cyberterror

Unraveling the Complexities of Cyber Terrorism

Summary:  In chapter 3 of Edwin Covert’s series about the cyberterrorism he explains how it requires more than a hacker and a PC. Like most forms of conflict, attacks on a large scale require preparation and a complex structure. (1st of 2 posts today) . Unraveling the Complexities of Cyber Terrorism By Edwin Covert From …

Unraveling the Complexities of Cyber Terrorism Read More »

Selling Fear: How Cyber Terrorism is Portrayed in the News

Summary:  New technology is scary, even magical. In August 1962 Amazing Fantasy #15 describes the effects of a radioactive spider biting a boy. Today that’s old hat; now it’s genetically engineered spider. Similarly with war and terrorism. Fifth-generation fighters (F-35s) and new supercarriers are the past; cyberwar and cyberterrorism are the future. Here’s chapter two of …

Selling Fear: How Cyber Terrorism is Portrayed in the News Read More »

Cyber Terrorism is a Strategy

Summary:  Much as defense experts in 1913 thought more about cavalry than airplanes, today’s experts think more about the aircraft carriers and 5th generation fighters (e.g., F-35) than cyberwar and cyberterrorism. But that’s changing. To help you stay current about these developments, here’s the first chapter in another series about cyberterrorism.  (1st of 2 posts …

Cyber Terrorism is a Strategy Read More »

Another day, another campaign of fearmongering in America: North Korea’s cyberattack on Sony

Summary: Another day, another campaign by the fearmongers to terrify America. Leaks from anonymous officials, amplified by cybersecurity and national security experts (noses planted in the trough) — journalists eager to fill the space between ads — and its time for war with North Korea (again). First post in this series; see links to the …

Another day, another campaign of fearmongering in America: North Korea’s cyberattack on Sony Read More »

Parsing Cyberwar – Part 4: The Best Defense is A Good Defense

Summary: In this series, Marcus Ranum, walks us through the basics of cyberconflict, in its various forms: the nature of the battlefield, logistics, and dynamics. Today he looks at methods of defense. While offense gets most of the attention, most organisations play only defense. So read and learn.   Article deleted at author’s request.   …

Parsing Cyberwar – Part 4: The Best Defense is A Good Defense Read More »

Scroll to Top