Word: cyberwar
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...developing "techniques that capture and identify data traversing enemy networks for the purpose of Information Operations or otherwise countering adversary communications." And the Navy is developing "a non-lethal, non-attributable system designed to offer non-kinetic offensive information operation solutions," according to Pentagon budget documents. (See how cyberwar was envisioned...
...there is mounting concern that U.S. offensive capability in cyberspace is growing too fast and too secretly. "I have no doubt we're doing some very profoundly sophisticated things on the attack side," says William Owens, a retired Navy admiral and cyberwar expert who led a federal study on U.S. offensive cyberwarfare last year. "But that is little realized by many people in Congress or the Administration." That study, by the National Research Council, concluded that "the U.S. armed forces are actively preparing to engage in cyberattacks, and may have done so in the past." But it added that...
Mulvenon and other analysts say China employs a constantly shifting mix of official and civilian or semicivilian groups (such as so-called patriotic hacker associations) as the foot soldiers - the "proxies" - in its cyberwar armies. The technological challenges of tracing attacks on U.S. government and private-corporation computers are so enormous that Beijing can simply deny that any of the problems have originated in China. So far, the Chinese have been able to get away with it, despite the fact that not just the U.S. is complaining. In the past few years, sources ranging from the German Chancellor's office...
...fundamental level, the Chinese view cyberwar as an overt tool of national power in a very different way from the United States," says James Mulvenon, a Washington-based specialist on the Chinese military. "The U.S. is still uncomfortable exercising that power, but the Chinese - and the Russians - are very comfortable with the deniability and using proxies, even though the actions of those proxies could have enormous strategic consequences." (See pictures of Obama in Asia...
...called asymmetrical warfare, aimed at using the U.S.'s dependence on technology as a weapon: for example, targeting America's network of space satellites or developing missiles that could sink U.S. aircraft carriers. For China's generals, though, of all the asymmetrical methods of attack available to them, cyberwar presents a uniquely effective - and cost-effective - means of neutralizing the U.S advantage. "They recognized the importance as far back as the early '90s," says Mulvenon, "and they now have a major advantage, a weapon like no other that allows them to reach out and touch right into the continental United...