Cyberwar

Voters in Chestertown, Maryland, cast ballots  at the Kent County Public Library in Maryland's early voting on October 25, 2018.

To Protect Democracy, Protect the Internet

The voluntary efforts of tech companies aren’t enough. The U.S. government needs to regulate social media platforms and make election interference illegal.

A participant stands near a screen during the ethical hacking contest Insomni'hack in Geneva on March 21, 2014.

Want to Avoid the Next Pandemic? Hire a Devil’s Advocate.

Forcing governments and businesses to institutionalize doubt—by putting hackers and red teams on the payroll—would stop groupthink and could prevent catastrophes.

Russian President Vladimir Putin speaks during his annual press conference in Moscow on Dec. 19, 2019.

As the West Panics, Putin Is Watching

The coronavirus crisis is exposing the West’s weaknesses—and adversaries of the U.S. and EU are paying close attention so they can exploit vulnerabilities in a future conflict.

An employee walks behind a glass wall with machine coding symbols at the headquarters of the internet security giant Kaspersky in Moscow on Oct. 17, 2016.

Russia and China Are Trying to Set the U.N.’s Rules on Cybercrime

At the United Nations General Assembly, the United States must push back against their agenda.

Social_WarringStates-2000px

The War-Torn Web

A once-unified online world has broken into new warring states.

A member of the Metropolitan Police SWAT team patrols a movie theater before a showing of the film "The Interview" on December 25, 2014 in Washington, DC.

In Cyberwar, There Are Some (Unspoken) Rules

A recent article argues that the lack of legal norms invites cyberconflict. But governments know the price of overreach and are refraining from unleashing their full capabilities.

Supreme Commander of the Allied Forces and future U.S. president, General Dwight D. Eisenhower (L) with British Field Marshal Bernard Montgomery (R), his deputy commander, in an unknown location in June 1944 after Allied forces stormed the Normandy beaches.

Washington Needs a New Solarium Project To Counter Cyberthreats

President Eisenhower confronted the unprecedented nuclear threat of the 1950s with a novel exercise. The United States needs a similar approach to tackle today's cyber threats.

An atomic bomb blast in Nevada in 1951. (Wikimedia Commons)

Quote of the Day 

How the military misapprehends cyberspace — and how that in turn undercuts cyber deterrence.

doha

The Iranian Cyberthreat Is Real

As Trump increasingly boxes in Tehran, U.S. allies should be worried about the potential for a devastating cyberattack from the Islamic Republic.

On this episode of The E.R., Max Boot joins us to discuss his new book "The Road Not Taken."

What Is ‘War’ Anymore?

The lines between violence, conflict, and war are being increasingly blurred -- with dangerous consequences.

Sri Lankan President Maithripala Sirisena listens to an AFP journalist during an interview in Colombo on January 3, 2016. Up to 100,000 people still living in camps six years after the end of Sri Lanka's ethnic war will be given land for homes within six months, President Maithripala Sirisena told AFP Sunday. "It is an ambitious target, but I will see that all the internally displaced people are given land to build homes," the president said in an interview. "I am setting up a mechanism to complete this process within six months." AFP PHOTO / LAKRUWAN WANNIARACHCHI / AFP / LAKRUWAN WANNIARACHCHI        (Photo credit should read )

Sri Lankan Teenager Hacks President’s Website Twice to Demand New Date For College Exams

How do high schoolers attempt to get out of exams these days? In Sri Lanka, one of them has turned to hacking the president's website.

maxresdefault-2

Essay contest (1): Information control is the desired effect, so cyber will be key in limited warfare — especially non-kinetic

No single change will be more important — or more difficult — for the U.S. military to adopt for success in Information Age warfare than to stop conceiving of cyber threats, and developing U.S. capabilities, in terms of kinetic effects.

GettyImages-517215480

U.S. Law Enforcement Targets Seven Iranian Hackers For Bank and Dam Breaches

The United States accuses seven Iranian hackers of targeting American banks and water infrastructure.

A man checks facebook on his smartphone while waiting for a train in a metro station in Washington, DC, on May 9, 2012. Mere weeks from a multi-billion-dollar debut on the stock market, Facebook has ramped up its focus on mobile lifestyles with the purchase of "social discovery" startup Glancee. Facebook has made a priority of following its users onto smartphones at the heart of Digital Age lifestyles even though the social network has yet to make clear how it plans to make money doing so. AFP PHOTO/Jewel Samad        (Photo credit should read JEWEL SAMAD/AFP/GettyImages)

Should the United States Ban the Islamic State From Facebook?

The fine line between free speech and incitement to terrorism has never been so contested.

illo_hackers_shell

Anonymous vs. the Islamic State

For nearly a year, a war has been unfolding in strange corners of the Internet. But can a bunch of hackers really take on the world’s deadliest jihadi group?

GettyImages-485410314

Clinton’s Private Emails Show Aides Worried About the Security of Her Correspondence

The latest batch of Hillary Clinton's private emails show she was the target of a cyberattack.

Bamford-Final-Flat

What @Snowden Told Me About the NSA’s Cyberweapons

From MonsterMind to TreasureMap, we’ve only just scratched the surface of the United States’ hyper-clandestine offensive capabilities.

Mark Wilson / Getty Images News

Exclusive: Meet the Fed’s First Line of Defense Against Cyber Attacks

Inside the secret Fed cybersecurity unit keeping trillions of dollars safe from hackers.

MANDEL NGAN/AFP/Getty Images

Breaking Bad

How America's biggest corporations became cyber vigilantes.

Load 10 More Articles