On January 28th, 2011, Egypt disappeared from the global map. In a coordinated shutdown of all major Egyptian internet service providers--an effort by its government to squelch public dissent- -virtually all Egyptian Internet addresses became unreachable worldwide.1 The action was unprecedented in Internet history.2 At the same time, the U.S. Senate
Topic: Cyber Warfare
On June 17, 2010 a small antivirus company established in Belarus discovered the Stuxnet worm. Later research would reveal that an earlier variant of the worm existed at least a year earlier. Stuxnet reputedly caused the physical degradation of some 1000 centrifuges at the Natanz facility in Iran, based on data of the International Atomic Energy Agency
Zipping past a Plan B for cyber defense solutions to the end of the alphabet, the U.S. Defense Department's research arm launched Plan X and advanced platforms to conduct and assess cyber warfare like kinetic warfare.
High-speed wireless "underwater internet" of the type that is now pervasive in the world's cities is still just theory. Without a cable, data just doesn't transmit easily through water (even less so when it is salt water).
Members of Congress are grappling with the new era of cyber warfare as the government works to define what acts in cyberspace should warrant a military response.
While government and military leaders have incessantly been asking industry for more automation in cyber network defense tools, some are also warning of the increased threat automation is posing on the offensive side.
On the civilian side, the new report warns that for at least the next five-to-10 years, other nations will have offensive cyber capabilities that "far exceed the United States' ability to defend and adequately strengthen the resilience of its critical infrastructures."
NATO and partner countries are sharing R&D in the development of cyber-security tools to achieve economies of scale, including the CIICS (Cyber Information and Incident Coordination System) which has just been deployed in the Alliance's 24/7 cyber operations center.
The Army, which already has 30 cyber teams at full operational capability and 11 more at initial operating capability, is aiming to have 41 fully operational teams by year’s end.
Appropriately named "Tallinn Manual 2.0: International Law Applicable to Cyber Operations," the new book offers a fascinating look at how far the cyber threat landscape has evolved in the less than half decade since the first version’s release in 2013, shifting the focus from conventional state-authorized and operated cyber warfare to the small-bore deniable