iOS app Android app

Cyberwar

The Dawn of World War IV: America Under Cyber Attack

CreditSesame.com | Posted 10.23.2014 | Money
CreditSesame.com

Einstein was wrong. World War IV will not be fought with sticks or rocks. It will be fought with bits and bytes, Trojans and bots, APTs and zero-days -- it's already started and we're already losing.

Chinese Cyber-Attacks: Will the United States Step Up Its Active Cyber Defense Posture?

Franz-Stefan Gady | Posted 07.27.2014 | Politics
Franz-Stefan Gady

To avoid escalatory steps, the United States and China have to find ways to have an open and fair dialogue on cyber-espionage and other cybersecurity related issues.

De-Escalation in Cyberspace: It is China's Turn to Act!

Franz-Stefan Gady | Posted 07.07.2014 | Politics
Franz-Stefan Gady

While there is an inherent asymmetry between U.S. and Chinese military capabilities in related technology, this should not be used as an excuse by the Chinese leadership to avoid a more open engagement with the United States in the coming months and try to break the cyber stalemate between the two rivals.

China-EU Cooperation on Combatting Cybercrime: A Model for China-US Relations?

Franz-Stefan Gady | Posted 06.30.2014 | Politics
Franz-Stefan Gady

The European Union is by its mere existence inherently an anomaly in modern Chinese political thought, which emphasizes state sovereignty and territorial integrity. Yet the transnational need for increased EU-China cooperation on cybercrime is more pressing than ever.

Too Big to Jail? Why Kidnapping, Torture, Assassination, and Perjury Are No Longer Crimes in Washington

Tom Engelhardt | Posted 06.21.2014 | Politics
Tom Engelhardt

Tthere is but one crime for which anyone in America's national security state can be held accountable in a court of law, and that's leaking information that might put those in it in a bad light or simply let the American public know something more about what its government is really doing.

A Wake-up Call on Government Security?

Rebecca Abrahams | Posted 06.02.2014 | Technology
Rebecca Abrahams

Co-authored by Dr. Stephen Bryen, Chairman, Ziklag Systems Rachel King and Danny Yardon of the Wall Street Journal have done some excellent reporti...

Advice Too Secret to Ignore

Tom Engelhardt | Posted 05.19.2014 | Politics
Tom Engelhardt

"'Be prepared' isn't just a saying for boy scouts -- not any more, not on our new, totally connected, and remarkably dangerous cyberplanet."

Obama Sees Limited Options For Cyberwar In Syria

New York Times | DAVID E. SANGER | Posted 02.24.2014 | Politics

Not long after the uprising in Syria turned bloody late in the spring of 2011, the Pentagon and the National Security Agency developed a battle plan t...

Intensifying Cyber Threats

Jonathan Zittrain | Posted 03.24.2014 | Impact
Jonathan Zittrain

Perceived digital warfare is escalating as a sophisticated breed of attack against corporations, governments and individuals.

We Need a Geneva Convention on Cyber Warfare

Chris Weigant | Posted 12.28.2013 | Politics
Chris Weigant

The "brave new world" of computer warfare -- in all its frightening aspects -- desperately needs some rules and limits. Communications spying and drone attacks are only the precursors for what could be eventually deployed against the United States.

A New Era of Digital Protest

Robert Muggah | Posted 01.23.2014 | World
Robert Muggah

Social networks are viewed with suspicion by the political establishment. Many governments are finding it increasingly difficult to control the public narrative in a world where information is available in realtime, and on an unfathomable scale.

Someone Is Telling Iranian Scientists: Don't Buy Green Bananas!

Haggai Carmon | Posted 01.23.2014 | World
Haggai Carmon

Someone has been sending a message to Iranian nuclear scientists, and now to Iranian Cyberwar experts: don't bother buying green bananas; before they ripen, you could be dead.

It's Time We Talk About Cyber Deterrence

Franz-Stefan Gady | Posted 11.12.2013 | World
Franz-Stefan Gady

When it comes to cyber deterrence, the revolutionary idea for policy makers to get their heads around is that the public and private sector need to be better informed on discussions pertaining to a state's cyber war capabilities.

Sasha Belenky

The Most Important General You've Never Heard Of, And Other Must-Read Stories

HuffingtonPost.com | Sasha Belenky | Posted 07.19.2013 | Politics

1. The Most Important General You've Never Heard Of Edward Snowden's disclosures about the U.S. government's mass surveillance programs have fo...

Snowden Unmasks the True Aggressor in Cyber-Warfare: The United States

Bea Edwards | Posted 09.07.2013 | Politics
Bea Edwards

Snowden gave us a chance to stop this before the Chertoff Group, SAIC, CACI, Lockheed and the rest of them are unstoppable. Once we're into a cyberwar, it's over. The war will be invisible, secret and eternal - conducted with our tax dollars, but without our knowledge.

Strategic Stability in Cyberspace

Franz-Stefan Gady | Posted 08.09.2013 | Politics
Franz-Stefan Gady

One of the principle questions moving forward will be how the United States and China can manage to contain their disagreements over cyberspace without an escalation in cyber rivalry and the risk of a full-scale cyber war.

Beware of the Syrian Sucker Punch

James P. Farwell | Posted 07.03.2013 | World
James P. Farwell

Those seeing the human tragedy unfolding in Syria with a heart full of hell, ready to jump in, stop the bloodshed, and deliver Bashar al Assad a knock-out punch might do well to recall a telling anecdote from journalist Dexter Filkins from his days in Iraq.

Jaws, Nuclear Weapons, and Cyber War

Franz-Stefan Gady | Posted 07.01.2013 | World
Franz-Stefan Gady

The top Chinese official of the People's Liberation Army, General Fang Fenghui recently announced that the consequences of a major cyber attack "may be as serious as a nuclear bomb." His remarks are symptomatic of the global uncertainty surrounding the results of a 'major cyber attack.'

Stuxnet and the Dawn of Algorithmic Warfare

Jason Healey | Posted 06.16.2013 | Technology
Jason Healey

Though autonomous, destructive robots are a long-time, hackneyed science fiction plot, for some time, this new kind of warfare has been shifting from yesterday's movie to today's reality.

Training For 'The New Espionage'

AP | JAKE PEARSON | Posted 04.12.2013 | Technology

NEW YORK -- Every week, a group of teenagers and 20-somethings dressed in hoodies gets together in a tiny room on a college campus and plug in their l...

Gerry Smith

Choosing Bytes Over Bombs: Military Veterans Wanted As Hackers In Cyberwar

HuffingtonPost.com | Gerry Smith | Posted 04.01.2013 | Technology

LINCROFT, N.J. -- In 2005, Kevin Jorge dodged mortar attacks on a military base in Afghanistan. Today, Jorge, a National Guardsman with an IT backgrou...

Report For NATO Justifies Killing Of Hackers In A Cyberwar

The Huffington Post | Gerry Smith | Posted 03.22.2013 | Technology

The U.S. government has taken a hard line on hackers lately, charging them with federal crimes that carry lengthy prison sentences. But a new repor...

There's Now A Handbook For Cyberwar

AP | RAPHAEL SATTER | Posted 05.19.2013 | Technology

LONDON — Even cyberwar has rules, and one group of experts is putting out a manual to prove it. Their handbook, due to be published later this ...

Gerry Smith

Security Chief's Cyberwar Testimony Seen As Veiled Threat To Enemies

HuffingtonPost.com | Gerry Smith | Posted 03.15.2013 | Technology

As threats of a crippling cyberattack against the United States have mounted, the Obama administration has pushed repeatedly for stronger digital defe...

The Distinguished Warfare Medal: A Sign of the Changing Times

Heather Roff | Posted 04.24.2013 | Politics
Heather Roff

Leon Panetta recently announced the creation of the "the Distinguished Warfare Medal" to recognize outstanding achievements by unmanned aerial vehicle pilots. Yet how can one evaluate acts in war when the fighter is not on the battlefield and is in no physical danger?