– CIMSEC – To stay ahead of competing ports and technological developments, automation has been heralded as inevitable. Major transshipment hubs and aspiring ports bet their future on automation, which raises the impact cyber risks could have in the long-run.
Category Archives: InformationWarfare
Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
– New York Times – A serial leak of the agency’s cyberweapons has damaged
morale, slowed intelligence operations and resulted in
hacking attacks on businesses and civilians worldwide.
Obama tried to give Zuckerberg a wake-up call over fake news on Facebook
– Washington Post – How Russia conducts information warfare against the US, via Facebook.
RT, Sputnik and Russia’s New Theory of War
– New York Times Magazine – How the Kremlin built one of the most powerful information weapons of the 21st century — and why it may be impossible to stop.
Cyber Threats to Navies With Dr. Alison Russell
– CIMSEC – A conversation with Dr. Alison Russell of Merrimack College about navies and their relationship with cyber. It’s about the distinct layers of cybersecurity, how navies use them to enhance their capabilities, and the challenges in securing and maintaining that domain.
Trump, Putin, and the New Cold War
– New Yorker – What lay behind Russia’s interference in the 2016 election—and what lies ahead? A look at information warfare, Russian-style.
Cyberwar for Sale
– New York Times Magazine – After a maker of surveillance software was hacked, its leaked documents shed light on a shadowy global industry that has turned email theft into a terrifying — and lucrative — political weapon.
The Perfect Weapon: How Russian Cyberpower Invaded the U.S.
– New York Times – …It was the cryptic first sign of a cyberespionage and information-warfare campaign devised to disrupt the 2016 presidential election, the first such attempt by a foreign power in American history. What started as an information-gathering operation, intelligence officials believe, ultimately morphed into an effort to harm one candidate, Hillary Clinton, and tip the election to her opponent, Donald J. Trump.
U.S. Had Cyberattack Plan if Iran Nuclear Dispute Led to Conflict
– New York Times – In the early years of the Obama administration, the United States developed an elaborate plan for a cyberattack on Iran in case the diplomatic effort to limit its nuclear program failed and led to a military conflict, according to a coming documentary film and interviews with military and intelligence officials involved in the effort. The plan, code-named Nitro Zeus, was devised to disable Iran’s air defenses, communications systems and crucial parts of its power grid, and was shelved, at least for the foreseeable future, after the nuclear deal struck between Iran and six other nations last summer was fulfilled.
War Stories from the Future
– The Atlantic Council – War Stories from the Future is the culmination of the Atlantic Council Art of Future Warfare project’s first year exploring the future of armed and social conflict. The anthology explores many of the most important looming issues in defense and security, but in a way that no white paper or policy brief can.
The Agency
– New York Times Magazine – From a nondescript office building in St. Petersburg, Russia, an army of well-paid “trolls” has tried to wreak havoc all around the Internet — and in real-life American communities.
Inside the Kremlin’s hall of mirrors
– The Guardian – Fake news stories. Doctored photographs. Staged TV clips. Armies of paid trolls. Has Putin’s Russia developed a new kind of information warfare – fought in the ‘psychosphere’ rather than on the battlefield? Or is it all just a giant bluff?
Information Warfare – Hacking the President’s DNA
– The Atlantic – The U.S. government is surreptitiously collecting the DNA of world leaders, and is reportedly protecting that of Barack Obama. Decoded, these genetic blueprints could provide compromising information. In the not-too-distant future, they may provide something more as well—the basis for the creation of personalized bioweapons that could take down a president and leave no trace.
Information Warfare – Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals
– Wired – A look at Eugene Kaspersky, whose company is a worldwide leader in anti-virus software, and friend of Vladimir Putin and the Russian FSB.
Information Warfare – Cool War
– Foreign Policy – John Arquilla asks could the age of cyberwarfare lead us to a brighter future?
Information Warfare – Obama Order Sped Up Wave of Cyberattacks Against Iran
– New York Times – From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.
Information Warfare – Jamming Tripoli: Inside Moammar Gadhafi’s Secret Surveillance Network
– Wired – A look at how cyberwar was waged by Libya against its citizens.
Information Warfare – People Power 2.0
– Technology Review – How civilians helped win the Libyan information war.
Information Warfare – The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)
– Wired – James Bamford writes that under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.
Information Warfare – In Attack on Vatican Web Site, a Glimpse of Hackers’ Tactics
– New York Times – The elusive hacker movement known as Anonymous has carried out Internet attacks on well-known organizations like Sony and PBS. In August, the group went after its most prominent target yet: the Vatican. A nice look at how they do it…
Information Warfare – Hackers 'hit' US water treatment systems
– BBC – Hackers are alleged to have destroyed a pump used to pipe water to thousands of homes in a US city in Illinois.
Information Warfare – From Russia With Jam
– Defense Technology International – Moscow-based Aviaconversiya Ltd., makes and sells GPS jammers…to anyone who wants to buy them, no questions asked.
Information Warfare – Electromagnetic weapons: Frying tonight
– Economist – Warfare is changing as weapons that destroy electronics, not people, are deployed on the field of battle.
Information Warfare – Malware myopia
– Los Angeles Times – Mark Bowden writes that as modern society leans more heavily on the Internet, its fragility becomes an ever greater concern.
Information Warfare – A Declaration of Cyber-War
– Vanity Fair – Last summer, the world’s top software-security experts were panicked by the discovery of a drone-like computer virus, radically different from and far more sophisticated than any they’d seen. The race was on to figure out its payload, its purpose, and who was behind it. As the world now knows, the Stuxnet worm appears to have attacked Iran’s nuclear program. And, as Michael Joseph Gross reports, while its source remains something of a mystery, Stuxnet is the new face of 21st-century warfare: invisible, anonymous, and devastating.
You must be logged in to post a comment.