Content

NATOSource

May 22, 2013

NSA Deputy Warns Against Cyber Vigilantes

By Colin Clark, Breaking Defense

From Colin Clark, Breaking Defense:  The private sector — and the government — must “exhaust” the use of traditional responses such as public shaming, criminal charges, diplomatic demarches, and sanctions “before we contemplate the dangerous possibility we might encourage vigilantism

Cybersecurity
Security & Defense

NATOSource

May 22, 2013

Report Recommends US Permit Private Counterattacks Against International Hackers

By David E. Sanger, New York Times

From David E. Sanger, New York Times:  With President Obama preparing for a first meeting with China’s new president, a commission led by two former senior officials in his administration will recommend a series of steps that could significantly raise the cost to China of the theft of American industrial secrets.

Cybersecurity
Security & Defense

New Atlanticist

May 22, 2013

Crisis in the Sahel: Overview

By Rudolph Atallah

North Africa and the intertwined Sahel, from Egypt to Mauritania, is a region that has undergone profound and destabilizing political and social change in the last several years, especially since the “Arab Spring” of 2011. Nascent political systems, newly empowered non-state actors, and underlying structural problems in the region contribute to an increasingly volatile mix, […]

National Security
North Africa

NATOSource

May 22, 2013

NATO Deactivates Allied Air Command Izmir HQ in Turkey

By Kimberly Rhoades, Allied Air Command

NATO
Security & Defense

NATOSource

May 22, 2013

NATO’s New Relevance as a Cyber Alliance

By Siobhan MacDermott, AVG

From Siobhan MacDermott, AVG:  NATO is a creature of crisis, having come into being early in the Cold War as an intergovernmental alliance between the United States and the European democracies for collective defense against attack

Cybersecurity
Security & Defense

NATOSource

May 21, 2013

Digital Warfare: North Korean Cyber-Rattling

By Economist

From Economist:  Earlier this month the Department of Defence delivered a report to Congress accusing the hermit kingdom’s expanding army of “cyber-warriors” of using foreign infrastructure, such as broadband networks, to launch cyber-attacks on American allies, most notably South Korea. Kim Jong Un, North Korea’s fresh-faced dictator, is said to have 4,000 loyal cyber-warriors at […]

Cybersecurity
Security & Defense

New Atlanticist

May 21, 2013

Three Benghazi Myths

By R. Nicholas Burns

The Benghazi controversy’s return to Washington’s raging partisan wars continues to portray our political culture at its worst.

Libya
National Security

NATOSource

May 20, 2013

EU Invites NATO to Boost Cyber Cooperation

By NATO Parliamentary Assembly

From NATO Parliamentary Assembly:  The European Union’s top justice official invited NATO on Saturday to work more closely with the EU to combat cyber-crime and create a safe Internet environment where citizen’s rights and personal data are protected.

Cybersecurity
European Union

NATOSource

May 20, 2013

The Unique Characteristics of Cyber Weapons

By Panayotis A. Yannakogeorgos, National Interest

From Panayotis A. Yannakogeorgos, National Interest:  Cyber events breaching the threshold of armed attack require the use of cyberweapons. These differ substantially from other malicious code.

Cybersecurity
Security & Defense

New Atlanticist

May 17, 2013

Challenges in Measuring Violent Conflict, Syria Edition

By Jay Ulfelder

As part of a larger (but, unfortunately, gated) story on how the terrific new Global Data on Events, Language, and Tone (GDELT) might help social scientists forecast violent conflicts, the New Scientist recently posted some graphics using GDELT to chart the ongoing civil war in Syria. Among those graphics was this time-series plot of violent events per […]

National Security
Security & Defense

Experts

Events