Similar Articles |
|
National Defense June 2009 Stew Magnuson |
U.S. Plans to Destroy Enemy Computer Networks in Cyber-Attacks Questioned But secrecy may have impeded widespread debate about the nature and implications of cyber-attack. |
InternetNews March 12, 2009 Kenneth Corbin |
Lessons From the Russia-Georgia Cyberwar Georgian official and U.S. security experts look back at the Internet attack that preceded the military conflict. |
PC World August 21, 2007 Robert McMillan |
Is the U.S. at Risk From Cyberwarfare? Hostile governments may be behind the next wave of Internet attacks. |
InternetNews August 13, 2010 |
Is the U.S. Ready for a Cyberwar? And if not, what's the worst that can happen? Cybersecurity expert Scott Borg painted a grim picture of the future of warfare this week at the USENIX security conference. |
The Motley Fool January 26, 2011 Rich Smith |
Welcome! You've Got Computer Worms! While the U.S. only targeted Stuxnet into Iran's nuclear centrifuge labs, the worm didn't stay stuck on it. Already, the worm has leaked out of Iran and into Symantec's virus filters. |
InternetNews September 27, 2010 |
Stuxnet Worm Infests Iranian Nuclear Plant The aggressive and decidedly crafty Stuxnet worm has struck Iran's first nuclear power facility, government officials said Monday. |
IEEE Spectrum September 2010 Robert W. Lucky |
Cyber Armageddon The author reflects on the latest fashion in end-of-the-world scenarios |
National Defense October 2010 Stew Magnuson |
Expert Warns of Nexus Between Cybercriminals and Terrorists Terrorists who want to stage a cyberattack against the United States may lean on criminal networks to assist them, a former Defense Department official said. |
Wired August 23, 2007 Ralph Peters |
Washington Ignores Cyberattack Threats, Putting Us All at Peril 21st-century-warfare will be to deny entire states the ability to process, protect, and communicate information. The Pentagon doesn't seem to fully grasp the dangerous potential of this new domain of warfare. |
Popular Mechanics September 2008 Glenn Derene |
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs |
Parameters Summer 2005 Michael H. Hoffman |
Rescuing the Law of War: A Way Forward in an Era of Global Terrorism Terrorists are gaining an astonishing legal edge over US and other armed forces deployed against them. Judicial intervention in the law of war since September 11, 2001 already far exceeds anything ever before experienced, by any nation, in the history of warfare. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews August 4, 2009 |
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. |
InternetNews April 15, 2010 |
Cyber Command Plans to Focus on Coordination Nominee for the new Department of Defense position says the agency is going to lead other agencies in cyber attacks instead of waging its own. |
InternetNews June 30, 2009 Kenneth Corbin |
Net Ushering in Era of War Without Borders Expert sees a new face of cyber warfare forcing 'some of the hardest national security decisions you'll have to make.' |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
InternetNews November 17, 2009 |
McAfee Outlines Growing Cyber Warfare Threat McAfee's study finds politically motivated cyber attacks are on the rise internationally. |
Bank Technology News July 2008 Rebecca Sausner |
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
National Defense October 2007 Breanne Wagner |
Cyber Attacks in Estonia Serve as Wake-Up Call The attacks compromised both public and private websites and sent a wave of panic through a country that is known for being especially "wired." |
National Defense February 2009 Sandra I. Erwin |
Foreign Policy Ambition Overlooks War Lessons The Obama administration has endorsed a major expansion of ground forces, and a surge in military capabilities to conduct "irregular" warfare against non-state actors. |
IEEE Spectrum March 2013 David Kushner |
The Real Story of Stuxnet How Kaspersky Lab tracked down the malware that stymied Iran's nuclear-fuel enrichment program |
National Defense December 2009 Austin Wright |
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets |
Reason February 2002 Chris Bray |
The Media and GI Joe How the press gets the military wrong -- and why it matters... |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. |
National Defense March 2013 Stew Magnuson |
Iran's Ability to Carry Out Attacks in Cyberspace May Be Improving The ability to carry out attacks from across the world that can do real physical or economic damage without ever launching a jet fighter or sending in suicide squads is tempting for adversaries such as Iran, U.S. officials and cybersecurity experts have pointed out. |
Wired August 21, 2007 Joshua Davis |
Hackers Take Down the Most Wired Country in Europe How Estonia dealt with a botnet strike that targeted almost every digital front all at once. |
National Defense November 2009 Stew Magnuson |
Debate Over Rules, Legality of Robots On The Battlefield Lagging, Experts Say As researchers push ahead with algorithms designed to give robots more autonomy, ethicists and legal minds warn that not enough thought is being given to the implications of using unmanned systems to apply lethal force. |
Parameters Spring 2006 Anthony Vinci |
The "Problems of Mobilization" and the Analysis of Armed Groups This article attempts to lay the foundation for a more agile, rationalized system of analysis for all types of armed groups which can take into account the evolving and adapting nature of contemporary armed groups. |
National Defense June 2009 Sandra I. Erwin |
Predicting the Outcome of War: Can Science Help? Digital simulations are staples of military war games. They can be used to recreate just about every aspect of combat. But simulating the complex scenarios of "irregular" warfare is one of the toughest challenges that the Defense Department now faces. |
BusinessWeek February 17, 2011 Simpson & Fam |
Egypt's Army Marches, Fights, Sells Chickens The armed forces have a substantial stake in Egypt's civilian economy through a host of government-owned service and manufacturing companies. |
IDB America February 2002 Charo Quesada |
Armies for peace A former Spanish defense minister calls for democratization of the military in Latin America... |
National Defense March 2014 Robert Johnston |
New Approach Needed to Counter Malicious Software For the better part of a decade, network security has been overly focused on perimeter defenses. This has triggered a change in nation-level techniques for launching cyber-attacks. |
National Defense October 2015 Tim Larkins |
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. |
Military & Aerospace Electronics October 2007 John Keller |
The importance of military information security Will the the computer and the data network be the aircraft carrier and atomic bomb of the future? |
CIO October 14, 2011 James Niccolai |
US Companies Pushed to Disclose Cyberattacks New guidelines from US regulators throw a spotlight on disclosure of cyber-incidents. |
InternetNews December 28, 2010 |
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. |
Parameters Summer 2006 David W. Barno |
Challenges in Fighting a Global Insurgency Strategy in a global counterinsurgency requires a new level of thinking. A world of irregular threats and asymmetrical warfare demands that we Americans broaden our thinking beyond the norms of traditional military action once sufficient to win our wars. |
Job Journal August 17, 2008 |
Military Service Joining the military is a surefire way to boost your future potential. |
InternetNews June 22, 2010 |
Botnet Still King of Malware Underworld Latest report from Gartner finds that while more sophisticated malware and phishing scams will proliferate, botnets will still be the top challenge for security experts for the foreseeable future. |
InternetNews January 19, 2011 |
Researcher Looks to Demystify Stuxnet Threat Securicon's Tom Parker is planning to present research at the Black Hat security conference describing a technical analysis of the feared threat of the Stuxnet worm, offering some tips for mitigation. |