Click on image to get a larger version.
Category: Cyber Conflict
State on State conflict using a variety of assets within and outside of cyberspace to create specific effects as a form of projection of power.
A jailbroken iPhone can be a very powerful weapon in the hands of an attacker: Smart phones can become an attacker’s most camoflashed weapon
Guest blogger Alejandro Chavez looks at the different ways a common popular cell phone can easily be modified to become a hidden method of attacking networks. Mr. Chavez is a student at Purdue University Calumet and we thank him for…
Cyber Warfare: Cyber Warfare and Cyber Terrorism, a growing threat?
Guest blogger Anthony Marszalek discusses in depth some of the concerns with cyber warfare and the ideas on how it exists (if it exists). He also discusses cyber terrorism and tries to make a distinction between the two. Mr. Marszalek…
Is Cyber Terrorism Fact or Fiction?
Guest blogger Aron Okichich Brings up a hot topic to information technology and conflict awareness. As a student at Purdue University Calumet we thank him for allowing us to post his work here. You can download a PDF of his…
What does it means when the military moves from defense to offense on the Internet?
The Internet is both the terrain and the tool in the future of cyber warfare. As we look at the use of the Internet to support hostile actions against government and military targets the classic asymmetric conflict is rising in…
May 21 News on Cyber Warfare (Special: USAF Cyber Command)
Todays news includes information on the new cyber command for the United States Air Force. Over the next month I will be running these as the Air Force Cyber Command comes to fruition. As a side note in the article…
The IED’s of Cyber-warfare
I am concerned that policy and the legislative agenda is making basic assumptions about the relationship of information assurance and security and cyber-warfare that may not be accurate. Some of the issues are illuminated when government and corporate information security…
Why students of small wars should care about cyber-warfare
We define forms of military conflict sometimes by the terrain on which it is fought. Whether the terrain be land warfare, naval warfare, or air warfare the terrain determines the scope and strategies. Low intensity conflict can be defined by…
The Air Force is moving ahead with work on the cyber command
The Air Force is moving ahead with work on the cyber command (LINK). Air Force moving ahead with Cyber Command The Air Force is moving ahead on establishing its new Cyber Command, searching for permanent facilities and planning meetings to…
Cyber-warfare threat or hype?
Center of gravity constructs look at the strategic, operational, and tactical elements of an adversary to identify weak points in the over all capability of resistance. Cyber-warfare attacks the computing and communication infrastructure of the adversary through a variety of…
Partial Bibliography of cyber-warfare topics
This list is not comprehensive but a selected sampling of work going down the path of cyber-warfare.
Generational assumptions of warfare
I’ve been looking at generational warfare from a slightly different perspective. As we have agricultural revolutions, industrial revolutions, and the information revolution it appears there is a corresponding relationship to the generations of warfare. We did not give up agriculture…
Hyper Political Action
The hyper-politicization you’re seeing is part of your increasing maturity as regards media. The fact is that American media has always been a highly tumultuous and terribly biased organ of information dissemination. Unfortunately most people never realize that simple fact.…