Tags » Cyberwar

Extended Call for Submissions for the 13th International Conference on Cyber Warfare and Security (ICCWS 2018)

This is the Extended Call for Submissions for the 13th International Conference on Cyber Warfare and Security (ICCWS 2018) which is being hosted by the National Defense University, Washington DC, USA on the   8 – 9th  March 2018. 106 more words

Information Operations

Trump Boosts Military Cyber Command, Hints At Future NSA Changes

BY LEIGH CUEN ON 08/18/17 AT 1:43 PM

President Donald Trump just announced he is elevating U.S. Cyber Command to a full combat command, which means more military resources will go towards developing both offensive and defensive cyber weapons. 626 more words

Information Operations

FBI has its first ‘living witness’ in Russian hacking investigation

Most of this is highly contentious, the conclusions are all highly fluid.

Apparently, Russia hired a Ukrainian hacker, witting or unwitting, to write a program enabling Russian intelligence services to hack into certain systems.  975 more words

Russia

In Ukraine, a Malware Expert Who Could Blow the Whistle on Russian Hacking

By ANDREW E. KRAMER and ANDREW HIGGINS AUG. 16, 2017

KIEV, Ukraine — The hacker, known only by his online alias “Profexer,” kept a low profile. 2,306 more words

Information Operations

The Morris Worm: Worms, Viruses, and Other Programmed Pests

Today, Eugene Spafford circulated an invitation to view a video he recently uploaded to the internet. Eugene Spafford is a legend in the cyber world. 427 more words

Information Operations

Op Whaledump - A Military Analysis - Part 4 - Information Warfare

5 September 2014

Cameron Slater, the owner of the Whale Oil blog site, has asked the courts to injunct the news media and the hacker (‘Rawshark’ aka ‘Whaledump’) over the release of his hacked communications. 631 more words

Analysis

Operation Whaledump - A Military Analysis - Part 1 - Strategic Intent

20 August 2014

Even a cursory analysis of the events and timeline described in Nicky Hager’s book “Dirty Politics” indicates that the cyber-attack on Cameron Slater was most likely part of a carefully planned and executed campaign rather than an opportunist assault.

691 more words
Analysis