Russia’s Propaganda Trolls become a power in cyberspace

Summary: Cyberspace is not just a means to steal information and wreck systems, but also a means to touch people's minds and change how they see the world. The tech is new, but the methods are old. Russia has a long history of playing this game well. Here Emilio Iasiello explains how they have aggressively … Continue reading Russia’s Propaganda Trolls become a power in cyberspace

Determining guilt in cyberspace: difficult now, but there’s hope for the future

Summary: We see the nature of modern America in our response to cyberattacks. The government quickly points to one of the usual suspects, and Americans believe. Reminders of past government lies have no effect, nor do experts' warnings that attribution in cyberspace ranges from difficult to impossible. For a change of pace, today cybersecurity expert … Continue reading Determining guilt in cyberspace: difficult now, but there’s hope for the future

Identifying the guilty: tying nation states to cyber espionage

Summary:  It's the cycle of our time. Cyberattack on us. The government points a figure, without evidence and encumbered by their history of lies (and of committing similar deeds).  Today cyber intelligence analyst Emilio Iasiello explains why attribution is so important but difficult to do.  (2nd of 2 posts today.) "Attempt the end and never … Continue reading Identifying the guilty: tying nation states to cyber espionage

Consequences of Overstating the Cyber Terrorism Threat

Summary:  Chapter 4 of Edwin Covert's series about cyberterrorism explains the severe penalties enacted since 9/11, their potential for misuse (accidental or deliberate), and how these poorly crafted laws and the public fear that created them both make us less safe. (1st of 2 posts today) . Consequences of Overstating the Cyber Terrorism Threat By … Continue reading Consequences of Overstating the Cyber Terrorism Threat

Unraveling the Complexities of Cyber Terrorism

Summary:  In chapter 3 of Edwin Covert's series about the cyberterrorism he explains how it requires more than a hacker and a PC. Like most forms of conflict, attacks on a large scale require preparation and a complex structure. (1st of 2 posts today) . Unraveling the Complexities of Cyber Terrorism By Edwin Covert From … Continue reading Unraveling the Complexities of Cyber Terrorism