita Sarkeesian Cancels Utah Lecture After Shooting Threats

Rev. Dr. Susan Brooks Thistlethwaite | Posted 12.16.2014 | Religion
Rev. Dr. Susan Brooks Thistlethwaite

This "perfect storm" of guns and cyber-stalking of women is an example of how Western culture, through both philosophy and Christian theology, works to normalize violence against women, and violence in the general culture.

Hacking Back and the Cyber Balance of Power

Rebecca Abrahams | Posted 12.14.2014 | Technology
Rebecca Abrahams

The Washington Post front page article on October 10 "Hacked Firms Quietly Talk about Fighting Fire with Fire" about growing corporate anger over successive cyber attacks has a new message: go on the offensive. Hack back! They are not alone.

Five Ways Cyberterrorists Could Target The U.S.

Michael Gregg | Posted 11.25.2014 | Crime
Michael Gregg

Cyberwarfare is now largely seen as an integral part of modern warfare by most developed nations. Until now, however, we have yet to see sophisticated cyber tactics be used by jihadist groups like al-Qaeda or ISIS. But that could soon change.

Gerry Smith

Former NSA Chief Is Working For Wall Street Now | Gerry Smith | Posted 07.09.2014 | Technology

Wall Street has tapped former National Security Agency director Keith Alexander to form a council that would coordinate how banks and the government r...

The Impending 'Peaceful War' Between China and America Over Cyberspying

Patrick Mendis | Posted 08.05.2014 | World
Patrick Mendis

Unlike the Cold War period -- in which the Soviet Union was isolated from the global economy -- commercial interests and trade secrets underpin the intrinsically entangled Sino-American economic relations. The higgledy-piggledy distinction between national security and corporate interests is hardly convincing to the Chinese, especially when the US revolving doors conveniently inhabit the space between government service and corporations during both Democratic and Republican administrations. Just like the Sino-American relations in commercial intercourse, economics triumphs over ideology in the partisan world of American politics. On China's side, its intertwined national and economic interests are enshrined in the peculiar institution of the State-Owned Enterprises (SOEs).

What's Wrong With America's Cyber Security Policy?

Rebecca Abrahams | Posted 05.31.2014 | Technology
Rebecca Abrahams

The U.S. has spent billions on cyber security, yet the problem is worsening. America's political leaders worry about a cyber "Pearl Harbor." Secretary of Defense Hagel, in his first major speech on the subject, is promising to triple the staff working to combat cyber terrorism. But will it work?

WATCH: John McAfee Doesn't Care That His Name Was Whitewashed From His Company

Posted 01.25.2014 | Technology

The company that spent years under the name McAfee Security is now known as Intel Security, but the company's founder John McAfee doesn't mind one bit...

WATCH: Clear And Present Danger: Cyber-Crime, Cyber-Espionage, Cyber-Terror, And Cyber-War

Posted 07.19.2013 | Impact

This livestream is part of our coverage of the Aspen Security Forum. For more from the series, click here. DATE: July 18, 2013. TIME: 7:30p-8:30p E...

How Edward Snowden Could End Cyber Warfare

Reuters | Tom Miles | Posted 09.14.2013 | Technology

By Tom Miles GENEVA (Reuters) - Edward Snowden's revelations about U.S. Internet surveillance have created a chance for countries to ca...

Cyber Warfare: What Are the Rules?

Daniel Garrie | Posted 06.17.2013 | World
Daniel Garrie

With the advent of cyber warfare the complexity of what is war is even more clouded and the application of law to this is even murkier.

History's First Cyber War Has Begun

Vanity Fair | Posted 06.09.2013 | Technology

On the hidden battlefields of history’s first known cyber-war, the casualties are piling up...

Silicon Valley's Place In The Global Cyber War

AP | MARTHA MENDOZA | Posted 06.04.2013 | Technology

SAN JOSE, Calif. -- Chinese President Xi Jinping and American counterpart Barack Obama will talk cyber-security this week in California, but experts s...

Obama: Falling Behind the Curve of Crisis

William Bradley | Posted 07.30.2013 | Politics
William Bradley

If it's not one thing for President Barack Obama, it's another. Already struggling in trying to get ahead of three controversies threatening to engulf his administration, he now has heightened geopolitical crises to manage.

Do Drone Pilots and 'Cyber Warriors' Deserve Medals?

Yousef Abukhdair | Posted 06.18.2013 | Politics
Yousef Abukhdair

Though military defense and national security has changed and evolved in the 21st century, they certainly have not altered the definitions of words like risk, sacrifice, heroism, and courage.

Big Data Under Attack

Tom Silva | Posted 05.20.2013 | Technology
Tom Silva

Like hanging on to clothes that don't fit, most of America's premier companies are starting to do essentially the same thing with data. The reason? They recognize the opportunity cost of not collecting data.

There's Now A Handbook For Cyberwar

AP | RAPHAEL SATTER | Posted 05.19.2013 | Technology

LONDON — Even cyberwar has rules, and one group of experts is putting out a manual to prove it. Their handbook, due to be published later this ...