Content

NATOSource

Sep 25, 2012

Weaknesses of US and European models of cyber defense

By Chris C. Demchak, American Interest

From Chris C. Demchak, American Interest:  [F]ew of the strategic or institutional support elements of a security resilience strategy are in place today, either within or across the various democratic trading states.

Cybersecurity Security & Defense

NATOSource

Sep 21, 2012

State Department’s Top Ten Answers on International Law in Cyberspace

By Harold Hongju Koh, Department of State

From Harold Hongju Koh, Department of State:  Everyone here knows that cyberspace presents new opportunities and new challenges for the United States in every foreign policy realm, including national defense.

Cybersecurity Security & Defense

NATOSource

Sep 21, 2012

Report: Iran behind “significant and ongoing” cyber attacks against U.S. financial institutions

By Robert Windrem and Jim  Miklaszewsk, NBC News

From Robert Windrem and Jim  Miklaszewsk, NBC News:  National security officials told NBC News that the continuing cyber attacks this week that slowed the websites of JPMorgan Chase and Bank of America are being carried out by the government of Iran.

Cybersecurity Security & Defense

NATOSource

Sep 20, 2012

Panetta talks cyber issues with Chinese, but experts see no decline in attacks out of China

By Lolita C. Baldor, AP

From Lolita C. Baldor, AP:  Despite several years of escalating diplomacy and warnings, the U.S. is making little headway in its efforts to tamp down aggressive Chinese cyberattacks against American companies and the government. U.S. Defense Secretary Leon Panetta, who is wrapping up three days of meetings with military and civilian leaders, said he has […]

Cybersecurity Security & Defense

NATOSource

Sep 12, 2012

Cyber Vigilantes and Digital Hit Men: The private sector ‘going on the offensive’ against cyber attackers

By Tim Maurer, Foreign Policy

From Tim Maurer, Foreign Policy:  [G]overnment is not the only one taking on cyber threats. Corporations, which have long worked to defend their networks from intrusion, are increasingly going on the offensive, turning from firewalls to retaliation.

Cybersecurity Security & Defense

NATOSource

Sep 12, 2012

Release of NATO sponsored manual on the international law applicable to cyber warfare

By NATO Cooperative Cyber Defense Center of Excellence

From NATO Cooperative Cyber Defense Center of Excellence:  The Tallinn Manual on the International Law Applicable to Cyber Warfare, written at the invitation of the Centre by an independent ‘International Group of Experts’, is the result of a three-year effort to examine how extant international law norms apply to this ‘new’ form of warfare.

Cybersecurity Security & Defense

NATOSource

Sep 12, 2012

Gates warns that terrorists ‘using off-the-shelf equipment can develop toxic tools and deploy them with great effect’

By Brian Prince, Security Week

From Brian Prince, Security Week:  In a keynote today at the ISC2 Security Congress in Philadelphia, [Robert] Gates – who served as defense secretary from 2006 and 2011 and is also a former director of the CIA – said the threat of cyber-war waged by nation-states in some ways is less problematic than the prospect […]

Cybersecurity Security & Defense

NATOSource

Sep 11, 2012

US increasing cyber cooperation with key allies

By John Reed, Killer Apps

From John Reed, Killer Apps:  The Defense Department has reached what Pentagon officials describe a key agreement with some of the United States’ closest international allies to share information in the cyber realm.

Cybersecurity Security & Defense

NATOSource

Sep 11, 2012

Army and Marines developing offensive cyber support ‘for the most forward, tactical commanders’

By John Reed, Killer Apps

From John Reed, Killer Apps:  The Army and Marine Corps are developing procedures that allow front-line troops to request offensive cyber support the same way they currently request artillery and air support.

Cybersecurity Security & Defense

NATOSource

Sep 10, 2012

Cyber Weapons: A New Kind of Warfare

By the Editors of the New York Times

From the Editors of the New York Times:  [F]aced with rising intrusions against computers that run America’s military systems and its essential infrastructure — its power grid, for instance, and its telecommunications networks — the military here (and elsewhere) sees disruptive software as an essential new tool of war.

Cybersecurity Security & Defense

Experts