recentpopularlog in

cyberwarfare

« earlier   
French application of international rules to cyberwarfare
The document is interesting as it defines the context for when cyberattacks may be interpreted as really serious, warranting State response; or how the situation looks like in existing conflict. How ransomware affects some interpretation, etc.
politics  security  cyberwarfare 
22 days ago by tiredoldfellow
The Digital Maginot Line
The Information World War has already been going on for several years. We called the opening skirmishes “media manipulation” and “hoaxes”, assuming that we were dealing with ideological pranksters doing it for the lulz (and that lulz were harmless).

In reality, the combatants are professional, state-employed cyberwarriors and seasoned amateur guerrillas pursuing very well-defined objectives with military precision and specialized tools. Each type of combatant brings a different mental model to the conflict, but uses the same set of tools.
cyberwarfare  social_media  venkatesh_rao  hacking  russia  bots 
december 2018 by perich
In Cyberwar, There Are Some (Unspoken) Rules
"Countries that have invested significant resources in cyberspace don’t lack the ability to act more effectively within this domain. They are making a conscious decision to rely on less sophisticated operations based on their strategic calculus—the same calculus that leads a government such as North Korea’s to employ violent rhetoric and limited military operations to signal its displeasure without risking direct confrontation. If critical industrial control systems are so easily compromised, one would expect governments to target these vulnerable systems more frequently rather than resort to mere disruption. While reports do suggest that North Korea has the capability to disrupt critical infrastructure such as power grids, acting on this is another matter altogether—much in the same way that having significant conventional military power does not merit its immediate use. There would be grave consequences."
a:Miguel-Alberto-N-Gomez  p:Foreign-Policy★  d:2018.11.06  w:2000  cyberwarfare  weapons  international-relations  from instapaper
november 2018 by bankbryan
The Untold Story of NotPetya, the Most Devastating Cyberattack in History
"The most enduring object lesson of NotPetya may simply be the strange, extra­dimensional landscape of cyberwar’s battlefield. This is the confounding geography of cyberwarfare: In ways that still defy human intuition, phantoms inside M.E.Doc’s server room in a gritty corner of Kiev spread chaos into the gilded conference rooms of the capital’s federal agencies, into ports dotting the globe, into the stately headquarters of Maersk on the Copenhagen harbor, and across the global economy. 'Somehow the vulnerability of this Ukrainian accounting software affects the US national security supply of vaccines and global shipping?' asks Joshua Corman, a cybersecurity fellow at the Atlantic Council, as if still puzzling out the shape of the wormhole that made that cause-and-effect possible. 'The physics of cyberspace are wholly different from every other war domain.' In those physics, NotPetya reminds us, distance is no defense. Every barbarian is already at every gate."
a:Andy-Greenberg★  p:Wired★★  d:2018.08.22  w:6500  cyberwarfare  Russia  infrastructure  logistics  container-shipping  from instapaper
october 2018 by bankbryan
Twitter
RT : Excited to announce I signed a book deal. Expected release date Summer 2019
CyberWarfare  cybersecurity  from twitter_favs
october 2018 by TomRaftery

Copy this bookmark:





to read