Content

NATOSource

Apr 22, 2013

SACEUR: Europe’s defense challenges

By James Stavridis, Allied Command Operations

Cybersecurity Security & Defense

New Atlanticist

Apr 19, 2013

Useless Speculation on Twitter Standard Time

By James Joyner

Since the news broke this morning that the likely perpetrators of the Boston Marathon bombing are two brothers from Chechnya, speculation has been rampant about their ties to militant groups there. That zero evidence supports that proposition seems irrelevant. We’re on Twitter Standard Time and we expect answers instantaneously.

Cybersecurity National Security

New Atlanticist

Apr 18, 2013

Chinese Cyber Espionage: US Must Shout but Also Listen

By Jason Healey

After years of silence, the United States has finally had enough of Chinese cyber-theft of trade secrets. American officials have repeatedly raised the issue with their Chinese counterparts in language that is increasingly frank.

China Cybersecurity

NATOSource

Apr 17, 2013

Should the U.S. use autonomous cyber weapons?

By Jason Healey, New Atlanticist

From Jason Healey, New Atlanticist:  Stuxnet, part of the "Olympic Games" covert assault by the United States and Israel on Iranian nuclear capability, appears to be the first autonomous weapon with an algorithm, not a human hand, pulling the trigger.

Cybersecurity Security & Defense

New Atlanticist

Apr 17, 2013

Stuxnet and the Dawn of Algorithmic Warfare

By Jason Healey

Though autonomous, destructive robots are a long-time, hackneyed science fiction plot, for some time, this new kind of warfare has been shifting from yesterday’s movie to today’s reality. But unforeseen by the imaginations of both headline and science fiction writers, it was not a missile-laden drone or humanoid Terminator that introduced this new kind of […]

Cybersecurity Security & Defense

New Atlanticist

Apr 16, 2013

To Stop North Korean Cyber Attacks, Start in Beijing

By Jason Healey

The recent cyber attacks on South Korea highlight four truths of cyber conflicts as they have actually been fought. The implications of three of them are obvious, the fourth not yet so. Such conflicts are disruptive, but far from warfare. And cyber conflicts are both easier to predict than popular myth has it and the […]

China Cybersecurity

New Atlanticist

Apr 16, 2013

Seeking to Avert Cyber War

By Frederick Kempe

Amid the buzz in Washington about new North Korean nuclear threats, President Barack Obama late last week summoned 15 of America’s top financial leaders to the White House to discuss what his administration considers to be threats that are more pervasive, more persistent and less manageable ‑ cyber risks. “The president scared the hell out […]

Cybersecurity Korea

NATOSource

Apr 16, 2013

China: US pivot to Asia ‘frequently makes the situation there tenser’

By Xinhua

From Xinhua:  The global trends toward economic globalization and multi-polarity are intensifying, cultural diversity is increasing, and an information society is fast emerging.

Cybersecurity Security & Defense

NATOSource

Apr 16, 2013

China’s military cyber policy: ‘Winning local wars under the conditions of informationization’

By Xinhua

From Xinhua:  China’s armed forces unswervingly implement the military strategy of active defense, guard against and resist aggression, contain separatist forces, safeguard border, coastal and territorial air security, and protect national maritime rights and interests and national security interests in outer space and cyber space.

Cybersecurity Security & Defense

NATOSource

Apr 15, 2013

DOD requests $4.7 billion to help fund offensive cyber teams

By John Reed, Killer Apps

From John Reed, Killer Apps:  Despite a climate of what defense officials love to describe as "fiscal uncertainty," the Pentagon’s 2014 budget request includes $4.7 billion for increased "cyberspace operations," including dozens of cyber attack teams

Cybersecurity Security & Defense

Experts