cyberterror

Stratfor: The Coming Age of Cyberterrorism

Summary: For five years readers of the FM website have learned the facts and myths of cybersecurity and cyberterrorism. Now CEOs are fired for big security breeches, wild headlines stoke the public’s fears — and Stratfor declares the “coming age of cyberterrorism”. Their analysis, as usual, gives a solid introduction to this important subject. The …

Stratfor: The Coming Age of Cyberterrorism Read More »

Determining guilt in cyberspace: difficult now, but there’s hope for the future

Summary: We see the nature of modern America in our response to cyberattacks. The government quickly points to one of the usual suspects, and Americans believe. Reminders of past government lies have no effect, nor do experts’ warnings that attribution in cyberspace ranges from difficult to impossible. For a change of pace, today cybersecurity expert …

Determining guilt in cyberspace: difficult now, but there’s hope for the future Read More »

A clarion call to prepare for cyberwar. But what’s the threat?

Summary:  American professionals writing about national defense are intelligent and well-educated, usually with distinguished careers. But their writings should be datelined “from Oz”. Today we examine another example, about the law of cyberwar.  {1st of 2 posts today.}   “Preparing for Cyber War: A Clarion Call“ By Michael Schmitt (bio here). Posted at Just Security, …

A clarion call to prepare for cyberwar. But what’s the threat? Read More »

Identifying the guilty: tying nation states to cyber espionage

Summary:  It’s the cycle of our time. Cyberattack on us. The government points a figure, without evidence and encumbered by their history of lies (and of committing similar deeds).  Today cyber intelligence analyst Emilio Iasiello explains why attribution is so important but difficult to do.  (2nd of 2 posts today.) “Attempt the end and never …

Identifying the guilty: tying nation states to cyber espionage Read More »

Consequences of Overstating the Cyber Terrorism Threat

Summary:  Chapter 4 of Edwin Covert’s series about cyberterrorism explains the severe penalties enacted since 9/11, their potential for misuse (accidental or deliberate), and how these poorly crafted laws and the public fear that created them both make us less safe. (1st of 2 posts today) . Consequences of Overstating the Cyber Terrorism Threat By …

Consequences of Overstating the Cyber Terrorism Threat Read More »

Scroll to Top