Stratfor: The Coming Age of Cyberterrorism

Summary: For five years readers of the FM website have learned the facts and myths of cybersecurity and cyberterrorism. Now CEOs are fired for big security breeches, wild headlines stoke the public's fears -- and Stratfor declares the "coming age of cyberterrorism". Their analysis, as usual, gives a solid introduction to this important subject. The … Continue reading Stratfor: The Coming Age of Cyberterrorism

Advertisements

Determining guilt in cyberspace: difficult now, but there’s hope for the future

Summary: We see the nature of modern America in our response to cyberattacks. The government quickly points to one of the usual suspects, and Americans believe. Reminders of past government lies have no effect, nor do experts' warnings that attribution in cyberspace ranges from difficult to impossible. For a change of pace, today cybersecurity expert … Continue reading Determining guilt in cyberspace: difficult now, but there’s hope for the future

A clarion call to prepare for cyberwar. But what’s the threat?

Summary:  American professionals writing about national defense are intelligent and well-educated, usually with distinguished careers. But their writings should be datelined "from Oz". Today we examine another example, about the law of cyberwar.  {1st of 2 posts today.}   "Preparing for Cyber War: A Clarion Call" By Michael Schmitt (bio here). Posted at Just Security, … Continue reading A clarion call to prepare for cyberwar. But what’s the threat?

Identifying the guilty: tying nation states to cyber espionage

Summary:  It's the cycle of our time. Cyberattack on us. The government points a figure, without evidence and encumbered by their history of lies (and of committing similar deeds).  Today cyber intelligence analyst Emilio Iasiello explains why attribution is so important but difficult to do.  (2nd of 2 posts today.) "Attempt the end and never … Continue reading Identifying the guilty: tying nation states to cyber espionage

Consequences of Overstating the Cyber Terrorism Threat

Summary:  Chapter 4 of Edwin Covert's series about cyberterrorism explains the severe penalties enacted since 9/11, their potential for misuse (accidental or deliberate), and how these poorly crafted laws and the public fear that created them both make us less safe. (1st of 2 posts today) . Consequences of Overstating the Cyber Terrorism Threat By … Continue reading Consequences of Overstating the Cyber Terrorism Threat

Unraveling the Complexities of Cyber Terrorism

Summary:  In chapter 3 of Edwin Covert's series about the cyberterrorism he explains how it requires more than a hacker and a PC. Like most forms of conflict, attacks on a large scale require preparation and a complex structure. (1st of 2 posts today) . Unraveling the Complexities of Cyber Terrorism By Edwin Covert From … Continue reading Unraveling the Complexities of Cyber Terrorism

Selling Fear: How Cyber Terrorism is Portrayed in the News

Summary:  New technology is scary, even magical. In August 1962 Amazing Fantasy #15 describes the effects of a radioactive spider biting a boy. Today that's old hat; now it's genetically engineered spider. Similarly with war and terrorism. Fifth-generation fighters (F-35s) and new supercarriers are the past; cyberwar and cyberterrorism are the future. Here's chapter two of … Continue reading Selling Fear: How Cyber Terrorism is Portrayed in the News