Blog Posts Tagged with "Politics"
October 14, 2012 Added by:Don Eijndhoven
Is some creative type with a long exposure to really unconventional warfare getting his cues from a government with a score to settle, and deep pockets to fund the whole thing? It’s a scary thought. If used properly, Social Media might very well be the most refined weapon for asymmetric warfare to date...
June 15, 2012 Added by:Scot Terban
It’s one thing to make something criminal, and another to attempt to force behavioral modifications that infringe on our first amendment rights. We are at the tipping point with all the cyber hubbub over warfare and criminality, and Congress will likely frak us all with their swift pens of “justice”...
June 08, 2012 Added by:Scot Terban
It is comical that there are calls in the Senate to investigate the “leaks and leakers” who talked to Sanger about their digital daring do Stuxnet. All you really need to do Mr. Senator is walk up to 1600 Pennsylvania Ave and knock on the oval office door. You can find the leaker there I can assure you...
June 07, 2012 Added by:Joel Harding
The US State Department cannot sign many treaties in cyberspace, and we cannot establish a lot of cooperation, because there is a lack of a definition or there is no established threshold for most of what we deal with. Part of that problem is that as soon as the ink dries, most of the conditions will change...
June 04, 2012 Added by:Joel Harding
Operations Security or OPSEC is strictly enforced in the military, this is one of the basic tenets of Information Operations. We have had problems with Senators and Congressmen in the past disclosing classified information when doing so suited their purpose. Now the President has become the “Discloser in Chief”...
May 30, 2012 Added by:Headlines
“Politically motivated DDoS attacks are increasingly common and are often timed to coincide with high profile events such as elections or executed in response to specific government actions. The key to minimizing disruption is being proactive and putting DDoS protection in place ahead of time...”
May 09, 2012 Added by:Joel Harding
Congressman Wolf, why don’t you establish a program, for the sake of national security, inspecting equipment originating from outside the US, looking for embedded malicious code and backdoors as well as inspecting software updates for that equipment for the same?
December 04, 2011 Added by:Danny Lieberman
“Why does every hacking and cyberscam story – real or fictional – seem to have a Russia connection? In part, it is prejudice and laziness. The stereotype of the Russian hacker has become such a common media trope that it gets recycled again and again..."
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013