Blog Posts Tagged with "Deterrence"

76e662e7786bf88946bd6c010c03ac65

Offensive Cyber Capabilities Need to be Built and Exposed Because of Deterrence

October 09, 2012 Added by:Jarno Limnéll

Cyberspace, the fifth dimension of warfare, has already become an important arena of world politics, especially since we are living in a time in which the lines between war and peace have blurred. The digital world has become a domain where strategic advantage can be either lost or won...

Comments  (1)

Aadb52f9100e0d31264fb3ce9e3d2536

Stuxnet and Cyber Deterrence

August 13, 2012 Added by:Robert M. Lee

Stuxnet showed that a nation-state was capable and willing to use an advanced cyber weapon against an adversary. With the world believing that the United States is responsible, the nation now has the highest level of credibility for willingness and capability to develop and use a cyber weapon. That is a strong deterrent...

Comments  (23)

44a2e0804995faf8d2e3b084a1e2db1d

Real Bullets for Digital Attacks

February 09, 2012 Added by:Don Eijndhoven

In May of last year, the US Government published its International Strategy for Cyberspace. The publication made some waves in the international community because in this document the US stated that military reprisals to cyber attacks were now officially on the table...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Handful of Chinese Hackers Responsible for Majority of Attacks

December 12, 2011 Added by:Headlines

"Right now we have the worst of worlds. If you want to attack me you can do it all you want, because I can't do anything about it. It's risk free, and you're willing to take almost any risk to come after me," said James Cartwright, a former vice chairman of the Joint Chiefs of Staff...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Israel and Cyber Warfare

September 27, 2011 Added by:Stefano Mele

The book discusses the formulation and development of Israeli deterrence policies, including the ability to carry out injurious and direct response against any party engaged in aggression against Israeli cyberspace...

Comments  (1)

Ba829a6cb97f554ffb0272cd3d6c18a7

How to Be A Private Sector Cyber Mercenary

August 01, 2011 Added by:Kevin McAleavey

Gen. Michael Hayden, former NSA and CIA Director under President Bush, suggested Friday that mercenaries could be the solution to the growing number of digital break-ins. So what happens if we give the "go order" on these only to find out that they bombed a kindergarten with an infected machine?

Comments  (3)

69dafe8b58066478aea48f3d0f384820

InfraGard: Cyberwar Declaration on the Horizon

June 20, 2011 Added by:Headlines

"What does our government or other governments think is an effective deterrent or response to an all out cyber attack? Since we have no good definitions or protocols, I do think that the attack on Lockheed Martin is a sign of the future..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Re-Analyzing Cyberdeterrence and Cyberwarfare

May 15, 2011 Added by:J. Oquendo

Military commanders and generals responsible for strategies could spend hours re-analyzing how their locations are constantly being exposed. Money down the drain. Soldiers may even be injured as a result or even worse loss of life. All the while the vulnerability existed from something as simple as an iPad or a mobile phone...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force General Urges Enhanced Cyber Deterrence

January 27, 2011 Added by:Headlines

“If we elect to use cybercapability to deter — and you don’t necessarily have to, you can use something else to deter bad cyberbehavior — [but] if we’re going to use cybercapabilities to deter, that’s going to beg for some demonstration of that capability..."

Comments  (0)