Tags » Cyber War

China and Russia are using hacked data to target U.S. spies, officials say

At least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised as a result, according to two U.S. 52 more words

Hacking

Our So-Called Foreign Policy: The Big Backfire Potential of Obama's Reported New Cyber-Security Policy

If Rule Number One in medicine is “Do No Harm,” then Rule Number One in foreign policy-making is surely “Do No Harm to Your Own Country.” Which is why… 556 more words

Obama

The "four harms" of Chinese cyberhacking

In order for the US to have reason to respond to China‘s cyberattacks, the malicious activity must do one (or more) of the following: 42 more words

Cyberattack

Music for Meditation or Mentalism

Music & States of Consciousness

One of the most powerful ways of altering consciousness coherence might as well be music. Like the universe, music is a pattern that recombines based on the relationship of independent signals , with each signal carrying a specific tone. 1,028 more words

Cultural Consciousness

How to Feed your Thinktank ['psych' out your user interface]

 

How to Feed your Thinktank [‘psych’ out your user interface]

for more generative and fruitful community building mind controls

Having a working understanding of influence psychology can aid in the success of every conceivable human endeavor, from business to lovemaking or love seeking, from wealth to power, to everything but wisdom, the power to control others is said to be one of the most well sought after elixirs of kings and gods. 1,378 more words

Cyber War

Hacking for asymmetry in military capabilities

After completing school, like all fellow countrymen my age, I was conscripted into the South African army. While coerced into military servitude my time was split between being trained in infantry combat and working on the Defence HQ computer system. 616 more words

Gennaro reblogged this on Legationes.

“Cyber-Security is Not an Individual Sport!”

Business owners, you can no longer think of your network as an island that you can secure from all others. You may believe you have your network and data locked down but the companies and people you are connected to, those with access to your data and the people you do business with, likely don’t. 351 more words

Cyberspace