Russia, China, And Cyber Espionage

Cyber operations are also an essentially asymmetric tool, in that they level the playing field between nations that may have wide disparities in terms of the effectiveness of their conventional forces. However, this cuts both ways, as the United States also conducts a considerable number of cyber operations in support of intelligence collection. This leads […]

Rate this:

Digital Armament

Besides the shiny world of social media, hard information technology work has been part of the U.S. governments for decades, but critics believe that the way the government deals with cyber issues is outdated or doesn’t even exist appropriately. Recently, the White House published the long-awaited Cybersecurity Strategy and Implementation Plan (CSIP), which aims to […]

Rate this:

Enter The Trolls

Digital wars are being fought in many theatres around the world – and in many forms. In the light of the Snowden revelations, citizens who guard their privacy may already feel that it has been occupied by a hostile force. But on Thursday, the Obama administration conceded that the US federal government had itself fallen […]

Rate this:

Open Battlefield

The characteristic of cyber warfare that makes it so uniquely dangerous to the corporate sector is that military power in the cyber domain must be extended through computer networks provided and maintained by non-governmental bodies. Read Here – The Diplomat

Rate this:

Are You Bugging My Phone?

The furore over the scale of American mass surveillance revealed by Edward Snowden shifted to an incendiary new level when Angela Merkel of Germany called Barack Obama to demand explanations over reports that the US National Security Agency was monitoring her mobile phone. Read Here – The Guardian

Rate this:

Nothing That Is Tech Is Sacred

Six years ago, two Microsoft cryptography researchers discovered some weirdness in an obscure cryptography standard authored by the National Security Agency. There was a bug in a government-standard random number generator that could be used to encrypt data. Read Here – Wired

Rate this: