A new strategy for U.S. Cyber Command seeks to block enemies from achieving their objectives – but may not be successful, and could have unforeseen consequences.
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
WikiLeaks’ latest release details what it claims is the CIA’s hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
Richard Forno, University of Maryland, Baltimore County
With the DNC email leak and Trump calling on Russia to hack Clinton’s emails, concern about foreign meddling in the 2016 presidential election process is rising. Is e-voting the next cyber battleground?
Richard Forno, University of Maryland, Baltimore County and Anupam Joshi, University of Maryland, Baltimore County
The country’s actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
The cloud lies under the ocean. Thin cables about as big around as a garden hose traverse the Earth’s oceans carrying all our intercontinental internet data.
Professor in Law and Co-Convener National Security Hub (University of Canberra) and Research Fellow (adjunct) - The Security Institute for Governance and Leadership in Africa, Faculty of Military Science, Stellenbosch University- NATO Fellow Asia-Pacific, University of Canberra