CyberWeapons, CyberWarfare

 

CyberBattlegrounds

Destabilization & Disruption, Implants & Subterfuge …

Global connectivity and a worldwide open & dark Internet have activated a new operational field of battle, intrusion and influence. The security horizon is one of CyberProliferation. CyberAttacks must be acknowledged and confronted as security risks — and restricted. “Let’s negotiate this internationally.”

 

Battle for Hearts & Minds in the CyberAge

 

Follow a security reporter as he reveals ongoing probing, skirmishing, attacks and CyberWar today

https://thebulletin.org/2018/09/david-sanger-on-the-perfect-weapon/

 

Snapshot of Voting Vulnerabilities

350,000 Cybervoting Machines in the U.S.

DEF CON: U.S. Voting Systems have ‘staggering’ vulnerabilities

 

Follow an expert as she navigates CyberThreats to U.S. Voting Systems

Jennifer Cohn @jennycohn1

https://twitter.com/jennycohn1

https://medium.com/@jennycohn1

 

 

Espionage, data manipulation, destructive attacks, information warfare

 

Bulletin of Atomic Scientists: What would US citizens, or citizens of any Western democracy, have to actually change in their lives to be properly defended against the risk of major cyberattack?

David Sanger: Before we get to what they would have to change in their lives, they have to debate intelligently what it is we’re trying to do.

Suppose you and I were to sit down over a beer and put together a list of the kinds of civilian-related systems we think should be off limits to state-run cyberattacks.

We come up with: Election systems, the electrical grid, anything that gets in the way of emergency services. Anything that would affect hospitals and nursing homes, homeless shelters, the most vulnerable.

Then we’d say, “Okay, let’s get the United States to come out and negotiate this internationally.”

Share