– CIMSEC – In a data-rich and knowledge-poor circumstance, challenged with sophisticated competitors, as IWC you will be more than just the conductor of this information orchestra; you will be the instrument builder and tuner, the composer, and the producer. You will rely on advanced technologies and computers to perform the heavy lifting so our forces can act dynamically with precision and purpose. Modern information warfare requires this nimble shift from orchestra to jazz, or to the raw power and disruption of punk rock.
– Washington Free Beacon – Several nations, including China and Russia, are building powerful nuclear bombs designed to produce super-electromagnetic pulse (EMP) waves capable of devastating all electronics—from computers to electric grids—for hundreds of miles, according to a newly-released congressional study.
– CIMSEC – Today, there are state and non-state actors challenging nations, institutions, and private companies through a wide range of overt and covert activities targeted at their vulnerabilities. Both NATO and the European Union refer to these as “hybrid threats” and the maritime domain has proven to be especially vulnerable.
– New Yorker – American companies that fall victim to data breaches want to retaliate against the culprits. But can they do so without breaking the law?
– CIMSEC – The 2017 back-to-back collisions of two Navy destroyers led to much speculation about the role of cyberphysical interference in the disasters. As the senior officer representing the U.S. Navy engineering community during the USS McCain cyber assessment, it is clear that we do not yet have the basic tools to definitively answer the question, “were we hacked or did we break it?”
– Breaking Defense – The US military is “not prepared” to conduct radio and radar jamming against high-end adversaries, a veteran electronic warfare officer now in Congress says.
– CIMSEC – To stay ahead of competing ports and technological developments, automation has been heralded as inevitable. Major transshipment hubs and aspiring ports bet their future on automation, which raises the impact cyber risks could have in the long-run.
– New York Times – A serial leak of the agency’s cyberweapons has damaged
morale, slowed intelligence operations and resulted in
hacking attacks on businesses and civilians worldwide.
– Washington Post – How Russia conducts information warfare against the US, via Facebook.
– New York Times Magazine – How the Kremlin built one of the most powerful information weapons of the 21st century — and why it may be impossible to stop.
– CIMSEC – A conversation with Dr. Alison Russell of Merrimack College about navies and their relationship with cyber. It’s about the distinct layers of cybersecurity, how navies use them to enhance their capabilities, and the challenges in securing and maintaining that domain.
– New Yorker – What lay behind Russia’s interference in the 2016 election—and what lies ahead? A look at information warfare, Russian-style.
– New York Times Magazine – After a maker of surveillance software was hacked, its leaked documents shed light on a shadowy global industry that has turned email theft into a terrifying — and lucrative — political weapon.
– New York Times – …It was the cryptic first sign of a cyberespionage and information-warfare campaign devised to disrupt the 2016 presidential election, the first such attempt by a foreign power in American history. What started as an information-gathering operation, intelligence officials believe, ultimately morphed into an effort to harm one candidate, Hillary Clinton, and tip the election to her opponent, Donald J. Trump.
– New York Times – In the early years of the Obama administration, the United States developed an elaborate plan for a cyberattack on Iran in case the diplomatic effort to limit its nuclear program failed and led to a military conflict, according to a coming documentary film and interviews with military and intelligence officials involved in the effort. The plan, code-named Nitro Zeus, was devised to disable Iran’s air defenses, communications systems and crucial parts of its power grid, and was shelved, at least for the foreseeable future, after the nuclear deal struck between Iran and six other nations last summer was fulfilled.
– The Atlantic Council – War Stories from the Future is the culmination of the Atlantic Council Art of Future Warfare project’s first year exploring the future of armed and social conflict. The anthology explores many of the most important looming issues in defense and security, but in a way that no white paper or policy brief can.
– New York Times Magazine – From a nondescript office building in St. Petersburg, Russia, an army of well-paid “trolls” has tried to wreak havoc all around the Internet — and in real-life American communities.
– The Guardian – Fake news stories. Doctored photographs. Staged TV clips. Armies of paid trolls. Has Putin’s Russia developed a new kind of information warfare – fought in the ‘psychosphere’ rather than on the battlefield? Or is it all just a giant bluff?
– The Atlantic – The U.S. government is surreptitiously collecting the DNA of world leaders, and is reportedly protecting that of Barack Obama. Decoded, these genetic blueprints could provide compromising information. In the not-too-distant future, they may provide something more as well—the basis for the creation of personalized bioweapons that could take down a president and leave no trace.
– Wired – A look at Eugene Kaspersky, whose company is a worldwide leader in anti-virus software, and friend of Vladimir Putin and the Russian FSB.
– Foreign Policy – John Arquilla asks could the age of cyberwarfare lead us to a brighter future?
– New York Times – From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.
– Wired – A look at how cyberwar was waged by Libya against its citizens.
– Technology Review – How civilians helped win the Libyan information war.
– Wired – James Bamford writes that under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.