Cyber Warfare

Carter has generally come down on the side of taking out ISIS’s computers and networks, which is the job of Cyber Command, and has been urging the national security community to “eliminate the threat,” one defense official said. The Pentagon, as well as the FBI, have also been leaning on social media companies such as […]

by

MUNICH — It’s hard to ignore. About 18,000 billboards, along with advertisements on the Internet, in newspapers and magazines, are promoting “cyber” positions in Germany’s Defense Ministry. “Defend Germany’s freedom in cyberspace,” the campaign’s slogan reads. “Do something that really matters.” The message is accompanied by the army’s logo and motto, “project digital forces.” The […]

by

There is a consensus that aggression by one nation against another is a serious matter, but there is no comparable consensus about what constitutes aggression. Waging aggressive war was one charge against Nazi leaders at the 1946 Nuremberg war crimes trials, but 70 years later it is unclear that aggression, properly understood, must involve war, […]

by

Robert Work GEOINT 2015(Photo: USGIF) In a multi-faceted offensive against the Islamic State terror group, the U.S. is striking in the cyber domain, according to the Pentagon’s second-in-command. “We are dropping cyber bombs. We have never done that before,” Deputy Defense Secretary Robert Work told reporters traveling with him on April 12, according to CNN. […]

by

Washington — There is a consensus that aggression by one nation against another is a serious matter, but there is no comparable consensus about what constitutes aggression. Waging aggressive war was one charge against Nazi leaders at the 1946 Nuremberg war crimes trials, but 70 years later it is unclear that aggression, properly understood, must […]

by

Passcode is proud to serve as the sole media partner for the Cyber Risk series of events with the Atlantic Council’s Cyber Statecraft Initiative. Please join us on Thursday, Apr. 14 from 4:00 to 5:30 p.m. for a panel discussion with a group of prominent cybersecurity experts. Russian aggression against Ukraine serves as a case study for […]

by

  Superpowers for ages have used various tools to exert their influence on the affairs of neighbors far and wide. East and West India companies were non-state actors used by imperial powers to seek trading rights to gain foothold in countries that were later converted into colonies. Trading was the soft power that created enabling […]

by

There is a consensus that aggression by one nation against another is a serious matter, but there is no comparable consensus about what constitutes aggression. Waging aggressive war was one charge against Nazi leaders at the 1946 Nuremberg war-crimes trials, but 70 years later it is unclear that aggression, properly understood, must involve war, as […]

by

Checkpoint Technologies shares have outpaced the Nasdaq Composite in the last year.(Photo: USATODAY.com) Check Point Software Technologies CEO Gil Shwed put a bullish spin on Wall Street’s 2016 revenue expectations for the maker of firewall software, suggesting annual growth in its segment of the security market remains at or near double digits. “We’re expecting to […]

by

There is a consensus that aggression by one nation against another is a serious matter, but there is no comparable consensus about what constitutes aggression. Waging aggressive war was one charge against Nazi leaders at the 1946 Nuremberg war crimes trials, but 70 years later it is unclear that aggression, properly understood, must involve war, […]

by