Cyberwar
2,777 Followers
Recent papers in Cyberwar
Livro, em recurso eletrônico (eBook), publicado em 2011 em parceria com a Editora Delpos. Avalia os aspectos sobre a (in)segurança virtual no Brasil, desde o contexto da guerra cibernética, o cibercrime e os incidentes na Internet e como... more
Over the last years there is a growing body of literature over exploiting cyberspace for offensive and defensive purposes. Cyber-conflict is after all the newest mode of warfare and cyber-weapons have been described as weapons of mass... more
In August 2008, the Russian Army invaded georgia. numerous, coordinated cyber attacks accompanied the military campaign. this represents the first instance of a large-scale computer network attack (CNA) conducted in tandem with major... more
Cyber-security has been approached by various disciplines. Information technology experts, lawyers, strategists and state officials have enriched the debate about the nature of cyber-security. The dominant trend - regardless of its... more
w: Wybrane problemy bezpieczeństwa państwa, t. II.
Com a crescente securitização do ciberespaço e o atrelamento cada vez maior de Infraestruturas Críticas às tecnologias de informação, pesquisas acadêmicas acerca de conflitos cibernéticos se tornam indispensáveis para o equilíbrio... more
Over the last years there is a growing body of literature over the role of states in cyberspace, over the need for the westphalian state system to adjust in a globalised and borderless world. The purpose of this article is to examine the... more
Les cyberattaques sont loin de ne viser que des cibles stratégiques. Et Chacun d'entre nous peut être durement impacté. Voilà comment (essayer de) s'en protéger.
L'elaborato spiega nel modo più dettagliato possibile cosa sia il cyberwarfare, illustrandone i concetti e le metodologie, offrendo esempi storici e spunti per ulteriori approfondimenti. Infine, è presente un'analisi delle dottrine e... more
The technological transformation story of Azerbaijan is marked by the popular embrace of digital banking, implementation of centralized e-government services, and the automation of critical energy infrastructure. However, this march... more
• Provides a multidisciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. • Presents detailed case studies of cyber-attack including inter-state... more
A excitação das massas pode ser produzida como resultado do recurso às novas tecnologias da comunicação de massa, para além da via farmacológica? E aqui chamamos de “novas tecnologias” de comunicação de massa as tecnologias digitais... more
Book review: VENTRE, Daniel (eds.); "Cyber Conflict: Competing National Perspectives"; ISTE Ltd. and John Wiley & Sons, Inc.; UK & USA; 2012. ISBN: 978-1-84821-350-0.
Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. Technological advances have profoundly impacted everyday life by introducing creative inventions that were once... more
“What Can We Say About Cyberwar Based on Cybernetics?” article examines the basics of cyberwar, mostly cybernetics. It also deals with cyberspace as a new global infrastructure and cyberwar as a global level of warfare. The focus of the... more
Cyber-attacks are often viewed in academic and military writings as strategic asymmetric weapons, great equalizers with the potential of leveling the battlefield between powerful nations and those less capable. However, there has been... more
Ciberseguridad Nacional en México y sus desafíos RESUMEN 1 Debido a los avances tecnológicos los Estados enfrentan nuevos desafíos en la llamada Era de la Información. Estos desafíos están ligados a la falta de protección y al mal uso del... more
El Siglo XXI nos obliga a repensar conceptos, objetos y amenazas en materia de Defensa y Seguridad, así como también las herramientas y métodos con los que respondemos a estas nuevas amenazas. Ante todo, es pertinente aclarar que este... more
The dimensions of warfare have evolved over the centuries from Land and Sea to encompass Air and Outer Space in the 20th Century. With the heavy dependence on networks in the 21st Century, Cyberspace is emerging as an increasingly... more
The term Advanced Persistent Threats (APT, APTs) has a relatively short history – originated in the United States' government spheres and as such was referred to cyber attacks waged by a state actor. The emergence of such threats has been... more
Cyber warfare figures conspicuously on the motivation of policymakers and military pioneers far and wide. New units to guarantee cybersecurity are made at different levels of government, incorporating into the military. Be that as it may,... more
The link between cyberspace and national security is often presented as an unquestionable and uncontested ‘truth’. However, there is nothing natural or given about this link: it had to be forged, argued, and accepted in the (security)... more
Cyber security is seen as one of the most pressing national security issues of our time. Due to sophisticated and highly publicised cyber attacks such as Stuxnet, it is increasingly framed as a strategic issue. The diffuse nature of the... more
Cyberspace is erroneously characterized as a domain that transcends physical space and thereby is immune to state sovereignty and resistant to international regulation. The purpose of this paper is to signify that cyberspace, in common... more
"Hacking Hearts and Minds: How Memetic Warfare is Transforming Cyberwar" is a paper written by Jeff Giesea for NATO OPEN publications.
En el presente trabajo se aborda la cuestión de la ciberseguridad, una disciplina que atiende las amenazas que surgen y se despliegan en el "quinto dominio" o ciberespacio. Su objetivo principal consiste en determinar si en esta cuestión... more
The U.S.-China bilateral agenda is dominated by issues like trade, intellectual property rights, monetary policy, human rights and security issues. However, given the fact that critical national infrastructures and the private sector are... more
The article presents the nuances of cyber espionage versus cyberattacks that are becoming more pervasive in the national security context. It defines the differences between the two, and proposes a method of analyzing cyber operations to... more
Dieser Beitrag untersucht die Frage, ob ein Krieg im Cyberspace möglich ist. Dazu stütze ich mich auf die Kriegs-Definition die Clausewitz aufgestellt hat und wende diese auf die aktuelle Cyberwar-Diskussion an. Ich stelle die aktuellen... more
Cyberspace is a socio-political and technological domain with unique characteristics. It is a human made domain that offers universal reach and access to its users. Its decentralized nature and the fact that it is mostly owned and managed... more
Der Artikel beschreibt den ersten Entwurf einer Strategie zur globalen Cyber-Sicherheit. Dabei lege ich einen besonderen Schwerpunkt auf die Handlungskompetenz der handelnden Akteure und die zugrunde liegende psychologische Forschung.
The following article presents an alternative critical perspective of the cyber security research agenda. The article opens with criticism of the securitization discourse that uses analogies of historical events with events in cyber... more
The dimensions of warfare have evolved over the centuries from Land and Sea to encompass Air and Outer Space in the 20th Century. With the heavy dependence on networks in the 21st Century, Cyberspace is emerging as an increasingly... more
The Internet has become a essential tool in the everyday conduct of commercial life and its security has become a topic of growing importance since 9/11. The ability of terrorists to conduct cyberwarfare is largely unknown, but the... more
Este artigo argumenta sobre a emergência da ciberguerra como nova forma de conflito internacional. É feita uma introdução à temática da guerra no ciberespaço, seguida de uma contextualização histórica que abrange o nascimento da ARPAnet1... more
English: The security of cyberspace has not only gained importance for individual computer users in recent years, but has also become a much discussed topic among states, who see cyber threats as a major threat to their national security.... more
Cyber-attacks are often viewed in academic and military writings as strategic asymmetric weapons, great equalizers with the potential of leveling the battlefield between powerful nations and those less capable. However, there has been... more
Cyber Warfare: Does International Humanitarian Law Apply?
This book critiques mainstream beliefs about cyberwarfare and forges a new path in the way of defining this largely misunderstood concept. Rather than outlining cyberspace as a new technology applied in military operations, here,... more
From France to China, transhumanism is driving people crazy!
The goal? The goal is to build Captain America-style programmed-to-kill supersoldiers. Here you can find out what is happening, where and how.
The goal? The goal is to build Captain America-style programmed-to-kill supersoldiers. Here you can find out what is happening, where and how.