Difference between revisions of "Cyberwarfare"
Jump to navigation
Jump to search
(Created page with "{{concept |WP=https://en.wikipedia.org/wiki/Cyberwarfare |image=Cyberwarfare.jpg |constitutes= |so_called=1 }} Bill Blunden opines that "the gilded hyperbole of Cyberwar b...") |
|||
Line 2: | Line 2: | ||
|WP=https://en.wikipedia.org/wiki/Cyberwarfare | |WP=https://en.wikipedia.org/wiki/Cyberwarfare | ||
|image=Cyberwarfare.jpg | |image=Cyberwarfare.jpg | ||
− | |constitutes= | + | |constitutes=plastic word |
|so_called=1 | |so_called=1 | ||
}} | }} |
Revision as of 06:24, 23 February 2019
Bill Blunden opines that "the gilded hyperbole of Cyberwar being peddled to the public is dangerous because it distracts us from focusing on actual threats and constructive solutions."[1]
Examples
Page name | Description |
---|---|
HBGary | Company that developed sophisticated software for the control of sock puppets. |
Russia/Cyberwarfare | |
Stuxnet | A production of the NSA and Unit 8200 installed with AIVD help, designed to sabotage Iranian efforts to develop nuclear weapons. |
Related Quotation
Page | Quote | Author |
---|---|---|
Matthijs Veenendaal | “Trust is a key foundation of a well-functioning society. Without reliable communication, organizations cannot operate effciently, be they corporations or government institutions. Malicious actors are aiming to exploit vulnerabilities in communication flows. With the advent
of new technology, it is possible for adversaries to impersonate leaders and create false impressions among population. The Tallinn based NATO Cooperative Cyber Defence Centre of Excellence will organize a session focusing on questions including: What is at stake? What can nations do to enhance and protect trust in democratic institutions? Or is it already too late?” | Matthijs Veenendaal |
Related Documents
Title | Type | Publication date | Author(s) | Description |
---|---|---|---|---|
Document:CyberGuardian Cyber Security Education Programme for Children and Young People | brainwashing concept paper | 30 January 2016 | Integrity Initiative | II puts lots of thought into how the military can train British children for cyberwarfare. |
Document:Executive Summary Cyber Security Education Programme for Children and Young People | brainwashing concept paper executive summary | 26 February 2016 | Integrity Initiative | II sums up its thought on how the military can train British children for cyberwarfare |
Document:The Terrorists Among US- Traitors and Terror 3 | article | 21 June 2019 | George Eliason Michael Jasinski | George Eliason interviews professor Michael Jasinski about the dire effects of outsourcing intelligence gathering and information dissemination. |
File:Manufactured consent and cyberwar.pdf | Conference Proceedings | June 2010 | Bill Blunden | |
File:US Psychological Warfare in Ukraine Targeting Online Independent Media Coverage.pdf | article | 20 March 2015 | George Eliason | Cyberwarfare operations are getting targeted at anyone. |
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.