While Cyber has been a recognized warfare domain for almost ten years, the U.S. is still working to improve information sharing relationships between traditional intelligence entities and cyber operations groups. The problem has been named an “item of special interest” for the DoD and efforts ar...
Posts Tagged: Cyberconflict
“Modern technology has outpaced the ability of shared familiar metaphors to describe it. Trying to tie modern threats, executed with code over a global network infrastructure that didn’t exist decades ago, to historical analogies is a perilous activity. Which is why I was perplexed to find a rec...
While hosting a delegation from France, Putin advised that to prevent cyber attacks, nations will have to establish international norms prohibiting such behavior. “This is what I can say about cyberattacks or war of words in the press and other issues. Action always causes reaction. Always. If one...
By Bob Gourley Jason Healey is a world-renowned strategic thinker who has focused for years on issues of importance to national security. He has served in government and industry and at the Atlantic Council, and has also dedicated a significant amount of his personal time helping lead the non-profit...
“Stuxnet, a sophisticated computer virus created by the United States and Israel, to spy on and attack Iran’s nuclear enrichment facilities in Natanz also infected Chevron ’s network in 2010, shortly after it escaped from its intended target. Chevron found Stuxnet in its systems after the ...
“The group that claimed to launch large, sustained cyber attacks against the websites of several major U.S. financial institutions told ABC News it is not acting on behalf of and is not supported by the Iranian government, contrary to recent news reports.” Source:US Bank Cyber Attackers ...
“The Obama administration is planning a next-generation terrorist targeting list that transforms the CIA into a paramilitary force, The Washington Post reported. The secret list, called the ‘disposition matrix,’ contains terrorism suspect names laid out against resources available ...
“ews last week that a U.S. government report alleged Chinese telecom companies were likely spying on U.S. firms comes at a time when Chinese companies are getting hacked into like never before. Including from computer systems in the U.S.” Source:Rise In U.S. Hacker Attacks Against Chin...