iOS app Android app

Cyberwarfare

Is Cybersecurity Like Arms Control?

Joseph Nye | Posted 05.18.2015 | World
Joseph Nye

CAMBRIDGE - Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control.

Quantum Computing Is About To Overturn Cybersecurity's Balance Of Power

Vivek Wadhwa | Posted 05.13.2015 | Technology
Vivek Wadhwa

Quantum computers are already here in a limited form, and fully functional versions are on the way. They will be as transformative for mankind as were the mainframe computers, personal computers, and smartphones that we all use. As do all advancing technologies, they will also create new nightmares. The most worrisome development will be in cryptography.

Moving From Axis to Access of Evil

Stanley Weiss | Posted 04.08.2015 | World
Stanley Weiss

If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.

Cyberwar or Cybervandalism?

Chris Weigant | Posted 02.21.2015 | Politics
Chris Weigant

Does hacking into a private entertainment corporation's computer files constitute an act of war? Against whom, exactly?

North Korea's Cyberarmy

AP | YOUKYUNG LEE | Posted 12.18.2014 | Technology

SEOUL, South Korea (AP) — Most North Koreans have never seen the Internet. But the country Washington suspects is behind a devastating hack on Sony...

Obama Sees Limited Options For Cyberwar In Syria

New York Times | DAVID E. SANGER | Posted 02.24.2014 | Politics

Not long after the uprising in Syria turned bloody late in the spring of 2011, the Pentagon and the National Security Agency developed a battle plan t...

Cybersurveillance: We Put the Law on Our Side, Part 2

Alexander Wooley | Posted 11.19.2013 | Books
Alexander Wooley

Black code: Inside the Battle for Cyberspace, by Ronald J. Deibert; 2013, McClelland & Stewart. In 2004, 18 months after the invasion of Iraq, I was ...

Cybersurveillance: We Put the Law on Our Side, Part I

Alexander Wooley | Posted 11.20.2013 | Books
Alexander Wooley

Black Code: Inside the Battle for Cyberspace, by Ronald J. Deibert; 2013, McClelland & Stewart The Citizen Lab's Ron Deibert began his academic caree...

Sasha Belenky

The Most Important General You've Never Heard Of, And Other Must-Read Stories

HuffingtonPost.com | Sasha Belenky | Posted 07.19.2013 | Politics

1. The Most Important General You've Never Heard Of Edward Snowden's disclosures about the U.S. government's mass surveillance programs have fo...

Stuxnet and the Dawn of Algorithmic Warfare

Jason Healey | Posted 06.16.2013 | Technology
Jason Healey

Though autonomous, destructive robots are a long-time, hackneyed science fiction plot, for some time, this new kind of warfare has been shifting from yesterday's movie to today's reality.

Report For NATO Justifies Killing Of Hackers In A Cyberwar

The Huffington Post | Gerry Smith | Posted 03.22.2013 | Technology

The U.S. government has taken a hard line on hackers lately, charging them with federal crimes that carry lengthy prison sentences. But a new repor...

There's Now A Handbook For Cyberwar

AP | RAPHAEL SATTER | Posted 05.19.2013 | Technology

LONDON — Even cyberwar has rules, and one group of experts is putting out a manual to prove it. Their handbook, due to be published later this ...

Broad Powers Seen For Obama In Cyberstrikes

The New York Times | Posted 02.04.2013 | Technology

WASHINGTON — A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power ...

Iran Said To Complete Underground Nuclear Enrichment Plant

The New York Times | DAVID E. SANGER AND WILLIAM J. BROAD | Posted 10.26.2012 | World

Intelligence officials from several countries say Iran in recent weeks has virtually completed an underground nuclear enrichment plant, racing ahead d...

Dan Froomkin

The Dark Side Of The Obama White House

HuffingtonPost.com | Dan Froomkin | Posted 07.25.2012 | Politics

The most conspicuous reaction in Washington to a series of astonishing national security revelations, many of which emerged in two new books, has ...

Living in an American Age of Techno-Wonder and Unreason

Lewis Lapham | Posted 08.25.2012 | Technology
Lewis Lapham

New philosophies call all in doubt, the more so as the accelerating rates of technological advance -- celestial, terrestrial, and subliminal -- overrun the frontiers between science, magic, and religion.

BOTH SIDES: Senor Romney No Bueno? Why Is Issa Furious? A Solomanic SCOTUS?

HuffPost Radio | Posted 06.24.2012 | Politics
HuffPost Radio

2011-11-29-20111107bothsidesnow.jpgReagan & Matalin agree with Obama's new policy on young immigrants but then clash over why Romney doesn't. Is self-deportation politically self-immolating?

E-War

John Feffer | Posted 08.05.2012 | World
John Feffer

Listen to Washington and you'd think the U.S. was simply a healthy body under attack by foreign microbes in league with traitorous parasites within. But several major news stories paint a very different picture of the government's approach to cyber war.

U.S. Reportedly Debated Cyberwarfare Against Libya

The New York Times | ERIC SCHMITT and THOM SHANKER | Posted 12.17.2011 | World

Just before the American-led strikes against Libya in March, the Obama administration intensely debated whether to open the mission with a new kind of...

CIA Chief Warns Of 'Next Pearl Harbor'

The Huffington Post | Amy Lee | Posted 08.13.2011 | Technology

Appearing before the Senate Armed Services Committee for a confirmation hearing for his appointment as the secretary of defense, Leon Panetta warned that the U.S. could face cyberwarfare in battles to come.

Anonymous Declares Cyberwar Against 'the System'

Timothy Karr | Posted 08.03.2011 | Technology
Timothy Karr

A new YouTube manifesto from someone claiming to speak for Anonymous calls on everyone in the online world to join a revolt against governments and corporations that are intent upon stifling free speech online.

Did U.S. Play A Role In Stuxnet Attack?

Posted 07.28.2011 | World

U.S. Deputy Defense Secretary William Lynn created a stir when he dodged a reporter's questions about whether the U.S. was involved in the Stuxnet cyb...

Inside The Secret Project To Sabotage Iran's Nuclear Program

New York Times | Posted 05.25.2011 | World

Behind Dimona's barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iran's at Natanz, where Iranian scientists ar...

The Decline and Fall of the American Empire: Four Scenarios for the End of the American Century by 2025

Alfred W. McCoy | Posted 05.25.2011 | Politics
Alfred W. McCoy

Instead of the bloodshed that marked the end of so many past empires, this 21st-century imperial collapse could come relatively quietly through the invisible tendrils of economic collapse or cyberwarfare.

What If Nuclear Terrorism Were Just a Mouse Click Away?

Russ Wellen | Posted 05.25.2011 | World
Russ Wellen

With the end of the Cold War, nuclear terrorism has displaced an attack by the Soviet Union as the prime nuclear fear. And that's not only reviving the specter of a traditional nuclear attack, but combining it with contemporary fears.