Cyberwar

Social_WarringStates-2000px

The War-Torn Web

A once-unified online world has broken into new warring states.

A member of the Metropolitan Police SWAT team patrols a movie theater before a showing of the film "The Interview" on December 25, 2014 in Washington, DC.

In Cyberwar, There Are Some (Unspoken) Rules

A recent article argues that the lack of legal norms invites cyberconflict. But governments know the price of overreach and are refraining from unleashing their full capabilities.

Supreme Commander of the Allied Forces and future U.S. president, General Dwight D. Eisenhower (L) with British Field Marshal Bernard Montgomery (R), his deputy commander, in an unknown location in June 1944 after Allied forces stormed the Normandy beaches.

Washington Needs a New Solarium Project To Counter Cyberthreats

President Eisenhower confronted the unprecedented nuclear threat of the 1950s with a novel exercise. The United States needs a similar approach to tackle today's cyber threats.

An atomic bomb blast in Nevada in 1951. (Wikimedia Commons)

Quote of the Day 

How the military misapprehends cyberspace — and how that in turn undercuts cyber deterrence.

doha

The Iranian Cyberthreat Is Real

As Trump increasingly boxes in Tehran, U.S. allies should be worried about the potential for a devastating cyberattack from the Islamic Republic.

On this episode of The E.R., Max Boot joins us to discuss his new book "The Road Not Taken."

What Is ‘War’ Anymore?

The lines between violence, conflict, and war are being increasingly blurred -- with dangerous consequences.

Sri Lankan President Maithripala Sirisena listens to an AFP journalist during an interview in Colombo on January 3, 2016. Up to 100,000 people still living in camps six years after the end of Sri Lanka's ethnic war will be given land for homes within six months, President Maithripala Sirisena told AFP Sunday. "It is an ambitious target, but I will see that all the internally displaced people are given land to build homes," the president said in an interview. "I am setting up a mechanism to complete this process within six months." AFP PHOTO / LAKRUWAN WANNIARACHCHI / AFP / LAKRUWAN WANNIARACHCHI        (Photo credit should read )

Sri Lankan Teenager Hacks President’s Website Twice to Demand New Date For College Exams

How do high schoolers attempt to get out of exams these days? In Sri Lanka, one of them has turned to hacking the president's website.

maxresdefault-2

Essay contest (1): Information control is the desired effect, so cyber will be key in limited warfare — especially non-kinetic

No single change will be more important — or more difficult — for the U.S. military to adopt for success in Information Age warfare than to stop conceiving of cyber threats, and developing U.S. capabilities, in terms of kinetic effects.

GettyImages-517215480

U.S. Law Enforcement Targets Seven Iranian Hackers For Bank and Dam Breaches

The United States accuses seven Iranian hackers of targeting American banks and water infrastructure.

A man checks facebook on his smartphone while waiting for a train in a metro station in Washington, DC, on May 9, 2012. Mere weeks from a multi-billion-dollar debut on the stock market, Facebook has ramped up its focus on mobile lifestyles with the purchase of "social discovery" startup Glancee. Facebook has made a priority of following its users onto smartphones at the heart of Digital Age lifestyles even though the social network has yet to make clear how it plans to make money doing so. AFP PHOTO/Jewel Samad        (Photo credit should read JEWEL SAMAD/AFP/GettyImages)

Should the United States Ban the Islamic State From Facebook?

The fine line between free speech and incitement to terrorism has never been so contested.

illo_hackers_shell

Anonymous vs. the Islamic State

For nearly a year, a war has been unfolding in strange corners of the Internet. But can a bunch of hackers really take on the world’s deadliest jihadi group?

GettyImages-485410314

Clinton’s Private Emails Show Aides Worried About the Security of Her Correspondence

The latest batch of Hillary Clinton's private emails show she was the target of a cyberattack.

Bamford-Final-Flat

What @Snowden Told Me About the NSA’s Cyberweapons

From MonsterMind to TreasureMap, we’ve only just scratched the surface of the United States’ hyper-clandestine offensive capabilities.

GettyImages-158326007

Privacy Advocates Get an Unfortunate Presidential Candidate to Champion Their Cause

Privacy advocates get an unfortunate candidate to champion their cause in 2016.

GettyImages-484127746

U.S. Aviation Authorities: Plane Groundings Not Due to a Hack

A failed software update -- not a hack -- kept planes in the Washington, D.C., region on the ground Saturday.

Soldiers from Company C, 2nd Battalion, 8th Cavalry Regiment, 1st Brigade Combat Team, 1st Cavalry Division fire rounds from their M1A2 Abrams Tanks at the Adazi Training Area, Latvia, Nov. 6, 2014. The Soldiers, who were here to assist in training the Latvian Land Forces as part of Operation Atlantic Resolve, were part of an exhibit to dignitaries and local media. These rounds mark the first firing of tank rounds in Latvia since 1994. These activities were part of the U.S. Army Europe-led Operation Atlantic Resolve land force assurance training taking place across Estonia, Latvia, Lithuania and Poland to enhance multinational interoperability, strengthen relationships among allied militaries, contribute to regional stability and demonstrate U.S. commitment to NATO. (U.S. Army photo by Sgt. 1st Class Jeremy J. Fowler)

Why hasn’t the Army’s regular acquisition process produced anything in decades?

At the Future of War (FoW) conference, one of General Odierno’s comments referenced the problem of ‘utopia requirements’ in our Defense Acquisitions process.

hermes_450_da_fab

The Future of War conference, Day One: Falling behind in drones and robotics

Here are some highlights from the first day of the New America/Arizona State conference on the future of war.

Mark Wilson / Getty Images News

Exclusive: Meet the Fed’s First Line of Defense Against Cyber Attacks

Inside the secret Fed cybersecurity unit keeping trillions of dollars safe from hackers.

MANDEL NGAN/AFP/Getty Images

Breaking Bad

How America's biggest corporations became cyber vigilantes.

Load 10 More Articles

Want unlimited access? Subscribe today.