Blog Posts Tagged with "Information Warfare"

6648b1abd4a9b964566c3690613f20a6

Companies Go on the Offensive

June 26, 2012 Added by:Mark Baldwin

Being the victim of an attack is not fun and it is easy to understand why businesses would like to take a more active stance against the attackers. Unfortunately, businesses that go down this path are likely to run into technical and legal problems. Let’s examine some of the possible outcomes...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Information Warfare and Cyberspace

May 30, 2012 Added by:Joel Harding

Why do I keep running into the phrase Information Warfare? If the discussion is about cyber and warfare in cyberspace, why use the phrase Information Warfare? Has cyber ‘anything’ become so overused that we need to resort to using a much broader term to interest people in a cybersecurity discussion?

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Off Topic: What to do about Conspiracy Theorists?

May 21, 2012 Added by:Joel Harding

I received an alert recently about an article dealing with Electronic Warfare or EW. Since EW has always been one of the components of Information Operations I decided to take a look. Mistake. My very first indicator, before I even had to think, was that the title was in ALL CAPS...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Attribution: Inductive vs. Deductive Reasoning

May 18, 2012 Added by:Infosec Island Admin

In the present day where cyberwar is all the rage, and governments as well as private sector entities are seeking to cash in on the power grab that is mostly information warfare - as the Chinese call it - too many are forgetting a core problem to the picture: Attribution...

Comments  (7)

7fef78c47060974e0b8392e305f0daf0

AQ, AQAP, BVD Bombs, CIA, INSPIRE, Media, Moles... Oh My

May 09, 2012 Added by:Infosec Island Admin

Al-Qaeda has a plan to leverage the internet even more than they already are. I believe they will continue to put the magazine out and perhaps inspire others to make clones. The ubiquitous nature of the internet will only serve to allow their propaganda to be loosed upon us all...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Applications Targeting Apple Products

May 03, 2012 Added by:Joel Harding

When I was told of a new mobile application distribution system which avoids Apple's scrutiny, my alarm antennas began quivering. Now combine this with who is doing it - Russian developers - and I get an even more dreadful feeling in the pit of my stomach...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

The First Cyber Shot in a Chinese Jasmine Spring

April 01, 2012 Added by:Joel Harding

This does not look like a US military action against China, that is certain. Whoever put the message together seems to be dumbing it down to aid in translation. It’s as if it’s intended for an American audience, but nobody in their right mind would or should do that...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Chinese Network Operations and Cyber Espionage Capabilities

March 09, 2012 Added by:Stefano Mele

Developments in Chinese network operations applications and research and development point to a nation fully engaged in leveraging all available resources to create a technically advanced ability to operate in cyberspace as a means of meeting military and civilian goals...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Northrop Report Examines Chinese Information Warfare Strategies

March 08, 2012 Added by:Headlines

"PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Jihadi Information Warfare: The Next Wave

February 14, 2012 Added by:Infosec Island Admin

There have been tutorials on SQLi and Metasploit online for a long time, but only recently have we seen them translated into Arabic and placed on the technical forums. This means that even the low end of the technically capable Jihadist's can now boot up these tools hack a site…

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

APT: What It Is and What It’s Not

February 10, 2012 Added by:Infosec Island Admin

They can use the most elegant of solutions and nimbly change their tactics, on the fly create/edit code to defeat the defender's tactics, and use the most simplistic of attacks in the effort to gain access KEEP it as long as possible to succeed in their own ends...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

China’s Cyber Strategy – Too Much or Too Little?

January 10, 2012 Added by:Joel Harding

That the Chinese government seems to be systematically penetrating corporate and government system in order to steal corporate and government secrets is not really the issue. This appears to be an accepted fact, and the issue is how to address the problem...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Neuromancing The Cyberwars

November 17, 2011 Added by:Infosec Island Admin

It’s pretty damned hard to determine who did what and where on the net. Digital forensics only gets you so far - compromised machines can be tampered with in so many ways to make it look like someone did something, and these guys want to launch cruise missiles against nation states over a DDoS?

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Should We Strike Iran? How About the Information War?

November 16, 2011 Added by:Joel Harding

A pre-emptive information strike would only cause the Iranians to involuntarily spasm and deploy suicide teams to attack US and other targets worldwide. Anything less would just be posturing for political purposes and could possibly result in more senseless deaths...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Information Warfare Directory

September 19, 2011 Added by:Joel Harding

There are literally tons of websites out there dealing with information warfare, information operations, psychological warfare, military information support operations and a myriad of topics. This website is not bad, not bad at all, it’s just not good....

Comments  (0)


Most Liked