Think: Technology As Power

Rarely did we speak of technology as power. So great was our sense of innocence that the most commonly used password in 2012 was simply password (followed by 123456), and that a security expert told me as recently as two years ago that the danger from cyber-espionage and cyber-crimes was vastly exaggerated in comparison to traditional military […]

Rate this:

India And It’s Own PRISM Debate

Acknowledging that better indigenous snooping capabilities may not be enough to protect India’s cyber security, National Security Advisor Shivshankar Menon has advocated formulating a set of “standard operating procedures” (SOPs) — ground rules for cooperation which would help India succeed in obtaining Internet information from major powers that control much of cyber space. Read Here […]

Rate this:

The Road To California

An official announcement on May 21 revealed that Chinese President Xi Jinping will be visiting the United States in June, where he will meet with U.S. President Barack Obama at a Californian retreat. The visit is a fitting end to the first round of diplomatic outreach by the new Chinese leadership. Read Here – The Diplomat

Rate this:

NATO’s New Rules for Cyberwar

The Tallinn Manual, the first attempt to lay down international ground rules for cyberwar, was published this week under the direction of NATO’s think tank, the NATO Cooperative Cyber Defense Center of Excellence. Written by more than 40 academics, lawyers, and experts from NATO countries, the 282-page manual defines under which conditions a country can respond to […]

Rate this:

If China Wants Respect Abroad, It Must Rein In Its Hackers: The Economist

FOREIGN governments and companies have long suspected that the Chinese hackers besieging their networks have links to the country’s armed forces. On February 19th Mandiant, an American security company, offered evidence that this is indeed so. A report, the fruit of six years of investigations, tracks individual members of one Chinese hacker group, with aliases […]

Rate this:

Why Is The Chinese Dragon Trembling?

As luck would have it, I was in Beijing when word came of China’s apparent hacking of the New York Times. The newspaper says it became the target of sustained cyber-attack immediately after it had revealed the vast fortune – estimated as “at least $2.7bn” – amassed by the family of China’s outgoing premier, Wen Jiabao. Among the […]

Rate this:

First Strike: US Cyber Warriors Seize the Offensive

When the Pentagon launched its much-anticipated “Strategy for Operating in Cyberspace” in July 2011, it appeared the US military was interested only in protecting its own computer networks, not in attacking anyone else’s. “The thrust of the strategy is defensive,” declared Deputy Secretary of Defense William Lynn. The Pentagon would not favor the use of […]

Rate this:

The Fog of Cyberwar

In mid-2010, thousands of centrifuges, enriching uranium at Iranian nuclear research facilities, spun out of control. The instruments were mysteriously reprogrammed to operate faster than normal, pushing them to the breaking point. Iranian computer systems, however, inexplicably reported that the centrifuges were operating normally. This incident, it was later revealed, was the work of the […]

Rate this: