Blog Posts Tagged with "Asymmetric Warfare"

0ff0a77035f9569943049ed3e980bb0d

Cyber Militias in the US: Feasibility, Structure, and Purpose

August 21, 2012 Added by:

Offensive cyber attacks benefit from their lack of structure and diversity of attack vectors. Cyber militias can be assigned a target and given the ability to choose their methods based on their capabilities. The absence of formal rules of engagement allows the cyber militia to exercise creativity and innovation...

Comments  (8)

69dafe8b58066478aea48f3d0f384820

Army to Integrate Cyber Considerations Across the Board

August 20, 2012 Added by:Headlines

"The vulnerabilities inherent in social media, ubiquitous encryption and malicious software that has the ability to change form and target enroute, retaining access and the freedom to maneuver in cyberspace will be essential for us to defend ourselves and influence the nature of future conflict..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

South Korea Moves to Improve Cybersecurity Posture

June 11, 2012 Added by:Headlines

"To the North, it is attractive to develop cyber capabilities as it does not cost much money to establish and maintain cyber units. Another reason is it is very difficult to trace down the origin of cyber attacks, which can be a good excuse when it is blamed for any cyber attack"...

Comments  (0)

6f11dfa37d387cd7c2099ebcd00bccdd

Meet a Cyber Special Ops Warrior: th3j35t3r

June 05, 2012 Added by:Laura Walker

Although the Jester is often described as a cyber vigilante, his operations tend to steer shy of retributive justice and drive more toward disruption of enemy operations. His targets are researched, specific, and his mission is consistent. There is also the psychological component to PWNing the enemy...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The SANS Report: The Jester: A Lesson in Asymmetric Warfare

March 05, 2012 Added by:Infosec Island Admin

Asymmetric Warfare Or Annoyance? Perhaps Jester has done things in the background we do not know about and he has not reported to the media, perhaps not. Overall though, the most creative thing he has done is to poison the LOIC. THIS was a real coup and I do appreciate that one...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Iranian Cyber-Jihadi Cells Plot Western Destruction

November 28, 2011 Added by:Headlines

"The first state to appropriate the strategy of asymmetric war itself was the Islamic Republic of Iran... Because in [cyberspace] one can destroy the laws that have been created by the security apparatus of the enemy, and one can attack their strategies"...

Comments  (0)