361Security
  • Intelligence
    • Blogs >
      • Paul Ashley
      • Brandon Scott >
        • Book
      • Haqmal
    • Analysis
    • Regions >
      • Global
      • Africa >
        • Kenya
        • Nigeria
        • Somalia
      • Asia >
        • Afghanistan
        • Myanmar (Burma)
        • India
        • North Korea
        • Pakistan
      • Europe >
        • Russia
      • Latin America >
        • Brazil
        • Colombia
        • El Salvador
        • Honduras
        • Mexico
        • Venezuela
      • Middle East >
        • Iran
        • Iraq
        • Jordan
        • Kuwait
        • Lebanon
        • Libya
        • Saudi Arabia
        • Syria
        • Turkey
        • Yemen
    • 'The First 300' Project
  • Services
    • US Government Services
    • Jobs Portal >
      • Leads
    • Shop
    • External Links
    • Consulting
    • Human Security
    • Development Nexus
    • Request For Information
    • Market Security
    • Key Leader Dossiers
    • Information Security
    • Literature Reviews
    • Cultural Intelligence
    • Research Resources
    • Forums (Beta)
    • Files
    • Security & Stability
    • Terrorist Profiles
  • Communications
    • About
    • Advertising
    • Public Affairs
    • Contributors >
      • Zachary Alpert
      • Paul Ashley
      • Michael Bassett
      • Ben Eden
      • Jeffrey Hawn
      • Nick Heras
      • Attila Laczko
      • Brandon Scott
      • Chris VanKirk
    • Mailing List

Think Again: Cyberwar

2/27/2012

 
No way. "Cyberwar is coming!" John Arquilla and David Ronfeldt predicted in a celebrated Rand paper back in 1993. Since then, it seems to have arrived -- at least by the account of the U.S. military establishment, which is busy competing over who should get what share of the fight.

Cyberwar Is Already Upon Us

2/27/2012

 
In the nearly 20 years since David Ronfeldt and I introduced our concept of cyberwar, this new mode of conflict has become a reality. Cyberwar is here, and it is here to stay, despite what Thomas Rid and other skeptics think.

Shots Fired: The 10 worst cyberattacks.

2/27/2012

 
In 2004, U.S. federal investigators discovered an ongoing series of attacks penetrating the networks of the departments of Defense, State, Energy, and Homeland Security, as well as those of defense contractors, and downloading terabytes of data.

Partisanship jeopardizes U.S. cyber defense

2/25/2012

 
Few would argue against the need to improve U.S. cybersecurity, but the current partisan divide on how to accomplish this goal threatens to stall much-needed legislation in this area. On February 14th, Sen. Joseph Lieberman (I-CT) and Sen. Susan Collins (R-ME) introduced the Cybersecurity Act of 2012, a bill that aims to improve US cyber defense, clarify responsible government oversight authorities, raise issue awareness, and promote information sharing between the private sector and the government.

Cyber-snoops often cross legal line in divorce wars

2/25/2012

 
When a Greeneville, Tenn., man saw that e-mails he sent were different from what the intended recipient received, he immediately suspected his soon-to-be ex-wife. His suspicions turned out to be true: She had installed snooping software on his computer, intercepted his e-mails and altered them, according to federal court records.

Cyber security expert finds new flaw in smartphones

2/25/2012

 
A former McAfee researcher has used a previously unknown hole in smartphone browsers to plant China-based malware that can record calls, pinpoint locations and access user texts and emails.

Citi: Attackers Gained Access to Customer Data

2/25/2012

 
Citigroup Inc. (C), the third-largest U.S. lender, said cyber attackers got into customer accounts last year as the threat of electronic intrusions increased.

    Cyber Security

    Never before in history has there been a more complex form of warfare than Cyberwarfare. The cyber battlefield is an ever evolving and seemingly insurmountable obstacle. At 361Security we have dedicated this section to writings from IT professionals from the US and European defense communities. They have volunteered to offer 361 and its readers a professional approach to current and future Cyber threats. Additionally we will provide ample updates to others writings.

    Archives

    May 2012
    March 2012
    February 2012

    Categories

    All

© 2011 - 2026