iOS app Android app

Cyber Warfare

Funding the War on Cybercrime

Edward Guiliano, Ph.D. | Posted 09.28.2016 | College
Edward Guiliano, Ph.D.

In 1851, the world got a little faster. That's the year the first world's fair opened in London. Six million people visited and marveled at the new technology on display, and watched with pleasure as men traded telegraphed messages instantly between London and Manchester. The defeat of distance was magical, and it was just the beginning.

Dark Supply Chains

Dante Disparte | Posted 08.02.2016 | Business
Dante Disparte

The concept of a supply chain as it is now understood borrows heavily from military strategy, where those armies that could assure the supply of critical materiel when it was needed won wars and spared lives.

Admiral Rogers Talks Openly About The NSA But Not Quite

Anna Wilding | Posted 07.18.2016 | DC
Anna Wilding

Admiral Michael Rogers has quite a task afoot, as Director of the National Security Agency and the military's Cyber Command Mission Force. Speaking at a luncheon organised by retired Captain Kevin Wensing, Admiral Rogers said that the agency will eventually contain 6200 dedicated computer personnel split into 133 teams.

Why Madison Avenue Together With Silicon Valley Might Be Better than Carpet Bombing Against ISIS, But Is Still Not an Easy Answer

Allen Adamson | Posted 12.16.2016 | Politics
Allen Adamson

I watched last night's Republican presidential candidate debate both as a concerned citizen and as a professional in the field of branding. After it w...

Anonymous vs. ISIS: Netpolitik After the Paris Attacks

Charlie Firestone | Posted 11.18.2016 | Home
Charlie Firestone

'Realpolitik' and 'international liberalism' no longer sufficed as diplomatic models to resolve world problems. The Westphalian concept of sovereign nations dealing with each other as states has limited application to a world where networks are the dominant form of organization.

What Will Make the Obama-Xi Summit a Success

Nathan Gardels | Posted 09.22.2016 | Home
Nathan Gardels

There is no higher priority in relations between the U.S. and China than to begin serious cyber detente negotiations to establish a code of conduct.

Moving From Axis to Access of Evil

Stanley Weiss | Posted 04.08.2015 | Home
Stanley Weiss

If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.

Worrying About Cyber Warfare on Cyber Monday

John A. Tures | Posted 01.31.2015 | Politics
John A. Tures

As most Americans log on after a long holiday weekend from work, they are eager for all kinds of sales and savings. They probably aren't thinking about cyberterrorists, rogue states, and great powers eager to take the U.S.A. down a peg or two. But maybe they should.

The Impending 'Peaceful War' Between China and America Over Cyberspying

Patrick Mendis | Posted 08.05.2014 | Home
Patrick Mendis

Unlike the Cold War period -- in which the Soviet Union was isolated from the global economy -- commercial interests and trade secrets underpin the intrinsically entangled Sino-American economic relations. The higgledy-piggledy distinction between national security and corporate interests is hardly convincing to the Chinese, especially when the US revolving doors conveniently inhabit the space between government service and corporations during both Democratic and Republican administrations. Just like the Sino-American relations in commercial intercourse, economics triumphs over ideology in the partisan world of American politics. On China's side, its intertwined national and economic interests are enshrined in the peculiar institution of the State-Owned Enterprises (SOEs).

Kathleen Miles

Security Experts Warn Of Potentially Dire Russian Threat

HuffingtonPost.com | Kathleen Miles | Posted 04.30.2014 | Home

Former U.S. security officials warned on Tuesday that Russia may use cyber warfare against the U.S. and Ukraine if tensions between the two sides cont...

Russia's Cyber-Weapons Hit Ukraine: How to Declare War Without Declaring War

Alec Ross | Posted 12.02.2014 | Home
Alec Ross

Today, utilizing cyber weapons falls into the category of largely being accepted (even if unhappily) as part of how countries exercise their power while falling short of the line of armed conflict treated as an act of war.

Refuge: A Film About Cyber-Warfare, Privacy and Immigration

Melissa Webster | Posted 12.27.2013 | Entertainment
Melissa Webster

What happens when a cyber-terrorist attack in the year of 2020 on America's immigration database leaves thousands of Iranian immigrants vulnerable to deportation?

How Edward Snowden Could End Cyber Warfare

Reuters | Tom Miles | Posted 09.14.2013 | Technology

By Tom Miles GENEVA (Reuters) - Edward Snowden's revelations about U.S. Internet surveillance have created a chance for countries to ca...

Cyber Warfare: What Are the Rules?

Daniel Garrie | Posted 06.17.2013 | Home
Daniel Garrie

With the advent of cyber warfare the complexity of what is war is even more clouded and the application of law to this is even murkier.

International Cyber Security at the UN: Between Doom and Hesitant Optimism

Lia Petridis Maiello | Posted 08.11.2013 | Home
Lia Petridis Maiello

Clearly, establishing a worldwide regulatory framework for Internet security will require staying power, juridical skill and a strong belief in the need to protect both the integrity of vital Internet resources and the lives of those threatened by cyber insecurity.

Chinese Hacking and The Art of War

Peter Navarro | Posted 05.21.2013 | Home
Peter Navarro

Finally, there appears to be real alarm in the White House over Chinese cyberattacks. Here's what the president should be telling the American people.

'Cyberterrorism': A Grave Threat or Over-hyped?

Dorian de Wind | Posted 05.13.2013 | Home
Dorian de Wind

We now talk about a "cyber domain" -- i.e., a military domain similar to the air, land, sea or space domains where the military already operates in -- as a new domain of warfare. We also talk about cyber warfare, cyber terrorism, a "cyber 9/11" and even "cyber Pearl Harbor."

China Hacking: A 21st Century Act of War

Greg Autry | Posted 05.03.2013 | Home
Greg Autry

A brilliant report recently issued by security firm Mandiant clearly identified a high-powered unit of the Chinese Army as the source of the most persistent cyber-attacks against American firms. The magnitude of this by invasion of privacy and theft of data is staggering.

When Your Identity Is Tossed Out the Window... Literally

Adam Levin | Posted 01.30.2013 | Technology
Adam Levin

From identity theft to cyber-warfare, our inability to weigh risks in a rational way is costing us big time --- and may ultimately be our undoing.

How Presidential War Came Out of the Shadows -- and We Went Into Them

Tom Engelhardt | Posted 01.08.2013 | Politics
Tom Engelhardt

In the last decade a high-tech, privatized, covert version of war has become presidential property, fought at the White House's behest by robots, warrior corporations, and two presidentially controlled "private" forces.

Beyond Bayonets and Battleships

Alfred W. McCoy | Posted 01.08.2013 | Politics
Alfred W. McCoy

Amid all the post-debate chatter, not a single commentator seemed to have a clue when it came to the profound strategic changes encoded in the president's words. Yet for the past four years, the Obama administration has presided over a technological revolution in defense planning.

National Defense: Topics for Tonight's Debate

A. Siegel | Posted 12.22.2012 | Green
A. Siegel

A better approach would be to devote a reasonable period of the debate -- perhaps 30 minutes -- to go through this list, allowing the two candidates to address each of these five in turn.

Will the Apocalypse Arrive Online?

Karen J. Greenberg | Posted 12.22.2012 | Technology
Karen J. Greenberg

It may sound like a scene from a zombie apocalypse movie, but it could be your life -- a nationwide cyber-version of Ground Zero. Think of it as 9/11/2015.

We Have Been Warned

Gary Hart | Posted 12.14.2012 | Politics
Gary Hart

How will you know when the "cyber Pearl Harbor" has occurred? When the lights and heat in your home go off. When you can't make a phone call. When no ATM works. When your flight cannot land.

Gov 2.0 and Cyberwar Mashup

Alan W. Silberberg | Posted 10.23.2012 | Technology
Alan W. Silberberg

Digital bullets might be replacing real bullets but when whole systems like water, electricity, or transportation go down due to hacking, cyberwar or cyber economic espionage; the effect could be the same.