2521:, while extremely effective in delaying Iran's nuclear program for the development of nuclear weaponry, came at a high cost. For the first time, it became clear that not only could cyber weapons be defensive but they could be offensive. The large decentralization and scale of cyberspace makes it extremely difficult to direct from a policy perspective. Non-state actors can play as large a part in the cyberwar space as state actors, which leads to dangerous, sometimes disastrous, consequences. Small groups of highly skilled malware developers are able to as effectively impact global politics and cyber warfare as large governmental agencies. A major aspect of this ability lies in the willingness of these groups to share their exploits and developments on the web as a form of arms proliferation. This allows lesser hackers to become more proficient in creating the large scale attacks that once only a small handful were skillful enough to manage. In addition, thriving black markets for these kinds of cyber weapons are buying and selling these cyber capabilities to the highest bidder without regard for consequences.
3322:, South Korea's annual joint military exercise with the United States. North Korea's cyber warfare capabilities raise the alarm for South Korea, as North Korea is increasing its manpower through military academies specializing in hacking. Current figures state that South Korea only has 400 units of specialized personnel, while North Korea has more than 3,000 highly trained hackers; this portrays a huge gap in cyber warfare capabilities and sends a message to South Korea that it has to step up and strengthen its Cyber Warfare Command forces. Therefore, in order to be prepared from future attacks, South Korea and the United States will discuss further about deterrence plans at the Security Consultative Meeting (SCM). At SCM, they plan on developing strategies that focuses on accelerating the deployment of ballistic missiles as well as fostering its defense shield program, known as the Korean Air and Missile Defense.
51:
99:
3964:
3811:
2544:
2746:, advocates that states take cyber warfare seriously as they are viewed as an attractive activity by many nations, in times of war and peace. Offensive cyber operations offer a large variety of cheap and risk-free options to weaken other countries and strengthen their own positions. Considered from a long-term, geostrategic perspective, cyber offensive operations can cripple whole economies, change political views, agitate conflicts within or among states, reduce their military efficiency and equalize the capacities of high-tech nations to that of low-tech nations, and use access to their critical infrastructures to blackmail them.
2877:
or to cause widespread destruction, but to draw attention to their cause through well-publicized disruptions of select targets. Anonymous and other hacktivist groups are often portrayed in the media as cyber-terrorists, wreaking havoc by hacking websites, posting sensitive information about their victims, and threatening further attacks if their demands are not met. However, hacktivism is more than that. Actors are politically motivated to change the world, through the use of fundamentalism. Groups like
Anonymous, however, have divided opinion with their methods.
4607:, has developed a project called the International Convention on Prohibition of Cyberwar in Internet. According to this project, cyberwar is defined as the use of Internet and related technological means by one state against the political, economic, technological and information sovereignty and independence of another state. Professor Merezhko's project suggests that the Internet ought to remain free from warfare tactics and be treated as an international landmark. He states that the Internet (cyberspace) is a "common heritage of mankind".
4119:. The malware caused the SCADA system running the pipeline to malfunction. The "Farewell Dossier" provided information on this attack, and wrote that compromised computer chips would become a part of Soviet military equipment, flawed turbines would be placed in the gas pipeline, and defective plans would disrupt the output of chemical plants and a tractor factory. This caused the "most monumental nonnuclear explosion and fire ever seen from space." However, the Soviet Union did not blame the United States for the attack.
3913:
13751:
11712:
3928:
2382:
3862:(IDF) intelligence estimates several countries in the Middle East used Russian hackers and scientists to operate on their behalf. As a result, Israel attached growing importance to cyber-tactics, and became, along with the U.S., France and a couple of other nations, involved in cyber-war planning. Many international high-tech companies are now locating research and development operations in Israel, where local hires are often veterans of the IDF's elite computer units.
3416:. The largest part of the attacks were coming from Russia and from official servers of the authorities of Russia. In the attack, ministries, banks, and media were targeted. This attack on Estonia, a seemingly small Baltic state, was so effective because of how most of Estonian government services are run online. Estonia has implemented an e-government, where banking services, political elections, taxes, and other components of a modern society are now all done online.
13763:
3997:, as allegedly orchestrating Qatar's cyber warfare campaign against Broidy. Further litigation revealed that the same cybercriminals who targeted Broidy had targeted as many as 1,200 other individuals, some of whom are also "well-known enemies of Qatar" such as senior officials of the U.A.E., Egypt, Saudi Arabia, and Bahrain. While these hackers almost always obscured their location, some of their activity was traced to a telecommunication network in Qatar.
3318:
30,000 computers were affected; it is one of the biggest attacks South Korea has faced in years. Although it remains uncertain as to who was involved in this incident, there has been immediate assertions that North Korea is connected, as it threatened to attack South Korea's government institutions, major national banks and traditional newspapers numerous times β in reaction to the sanctions it received from nuclear testing and to the continuation of
11849:
2540:
root nameservers. DoS attacks often leverage internet-connected devices with vulnerable security measures to carry out these large-scale attacks. DoS attacks may not be limited to computer-based methods, as strategic physical attacks against infrastructure can be just as devastating. For example, cutting undersea communication cables may severely cripple some regions and countries with regards to their information warfare ability.
2974:
severe disruptions in the power generation and distribution, 4G communication systems, maritime surveillance, water purification plant and other critical infrastructure components". CCDCE describe the aim of the exercise was to "maintain the operation of various systems under intense pressure, the strategic part addresses the capability to understand the impact of decisions made at the strategic and policy level." Ultimately,
3391:, on both sensitive and not so sensitive matters. The event exposed poor protection of routine exchanges among European Union officials and a coordinated effort from a foreign entity to spy on another country. "After over a decade of experience countering Chinese cyberoperations and extensive technical analysis, there is no doubt this campaign is connected to the Chinese government", said Blake Darche, one of the
11700:
2287:
large-scale action, typically over a protracted period of time, and may include objectives seeking to utilize violence or the aim to kill. A cyber war could accurately describe a protracted period of back-and-forth cyber attacks (including in combination with traditional military action) between warring states. To date, no such action is known to have occurred. Instead, armed forces have responded with
2315:, EO 13694 of 2015 and EO 13757 of 2016, specifically focused on the implementation of the cyber sanctions. Subsequent US presidents have issued similar Executive Orders. The US Congress has also imposed cyber sanctions in response to cyberwarfare. For example, the Iran Cyber Sanctions Act of 2016 imposes sanctions on specific individuals responsible for cyber attacks.
3298:
3031:" of their military through "increased education of soldiers in cyber warfare; improving the information network for military training, and has built more virtual laboratories, digital libraries and digital campuses." Through this informatisation, they hope to prepare their forces to engage in a different kind of warfare, against technically capable adversaries.
2150:, have active cyber capabilities for offensive and defensive operations. As states explore the use of cyber operations and combine capabilities, the likelihood of physical confrontation and violence playing out as a result of, or part of, a cyber operation is increased. However, meeting the scale and protracted nature of war is unlikely, thus ambiguity remains.
2278:", which came to prominence in 2017, describing hostile actions that fall below the traditional threshold of war. But as Kello explained, technological unpeace differs from the grey zone as the term is commonly used in that unpeace by definition is never overtly violent or fatal, whereas some grey-zone actions are violent, even if they are not acts of war.
2679:
today. People can convey their messages quickly across to a huge audience, and this can open a window for evil. Terrorist organizations can exploit this and may use this medium to brainwash people. It has been suggested that restricted media coverage of terrorist attacks would in turn decrease the number of terrorist attacks that occur afterwards.
8148:
2307:. Sometimes, it is not easy to detect the attacker, but suspicions may focus on a particular country or group of countries. In these cases, unilateral and multilateral economic sanctions can be used instead of cyberwarfare. For example, the United States has frequently imposed economic sanctions related to cyber attacks. Two
4434:, the establishment of cyber security centers, auditing of critical infrastructure cybersecurity, obligations to disclose vulnerabilities, disarmament, defensive security strategies, decentralization, education and widely applying relevant tools and infrastructures, encryption and other cyberdefenses.
3749:(GCHQ), said the UK faces a "real and credible" threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 times each month, such attacks threatened the UK's economic future, and some countries were already using cyber assaults to put pressure on other nations.
3197:
was finalizing policies related to national cyber security that would focus on domestic security solutions, reducing exposure through foreign technology. Other steps include the isolation of various security agencies to ensure that a synchronised attack could not succeed on all fronts and the planned
2207:
The warfare grounded on certain uses of ICTs within an offensive or defensive military strategy endorsed by a state and aiming at the immediate disruption or control of the enemy's resources, and which is waged within the informational environment, with agents and targets ranging both on the physical
3975:
According to
Kubecka, in order to restore operations. Saudi Aramco used its large private fleet of aircraft and available funds to purchase much of the world's hard drives, driving the price up. New hard drives were required as quickly as possible so oil prices were not affected by speculation. By 1
3317:
stated that South Korea was going to improve cyber-defense strategies in hopes of preparing itself from possible cyber attacks. In March 2013, South Korea's major banks β Shinhan Bank, Woori Bank and NongHyup Bank β as well as many broadcasting stations β KBS, YTN and MBC β were hacked and more than
3251:
The
Chinese are being blamed after a cybersecurity company, F-Secure Labs, found a malware, NanHaiShu, which targeted the Philippines Department of Justice. It sent information in an infected machine to a server with a Chinese IP address. The malware which is considered particularly sophisticated in
2678:
Jowell and O'Donnell (2006) state that "propaganda is the deliberate, systematic attempt to shape perceptions, manipulate cognitions, and direct behavior to achieve a response that furthers the desired intent of the propagandist" (p. 7). The internet is the most important means of communication
2539:
attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even
2502:
components that are responsible for orders and communications could lead to their interception or malicious replacement. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to disruption. According to Clarke, the civilian realm is also at risk, noting that the
2348:
Cyber warfare can present a multitude of threats towards a nation. At the most basic level, cyber attacks can be used to support traditional warfare. For example, tampering with the operation of air defenses via cyber means in order to facilitate an air attack. Aside from these "hard" threats, cyber
2273:
In 2017, Oxford academic Lucas Kello proposed a new term, "Unpeace", to denote highly damaging cyber actions whose non-violent effects do not rise to the level of traditional war. Such actions are neither warlike nor peace-like. Although they are non-violent, and thus not acts of war, their damaging
3884:
in May 2018, cyber warfare units in the United States and Israel monitoring internet traffic out of Iran noted a surge in retaliatory cyber attacks from Iran. Security firms warned that
Iranian hackers were sending emails containing malware to diplomats who work in the foreign affairs offices of US
3834:
Iranian Cyber Police department, FATA, was dismissed one year after its creation in 2011 because of the arrest and death of Sattar
Behesti, a blogger, in the custody of FATA. Since then, the main responsible institution for the cyberwarfare in Iran is the "Cyber Defense Command" operating under the
3515:
laid out a cyber strategy in 2011. The first focus is to improve the cyber defense handled by the Joint IT branch (JIVC). To improve intel operations, the intel community in the
Netherlands (including the military intel organization, MIVD) has set up the Joint Sigint Cyber Unit (JSCU). The Ministry
2876:
to promote an agenda, and can potentially extend to attacks, theft and virtual sabotage that could be seen as cyberwarfare β or mistaken for it. Hacktivists use their knowledge and software tools to gain unauthorized access to computer systems they seek to manipulate or damage not for material gain
2576:
and to help industries enhance the security of control system networks. The federal government is also working to ensure that security is built in as the next generation of "smart grid" networks are developed. In April 2009, reports surfaced that China and Russia had infiltrated the U.S. electrical
2185:
Raymond
Charles Parks and David P. Duggan focused on analyzing cyberwarfare in terms of computer networks and pointed out that "Cyberwarfare is a combination of computer network attack and defense and special technical operations." According to this perspective, the notion of cyber warfare brings a
4235:
In 2016 President Barack Obama authorized the planting of cyber weapons in
Russian infrastructure in the final weeks of his presidency in response to Moscow's interference in the 2016 presidential election. On 29 December 2016 United States imposed the most extensive sanctions against Russia since
3988:
In March 2018 American
Republican fundraiser Elliott Broidy filed a lawsuit against Qatar, alleging that Qatar's government stole and leaked his emails in order to discredit him because he was viewed "as an impediment to their plan to improve the country's standing in Washington." In May 2018, the
3468:
announced that his agency had observed up to five attacks a day on government authorities, thought mainly to originate in China. He confirmed the attackers had so far only accessed data and expressed concern that the stolen information could be used as the basis of future sabotage attacks against
3309:
was hacked, resulting in the theft of the personal details (including names, phone numbers, home and email addresses and resident registration numbers) of up to 35 million people. A trojaned software update was used to gain access to the SK Communications network. Links exist between this hack and
3112:
in China, the shareholders of
Zhenhua Data Information Technology Co., Ltd. are two natural persons and one general partnership enterprise whose partners are natural persons. Wang Xuefeng, who is the chief executive and the shareholder of Zhenhua Data, has publicly boasted that he supports "hybrid
3044:
While China continues to be held responsible for a string of cyber-attacks on a number of public and private institutions in the United States, India, Russia, Canada, and France, the Chinese government denies any involvement in cyber-spying campaigns. The administration maintains the position that
2973:
exercise. The war game involved a fictional country, Berylia, which was "experiencing a deteriorating security situation, where a number of hostile events coincide with coordinated cyber attacks against a major civilian internet service provider and maritime surveillance system. The attacks caused
2885:
Cyber attacks, including ransomware, can be used to generate income. States can use these techniques to generate significant sources of income, which can evade sanctions and perhaps while simultaneously harming adversaries (depending on targets). This tactic was observed in August 2019 when it was
4568:(members of which include China and Russia) defines cyberwar to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other states". In September 2011, these countries proposed to the UN Secretary General a document called "International code of conduct for
4429:
runs a campaign for cyberpeace β for the control of cyberweapons and surveillance technology and against the militarization of cyberspace and the development and stockpiling of offensive exploits and malware. Measures for cyberpeace include policymakers developing new rules and norms for warfare,
4033:
with the Justice Department, the three defendants also agreed to pay nearly $ 1.7 million in fines to evade prison sentences. The court documents revealed that the Emirates hacked into the computers and mobile phones of dissidents, activists, and journalists. They also attempted to break into the
3971:
On 29 August 2012 the same attackers behind Shamoon posted another pastie on PasteBin.com, taunting Saudi Aramco with proof they still retained access to the company network. The post contained the username and password on security and network equipment and the new password for the CEO Khalid Al-
3830:
It was a 500-kilobyte computer worm that infected at least 14 industrial sites in Iran, including the Natanz uranium-enrichment plant. Although the official authors of Stuxnet haven't been officially identified, Stuxnet is believed to be developed and deployed by the United States and Israel. The
3679:
spyware and posted online on military forums. The attack was claimed by Crowd-Strike to be successful, with more than 80% of Ukrainian D-30 Howitzers destroyed, the highest percentage loss of any artillery pieces in the army (a percentage that had never been previously reported and would mean the
2988:
As well as war games which serve a broader purpose to explore options and improve skills, cyber war games are targeted at preparing for specific threats. In 2018 the Sunday Times reported the UK government was conducting cyber war games which could "blackout Moscow". These types of war games move
2286:
The term "cyberwarfare" is distinct from the term "cyber war". Cyberwarfare includes techniques, tactics and procedures that may be involved in a cyber war, but the term does not imply scale, protraction or violence, which are typically associated with the term "war", which inherently refers to a
2118:
There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists. One view is that the term is a misnomer since no cyber attacks to date could be described as a war. An alternative view is that it is a suitable label for cyber attacks which cause
5447:
4243:
Economic sanctions are the most frequently used the foreign policy instruments by the United States today Thus, it is not surprising to see that economic sanctions are also used as counter policies against cyberattacks. According to Onder (2021), economic sanctions are also information gathering
3935:
Kubecka also detailed in her Black Hat USA talk Saudi Aramco placed the majority of their security budget on the ICS control network, leaving the business network at risk for a major incident. The virus has been noted to have behavior differing from other malware attacks, due to the destructive
3201:
On 26 November 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic
4617:
president Brad Smith suggested global rules β a "Digital Geneva Convention" β for cyber attacks that "ban the nation-state hacking of all the civilian aspects of our economic and political infrastructures". He also stated that an independent organization could investigate and publicly disclose
3959:
Saudi Aramco announced the attack on their Facebook page and went offline again until a company statement was issued on 25 August 2012. The statement falsely reported normal business was resumed on 25 August 2012. However a Middle Eastern journalist leaked photographs taken on 1 September 2012
2777:
Alexander sketched out the broad battlefield envisioned for the computer warfare command, listing the kind of targets that his new headquarters could be ordered to attack, including "traditional battlefield prizes β command-and-control systems at military headquarters, air defense networks and
9581:
4197:
On 21 November 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois. However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois
2169:
There is ongoing debate over how cyberwarfare should be defined and no absolute definition is widely agreed upon. While the majority of scholars, militaries, and governments use definitions that refer to state and state-sponsored actors, other definitions may include non-state actors, such as
4499:
In 2015, the Department of Defense released an updated cyber strategy memorandum detailing the present and future tactics deployed in the service of defense against cyberwarfare. In this memorandum, three cybermissions are laid out. The first cybermission seeks to arm and maintain existing
3924:, a former security advisor to Saudi Aramco after the attack and group leader of security for Aramco Overseas. It was an unnamed Saudi Aramco employee on the Information Technology team which opened a malicious phishing email, allowing initial entry into the computer network around mid-2012.
4445:
Cyber counter-intelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions.
4170:
In August 2010, the U.S. for the first time warned publicly about the Chinese military's use of civilian computer experts in clandestine cyber attacks aimed at American companies and government agencies. The Pentagon also pointed to an alleged China-based computer spying network dubbed
4457:
On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House cyber security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first
3236:), a compiled AutoIt script, and UAC bypass code dubbed UACME. Targets are believed to be mainly military and political assignments around Southeast Asia and the South China Sea and the attackers are believed to be of Indian origin and gathering intelligence from influential parties.
3695:", or "Ouroboros," to conduct a cyber attack on Ukraine during a period of political turmoil. The Snake tool kit began spreading into Ukrainian computer systems in 2010. It performed Computer Network Exploitation (CNE), as well as highly sophisticated Computer Network Attacks (CNA).
3442:) to identify and secure its main elements susceptible to cyber threats. In 2016 France had planned 2600 "cyber-soldiers" and a 440 million euros investment for cybersecurity products for this new army corps. An additional 4400 reservists constitute the heart of this army from 2019.
2219:, defined cyberwarfare as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption". The target's own cyber-physical infrastructure may be used by the adversary in case of a cyber conflict, thus weaponizing it.
3096:
that collected personal details of roughly 500 million guests is now known to be a part of a Chinese intelligence-gathering effort that also hacked health insurers and the security clearance files of millions more Americans, The hackers, are suspected of working on behalf of the
2965:, have conducted a yearly war game called Locked Shields since 2010 designed to test readiness and improve skills, strategy tactics and operational decision making of participating national organizations. Locked Shields 2019 saw 1200 participants from 30 countries compete in a
9601:
4364:
said many of its senior staff and managers were also hit by the ongoing attack, which it first suspected in early 2023. The oldest traces of infiltration date back to 2019. Kaspersky Lab said it had not shared the findings with Russian authorities until the FSB announcement.
2411:
Traditional espionage is not an act of war, nor is cyber-espionage, and both are generally assumed to be ongoing between major powers. Despite this assumption, some incidents can cause serious tensions between nations, and are often described as "attacks". For example:
9760:
3434:, ordered the creation of a cyber army, representing its fourth national army corps (along with ground, naval and air forces) under the French Ministry of Defense, to protect French and European interests on its soil and abroad. A contract was made with French firm
4138:(European Union Agency for Network and Information Security) which is headed by Prof. Udo Helmbrecht and there are now further plans to significantly expand ENISA's capabilities. The United Kingdom has also set up a cyber-security and "operations centre" based in
2804:
Examples of cyberwarfare driven by political motivations can be found worldwide. In 2008, Russia began a cyber attack on the Georgian government website, which was carried out along with Georgian military operations in South Ossetia. In 2008, Chinese "nationalist
3752:
On 12 November 2013, financial organizations in London conducted cyber war games dubbed "Waking Shark 2" to simulate massive internet-based attacks against bank and other financial organizations. The Waking Shark 2 cyber war games followed a similar exercise in
4488:, Estonia, in order to enhance the organization's cyber defence capability. The center was formally established on 14 May 2008, and it received full accreditation by NATO and attained the status of International Military Organization on 28 October 2008. Since
2852:, to the varying types of data communication mediums and network equipment. This would include: web servers, enterprise information systems, client server systems, communication links, network equipment, and the desktops and laptops in businesses and homes.
5455:
3189:
began in October 2012, and intends to boost up India's cyber security capabilities in the light of a group of experts findings that India faces a 470,000 shortfall of such experts despite the country's reputation of being an IT and software powerhouse.
8174:
4028:
In September 2021, three of the former American intelligence officers, Marc Baier, Ryan Adams, and Daniel Gericke, admitted to assisting the UAE in hacking crimes by providing them with advanced technology and violating US laws. Under a three-year
2773:
is the newest global combatant and its sole mission is cyberspace, outside the traditional battlefields of land, sea, air and space." It will attempt to find and, when necessary, neutralize cyberattacks and to defend military computer networks.
2920:
and as such is presumed to widely occur. It is typical that this type of crime is underreported to the extent they are known. According to McAfee's George Kurtz, corporations around the world face millions of cyberattacks a day. "Most of these
4221:(TAO) unit "has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People's Republic of China."
4167:", would grant the president emergency powers over parts of the Internet. However, all three co-authors of the bill issued a statement that instead, the bill " existing broad presidential authority to take over telecommunications networks".
3481:
announced that the BND would be given an additional budget of 100 million Euros to increase their cyber surveillance capability from 5% of total internet traffic in Germany to 20% of total traffic, the maximum amount allowed by German law.
3022:
According to Fritz, China has expanded its cyber capabilities and military technology by acquiring foreign military technology. Fritz states that the Chinese government uses "new space-based surveillance and intelligence gathering systems,
2949:
A number of countries conduct exercise to increase preparedness and explore the strategy, tactics and operations involved in conducting and defending against cyber attacks against hostile states, this is typically done in the form of
9598:
3395:
experts β the company revealing the stolen documents. The Chinese Embassy in the US did not return calls for comment. In 2019, another coordinated effort took place that allowed hackers to gain access to government (gov.cy) emails.
4526:, "Cyber War Will Not Take Place" which argued that all politically motivated cyber attacks are merely sophisticated versions of sabotage, espionage, or subversion β and that it is unlikely that cyber war will occur in the future.
4595:
providing "a direct secure voice communications line between the US cybersecurity coordinator and the Russian deputy secretary of the security council, should there be a need to directly manage a crisis situation arising from an
4142:(GCHQ), the British equivalent of the NSA. In the U.S. however, Cyber Command is only set up to protect the military, whereas the government and corporate infrastructures are primarily the responsibility respectively of the
2630:
have gotten into administrative computer systems of utility companies, but says those aren't linked to the equipment controlling the grid, at least not in developed countries. has never heard that the grid itself has been
2198:
Cyber war is an extension of policy by actions taken in cyber space by state or nonstate actors that constitute a serious threat to a nation's security or are conducted in response to a perceived threat against a nation's
4500:
capabilities in the area of cyberspace, the second cybermission focuses on prevention of cyberwarfare, and the third cybermission includes strategies for retaliation and preemption (as distinguished from prevention).
5772:
2510:
that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes
8182:
4622:
and not aid governments in offensive activity and to adopt a coordinated disclosure process for software and hardware vulnerabilities. A fact-binding body has also been proposed to regulate cyber operations.
4618:
evidence that attributes nation-state attacks to specific countries. Furthermore, he said that the technology sector should collectively and neutrally work together to protect Internet users and pledge to
9492:
4426:
2800:
The distributed nature of internet based attacks means that it is difficult to determine motivation and attacking party, meaning that it is unclear when a specific act should be considered an act of war.
8446:
3252:
nature was introduced by phishing emails that were designed to look like they were coming from an authentic sources. The information sent is believed to be relating to the South China Sea legal case.
6098:
3151:(CERT-In) in 2004 to thwart cyber attacks in India. That year, there were 23 reported cyber security breaches. In 2011, there were 13,301. That year, the government created a new subdivision, the
3944:. Once a system is infected, the virus continues to compile a list of files from specific locations on the system, upload them to the attacker, and erase them. Finally the virus overwrites the
3628:
that the United States will respond. The New York Times noted that Biden's comment "seems to suggest that Mr. Obama is prepared to order β or has already ordered β some kind of covert action".
8344:
2212:
Robinson et al. proposed in 2015 that the intent of the attacker dictates whether an attack is warfare or not, defining cyber warfare as "the use of cyber attacks with a warfare-like intent."
4437:
The topics of cyber peacekeeping and cyber peacemaking have also been studied by researchers, as a way to restore and strengthen peace in the aftermath of both cyber and traditional warfare.
8917:
3220:
In July 2016, Cymmetria researchers discovered and revealed the cyber attack dubbed 'Patchwork', which compromised an estimated 2500 corporate and government agencies using code stolen from
2675:
stated that this kind of attack from actors such as Russia "is a form of system warfare that seeks to de-legitimize the political and social system on which our military strength is based".
6451:
2239:" is a more accurate term than "cyberwar." He states that "with today's attacks, you are clueless about who did it or when they will strike again. It's not cyber-war, but cyberterrorism."
10725:
10215:
3614:
emails. Under U.S. law (50 U.S.C.Title 50 β War and National Defense, Chapter 15 β National Security, Subchapter III Accountability for Intelligence Activities) there must be a formal
7116:
2985:
conducts cyber war game scenarios with member states and foreign partner states to improve readiness, skills and observe how strategic and tactical decisions may affect the scenario.
2754:
With the emergence of cyber as a substantial threat to national and global security, cyber war, warfare and/or attacks also became a domain of interest and purpose for the military.
2291:
military cyber actions. For example, in June 2019, the United States launched a cyber attack against Iranian weapons systems in retaliation to the shooting down of a US drone in the
10399:
3501:
2258:", as militaristic responses may not be appropriate. However, to date, even serious cyber-attacks that have disrupted large parts of a nation's electrical grid (230,000 customers,
8070:
6297:
8508:
2181:'Cyberwarfare' is used in a broad context to denote interstate use of technological force within computer networks in which information is stored, shared, or communicated online.
10444:
3041:
highlight US concerns that China is using access to Microsoft source code and 'harvesting the talents of its private sector' to boost its offensive and defensive capabilities.
11417:
7197:
6160:
6019:
3194:
3152:
2581:(NERC) has issued a public notice that warns that the electrical grid is not adequately protected from cyber attack. China denies intruding into the U.S. electrical grid. One
4122:
In 2009, president Barack Obama declared America's digital infrastructure to be a "strategic national asset," and in May 2010 the Pentagon set up its new U.S. Cyber Command (
10201:
A Bill. To amend the Homeland Security Act of 2002 and other laws to enhance the security and resiliency of the cyber and communications infrastructure of the United States.
7469:
2769:
that computer network warfare is evolving so rapidly that there is a "mismatch between our technical capabilities to conduct operations and the governing laws and policies.
5880:
4084:(May 2010), had defined "cyberwarfare" as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption."
6816:
4194:, resisting all attempts to reverse the exploit, for the past two weeks. The Air Force issued a statement that the virus had "posed no threat to our operational mission".
3139:
In May 2024 The UK announced that it had taken a database offline that is used by its defense ministry after coming under a cyber attack attributed to the Chinese state.
7444:
5765:
2503:
security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.
9405:
9028:
3089:
in August 2011. China is widely believed to be the state actor behind these attacks which hit at least 72 organizations including governments and defense contractors.
10248:
9507:
3198:
appointment of a National Cyber Security Coordinator. As of that month, there had been no significant economic or physical damage to India related to cyber attacks.
2836:
Jobs in cyberwarfare have become increasingly popular in the military. All four branches of the United States military actively recruit for cyber warfare positions.
9999:
9244:
7941:
6189:
7173:
4454:
announced they spent more than $ 100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems.
2416:
8123:
4425:
The rise of cyber as a warfighting domain has led to efforts to determine how cyberspace can be used to foster peace. For example, the German civil rights panel
8587:
6971:
4022:
3688:
this number is incorrect and that losses in artillery weapons "were way below those reported" and that these losses "have nothing to do with the stated cause".
3162:(NPCIL) stated in February 2013 that his company alone was forced to block up to ten targeted attacks a day. CERT-In was left to protect less critical sectors.
8899:
8836:
7986:
3274:
and the United States. While many thought the attack was directed by North Korea, one researcher traced the attacks to the United Kingdom. Security researcher
3003:
Approximately 120 countries have been developing ways to use the Internet as a weapon and target financial markets, government computer systems and utilities.
7800:
7770:
2498:
that coordinate other activities are vulnerable components of a system and could lead to the disruption of equipment. Compromise of military systems, such as
13203:
12542:
12499:
9388:
11344:
11219:
6112:
2695:
cyber attacks, masquerading as ransomware, caused large-scale disruptions in Ukraine as well as to the U.K.'s National Health Service, pharmaceutical giant
2247:, said that "there is no cyberwar... I think that is a terrible metaphor and I think that is a terrible concept. There are no winners in that environment."
12468:
11547:
4604:
3873:. U.S. industry and military sources speculated that the Israelis may have used cyberwarfare to allow their planes to pass undetected by radar into Syria.
3290:
infections, malware used in part of the attack. Some of the companies used in the attack were partially owned by several governments, further complicating
12333:
9218:
8921:
4558:
4338:
4021:. He was given the code name Egret under the state-led covert project called Raven, which spied on top political opponents, dissidents, and journalists.
9623:
5744:
5580:
10200:
9891:
8229:
7746:
4104:
has formally recognized cyberspace as a new domain in warfare . . . has become just as critical to military operations as land, sea, air, and space."
4054:
3722:
3607:
3525:
3491:
3451:
3425:
9695:
2989:
beyond defensive preparedness, as previously described above and onto preparing offensive capabilities which can be used as deterrence, or for "war".
13824:
10047:
8354:
4761:, a British thriller series, revolves around a sustained campaign of cyberwar against the United Kingdom and the British government's response to it.
3104:
On 14 September 2020, a database showing personal details of about 2.4 million people around the world was leaked and published. A Chinese company,
3045:
China is also victim to an increasing number of cyber-attacks. Most reports about China's cyber warfare capabilities have yet to be confirmed by the
10748:
10212:
13596:
9963:
6476:
3400:
revealed that "Sea Turtle" hackers carried out a broad piracy campaign in the DNS countries, hitting 40 different organizations, including Cyprus.
3314:
2732:
9203:
7901:
7718:
2577:
grid and left behind software programs that could be used to disrupt the system, according to current and former national security officials. The
8702:
8096:
4163:
3061:
3046:
2578:
10872:. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol. 157. pp. 126β139.
9127:
7113:
13494:
11743:
6563:
6281:
5264:
5107:
5003:
4481:
3580:
3560:
2958:
2941:
which engage in cyberwarfare so as to better understand the field through actions like the researching and publishing of new security threats.
6918:
Palmer, Robert Kenneth. "Critical Infrastructure: Legislative Factors for Preventing a Cyber-Pearl Harbor." Va. JL & Tech. 18 (2013): 289.
6735:
12413:
4696:
3706:
that left more than 200,000 people temporarily without power. A mining company and a large railway operator were also victims of the attack.
3703:
3174:
2569:
2441:
The NSA recording nearly every cell phone conversation in the Bahamas, without the Bahamian government's permission, and similar programs in
59:
10308:
8405:
13923:
11112:
10357:
9163:
6842:
3595:
3053:
2259:
9945:
9371:
8391:
12547:
11236:
10670:
6518:
5906:
4579:. This difference of opinion has led to reluctance in the West to pursue global cyber arms control agreements. However, American General
3287:
10972:
10960:
9149:
8505:
6294:
2925:
don't gain any media attention or lead to strong political statements by victims." This type of crime is usually financially motivated.
2274:
effects on the economy and society may be greater than those of some armed attacks. This term is closely related to the concept of the "
12650:
8862:
7495:
3109:
2468:
4496:
says it will permanently base a computer crime expert in Estonia in 2009 to help fight international threats against computer systems.
3165:
A high-profile cyber attack on 12 July 2012 breached the email accounts of about 12,000 people, including those of officials from the
13928:
12287:
9265:
7625:
6135:
4597:
2933:
But not all those who engage in cyberwarfare do so for financial or ideological reasons. There are institutes and companies like the
11280:
7194:
6985:
6016:
3108:
compiled the database. According to the information from "National Enterprise Credit Information Publicity System", which is run by
13653:
13591:
10458:
9128:"Joint Statement from the Department of Homeland Security and Office of the Director of National Intelligence on Election Security"
9035:. Strategists must be aware that part of every political and military conflict will take place on the internet, says Kenneth Geers.
5695:
5612:
4782:
4067:
and the use of cyberwarfare as a platform for attack. The new United States military strategy makes explicit that a cyberattack is
1022:
11202:
7238:
50:
12326:
8937:
6000:
4466:
3990:
3866:
adds that "our Israeli friends have learned a thing or two from the programs we have been working on for more than two decades."
3148:
2561:
1454:
9189:
6820:
5317:
13953:
10935:
7005:
6636:
4139:
3831:
worm is said to be the most advanced piece of malware ever discovered and significantly increases the profile of cyberwarfare.
3746:
3397:
3209:
On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the
10373:
8613:
7153:
7134:
2659:
Cyber propaganda is an effort to control information in whatever form it takes, and influence public opinion. It is a form of
13893:
13817:
12732:
12264:
11644:
11557:
11493:
11462:
10885:
10502:
8881:
8635:
7875:
6941:
6339:
3836:
3661:
9733:
9025:
7574:
3456:
In 2013, Germany revealed the existence of their 60-person Computer Network Operation unit. The German intelligence agency,
3375:
The New York Times published an exposΓ© revealing an extensive three-year phishing campaign aimed against diplomats based in
3128:. Several government websites were targeted including the National coast watch and personal website of the president of the
2886:
revealed North Korea had generated $ 2 billion to fund its weapons program, avoiding the blanket of sanctions levied by the
13913:
12670:
10252:
9419:
6313:
5691:
3963:
3166:
10419:
9504:
9130:. Department of Homeland Security and Office of the Director of National Intelligence on Election Security. 7 October 2016
9045:
6551:
13225:
12665:
12564:
12295:
11060:
10290:
10125:
9241:
6420:
5881:"Executive Order β "Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities""
3905:. The attackers posted a pastie on PasteBin.com hours prior to the wiper logic bomb occurring, citing oppression and the
2790:
2275:
1810:
98:
11000:
10984:
8375:
7170:
6503:
4153:(I-CT) introduced a bill called "Protecting Cyberspace as a National Asset Act of 2010", which he co-wrote with Senator
3243:, which is the Indian Military agency responsible for Cyberwarfare, is expected to become operational by November 2019.
13625:
12319:
11736:
11590:
11537:
11476:
11433:
8673:
7599:
7221:
6176:
5718:
4842:
4652:
4097:
3506:
3388:
3159:
3098:
2005:
1783:
393:
9981:
8960:
6961:
6894:
4575:
In contrast, the United approach focuses on physical and economic damage and injury, putting political concerns under
13857:
12645:
12227:
11512:
11448:
11411:
11323:
10912:
10824:
10790:
10185:
9304:
9097:
9083:
8423:
7271:
6215:
5800:
5728:
5656:
5434:
5395:
5240:
5091:
4979:
4637:
4565:
4337:
The United States topped the world in terms of cyberwarfare intent and capability, according to Harvard University's
4048:
3603:
3564:
3512:
3182:
2250:
Some experts take issue with the possible consequences linked to the warfare goal. In 2011, Ron Deibert, of Canada's
1459:
8991:
8230:
https://www.reuters.com/world/uk/uk-has-taken-military-database-offline-after-hack-reports-says-minister-2024-05-07/
7693:
4407:
for hire. State actors can use the cyber mercenaries as a front to try and distance themselves from the attack with
3976:
September 2012 gasoline resources were dwindling for the public of Saudi Arabia 17 days after the 15 August attack.
13918:
13810:
13210:
12906:
12023:
10697:
8840:
8655:
8246:
7849:
7808:
7778:
7659:
4902:
4229:
3710:
3170:
1537:
11032:
7319:
7035:
7009:
5172:
5017:
3941:
3155:(NCIIPC) to thwart attacks against energy, transport, banking, telecom, defense, space and other sensitive areas.
3027:, anti-radar, infrared decoys, and false target generators" to assist in this quest, and that they support their "
13257:
12754:
12727:
12358:
12277:
11373:
11348:
10675:
4897:
4493:
4143:
3359:
3210:
2766:
1882:
1520:
1307:
147:
10726:
Vault 7: Wikileaks reveals details of CIA's hacks of Android, iPhone Windows, Linux, MacOS, and even Samsung TVs
10386:
6817:"NotPetya: virus behind global attack 'masquerades' as ransomware but could be more dangerous, researchers warn"
2543:
13898:
12615:
11425:
11049:
6168:
4728:
4546:
4255:
and dated from 2013 to 2016, include details on CIA's software capabilities, such as the ability to compromise
4030:
4025:
deployed a secret hacking tool called Karma, to spy without requiring the target to engage with any web links.
1646:
11234:Π£ΠΊΡΠ°ΡΠ½ΡΡΠΊΠΈΠΉ ΡΠ΅Π½ΡΡ ΠΏΠΎΠ»ΡΡΠΈΡΠ½ΠΎΠ³ΠΎ ΠΌΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½ΡΡ β ΠΠΌΡΡΡ ΠΏΡΠ±Π»ΡΠΊΠ°ΡΡΡ β ΠΠΎΠ½Π²Π΅Π½ΡΠΈΡ ΠΎ Π·Π°ΠΏΡΠ΅ΡΠ΅Π½ΠΈΠΈ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ ΠΊΠΈΠ±Π΅ΡΠ²ΠΎΠΉΠ½Ρ
10476:
9525:
9228:
2593:
caused by a cyber attack could disrupt the economy, distract from a simultaneous military attack, or create a
13948:
13005:
12911:
12363:
12090:
11729:
11704:
10614:
9320:
8471:
7926:
4208:
In August 2012, USA Today reported that the US conducted cyberattacks for tactical advantage in Afghanistan.
3897:
virus began destroying over 35,000 computer systems, rendering them inoperable. The virus used to target the
3611:
2970:
2063:
1510:
17:
10339:
8806:
8204:
7743:
5845:
5283:
2723:" to draw attention to the nontraditional, asymmetric, or irregular aspect of cyber action against a state.
2157:
used in response to a cyber-attack resulting in the loss of human life was observed on 5 May 2019, when the
13933:
13658:
13055:
12955:
11573:
10056:
9279:
Defense ministry denies reports of alleged artillery losses because of Russian hackers' break into software
5197:
4847:
4644:
4518:
4477:
4331:
3556:
3461:
3409:
3261:
3093:
3038:
2998:
2911:
2640:
2385:
2255:
2215:
In 2010, the former US National Coordinator for Security, Infrastructure Protection and Counter-terrorism,
2000:
699:
459:
11015:
10236:
ANNUAL REPORT TO CONGRESS Military and Security Developments Involving the People's Republic of China 2010
9012:
7418:
3960:
showing kilometers of petrol trucks unable to be loaded due to backed business systems still inoperable.
3810:
3610:. The New York Times reported the Obama administration formally accused Russia of stealing and disclosing
13789:
13538:
12737:
12687:
12282:
12203:
12003:
10642:
6070:
4882:
4327:
4248:
4123:
4116:
3672:
3214:
2762:
2719:" has been debated by scholars, drawing an analogy to the historical act of war. Others have used "cyber
2648:
2565:
2010:
1197:
994:
865:
403:
11685:
RΓΌdiger Wolfrum (Ed.) Max Planck Encyclopedia of Public International Law (Oxford University Press 2012)
11392:
10763:"Cyber Mercenaries: The Failures of Current Responses and the Imperative of International Collaboration"
10021:
8037:
7960:
7003:
6868:
3803:
has been both victim and perpetrator of several cyberwarfare operations. Iran is considered an emerging
13938:
13198:
13050:
13025:
12435:
12259:
12217:
11873:
11485:
Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland
9715:
8918:"Germany's 60-person Computer Network Operation (CNO) unit has been practicing for cyber war for years"
7359:
5268:
4827:
4300:
4218:
3665:
3335:
3178:
2806:
2688:
2627:
2334:
2312:
2267:
2244:
1474:
11715:
8699:
7548:
13668:
13601:
13444:
13176:
13171:
13045:
12875:
12717:
12504:
12120:
11838:
9782:
9663:
9437:
9075:
6657:
4892:
4757:
4583:
did endorse talks with Russia over a proposal to limit military attacks in cyberspace. In June 2013,
4205:
reported that president Obama had ordered the cyber attack on Iranian nuclear enrichment facilities.
3972:
Falih The attackers also referenced a portion of the Shamoon malware as further proof in the pastie.
3469:
arms manufacturers, telecommunications companies and government and military agencies. Shortly after
3413:
2857:
2849:
2826:
2582:
2573:
1584:
1092:
436:
310:
164:
31:
7850:"US embassy cables: China uses access to Microsoft source code to help plot cyber warfare, US fears"
7056:
5957:
13888:
13774:
13663:
13558:
13484:
13311:
12940:
12640:
12342:
12105:
11983:
11878:
11304:"Regulating the Use and Conduct of Cyber Operations: Challenges and a Fact-Finding Body Proposal",
11253:
10273:
9804:
Harper, Michael (31 August 2012). "RedOrbit: Energy Company RasGas Is Infected with Shamoon Virus".
6739:
4914:
4857:
4772:
4541:, published in 2013, is an academic, non-binding study on how international law, in particular the
4353:
4345:
4134:(NSA), to defend American military networks and attack other countries' systems. The EU has set up
4131:
4112:
3885:
allies and employees at telecommunications companies, trying to infiltrate their computer systems.
3640:
were subjected to a cyber-attack that caused them to shutdown a so-called Caxcis IT system used in
3474:
3203:
2934:
2536:
2530:
2431:
2396:
2035:
1902:
1449:
1142:
955:
803:
11601:
11180:
8686:
6241:
3869:
In September 2007, Israel carried out an airstrike on a suspected nuclear reactor in Syria dubbed
13769:
13338:
13193:
12489:
12193:
12145:
11808:
10847:
Robinson, Michael; Janicke, Helge; Jones, Kevin (2017). "An Introduction to Cyber Peacekeeping".
10316:
8539:
5790:
4887:
4867:
4420:
4382:
4183:
4111:
in 1982, a portion of a Trans-Siberia pipeline within its territory exploded, allegedly due to a
4064:
3827:
3783:
3457:
3267:
2703:
shipping company and other organizations around the world. These attacks are also categorized as
2263:
2154:
1988:
1970:
1726:
1285:
1207:
1152:
1032:
745:
408:
11120:
8761:
7902:"U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say"
7405:
4228:'s missile program for sabotaging test launches in their opening seconds. On 24 November 2014,
3713:. Several websites belonging to Ukrainian banks and government departments became inaccessible.
2860:
are also deemed vulnerable, especially due to current trends in computerization and automation.
13852:
13784:
13618:
13565:
13459:
13282:
13127:
12485:
5613:"Latest viruses could mean 'end of the world as we know it,' says the man who discovered Flame"
4744:
4470:
3681:
3584:
3536:
3310:
other malicious activity and it is believed to be part of a broader, concerted hacking effort.
3037:
magazine put the size of China's "hacker army" at anywhere from 50,000 to 100,000 individuals.
2938:
2716:
2373:, claiming that in an interconnected world, they have the potential to be equally destructive.
1855:
1830:
1552:
1464:
1337:
1212:
808:
785:
231:
130:
11305:
11233:
10902:
10814:
10780:
10090:
7305:
5631:
13883:
13842:
13188:
13000:
12462:
12423:
12234:
11968:
11048:
Lisa Lucile Owens, Justice and Warfare in Cyberspace, The Boston Review (2015), available at
9555:
8124:"Zhenhua Data leak: personal details of millions around world gathered by China tech company"
7043:
6515:
4682:
4660:
4408:
3859:
3017:
2660:
2548:
2389:
2330:
2158:
2108:
1444:
1377:
1330:
979:
942:
905:
823:
775:
659:
469:
277:
186:
10055:
8492:
8447:"Agencies take shape for special operations, space, cyber war | India News β Times of India"
8298:
4469:
cyber security initiatives are appropriately integrated, resourced and coordinated with the
3846:
is active since at least 2017 and is responsible for many cyber attacks on various sectors.
13847:
13553:
13350:
13252:
13117:
13079:
12829:
12633:
12527:
12254:
12166:
12115:
12060:
11928:
11901:
11883:
11781:
11752:
11143:"Tallinn manual 2.0 on the international law applicable to cyber operations | WorldCat.org"
10730:
10143:
10109:
8640:
7830:
7097:
6368:
4949:
4872:
4852:
4569:
4508:. Unlike conventional warfare, figuring out who is behind an attack can be very difficult.
4465:
announced that it will conduct a review of the country's cyber security to ensure that the
4431:
4006:
3795:
3771:
3478:
3240:
2917:
1835:
1737:
1594:
1589:
1407:
1372:
1107:
922:
780:
716:
570:
540:
137:
11848:
11523:
Implications of Privacy & Security Research for the Upcoming Battlefield of Things
9734:"Elisabeth Bumiller and Thom Shanker: Panetta Warns of Dire Threat of Cyberattack on U.S."
9542:
6099:"Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas"
5146:
5121:
5084:
Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare
4161:(D-DE). If signed into law, this controversial bill, which the American media dubbed the "
3362:, Ethiopian government websites have been hacked by the Egypt-based hackers in June 2020.
8:
13903:
13694:
13474:
13345:
13267:
12865:
12811:
12759:
12722:
12712:
12418:
12038:
11813:
11771:
11522:
8636:"An Egyptian cyber attack on Ethiopia by hackers is the latest strike over the Grand Dam"
6136:"The Intercept Wouldn't Reveal a Country the U.S. Is Spying On, So WikiLeaks Did Instead"
4802:
4187:
3940:
called the attack a "Cyber Pearl Harbor". Shamoon can spread from an infected machine to
3233:
3078:
2907:
2786:
2671:
and other digital means. In 2018, Sir Nicholas Carter, Chief of the General Staff of the
2586:
2392:
2191:
1686:
1671:
1547:
1434:
1412:
1387:
1347:
1257:
1067:
967:
917:
684:
674:
639:
431:
421:
191:
115:
42:
10078:
8793:
8038:"Marriott Data Breach Is Traced to Chinese Hackers as U.S. Readies Crackdown on Beijing"
7470:"Advanced threat actors engaged in cyberespionage in APAC up their game in new campaign"
6929:
6372:
5581:"Implications of Privacy & Security Research for the Upcoming Battlefield of Things"
3916:
Pastie announcing attack against Saudi Aramco by a group called Cutting Sword of Justice
2789:
on the cabinet level by former administration officials, raised issues ranging from the
2303:
In addition to retaliatory digital attacks, countries can respond to cyber attacks with
13908:
13397:
13392:
13370:
13355:
13247:
13035:
13015:
12965:
12928:
12918:
12769:
12606:
12222:
12150:
12055:
11671:
11621:
11254:"'Digital Geneva Convention' needed to deter nation-state hacking: Microsoft president"
11094:
10848:
10762:
10619:
10595:
10591:
10235:
8349:
8326:
8247:"Beware of the bugs: Can cyber attacks on India's critical infrastructure be thwarted?"
8036:
Sanger, David E.; Perlroth, Nicole; Thrush, Glenn; Rappeport, Alan (11 December 2018).
7805:
Culture Mandala: The Bulletin of the Centre for East-West Cultural and Economic Studies
7775:
Culture Mandala: The Bulletin of the Centre for East-West Cultural and Economic Studies
6798:
6790:
6716:
6617:
6397:
6356:
6275:
5850:
5673:
5545:
5498:
5258:
5101:
5064:
4997:
4668:
4580:
4430:
individuals and organizations building new tools and secure infrastructures, promoting
4390:
4244:
mechanisms for the sanctioning states about the capabilities of the sanctioned states.
4127:
3945:
3777:
3641:
3637:
3431:
3331:
2922:
2758:
2601:
2370:
2190:
and colleagues put forward the following definition of "cyber war" in 2013, drawing on
2020:
1875:
1795:
1716:
1661:
1636:
1557:
1503:
1469:
1400:
1317:
1227:
1132:
1077:
962:
927:
880:
755:
726:
679:
617:
592:
426:
240:
159:
55:
38:
8934:
8744:
8561:
6575:
3730:
reportedly infiltrated an Al Qaeda website and replaced the instructions for making a
13943:
13630:
13531:
13326:
13134:
13099:
13060:
13010:
12901:
12885:
12628:
12591:
12569:
12554:
12537:
12455:
12270:
12028:
11963:
11913:
11860:
11818:
11766:
11675:
11640:
11586:
11569:
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
11553:
11533:
11508:
11489:
11472:
11458:
11444:
11429:
11421:
11407:
11319:
11098:
10908:
10881:
10820:
10786:
10599:
10181:
10151:
9300:
9278:
9079:
8780:
8330:
8318:
8175:"Zhenhua Data: 35,000 Aussies being spied on by China as part of 'psychological war'"
8045:
7667:
7633:
7301:
6937:
6802:
6782:
6708:
6609:
6470:
6402:
6384:
6335:
6172:
6164:
6044:
6036:
5855:
5796:
5724:
5677:
5537:
5430:
5401:
5391:
5346:
5291:
5246:
5236:
5087:
5056:
4985:
4975:
4919:
4777:
4619:
4576:
4505:
4308:
4077:
4060:
3881:
3870:
3863:
3791:
3676:
3572:
3465:
3306:
3291:
3186:
3105:
2951:
2845:
2737:
2668:
2349:
warfare can also contribute towards "soft" threats such as espionage and propaganda.
2216:
2056:
1965:
1912:
1815:
1805:
1800:
1770:
1753:
1748:
1721:
1666:
1367:
1357:
1352:
1342:
1262:
1252:
1247:
1222:
1192:
1082:
1052:
1047:
1037:
1027:
1017:
932:
885:
855:
694:
487:
464:
398:
63:
11625:
10000:"UAE: Activist Ahmed Mansoor sentenced to 10 years in prison for social media posts"
6535:
6490:
5816:
5549:
5502:
3516:
of Defense oversees an offensive cyber force, called Defensive Cyber Command (DCC).
3193:
In February 2013, Information Technology Secretary J. Satyanarayana stated that the
2844:
Potential targets in internet sabotage include all aspects of the Internet from the
2025:
13963:
13958:
13779:
13714:
13543:
13521:
13365:
13333:
13321:
13297:
12923:
12870:
12860:
12819:
12749:
12744:
12473:
12381:
12239:
12179:
11943:
11933:
11828:
11663:
11613:
11387:
11086:
10873:
10671:"Vault 7: CIA hacking tools were used to spy on iOS, Android and Samsung smart TVs"
10587:
10551:
10541:
9472:
9282:
8310:
7341:
6774:
6662:
6601:
6392:
6376:
6108:
5665:
5636:
5529:
5490:
5358:
4862:
4807:
4304:
4232:
was a release of confidential data belonging to Sony Pictures Entertainment (SPE).
3994:
3787:
3229:
2873:
2350:
2292:
2228:
2112:
2092:
2030:
1995:
1927:
1820:
1758:
1651:
1579:
1572:
1429:
1362:
1312:
1302:
1177:
1097:
1057:
1042:
1004:
989:
860:
845:
798:
706:
664:
607:
602:
560:
383:
360:
267:
196:
125:
108:
11317:
9719:
8720:"War in the fifth domain. Are the mouse and keyboard the new weapons of conflict?"
6380:
3912:
2707:, specifically financial crime because they negatively affect a company or group.
2506:
In mid-July 2010, security experts discovered a malicious software program called
13608:
13449:
13020:
12880:
12796:
12784:
12764:
12660:
12450:
12430:
12353:
12130:
12110:
12008:
11833:
11823:
11667:
11634:
11483:
11240:
11090:
11019:
10877:
9841:
9605:
9511:
9248:
9032:
8964:
8941:
8706:
8512:
7750:
7257:
7225:
7201:
7177:
7120:
6677:
6522:
6301:
6075:
6023:
5983:
4934:
4561:
by an international group of approximately twenty experts between 2009 and 2012.
4400:
4276:
4093:
3692:
3392:
3133:
3028:
2853:
2782:
2692:
2622:, former Cyber-Security Coordinator of the US, commented on those possibilities:
2594:
2475:
2362:
2308:
2304:
2208:
and non-physical domains and whose level of violence may vary upon circumstances.
2187:
2174:, and transnational criminal organizations depending on the context of the work.
1840:
1825:
1743:
1699:
1641:
1297:
1292:
1182:
1172:
1087:
1062:
999:
840:
770:
760:
612:
597:
520:
492:
292:
272:
120:
13750:
9526:"Iranian Hackers Targeting Turkey and Arabian Peninsula in New Malware Campaign"
7445:"U.S. Needs New National Strategy in Era of Cyberaggression, UC Paper Concludes"
7345:
5958:"Text β H.R.5222 β 114th Congress (2015β2016): Iran Cyber Sanctions Act of 2016"
13586:
13526:
13511:
13464:
13360:
13306:
13166:
12824:
12801:
12774:
12692:
12682:
12584:
12579:
12445:
12396:
12300:
12198:
12048:
11998:
11973:
11938:
11918:
11798:
11786:
11602:"US Government Computer Penetration Programs and the Implications for Cyberwar"
11564:
9815:
9345:
9049:
7835:
7523:
7384:
6957:
5564:
5517:
5362:
4877:
4812:
4675:
4611:
4588:
4538:
4341:
Cyber 2022 Power Index, above China, Russia, the United Kingdom and Australia.
4280:
4272:
4213:
3906:
3685:
3624:
3470:
3380:
3283:
3279:
3033:
2982:
2895:
2891:
2696:
2651:
planted malware potentially capable of disrupting the Russian electrical grid.
2619:
2479:
2420:
2240:
2236:
2127:
2084:
2015:
1763:
1187:
1147:
1125:
1112:
1102:
1072:
984:
937:
740:
731:
622:
575:
555:
545:
515:
482:
370:
327:
282:
154:
87:
10530:"Regime Type, Issue Type and Economic Sanctions: The Role of Domestic Players"
9918:"Youtube β Chris Kubecka: How to Implement IT Security after a Cyber Meltdown"
9917:
9711:
8529:
8314:
6778:
6428:
5494:
3980:
was also affected by a different variant, crippling them in a similar manner.
13877:
13729:
13613:
13570:
13516:
13504:
13489:
13479:
13402:
13316:
13292:
13287:
13161:
13156:
13151:
13067:
12655:
12596:
12559:
12511:
12210:
12171:
12140:
12135:
11988:
11978:
11948:
11711:
10572:
10546:
10529:
10404:
10400:
Secret NSA hackers from TAO Office have been pwning China for nearly 15 years
10219:
10155:
9982:"Hackers Went After a Now-Disgraced G.O.P. Fund-Raiser. Now He Is After Them"
9321:"BlackEnergy malware activity spiked in runup to Ukraine power grid takedown"
8674:
Hacked European Cables Reveal a World of Anxiety About Trump, Russia and Iran
8322:
8049:
7671:
7637:
7320:
The ethics of cyber conflict. The Handbook of Information and Computer Ethics
6786:
6712:
6613:
6388:
6103:
6048:
5859:
5749:
5669:
5541:
5405:
5295:
5250:
5060:
4989:
4550:
4542:
4386:
4361:
4268:
4158:
4154:
4150:
4010:
3949:
3921:
3599:
3552:
3275:
3113:
warfare" through manipulation of public opinion and "psychological warfare".
2887:
2770:
2585:
would be to disconnect the power grid from the Internet and run the net with
2427:
2354:
2232:
2123:
1862:
1850:
1706:
1626:
1542:
1525:
1382:
1237:
1217:
895:
890:
870:
850:
765:
736:
711:
587:
565:
550:
525:
365:
287:
250:
245:
142:
12311:
11167:
10459:"U.S. Sanctions Russia Over Election Hacking; Moscow Threatens to Retaliate"
10048:"Ex-U.S. Intelligence Officers Admit to Hacking Crimes in Work for Emiratis"
8957:
6895:"What is the impact of ransomware on financial crime compliance in the UAE?"
4360:, including those of diplomats from China, Israel, NATO members, and Syria.
3927:
2916:
Computer hacking represents a modern threat in ongoing global conflicts and
2731:
There are a number of reasons nations undertake offensive cyber operations.
13755:
13421:
13407:
13262:
13072:
13040:
13030:
12933:
12779:
12677:
12623:
12532:
12244:
12100:
11142:
8837:"Terre, Air, Mer, Cyber ? La 4Γ¨me armΓ©e entre coup de com et rΓ©alitΓ©s"
8794:
From Nuclear War to Net War: Analogizing Cyber Attacks in International Law
8766:
6406:
4797:
4584:
4451:
4404:
4108:
4101:
3937:
3902:
3898:
3877:
3082:
2830:
2672:
2664:
2590:
2381:
2358:
2338:
2194:'s definition of war: "War is the continuation of politics by other means":
2161:
targeted and destroyed a building associated with an ongoing cyber-attack.
2049:
1975:
1955:
1950:
1845:
1790:
1424:
1419:
1242:
1157:
900:
535:
332:
236:
13802:
10445:
Obama's secret struggle to retaliate against Putin's election interference
9964:"GOP Fundraiser Elliott Broidy Expands Suit Alleging Qatar-Backed Hacking"
9105:
7801:"How China will use cyber warfare to leapfrog in military competitiveness"
7771:"How China will use cyber warfare to leapfrog in military competitiveness"
6605:
6001:"Cyber espionage bug attacking Middle East, but Israel untouched β so far"
3948:
of the infected computer, making it unusable. The virus has been used for
3901:
government by causing destruction to the state owned national oil company
3228:. Examples of weapons used are an exploit for the Sandworm vulnerability (
2227:
There is debate on whether the term "cyber warfare" is accurate. In 2012,
13734:
13277:
13272:
13109:
13094:
12970:
12945:
12574:
12494:
12401:
12386:
12184:
12018:
11993:
11958:
11793:
11617:
9599:
Israel used electronic attack in air strike against Syrian mystery target
9252:
8719:
7987:"Marriott Breach β What Happened, How Serious Is It And Who Is Impacted?"
5931:
5533:
4924:
4909:
4817:
4787:
4504:
One of the hardest issues in cyber counterintelligence is the problem of
4462:
4264:
4256:
4225:
4224:
In 2014, Barack Obama ordered an intensification of cyberwarfare against
4069:
3804:
3754:
3742:
3699:
3653:
3591:
3548:
3547:
It has been claimed that Russian security services organized a number of
3497:
3271:
3129:
3121:
3117:
3064:
3057:
2454:
2446:
2366:
2324:
2288:
2251:
2177:
Examples of definitions proposed by experts in the field are as follows.
2147:
2080:
1960:
1711:
1676:
1515:
1202:
1167:
875:
818:
721:
505:
226:
221:
13416:
10556:
10079:
American Forces Press Service: Lynn Explains U.S. Cybersecurity Strategy
7218:
7070:
6794:
6762:
6720:
6696:
6621:
6589:
5651:
5068:
5044:
3858:, Israel alleges that cyber-warfare was part of the conflict, where the
3680:
loss of nearly the entire arsenal of the biggest artillery piece of the
2170:
terrorist groups, companies, political or ideological extremist groups,
13684:
13499:
13469:
13454:
13242:
13230:
12990:
12852:
12478:
12249:
12065:
12013:
11896:
11776:
11721:
11404:
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
9505:
Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon | Video on
8122:
Hurst, Daniel; Kuo, Lily; Graham-McLay, Charlotte (14 September 2020).
7942:"Massive Data Breach Puts 4 Million Federal Employees' Records at Risk"
6190:"Massive Data Breach Puts 4 Million Federal Employees' Records at Risk"
4929:
4792:
4749:
4523:
4374:
4349:
4288:
4284:
4191:
4179:
4089:
3668:
3657:
3319:
2869:
2822:
2794:
2704:
2495:
2461:
2171:
2104:
1917:
1887:
1609:
973:
9477:
9460:
9266:"Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units"
8958:"Germany to invest 100 million euros on internet surveillance: report"
7626:"EU to run war games to prepare for Russian and Chinese cyber-attacks"
6843:"NotPetya ransomware outbreak cost Merck more than $ 300M per quarter"
3967:
Tanker trucks unable to be loaded with gasoline due to Shamoon attacks
13426:
13215:
13144:
13089:
13084:
12950:
12791:
12697:
12440:
12125:
12080:
12075:
11923:
11891:
11324:"An International Attribution Mechanism for Hostile Cyber Operations"
10936:"What are the challenges of cybersecurity in times of peace and war?"
9668:
8614:"S. Korean military to prepare with U.S. for cyber warfare scenarios"
7020:
4721:
4614:
4492:
has led international efforts to fight cybercrime, the United States
4396:
4378:
4009:
has launched several cyber-attacks in the past targeting dissidents.
3936:
nature and the cost of the attack and recovery. US Defense Secretary
3855:
3731:
3619:
3581:
Russian, South Ossetian, Georgian and Azerbaijani sites were attacked
3542:
2464:" probes of American defense contractors computer systems since 2003.
2096:
1907:
1731:
1681:
1631:
1621:
1616:
1481:
1272:
1267:
1232:
669:
355:
322:
211:
11221:
US, Russia to install "cyber-hotline" to prevent accidental cyberwar
6590:"Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?"
4247:
In March 2017, WikiLeaks published more than 8,000 documents on the
3675:
artillery. The app, used by Ukrainian officers, was loaded with the
2604:
pushed a massive power outage for 12 hours in 44 of 81 provinces of
13719:
13704:
13235:
13220:
13122:
12960:
12408:
12085:
12043:
11906:
10853:
10702:
10340:"Exclusive: Comedy of Errors Led to False 'Water-Pump Hack' Report"
9846:
8588:"South Korea raises alert after hackers attack broadcasters, banks"
7332:
Kenney, Michael (2015). "Cyber-Terrorism in a Post-Stuxnet World".
5821:
5792:
Striking Back: The End of Peace in Cyberspace and How to Restore It
5569:. International Conference on Cyber Conflict (ICCC). Estonia: IEEE.
5478:
5448:"Security: A huge challenge from China, Russia and organised crime"
4260:
4237:
4172:
4115:
computer malware implanted in the pirated Canadian software by the
4014:
3735:
3691:
In 2014, the Russians were suspected to use a cyber weapon called "
3561:
2008 cyberattacks on Russia, South Ossetia, Georgia, and Azerbaijan
3351:
3225:
2966:
2829:, with Azerbaijani hackers targeting Armenian websites and posting
2609:
2400:
2100:
1922:
1897:
1530:
1162:
1137:
750:
305:
179:
11632:
9219:"Swedish forces exposed to extensive cyber attack: Dagens Nyheter"
7927:"U.S. gov't hack may be four (4) times larger than first reported"
7807:. Vol. 8, no. 1 October 2008. p. 43. Archived from
7777:. Vol. 8, no. 1 October 2008. p. 42. Archived from
7719:"Public servants prepare for cyber attacks at inaugural war games"
7239:"Azerbaijani hackers broke into over 90 armenian websites β VIDEO"
4534:
NIST, a cybersecurity framework, was published in 2014 in the US.
13699:
13548:
13385:
13375:
13183:
12995:
12707:
12702:
12095:
12070:
12033:
10901:
Ramsbotham, Oliver; Miall, Hugh; Woodhouse, Tom (11 April 2011).
10782:
The Future Information Society: Social and Technological Problems
10613:
Shane, Scott; Mazzetti, Mark; Rosenberg, Matthew (7 March 2017).
9922:
9223:
8814:
8534:
8406:"Copy paste slacker hackers pop corp locks in ode to stolen code"
8392:"Hacked by 'Pakistan cyber army', CBI website still not restored"
7658:
Wheeler, Caroline; Shipman, Tim; Hookham, Mark (7 October 2018).
7360:"North Korea took $ 2 billion in cyberattacks to fund weapons..."
6697:"Russian Information Warfare: Implications for Deterrence Theory"
6097:
Devereaux, Ryan; Greenwald, Glenn; Poitras, Laura (19 May 2014).
5723:. New Haven, Connecticut: Yale University Press. pp. 77β79.
5318:"Israel launched an airstrike in response to a Hamas cyberattack"
4944:
4832:
4554:
4489:
4485:
4252:
4018:
3894:
3823:
3379:. After accessing the state system the hackers had access to the
2818:
2518:
2507:
2499:
2088:
1932:
1892:
1656:
1490:
1486:
828:
813:
689:
350:
345:
315:
254:
216:
10573:"Economic sanctions outcomes: An information-driven explanation"
10420:"Trump Inherits a Secret Cyberwar Against North Korean Missiles"
9892:"Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems"
9869:
9783:"Jose Pagliery: The inside story of the biggest hack in history"
9641:
8272:"National Critical Information Infrastructure Protection Centre"
6452:"The internet is run under the sea. What if the cables are cut?"
3270:
against major government, news media, and financial websites in
3060:
targeting the records of as many as four million people. Later,
2262:) or affected access to medical care, thus endangering life (UK
58:'s 782nd Military Intelligence Battalion (Cyber) supporting the
13709:
13635:
11953:
11868:
11699:
11012:
10698:"WikiLeaks posts trove of CIA documents detailing mass hacking"
9664:"Jose Pagliery:The inside story of the biggest hack in history"
9420:"Wall Street banks learn how to survive in staged cyber attack"
7694:"The UK is practicing cyberattacks that could black out Moscow"
6990:
6966:
6867:
Perlroth, Nicole; Scott, Mark; Frenkel, Sheera (27 June 2017).
6637:"Iran Flexes Its Power by Transporting Turkey to the Stone Age"
5390:. Amsterdam: Morgan Kaufmann Publishers β Elsevier. p. 2.
4357:
4296:
3977:
3953:
3618:
prior to authorizing a covert attack. Then U.S. vice president
3563:. One identified young Russian hacker said that he was paid by
3439:
3376:
3301:
Visualization of 2009 cyber warfare attacks against South Korea
3221:
3101:(MSS), the country's Communist-controlled civilian spy agency.
3086:
2975:
2700:
2636:
2613:
2605:
2450:
2404:
2139:
2131:
1439:
835:
652:
388:
11418:
Reverse Deception: Organized Cyber Threat Counter-Exploitation
10868:
Akatyev, Nikolay; James, Joshua (2015). "Cyber Peacekeeping".
10643:"How the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks)"
10615:"WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents"
10503:"US expels 35 Russian diplomats, closes two compounds: report"
10022:"Inside the UAE's secret hacking team of American mercenaries"
8276:
National Critical Information Infrastructure Protection Centre
8205:"Philippines wards off cyber attacks from China-based hackers"
6161:
Reverse Deception: Organized Cyber Threat Counter-Exploitation
5795:. New Haven, Connecticut: Yale University Press. p. 218.
3153:
National Critical Information Infrastructure Protection Centre
13380:
13139:
10749:"Russia says US hacked thousands of Apple phones in spy plot"
10647:
10477:"U.S. imposes sanctions on Russia over election interference"
8035:
8011:
7272:"Become a Naval Cyber Warfare Engineer (CWE) : Navy.com"
7219:"International Cyber Warfare: Limitations and Possibilities".
7135:"In a doomsday cyber attack scenario, answers are unsettling"
6930:"Viewpoint: Cyberterrorism: Cyber "Pearl Harbor" is Imminent"
6242:"Hacking Diplomatic Cables Is Expected. Exposing Them Is Not"
5045:"Cyber Warfare: A Misrepresentation of the True Cyber Threat"
4972:
Cybersecurity and cyberwar : what everyone needs to know
4316:
4312:
4135:
4013:, an Emirati citizen, was jailed for sharing his thoughts on
3671:
whose original purpose was to control targeting data for the
3608:
interfering with the 2016 United States presidential election
3384:
3355:
3125:
3072:
3024:
2814:
2442:
2435:
2135:
910:
446:
441:
11577:, vol. LXVI, no. 20 (19 December 2019), pp. 14, 16, 20.
9346:"Ukraine crisis: 'Wiper' discovered in latest cyber-attacks"
8530:"28c3: Security Log Visualization with a Correlation Engine"
8506:
UK, Not North Korea, Source of DDOS Attacks, Researcher Says
8241:
8239:
8237:
7292:
Lin, Tom C. W. (14 April 2016). "Financial Weapons of War".
6564:
Xinhua: China denies intruding into the U.S. electrical grid
6355:
Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R. (2016).
4059:
Cyberwarfare in the United States is a part of the American
3952:
against the national oil companies Saudi Aramco and Qatar's
3460:, announced it was seeking to hire 130 "hackers" for a new "
13724:
11441:
Cyber Threats: The Emerging Fault Lines of the Nation State
11306:
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3540615
8687:
Hacking Diplomatic Cables Is Expected. Exposing Them Is Not
6525:. In.reuters.com (9 April 2009). Retrieved 8 November 2011.
5388:
Introduction to cyber-warfare: a multidisciplinary approach
4939:
4837:
4822:
4522:, a leading journal in that field, published an article by
3819:
3800:
3568:
3435:
3181:(ITBP). A government-private sector plan being overseen by
2962:
2743:
2720:
2486:
Out of all cyber attacks, 25% of them are espionage based.
2143:
206:
201:
9372:"Al Qaeda rocked by apparent cyberattack. But who did it?"
8762:"Russia accused of unleashing cyberwar to disable Estonia"
8071:"Marriott hotel cyber attack linked to Chinese spy agency"
7744:
Government-sponsored cyberattacks on the rise, McAfee says
7575:"NATO takes part in international cyber security exercise"
5692:"What limits does the law of war impose on cyber attacks?"
5284:"What Israel's Strike on Hamas Hackers Means For Cyberwar"
2825:
have actively participated in cyberwarfare as part of the
2478:
published details of a breach that compromised one of the
11003:. CBS News (10 February 2009). Retrieved 8 November 2011.
10238:. US Defense Department (PDF). Retrieved 8 November 2011.
10144:"Old Trick Threatens the Newest Weapons (Published 2009)"
9389:
Britain faces serious cyber threat, spy agency head warns
9217:
Ringstrom, Anna (25 January 2017). Goodman, David (ed.).
9204:"Biden Hints at U.S. Response to Russia for Cyberattacks"
8271:
8234:
8149:"National Enterprise Credit Information Publicity System"
7879:
7876:"China to make mastering cyber warfare A priority (2011)"
7258:"Nagorno-Karabakh: The Armenian-Azeri 'information wars'"
6216:"U.S. government hacked; feds think China is the culprit"
6096:
4292:
4240:, expelling 35 Russian diplomats from the United States.
3727:
3286:
companies unwittingly helped attack South Korea due to a
3085:
starting mid-2006, reported by Internet security company
2810:
2119:
physical damage to people and objects in the real world.
79:
11684:
10900:
10358:"Obama Order Sped Up Wave of Cyberattacks Against Iran."
10309:"Hacker Apparently Triggers Illinois Water Pump Burnout"
9624:"Without the nuclear deal, Iranian cyber attacks resume"
9150:"U.S. Says Russia Directed Hacks to Influence Elections"
8882:"Pourquoi la France se dote d'une cyber-armΓ©e β DΓ©fense"
8394:. Ndtv.com (4 December 2010). Retrieved 8 November 2011.
6763:"Terrorism as Theater: Analysis and Policy Implications"
5844:
Barnes, Julian E.; Gibbons-Neff, Thomas (22 June 2019).
5386:
Shakarian, Paulo; Shakarian, Jana; Ruef, Andrew (2013).
5345:
Robinson, Michael; Jones, Kevin; Helge, Janicke (2015).
3709:
Ukraine saw a massive surge in cyber attacks during the
3297:
3202:
Ideology, etc. The attack was done as a revenge for the
11469:
On Cyber: Towards an Operational Art for Cyber Conflict
11345:"Darknet, Hacker, Cyberwar β Der geheime Krieg im Netz"
10779:
Hofkirchner, Wolfgang; Burgin, Mark (24 January 2017).
10291:"Air Force says drone computer virus poses 'no threat'"
10180:. USA: University of Nebraska Press. pp. 235β236.
9299:. USA: University of Nebraska Press. pp. 221β222.
9164:"Presidential approval and reporting of covert actions"
8424:"APT Group 'Patchwork' Cuts-and-Pastes a Potent Attack"
7961:"State actor seen in "enormous" range of cyber attacks"
7114:
Cyber ShockWave Shows U.S. Unprepared For Cyber Threats
6869:"Cyberattack Hits Ukraine Then Spreads Internationally"
6578:. ABC News. (20 April 2009). Retrieved 8 November 2011.
6332:
Cybersecurity and Cyberwar: What Everyone Needs to Know
3814:
Flag of Cyber Police (FATA) of Islamic Republic of Iran
3477:'s cyber surveillance system, German Interior Minister
10813:
Grady, Mark F.; Parisi, Francesco (28 November 2005).
10612:
10126:"Defending a New Domain: The Pentagon's Cyberstrategy"
9732:
Bumiller, Elisabeth; Shanker, Thom (11 October 2012).
9493:
Stuxnet worm brings cyber warfare out of virtual world
8977:
7154:"Washington Group Tests Security in 'Cyber ShockWave'"
6678:"Russian military admits significant cyber-war effort"
5766:"The Characterization and Conditions of the Gray Zone"
5516:
Parks, Raymond C.; Duggan, David P. (September 2011).
5385:
4330:
planted malware potentially capable of disrupting the
2959:
Cooperative Cyber Defence Centre of Excellence (CCDCE)
2643:
has been under cyber-attack by the United States. The
12543:
Self-indication assumption doomsday argument rebuttal
11654:
Rid, Thomas (2012). "Cyber War Will Not Take Place".
11521:
Fritsch, Lothar & Fischer-HΓΌbner, Simone (2019).
11077:
Rid, Thomas (2012). "Cyber War Will Not Take Place".
11061:"Is the 'holy grail' of cyber security within reach?"
9696:"How to Implement IT Security after a Cyber Meltdown"
7657:
7496:"Cyber-war gaming: A cybersecurity tabletop exercise"
6504:"Hackers reportedly have embedded code in power grid"
6270:. Vol. 1 (1st ed.). Australia. p. 231.
3147:
The Department of Information Technology created the
2482:'s diplomatic communication channels for three years.
12469:
Safety of high-energy particle collision experiments
11482:
Cordesman, Anthony H.; Cordesman, Justin G. (2002).
10846:
10418:
Sanger, David E.; Broad, William J. (4 March 2017).
10213:
Senators Say Cybersecurity Bill Has No 'Kill Switch'
9842:"Shamoon virus targets energy sector infrastructure"
9440:. Flash//CRITIC Cyber Threat News. 16 September 2013
8900:"L'armée française consolide son commandement cyber"
8345:"5 lakh cyber warriors to bolster India's e-defence"
8121:
6893:
Elhais, Hassan Elhais-Dr Hassan (21 November 2021).
6866:
6516:"US concerned power grid vulnerable to cyber-attack"
6071:"Merkel Compared NSA To Stasi in Complaint To Obama"
5817:"US 'launched cyber-attack on Iran weapons systems'"
3660:
used Android malware to target the Ukrainian Army's
2778:
weapons systems that require computers to operate."
10985:"Senate Legislation Would Federalize Cybersecurity"
10742:
10740:
10046:Mazzetti, Mark; Goldman, Adam (14 September 2021).
8376:"36 government sites hacked by 'Indian Cyber Army'"
8303:
Journal of Asian Security and International Affairs
7195:
Report: The Cyber ShockWave event and its aftermath
6153:
5235:. Green, James A., 1981β. London. 7 November 2016.
4559:
NATO Cooperative Cyber Defence Centre of Excellence
2298:
11481:
11455:Inside Cyber Warfare: Mapping the Cyber Underworld
9582:Why Syria's Air Defenses Failed to Detect Israelis
7171:Cyber ShockWave CNN/BPC wargame: was it a failure?
7123:. Bipartisanpolicy.org. Retrieved 8 November 2011.
6450:Lewis, Sherryn Groch, Felicity (4 November 2022).
6354:
5843:
5344:
3993:, brother of the Emir of Qatar, and his associate
11563:Halpern, Sue, "The Drums of Cyberwar" (review of
11042:
10778:
10374:"US general: We hacked the enemy in Afghanistan."
9406:"Attack the City: why the banks are 'war gaming'"
8012:"Starwood Reservation Database Security Incident"
5745:"The Politics of Cyberspace: Grasping the Danger"
5233:Cyber warfare : a multidisciplinary analysis
3500:, Cyber Defense is nationally coordinated by the
3056:(OPM) announced that it had been the target of a
2203:Taddeo offered the following definition in 2012:
13875:
13597:List of apocalyptic and post-apocalyptic fiction
11181:"Seeing The Internet As An 'Information Weapon'"
10737:
10274:U.S. drone and predator fleet is being keylogged
9438:"Iran's military is preparing for cyber warfare"
8097:"Marriott cyberattack traced to Chinese hackers"
7549:"Agency leads NATO team in tough cyber exercise"
6421:"Understanding Denial-of-Service Attacks | CISA"
6334:. Oxford: Oxford University Press. p. 156.
6314:"Malware Hits Computerized Industrial Equipment"
5632:"White House Cyber Czar: 'There Is No Cyberwar'"
3120:announced that it had successfully fought off a
13862:
11583:@War: The Rise of the Military-Internet Complex
11525:. Journal of Information Warfare, 17(4), 72β87.
11416:Bodmer, Kilger, Carpenter, & Jones (2012).
10457:Lee, Carol E.; Sonne, Paul (30 December 2016).
10091:"Pentagon to Consider Cyberattacks Acts of War"
10045:
9731:
9190:"VP Biden Promises Response to Russian Hacking"
8935:"Hackers wanted to man front line in cyber war"
7899:
6736:"Dynamic Security Threats and the British Army"
6159:Bodmer, Kilger, Carpenter, & Jones (2012).
5984:"How Israel Spoofed Syria's Air Defense System"
5652:"Tracking the emerging arms race in cyberspace"
3350:In an extension of a bilateral dispute between
3313:With ongoing tensions on the Korean Peninsula,
3268:series of coordinated denial of service attacks
2579:North American Electric Reliability Corporation
2426:After the NSA's spying on Germany's Chancellor
30:"Cyberwar" redirects here. For other uses, see
13495:List of dates predicted for apocalyptic events
10249:"AP: Pentagon takes aim at China cyber threat"
9946:"GOP Fundraiser Sues Qatar Over Stolen Emails"
8700:Major and successful hackers' attack in Cyprus
7757:(29 November 2007). Retrieved 8 November 2011.
7184:(17 February 2010). Retrieved 8 November 2011.
7036:"Cyberwar β Das Internet als Kriegsschauplatz"
6956:
6927:
6357:"The psychological effects of cyber terrorism"
6329:
4969:
4482:Cooperative Cyber Defence Centre of Excellence
4175:which was revealed in a 2009 research report.
4055:Global surveillance disclosures (2013βpresent)
3931:Shamoon 1 attack timeline against Saudi Aramco
3893:On 15 August 2012 at 11:08 am local time, the
3723:Global surveillance disclosures (2013βpresent)
3526:Global surveillance disclosures (2013βpresent)
3492:Global surveillance disclosures (2013βpresent)
3452:Global surveillance disclosures (2013βpresent)
3426:Global surveillance disclosures (2013βpresent)
3387:, hackers accessed communications linking all
3175:Defense Research and Development Organizations
13818:
12500:Existential risk from artificial intelligence
12341:
12327:
11737:
11682:Woltag, Johann-Christoph: 'Cyber Warfare' in
11633:Janczewski, Lech; Colarik, Andrew M. (2007).
11530:Cyberwar β Das WettrΓΌsten hat lΓ€ngst begonnen
11502:
10746:
10206:
10105:
10103:
9395:(13 October 2010). Retrieved 8 November 2011.
9242:Ukraine's military denies Russian hack attack
9026:Cyberspace and the changing nature of warfare
8299:"Cyber Threats and Nuclear Security in India"
7385:"North Korea 'stole $ 2bn via cyber-attacks'"
6962:"Click, click... counting down to cyber 9/11"
6694:
6239:
6213:
5608:
5606:
4970:Singer, P. W.; Friedman, Allan (March 2014).
4198:Statewide Terrorism and Intelligence Center.
3664:. They distributed an infected version of an
2992:
2872:involves the subversive use of computers and
2570:United States Department of Homeland Security
2281:
2057:
60:3rd Brigade Combat Team, 1st Cavalry Division
11243:. Politik.org.ua. Retrieved 8 November 2011.
10867:
9755:
9753:
9556:"IAEA: Syria tried to build nuclear reactor"
9258:
8656:"The Ethiopian-Egyptian Water War Has Begun"
8579:
7939:
6932:. In Costigan, Sean S.; Perry, Jake (eds.).
6652:
6650:
6536:Electricity Grid in U.S. Penetrated By Spies
6475:: CS1 maint: multiple names: authors list (
6187:
6090:
5907:"Sanctions Programs and Country Information"
4440:
3622:said on the American news interview program
3606:issued a joint statement accusing Russia of
3596:United States Secretary of Homeland Security
3430:In 2013, the French Minister of Defense, Mr
3054:United States Office of Personnel Management
13832:
12548:Self-referencing doomsday argument rebuttal
11402:Andress, Jason. Winterfeld, Steve. (2011).
11281:"A Digital Geneva Convention? A Great Idea"
11212:
11033:FBI to station cybercrime expert in Estonia
10812:
10495:
10443:Greg Miller, Ellen Nakashima, Adam Entous:
10417:
10387:U.S. NSA Unit 'TAO' Hacking China For Years
9689:
9687:
9612:, 8 October 2007. Retrieved 8 October 2007.
9588:, 3 October 2007. Retrieved 3 October 2007.
9192:. NBC News Meet the Press. 14 October 2016.
9098:"Coordinated Russia vs Georgia cyberattack"
8807:"Bienvenue sur Atlantico.fr β Atlantico.fr"
8751:. (17 May 2007). Retrieved 8 November 2011.
7408:, McAfee Security Insights, 13 January 2010
7287:
7285:
6658:"How Not To Prevent a Cyberwar With Russia"
6295:"Clarke: More defense needed in cyberspace"
5515:
5340:
5338:
3383:'s entire exchange database. By login into
3071:has reported that the attack originated in
2524:
2243:, former Cyber Security Coordinator in the
13825:
13811:
12651:Climate change and civilizational collapse
12334:
12320:
11744:
11730:
10100:
9644:. 15 August 2012. Cutting Sword of Justice
9523:
8562:"SK Hack by an Advanced Persistent Threat"
7984:
7419:"Financially Motivated Threats β cyber.uk"
6280:: CS1 maint: location missing publisher (
5994:
5981:
5764:Popp, George; Canna, Sarah (Winter 2016).
5720:The Virtual Weapon and International Order
5603:
5263:: CS1 maint: location missing publisher (
5106:: CS1 maint: location missing publisher (
5002:: CS1 maint: location missing publisher (
4553:. It was written at the invitation of the
4421:Cyberweapon Β§ Control and disarmament
3555:against other countries, most notably the
3110:State Administration for Market Regulation
2616:were among the places suffering blackout.
2535:In computing, a denial-of-service attack (
2469:Office of Personnel Management data breach
2430:was revealed, the Chancellor compared the
2064:
2050:
12288:Security information and event management
11585:. Eamon Dolan/Houghton Mifflin Harcourt.
10852:
10640:
10555:
10545:
10081:. Defense.gov. Retrieved 8 November 2011.
9816:"Shamoon virus attacks Saudi oil company"
9750:
9476:
9216:
8781:"Cyber-war a growing threat warn experts"
6647:
6396:
6133:
6017:"A Note on the Laws of War in Cyberspace"
5955:
5763:
5421:
5419:
5417:
5415:
4703:Hacking the Infrastructure: Cyber Warfare
4511:
4178:On 6 October 2011, it was announced that
4034:systems of the US and rest of the world.
3826:worm, thought to specifically target its
2963:North Atlantic Treaty Organization (NATO)
2742:, a cyber security expert and adviser to
13654:Centre for the Study of Existential Risk
13592:Apocalyptic and post-apocalyptic fiction
11751:
11467:Conti, Gregory. Raymond, David. (2017).
11022:. Ccdcoe.org. Retrieved 8 November 2011.
10774:
10772:
10456:
10307:Schwartz, Mathew J. (21 November 2011).
10306:
10280:, October 2011. Retrieved 6 October 2011
9684:
9621:
8978:"National Cyber Security Centrum β NCSC"
8879:
8745:Estonia accuses Russia of 'cyber attack'
8353:. India. 16 October 2012. Archived from
8296:
7765:
7763:
7691:
7442:
7282:
6950:
6695:Ajir, Media; Vailliant, Bethany (2018).
6304:HometownAnnapolis.com, 24 September 2010
5696:International Committee of the Red Cross
5627:
5625:
5476:
5335:
4600:security incident" (White House quote).
4326:reported that American hackers from the
4251:. The confidential documents, codenamed
3962:
3926:
3920:The attack was well staged according to
3911:
3809:
3577:Department of the Defense of Information
3296:
2813:as it reported on Chinese repression on
2710:
2647:reported that American hackers from the
2555:
2542:
2471:, in the US, widely attributed to China.
2380:
1023:List of military strategies and concepts
49:
11606:IEEE Annals of the History of Computing
11503:Costigan, Sean S.; Perry, Jake (2012).
11420:. New York: McGraw-Hill Osborne Media.
11318:Yuval Shany; Michael N. Schmittwebsite=
11178:
10973:Pentagon Bill To Fix Cyber Attacks: ,0M
10668:
10226:, 24 June 2010. Retrieved 25 June 2010.
10203:. Senate.gov. 111th Congress 2D Session
10175:
10141:
9694:Kubecka, Christina (29 December 2015).
9693:
9458:
9294:
9095:
8863:"Vers une cyber-armée française ?"
8796:, 27 Berkeley J. Int'l Law. 192 (2009).
7572:
7033:
6634:
6163:. New York: McGraw-Hill Osborne Media.
5846:"U.S. Carried Out Cyberattacks on Iran"
5649:
5479:"Can information warfare ever be just?"
4603:A Ukrainian international law scholar,
4467:Federal government of the United States
4149:On 19 June 2010, United States Senator
4000:
3991:Mohammed bin Hamad bin Khalifa Al Thani
3579:. His tuition was paid for by the FSB.
3305:In July 2011, the South Korean company
3149:Indian Computer Emergency Response Team
3075:, citing unnamed government officials.
2978:was the winner of Locked Shields 2019.
2562:federal government of the United States
2399:collects user data from companies like
14:
13876:
11580:
11203:WSJ: U.S. Backs Talks on Cyber Warfare
11001:"White House Eyes Cyber Security Plan"
10975:. CBS News. Retrieved 8 November 2011.
10963:. Dtic.mil. Retrieved 8 November 2011.
10816:The Law and Economics of Cybersecurity
10337:
9803:
8880:Nouvelle, L'Usine (13 December 2016).
8783:. BBC News. Retrieved 8 November 2011.
8495:. BBC News. Retrieved 8 November 2011.
8444:
8172:
7958:
7623:
7399:
7331:
7256:Giles, Christopher (26 October 2020).
7132:
7093:
7091:
7006:Marine Corps Command and Staff College
6892:
6733:
6587:
6493:. BBC News. Retrieved 8 November 2011.
6330:Singer, P.W.; Friedman, Allan (2014).
6288:
6068:
5778:from the original on 5 September 2021.
5562:
5412:
5315:
5281:
4140:Government Communications Headquarters
4100:, states that "as a doctrinal matter,
4092:as "the fifth domain of warfare," and
3747:Government Communications Headquarters
3464:" unit. In March 2013, BND president
2928:
2797:to the limits of statutory authority.
2682:
2222:
27:Use of digital attacks against a state
13806:
12315:
12265:Host-based intrusion detection system
11725:
11278:
10769:
10570:
10527:
10118:
9514:. Ted.com. Retrieved 8 November 2011.
8542:from the original on 21 December 2021
7760:
7660:"UK war-games cyber attack on Moscow"
7518:
7516:
7255:
7008:. Quantico VA) (Third Quarter 2013).
6760:
6491:BBC: Spies 'infiltrate US power grid'
6449:
6361:The Bulletin of the Atomic Scientists
6265:
5982:Weinberger, Sharon (4 October 2007).
5788:
5716:
5622:
5563:Taddeo, Mariarosaria (19 July 2012).
5445:
5381:
5379:
5347:"Cyber Warfare Issues and Challenges"
5081:
5042:
4747:", an episode of the animated sitcom
4626:
4283:), and the operating systems of most
3704:a cyberattack on Ukraine's power-grid
2186:new paradigm into military doctrine.
12671:Tipping points in the climate system
11599:
10002:. Amnesty International. 31 May 2018
9834:
9610:Aviation Week & Space Technology
9586:Aviation Week & Space Technology
9495:. Google. Retrieved 8 November 2011.
9459:Denning, Dorothy E. (16 July 2012).
7098:"Cyber-War Nominee Sees Gaps in Law"
6734:Carter, Nicholas (22 January 2018).
6594:Journal of Conflict and Security Law
5566:An analysis for a just cyber warfare
5227:
5225:
5223:
5221:
5219:
4697:Documentary films about cyberwarfare
4529:
4107:When Russia was still a part of the
2880:
2568:is susceptible to cyberwarfare. The
2087:, causing comparable harm to actual
13924:Mass intelligence-gathering systems
12666:Extinction risk from climate change
12565:New World Order (conspiracy theory)
12296:Runtime application self-protection
11653:
11076:
11070:
10376:. Associated Press, 24 August 2012.
10110:"Cyberwar: War in the Fifth Domain"
9808:
9524:Lakshmanan, Ravie (10 March 2022).
8611:
7291:
7151:
7088:
6554:. (PDF). Retrieved 8 November 2011.
6181:
5198:"Who are the cyberwar superpowers?"
5122:"Advanced Persistent Threat Groups"
4478:2007 cyberwar waged against Estonia
4403:that carries out cyber attacks for
4356:(FSB) of compromising thousands of
3837:Joint Staff of Iranian Armed Forces
3828:Natanz nuclear enrichment facility.
3656:from 2014 to 2016, the Russian APT
2343:
2270:) have not led to military action.
24:
13626:List of fictional doomsday devices
11847:
11367:
11179:Gjelten, Tom (23 September 2010).
10747:Faulconbridge, Guy (1 June 2023).
9096:Danchev, Dancho (11 August 2008).
8888:– via www.usinenouvelle.com.
8493:"New cyberattacks hit South Korea"
7513:
5376:
4843:List of cyber attack threat trends
4653:Terminator 3: Rise of the Machines
4368:
4073:just as a traditional act of war.
3842:The Iranian state sponsored group
3160:Nuclear Power Corporation of India
3067:put the number at 18 million. The
2572:works with industries to identify
2318:
2095:. Some intended outcomes could be
25:
13975:
12646:Cataclysmic pole shift hypothesis
12228:Security-focused operating system
11692:
11636:Cyber Warfare and Cyber Terrorism
10870:Digital Forensics and Cyber Crime
10389:". Business Insider. 11 June 2013
10142:Markoff, John (26 October 2009).
9562:. Associated Press. 28 April 2011
9543:"Israel Adds Cyber-Attack to IDF"
8839:. 13 October 2014. Archived from
8403:
8173:Graham, Ben (13 September 2020).
7692:Detrixhe, John (7 October 2018).
7573:Allison, George (11 April 2019).
7406:"Google Attack Is Tip Of Iceberg"
6974:from the original on 1 March 2012
6506:. CNN. Retrieved 8 November 2011.
6069:Rayman, Noah (18 December 2013).
5936:United States Department of State
5657:Bulletin of the Atomic Scientists
5483:Ethics and Information Technology
5216:
4566:Shanghai Cooperation Organisation
4049:Cyberwarfare in the United States
3716:
3604:Director of National Intelligence
3412:in the wake of relocation of the
3398:Cisco's Talos Security Department
2901:
2369:which his company discovered, to
13929:Military intelligence collection
13762:
13761:
13749:
12907:Decline in amphibian populations
12024:Insecure direct object reference
11710:
11698:
11337:
11311:
11298:
11272:
11246:
11227:
11195:
11172:
11160:
11135:
11105:
11053:
11025:
11006:
10994:
10978:
10966:
10954:
10928:
10904:Contemporary Conflict Resolution
10894:
10861:
10840:
10806:
10755:
10718:
10690:
10662:
10641:Greenberg, Andy (7 March 2017).
10634:
10606:
10580:Journal of International Studies
10564:
10521:
10469:
10450:
10447:, Washington Post, 23. June 2017
10437:
10411:
10392:
10379:
10366:
10350:
10338:Zetter, Kim (30 November 2011).
10331:
10300:
10283:
10267:
10241:
10229:
10194:
10169:
10135:
10084:
10072:
10039:
10014:
9992:
9974:
9956:
9938:
9910:
9884:
9862:
9797:
9775:
9725:
9656:
9634:
9622:Perlroth, Nicole (12 May 2018).
9615:
9591:
9574:
9548:
9545:, Military.com, 10 February 2010
9536:
9517:
9498:
9485:
9452:
9430:
9412:
9398:
9382:
9364:
9338:
9313:
9288:
9272:
9268:. CrowdStrike. 22 December 2016.
9235:
9210:
9196:
9182:
9156:
9142:
9120:
9089:
9064:
9038:
9019:
9005:
8984:
8970:
8951:
8928:
8910:
8892:
8873:
8855:
8829:
8799:
8786:
8773:
8754:
8738:
8712:
8692:
8679:
8666:
8648:
8628:
8605:
8554:
8522:
8498:
8485:
8464:
8438:
8416:
8397:
8385:
8369:
8337:
8290:
8264:
8223:
8197:
8166:
8141:
8115:
8089:
8063:
8029:
8004:
7978:
7952:
7933:
7919:
7893:
7868:
7842:
7823:
7793:
7737:
7711:
7685:
7651:
7617:
7152:Ali, Sarmad (16 February 2010).
7133:Drogin, Bob (17 February 2010).
6635:Halpern, Micah (22 April 2015).
6534:Gorman, Siobhan. (8 April 2009)
6502:Meserve, Jeanne (8 April 2009).
5446:Blitz, James (1 November 2011).
4903:United States Army Cyber Command
4737:
4230:Sony Pictures Entertainment hack
4076:U.S. government security expert
4042:
4037:
3711:2022 Russian invasion of Ukraine
2299:Cyberwarfare and cyber sanctions
97:
54:Cyberwarfare specialists of the
13258:Four Horsemen of the Apocalypse
12755:Land surface effects on climate
12728:Human impact on the environment
12359:Future of an expanding universe
12278:Information security management
11201:Gorman, Siobhan. (4 June 2010)
11119:. 13 March 2017. Archived from
11031:Associated Press (11 May 2009)
10961:DOD β Cyber Counterintelligence
10676:International Business Times UK
10669:Murdock, Jason (7 March 2017).
9870:"Saudi Aramco hug, another one"
8585:
7900:Barrett, Devlin (5 June 2015).
7624:Boffey, Daniel (27 June 2019).
7592:
7566:
7541:
7488:
7462:
7436:
7411:
7377:
7352:
7325:
7312:
7264:
7249:
7231:
7211:
7187:
7164:
7145:
7126:
7107:
7063:
7027:
6997:
6921:
6912:
6886:
6860:
6835:
6809:
6754:
6727:
6688:
6670:
6628:
6581:
6569:
6557:
6545:
6528:
6509:
6496:
6489:Shiels, Maggie. (9 April 2009)
6483:
6443:
6413:
6348:
6323:
6307:
6266:Gupta, S.C. (8 November 2022).
6259:
6233:
6207:
6134:Schonfeld, Zach (23 May 2014).
6127:
6062:
6029:
6010:
5975:
5956:Ratcliffe, John (18 May 2016).
5949:
5924:
5911:U.S. Department of the Treasury
5899:
5873:
5837:
5809:
5782:
5757:
5737:
5710:
5684:
5643:
5573:
5556:
5509:
5470:
5439:
5309:
5282:Newman, Lily Hay (6 May 2019).
5275:
4898:Marine Corps Cyberspace Command
4783:Computer security organizations
4549:, apply to cyber conflicts and
4494:Federal Bureau of Investigation
4144:Department of Homeland Security
3909:as a reason behind the attack.
3888:
3880:'s decision to pull out of the
3565:Russian state security services
3502:National Cyber Security Centrum
3360:Grand Ethiopian Renaissance Dam
3211:Central Bureau of Investigation
3124:which was traced to hackers in
2944:
2767:Senate Armed Services Committee
2608:, impacting 40 million people.
2419:on many countries, revealed by
11505:Cyberspaces and global affairs
11488:. Greenwood Publishing Group.
10819:. Cambridge University Press.
10592:10.14254/2071-8330.2021/14-2/3
8491:Sudworth, John. (9 July 2009)
6934:Cyberspaces and Global Affairs
6819:. 28 June 2017. Archived from
6240:Liptak, Kevin (20 June 2015).
5585:Journal of Information Warfare
5190:
5165:
5139:
5114:
5075:
5036:
5010:
4963:
4547:international humanitarian law
4031:deferred prosecution agreement
3942:other computers on the network
3760:
3485:
3325:
3315:South Korea's defense ministry
3255:
3246:
3158:The executive director of the
2726:
2122:Many countries, including the
13:
1:
13954:Social engineering (security)
13204:Interpretations of Revelation
13006:Cosmological phase transition
12912:Decline in insect populations
12364:Ultimate fate of the universe
11571:, Doubleday, 2019, 348 pp.),
8749:The Christian Science Monitor
8445:Pandit, Rajat (16 May 2019).
7959:Finkle, Jim (3 August 2011).
6381:10.1080/00963402.2016.1216502
6214:Liptak, Kevin (4 June 2015).
5316:Liptak, Andrew (5 May 2019).
5049:American Intelligence Journal
4956:
4414:
3612:Democratic National Committee
2863:
2654:
2164:
13894:Computer security procedures
13659:Future of Humanity Institute
13056:Potentially hazardous object
12956:Interplanetary contamination
11668:10.1080/01402390.2011.608939
11656:Journal of Strategic Studies
11574:The New York Review of Books
11507:. Farnham, Surrey: Ashgate.
11393:Resources in other libraries
11209:. Retrieved 8 November 2011.
11091:10.1080/01402390.2011.608939
11079:Journal of Strategic Studies
11039:. Retrieved 8 November 2011.
10991:. Retrieved 8 November 2011.
10878:10.1007/978-3-319-25512-5_10
10132:, Sept/Oct. 2010, pp. 97β108
9461:"Stuxnet: What Has Changed?"
8779:Boyd, Clark. (17 June 2010)
8612:Kim, Eun-jung (April 2013).
8382:. Retrieved 8 November 2011.
8297:Poornima, B. (August 2022).
7940:Sanders, Sam (4 June 2015).
7075:www.careersinthemilitary.com
6542:. Retrieved 8 November 2011.
6188:Sanders, Sam (4 June 2015).
6026:, James A. Lewis, April 2010
5518:"Principles of Cyberwarfare"
4848:List of cyber warfare forces
4519:Journal of Strategic Studies
4352:were accused by the Russian
3557:2007 cyberattacks on Estonia
3278:presented evidence multiple
3262:2013 South Korea cyberattack
3217:(NIC) has begun an inquiry.
3167:Ministry of External Affairs
3092:The 2018 cyberattack on the
2999:List of cyber warfare forces
2912:Market for zero-day exploits
2781:One cyber warfare scenario,
2376:
2256:militarization of cyberspace
7:
13914:Hacking (computer security)
13539:Nemesis (hypothetical star)
12688:Global terrestrial stilling
12283:Information risk management
12204:Multi-factor authentication
11760:Related security categories
11443:. Oxford University Press.
11347:(in German). Archived from
11224:, Arstechnica, 18 June 2013
7346:10.1016/j.orbis.2014.11.009
6701:Strategic Studies Quarterly
5147:"APT trends report Q1 2019"
5018:"Cyberwar β does it exist?"
4883:United States Cyber Command
4765:
4631:
4591:agreed to install a secure
4328:United States Cyber Command
4117:Central Intelligence Agency
3734:with the recipe for making
3662:Rocket Forces and Artillery
3571:computers. He was studying
3567:to lead hacking attacks on
3473:leaked details of the U.S.
3266:In July 2009, there were a
3215:National Informatics Center
2749:
2649:United States Cyber Command
2489:
1521:Militaryβindustrial complex
995:Operational manoeuvre group
10:
13980:
13051:Asteroid impact prediction
13026:Heat death of the universe
12436:Mutual assured destruction
12260:Intrusion detection system
12218:Computer security software
11874:Advanced persistent threat
11166:Russian Embassy to the UK
10178:The Evolution of Cyber War
10176:Mazanec, Brain M. (2015).
9763:. Symantec. 16 August 2012
9297:The Evolution of Cyber War
9295:Mazanec, Brain M. (2015).
9076:W. W. Norton & Company
8992:"Defensie Cyber Strategie"
7443:hoffmacd (18 April 2010).
5363:10.1016/j.cose.2014.11.007
4828:Fifth Dimension Operations
4694:
4635:
4620:remain neutral in conflict
4418:
4372:
4219:Tailored Access Operations
4052:
4046:
3781:
3775:
3769:
3720:
3647:
3540:
3534:
3523:
3489:
3449:
3445:
3423:
3403:
3336:WannaCry ransomware attack
3329:
3259:
3179:Indo-Tibetan Border Police
3099:Ministry of State Security
3015:
2996:
2993:Cyber activities by nation
2905:
2858:telecommunications systems
2856:, financial networks, and
2850:internet service providers
2600:Iranian hackers, possibly
2528:
2335:Advanced persistent threat
2328:
2322:
2282:Cyberwarfare vs. cyber war
36:
29:
13838:
13743:
13677:
13669:Nuclear Threat Initiative
13646:
13602:List of apocalyptic films
13579:
13445:2011 end times prediction
13437:
13177:Prophecy of Seventy Weeks
13172:Abomination of desolation
13108:
13046:Asteroid impact avoidance
12983:
12894:
12876:List of extinction events
12851:
12844:
12810:
12718:Environmental degradation
12614:
12605:
12520:
12505:Technological singularity
12374:
12349:
12343:Global catastrophic risks
12159:
11859:
11845:
11839:Digital rights management
11759:
11528:Gaycken, Sandro. (2012).
11388:Resources in your library
11113:"Cybersecurity Framework"
9628:The Sydney Morning Herald
9376:The Chris Science Monitor
8967:, Kazinform, 18 June 2013
8426:. Threatpost. 7 July 2016
8315:10.1177/23477970221099748
7856:. London. 4 December 2010
7071:"Careers in the Military"
7010:"Awaiting the Cyber 9/11"
6936:. Routledge. p. 75.
6779:10.1007/s11127-006-9051-y
6456:The Sydney Morning Herald
5753:. London. 26 August 2017.
4715:Darknet, Hacker, Cyberwar
4441:Cyber counterintelligence
3849:
3631:
3549:denial of service attacks
3530:
3519:
3513:Dutch Ministry of Defense
3419:
3414:Bronze Soldier of Tallinn
3370:
3365:
3340:
3183:National Security Advisor
2827:Nagorno-Karabakh conflict
1585:Loss-of-strength gradient
437:Combat information center
32:Cyberwar (disambiguation)
13664:Future of Life Institute
13566:Resurrection of the dead
13559:Post-tribulation rapture
12941:Colony collapse disorder
11984:Denial-of-service attack
11879:Arbitrary code execution
11639:. Idea Group Inc (IGI).
11549:Strategic Cyber Security
11544:Strategic Cyber Security
11542:Geers, Kenneth. (2011).
11532:. Goldmann/Randomhouse.
11169:. Retrieved 25 May 2012.
10547:10.3390/economies8010002
8676:, New York Times (2018).
7217:Lee, Andy (1 May 2012).
7176:23 February 2010 at the
7034:Gaycken, Sandro (2010).
6588:Buchan, Russell (2012).
5670:10.1177/0096340210393703
4915:Convention on Cybercrime
4858:Military-digital complex
4773:Automated teller machine
4638:Films about cyberwarfare
4461:On 9 February 2009, the
4354:Federal Security Service
4346:National Security Agency
4217:magazine article, NSA's
4132:National Security Agency
3983:
3854:In the 2006 war against
3698:On 23 December 2015 the
3475:National Security Agency
3345:
3204:Mumbai terrorist attacks
3171:Ministry of Home Affairs
3142:
3011:
2935:University of Cincinnati
2839:
2531:Denial-of-service attack
2525:Denial-of-service attack
2417:Massive spying by the US
2395:program under which the
2091:and/or disrupting vital
1903:Military science fiction
1388:Technology and equipment
804:List of military tactics
37:Not to be confused with
13919:Information sensitivity
13833:Cyberwarfare by country
12490:Artificial intelligence
12194:Computer access control
12146:Rogue security software
11809:Electromagnetic warfare
11453:Carr, Jeffrey. (2010).
11207:The Wall Street Journal
11065:Foreign Policy Magazine
11013:CCD COE β Cyber Defence
10463:The Wall Street Journal
9968:The Wall Street Journal
9950:The Wall Street Journal
9510:1 February 2014 at the
9206:. NYT. 15 October 2016.
9031:3 December 2008 at the
8963:1 November 2013 at the
7906:The Wall Street Journal
7318:Denning, D. E. (2008).
7158:The Wall Street Journal
6928:Molfino, Emily (2012).
6540:The Wall Street Journal
6521:30 October 2020 at the
6022:7 November 2015 at the
5495:10.1023/A:1010066528521
5477:Arquilla, John (1999).
5429:, HarperCollins (2010)
5043:Smith, Troy E. (2013).
4888:Air Force Cyber Command
4868:Proactive cyber defence
4480:, NATO established the
4473:and the private sector.
4383:Sandworm (hacker group)
4332:Russian electrical grid
4146:and private companies.
4065:proactive cyber defence
3876:Following US President
3784:Operation Olympic Games
3765:
3410:came under cyber attack
3408:In April 2007, Estonia
3006:
2264:National Health Service
2155:kinetic military action
1971:Wartime sexual violence
1727:Full-spectrum dominance
1538:Supply-chain management
13619:List of disaster films
13460:Apocalyptic literature
12560:Malthusian catastrophe
12486:Synthetic intelligence
12240:Obfuscation (software)
11969:Browser Helper Objects
11853:
11581:Harris, Shane (2014).
11239:7 October 2011 at the
10571:Onder, Mehmet (2021).
10528:Onder, Mehmet (2020).
10124:Lynn, William J. III.
9491:AFP (1 October 2010).
9247:7 January 2017 at the
9152:. NYT. 7 October 2016.
8792:Scott J. Shackelford,
8567:. Command Five Pty Ltd
8511:17 August 2009 at the
7051:Cite journal requires
6738:. RUSI. Archived from
5962:United States Congress
5351:Computers and Security
5082:Lucas, George (2017).
4512:Doubts about existence
4471:United States Congress
3968:
3932:
3917:
3815:
3745:, the director of the
3682:Ukrainian Armed Forces
3585:2008 South Ossetia War
3583:by hackers during the
3537:Cyberwarfare in Russia
3302:
2939:Kaspersky Security Lab
2868:Politically motivated
2633:
2552:
2408:
2357:, equates large-scale
2210:
2201:
2183:
2153:The first instance of
1883:Awards and decorations
1856:Peace through strength
1831:Low-intensity conflict
1465:Conscientious objector
1338:Area of responsibility
67:
13899:Computing terminology
13001:Coronal mass ejection
12463:Electromagnetic pulse
12424:Kinetic energy weapon
12235:Data-centric security
12116:Remote access trojans
11851:
11600:Hunt, Edward (2012).
11546:. NATO Cyber Centre.
10602:– via ProQuest.
10218:21 September 2012 at
9761:"The Shamoon Attacks"
7228:Jeju Peace Institute.
7224:27 March 2012 at the
7017:Joint Force Quarterly
6761:Cowen, Tyler (2006).
6300:24 March 2012 at the
5789:Kello, Lucas (2022).
5717:Kello, Lucas (2017).
5650:Deibert, Ron (2011).
5522:IEEE Security Privacy
5267:) CS1 maint: others (
5086:. Oxford. p. 6.
4683:Terminator: Dark Fate
4661:Live Free or Die Hard
4610:On the February 2017
4409:plausible deniability
4190:data stream had been
4126:), headed by General
3966:
3930:
3915:
3860:Israel Defense Forces
3813:
3782:Further information:
3638:Sweden's armed forces
3462:cyber defence station
3330:Further information:
3300:
3116:In February 2024 The
3025:Anti-satellite weapon
3018:Cyberwarfare by China
2906:Further information:
2757:In the U.S., General
2715:The idea of a "cyber
2711:Surprise cyber attack
2661:psychological warfare
2624:
2556:Electrical power grid
2551:in the United Kingdom
2549:electrical substation
2546:
2384:
2331:List of hacker groups
2329:Further information:
2205:
2196:
2179:
2159:Israel Defense Forces
470:Torpedo data computer
460:Ship gun fire-control
53:
13949:Security engineering
13403:War of Gog and Magog
13080:Near-Earth supernova
12830:Human overpopulation
12634:Mass mortality event
12528:Anthropogenic hazard
12167:Application security
12061:Privilege escalation
11929:Cross-site scripting
11782:Cybersex trafficking
11753:Information security
11707:at Wikimedia Commons
11618:10.1109/mahc.2011.82
11439:Brenner, S. (2009).
10940:CyberPeace Institute
10785:. World Scientific.
9988:. 20 September 2018.
9642:"Pastie: 'Untitled'"
9170:. United States Code
8843:on 24 September 2020
8705:29 July 2020 at the
8662:. 22 September 2020.
8616:. Yonhap News Agency
8538:. 29 December 2011.
8185:on 17 September 2020
7749:17 June 2013 at the
7294:Minnesota Law Review
7245:. 27 September 2020.
7200:22 July 2011 at the
7119:19 July 2013 at the
7004:Magee, Clifford S. (
6823:on 19 September 2020
5534:10.1109/MSP.2011.138
5202:World Economic Forum
4873:Signals intelligence
4853:List of cyberattacks
4570:information security
4516:In October 2011 the
4303:), as well as other
4211:According to a 2013
4098:Secretary of Defense
4007:United Arab Emirates
4001:United Arab Emirates
3822:was attacked by the
3796:Operation Newscaster
3772:Cyberwarfare by Iran
3702:malware was used in
3684:). According to the
3616:Presidential finding
3479:Hans-Peter Friedrich
3241:Defence Cyber Agency
3094:Marriott hotel chain
2918:industrial espionage
2313:Obama administration
2245:Obama administration
2001:Military occupations
1836:Military engineering
1738:Unrestricted Warfare
1595:Force multiplication
488:Military manoeuvrers
13934:Military technology
13475:Blood moon prophecy
13268:Number of the Beast
12866:Holocene extinction
12812:Earth Overshoot Day
12760:Ocean acidification
12723:Habitat destruction
12713:Ecological collapse
12419:Kinetic bombardment
12354:Future of the Earth
11814:Information warfare
11772:Automotive security
11716:The Information Age
11279:Kaspersky, Eugene.
11067:, 6 September 2012.
11018:31 May 2009 at the
10989:The Washington Post
10060:on 28 December 2021
9604:21 May 2011 at the
9597:Fulghum, David A. "
9580:Fulghum, David A. "
9408:. 13 November 2013.
9231:on 25 January 2017.
9108:on 12 December 2008
9046:"www.axisglobe.com"
8940:29 May 2013 at the
8906:. 12 December 2016.
8380:The Express Tribune
7831:China's Hacker Army
7725:. 19 September 2017
6684:. 21 February 2017.
6606:10.1093/jcsl/krs014
6373:2016BuAtS..72e.284G
6320:, 24 September 2010
6005:The Times of Israel
5617:The Times of Israel
5425:Clarke, Richard A.
4893:Fleet Cyber Command
4803:Cyber-arms industry
4476:In the wake of the
4188:command and control
4157:(R-ME) and Senator
3818:In September 2010,
3551:as a part of their
3134:Ferdinand Marcos Jr
3079:Operation Shady RAT
2929:Non-profit research
2908:Cyber-arms industry
2848:of the web, to the
2683:Economic disruption
2626:It's possible that
2587:droop speed control
2566:electric power grid
2223:Controversy of term
1687:Penal military unit
1672:Rules of engagement
1348:Command and control
968:Operations research
432:Director (military)
422:Fire-control system
192:Command and control
73:Part of a series on
43:information warfare
13790:Doomsday scenarios
13356:Beast of the Earth
13248:Book of Revelation
13036:Virtual black hole
13016:False vacuum decay
12966:Pollinator decline
12929:Biological warfare
12919:Biotechnology risk
12770:Resource depletion
12223:Antivirus software
12091:Social engineering
12056:Polymorphic engine
12009:Fraudulent dialers
11914:Hardware backdoors
11854:
11471:. Kopidion Press.
11260:. 14 February 2017
11123:on 8 November 2022
10620:The New York Times
10509:. 29 December 2016
10483:. 29 December 2016
10424:The New York Times
10361:The New York Times
10319:on 24 January 2012
10297:, 13 October 2011.
10148:The New York Times
10095:The New York Times
10052:The New York Times
9986:The New York Times
9898:. 19 December 2018
9737:The New York Times
9426:. 21 October 2013.
9393:The Globe and Mail
9352:. 24 February 2022
8886:Usinenouvelle.com/
8869:. 29 January 2013.
8709:, BalkanEU (2019).
8698:Michalis Michael,
8504:Williams, Martin.
8451:The Times of India
8357:on 26 January 2013
8350:The Times of India
8103:. 12 December 2018
8077:. 12 December 2018
8042:The New York Times
7985:O'Flaherty, Kate.
7579:UK Defence Journal
7208:. 16 February 2010
7102:The New York Times
6873:The New York Times
6552:NERC Public Notice
6318:The New York Times
6041:The New York Times
5851:The New York Times
4730:The Perfect Weapon
4705:(2016) by Viceland
4669:Terminator Genisys
4627:In popular culture
4605:Alexander Merezhko
4581:Keith B. Alexander
4391:Iranian Cyber Army
4344:In June 2023, the
4322:In June 2019, the
4281:Opera Software ASA
4203:the New York Times
4184:drone and Predator
4130:, director of the
4128:Keith B. Alexander
3969:
3946:master boot record
3933:
3918:
3816:
3778:Iranian Cyber Army
3642:military exercises
3432:Jean-Yves Le Drian
3332:Sony Pictures hack
3303:
3052:In June 2015, the
3047:Chinese government
2759:Keith B. Alexander
2669:fake news websites
2602:Iranian Cyber Army
2553:
2513:The New York Times
2474:The security firm
2409:
2371:biological weapons
2311:issued during the
2235:, concluded that "
1796:Counter-insurgency
1717:Command of the sea
1662:Jewish laws on war
1637:Geneva Conventions
1173:Divide and conquer
963:Military operation
928:Tactical objective
427:Fire-control radar
404:Electronic-warfare
68:
56:United States Army
39:electronic warfare
13939:National security
13871:
13870:
13800:
13799:
13631:Zombie apocalypse
13532:Postmillennialism
13327:Great Tribulation
13100:Stellar collision
13061:Near-Earth object
13011:Geomagnetic storm
12979:
12978:
12902:Biodiversity loss
12886:Genetic pollution
12840:
12839:
12629:Biodiversity loss
12592:Societal collapse
12570:Nuclear holocaust
12555:Economic collapse
12538:Doomsday argument
12456:Antimatter weapon
12309:
12308:
12271:Anomaly detection
12176:Secure by default
12029:Keystroke loggers
11964:Drive-by download
11852:vectorial version
11819:Internet security
11767:Computer security
11703:Media related to
11646:978-1-59140-992-2
11558:978-9949-9040-7-5
11495:978-0-275-97423-7
11463:978-0-596-80215-8
11374:Library resources
11320:Naval War College
10887:978-3-319-25511-8
10372:Satter, Raphael.
10356:Sanger, David E.
10295:Los Angeles Times
10255:on 23 August 2010
9478:10.3390/fi4030672
9052:on 17 August 2016
8817:on 5 January 2019
8685:Lily Hay Newman,
8278:. 8 November 2022
8211:. 5 February 2024
8016:answers.kroll.com
7553:www.ncia.nato.int
7474:www.kaspersky.com
7139:Los Angeles Times
6943:978-1-4094-2754-4
6341:978-0-19-991809-6
5932:"Cyber Sanctions"
4920:Vulkan files leak
4778:Computer security
4577:freedom of speech
4530:Legal perspective
4506:cyber attribution
4450:On 7 April 2009,
4309:Microsoft Windows
4305:operating systems
4078:Richard A. Clarke
4061:military strategy
3882:Iran nuclear deal
3871:Operation Orchard
3864:Richard A. Clarke
3792:Operation Cleaver
3741:In October 2010,
3636:In January 2017,
3590:In October 2016,
3573:computer sciences
3466:Gerhard Schindler
3307:SK Communications
3292:cyber attribution
3187:Shivshankar Menon
3039:Diplomatic cables
2881:Income generation
2874:computer networks
2663:, except it uses
2217:Richard A. Clarke
2083:against an enemy
2074:
2073:
1966:Horses in warfare
1913:Anti-war movement
1816:Gunboat diplomacy
1806:Disaster response
1754:Philosophy of war
1749:Principles of war
1722:Deterrence theory
1667:Right of conquest
1590:Lanchester's laws
1358:Principles of war
1048:Counter-offensive
1028:Military campaign
933:Target saturation
856:Counterinsurgency
465:Gun data computer
399:Close air support
361:Aircraft carriers
64:training exercise
16:(Redirected from
13971:
13827:
13820:
13813:
13804:
13803:
13765:
13764:
13756:World portal
13754:
13753:
13715:Financial crisis
13544:Nibiru cataclysm
13522:Premillennialism
13366:Dhul-Suwayqatayn
13334:Son of perdition
13322:Olivet Discourse
13298:Whore of Babylon
12924:Biological agent
12871:Human extinction
12861:Extinction event
12849:
12848:
12820:Overexploitation
12750:Land consumption
12745:Land degradation
12612:
12611:
12474:Micro black hole
12382:Chemical warfare
12336:
12329:
12322:
12313:
12312:
12180:Secure by design
12111:Hardware Trojans
11944:History sniffing
11934:Cross-site leaks
11829:Network security
11746:
11739:
11732:
11723:
11722:
11714:
11702:
11679:
11650:
11629:
11596:
11518:
11499:
11361:
11360:
11358:
11356:
11341:
11335:
11334:
11332:
11330:
11315:
11309:
11302:
11296:
11295:
11293:
11291:
11276:
11270:
11269:
11267:
11265:
11250:
11244:
11231:
11225:
11218:Sean Gallagher,
11216:
11210:
11199:
11193:
11192:
11190:
11188:
11176:
11170:
11164:
11158:
11157:
11155:
11153:
11147:www.worldcat.org
11139:
11133:
11132:
11130:
11128:
11109:
11103:
11102:
11074:
11068:
11057:
11051:
11046:
11040:
11029:
11023:
11010:
11004:
10998:
10992:
10982:
10976:
10970:
10964:
10958:
10952:
10951:
10949:
10947:
10932:
10926:
10925:
10923:
10921:
10898:
10892:
10891:
10865:
10859:
10858:
10856:
10844:
10838:
10837:
10835:
10833:
10810:
10804:
10803:
10801:
10799:
10776:
10767:
10766:
10759:
10753:
10752:
10744:
10735:
10722:
10716:
10715:
10713:
10711:
10694:
10688:
10687:
10685:
10683:
10666:
10660:
10659:
10657:
10655:
10638:
10632:
10631:
10629:
10627:
10610:
10604:
10603:
10577:
10568:
10562:
10561:
10559:
10549:
10525:
10519:
10518:
10516:
10514:
10499:
10493:
10492:
10490:
10488:
10473:
10467:
10466:
10454:
10448:
10441:
10435:
10434:
10432:
10430:
10415:
10409:
10396:
10390:
10383:
10377:
10370:
10364:
10354:
10348:
10347:
10335:
10329:
10328:
10326:
10324:
10315:. Archived from
10304:
10298:
10287:
10281:
10271:
10265:
10264:
10262:
10260:
10251:. Archived from
10245:
10239:
10233:
10227:
10224:Information Week
10210:
10204:
10198:
10192:
10191:
10173:
10167:
10166:
10164:
10162:
10139:
10133:
10122:
10116:
10107:
10098:
10088:
10082:
10076:
10070:
10069:
10067:
10065:
10059:
10054:. Archived from
10043:
10037:
10036:
10034:
10032:
10018:
10012:
10011:
10009:
10007:
9996:
9990:
9989:
9978:
9972:
9971:
9960:
9954:
9953:
9952:. 26 March 2018.
9942:
9936:
9935:
9933:
9931:
9914:
9908:
9907:
9905:
9903:
9888:
9882:
9881:
9879:
9877:
9872:. 29 August 2012
9866:
9860:
9859:
9857:
9855:
9850:. 17 August 2012
9838:
9832:
9831:
9829:
9827:
9822:. 18 August 2012
9812:
9806:
9805:
9801:
9795:
9794:
9792:
9790:
9779:
9773:
9772:
9770:
9768:
9757:
9748:
9747:
9745:
9743:
9729:
9723:
9709:
9707:
9705:
9700:
9691:
9682:
9681:
9679:
9677:
9660:
9654:
9653:
9651:
9649:
9638:
9632:
9631:
9619:
9613:
9595:
9589:
9578:
9572:
9571:
9569:
9567:
9552:
9546:
9540:
9534:
9533:
9521:
9515:
9502:
9496:
9489:
9483:
9482:
9480:
9456:
9450:
9449:
9447:
9445:
9434:
9428:
9427:
9416:
9410:
9409:
9402:
9396:
9386:
9380:
9379:
9368:
9362:
9361:
9359:
9357:
9342:
9336:
9335:
9333:
9331:
9317:
9311:
9310:
9292:
9286:
9285:(6 January 2017)
9283:Interfax-Ukraine
9276:
9270:
9269:
9262:
9256:
9255:(6 January 2017)
9239:
9233:
9232:
9227:. Archived from
9214:
9208:
9207:
9200:
9194:
9193:
9186:
9180:
9179:
9177:
9175:
9160:
9154:
9153:
9146:
9140:
9139:
9137:
9135:
9124:
9118:
9117:
9115:
9113:
9104:. Archived from
9093:
9087:
9068:
9062:
9061:
9059:
9057:
9048:. Archived from
9042:
9036:
9023:
9017:
9016:
9015:. 29 March 2017.
9013:"Cyber commando"
9009:
9003:
9002:
9000:
8998:
8988:
8982:
8981:
8974:
8968:
8955:
8949:
8932:
8926:
8925:
8924:on 15 June 2013.
8920:. Archived from
8914:
8908:
8907:
8896:
8890:
8889:
8877:
8871:
8870:
8859:
8853:
8852:
8850:
8848:
8833:
8827:
8826:
8824:
8822:
8813:. Archived from
8811:www.atlantico.fr
8803:
8797:
8790:
8784:
8777:
8771:
8758:
8752:
8742:
8736:
8735:
8733:
8731:
8716:
8710:
8696:
8690:
8683:
8677:
8670:
8664:
8663:
8652:
8646:
8645:
8632:
8626:
8625:
8623:
8621:
8609:
8603:
8602:
8600:
8598:
8583:
8577:
8576:
8574:
8572:
8566:
8558:
8552:
8551:
8549:
8547:
8526:
8520:
8502:
8496:
8489:
8483:
8482:
8476:
8468:
8462:
8461:
8459:
8457:
8442:
8436:
8435:
8433:
8431:
8420:
8414:
8413:
8401:
8395:
8389:
8383:
8373:
8367:
8366:
8364:
8362:
8341:
8335:
8334:
8294:
8288:
8287:
8285:
8283:
8268:
8262:
8261:
8259:
8257:
8243:
8232:
8227:
8221:
8220:
8218:
8216:
8201:
8195:
8194:
8192:
8190:
8181:. Archived from
8170:
8164:
8163:
8161:
8159:
8145:
8139:
8138:
8136:
8134:
8119:
8113:
8112:
8110:
8108:
8093:
8087:
8086:
8084:
8082:
8067:
8061:
8060:
8058:
8056:
8033:
8027:
8026:
8024:
8022:
8008:
8002:
8001:
7999:
7997:
7982:
7976:
7975:
7973:
7971:
7956:
7950:
7949:
7937:
7931:
7930:
7923:
7917:
7916:
7914:
7912:
7897:
7891:
7890:
7888:
7886:
7872:
7866:
7865:
7863:
7861:
7846:
7840:
7827:
7821:
7820:
7818:
7816:
7811:on 10 March 2011
7797:
7791:
7790:
7788:
7786:
7781:on 10 March 2011
7767:
7758:
7741:
7735:
7734:
7732:
7730:
7715:
7709:
7708:
7706:
7704:
7689:
7683:
7682:
7680:
7678:
7664:The Sunday Times
7655:
7649:
7648:
7646:
7644:
7621:
7615:
7614:
7612:
7610:
7596:
7590:
7589:
7587:
7585:
7570:
7564:
7563:
7561:
7559:
7545:
7539:
7538:
7536:
7534:
7524:"Locked Shields"
7520:
7511:
7510:
7508:
7506:
7492:
7486:
7485:
7483:
7481:
7466:
7460:
7459:
7457:
7455:
7440:
7434:
7433:
7431:
7429:
7415:
7409:
7403:
7397:
7396:
7394:
7392:
7381:
7375:
7374:
7372:
7370:
7356:
7350:
7349:
7329:
7323:
7316:
7310:
7309:
7289:
7280:
7279:
7268:
7262:
7261:
7253:
7247:
7246:
7235:
7229:
7215:
7209:
7191:
7185:
7168:
7162:
7161:
7149:
7143:
7142:
7130:
7124:
7111:
7105:
7095:
7086:
7085:
7083:
7081:
7067:
7061:
7060:
7054:
7049:
7047:
7039:
7031:
7025:
7024:
7014:
7001:
6995:
6983:
6981:
6979:
6960:(27 July 2009).
6954:
6948:
6947:
6925:
6919:
6916:
6910:
6909:
6907:
6905:
6890:
6884:
6883:
6881:
6879:
6864:
6858:
6857:
6855:
6853:
6839:
6833:
6832:
6830:
6828:
6813:
6807:
6806:
6773:(1/2): 233β244.
6758:
6752:
6751:
6749:
6747:
6742:on 29 March 2018
6731:
6725:
6724:
6692:
6686:
6685:
6674:
6668:
6667:
6654:
6645:
6644:
6632:
6626:
6625:
6585:
6579:
6573:
6567:
6561:
6555:
6549:
6543:
6532:
6526:
6513:
6507:
6500:
6494:
6487:
6481:
6480:
6474:
6466:
6464:
6462:
6447:
6441:
6440:
6438:
6436:
6431:on 18 March 2021
6427:. Archived from
6425:us-cert.cisa.gov
6417:
6411:
6410:
6400:
6352:
6346:
6345:
6327:
6321:
6311:
6305:
6292:
6286:
6285:
6279:
6271:
6263:
6257:
6256:
6254:
6252:
6237:
6231:
6230:
6228:
6226:
6211:
6205:
6204:
6202:
6200:
6185:
6179:
6157:
6151:
6150:
6148:
6146:
6131:
6125:
6124:
6122:
6120:
6111:. Archived from
6109:First Look Media
6094:
6088:
6087:
6085:
6083:
6066:
6060:
6059:
6057:
6055:
6033:
6027:
6014:
6008:
5998:
5992:
5991:
5979:
5973:
5972:
5970:
5968:
5953:
5947:
5946:
5944:
5942:
5928:
5922:
5921:
5919:
5917:
5903:
5897:
5896:
5894:
5892:
5877:
5871:
5870:
5868:
5866:
5841:
5835:
5834:
5832:
5830:
5813:
5807:
5806:
5786:
5780:
5779:
5777:
5770:
5761:
5755:
5754:
5741:
5735:
5734:
5714:
5708:
5707:
5705:
5703:
5688:
5682:
5681:
5647:
5641:
5629:
5620:
5610:
5601:
5600:
5598:
5596:
5577:
5571:
5570:
5560:
5554:
5553:
5513:
5507:
5506:
5474:
5468:
5467:
5465:
5463:
5454:. Archived from
5443:
5437:
5423:
5410:
5409:
5383:
5374:
5373:
5371:
5369:
5342:
5333:
5332:
5330:
5328:
5313:
5307:
5306:
5304:
5302:
5279:
5273:
5272:
5262:
5254:
5229:
5214:
5213:
5211:
5209:
5194:
5188:
5187:
5185:
5183:
5169:
5163:
5162:
5160:
5158:
5143:
5137:
5136:
5134:
5132:
5118:
5112:
5111:
5105:
5097:
5079:
5073:
5072:
5040:
5034:
5033:
5031:
5029:
5014:
5008:
5007:
5001:
4993:
4967:
4863:Penetration test
4808:Cyber-collection
4709:Cyber War Threat
4645:Independence Day
4593:Cyberwar-Hotline
4164:Kill switch bill
3995:Ahmed Al-Rumaihi
3788:Operation Ababil
3510:
3177:(DRDO), and the
2854:Electrical grids
2761:, first head of
2741:
2693:Petya (NotPetya)
2564:admits that the
2351:Eugene Kaspersky
2344:Types of warfare
2309:Executive Orders
2293:Strait of Hormuz
2229:Eugene Kaspersky
2113:economic warfare
2093:computer systems
2066:
2059:
2052:
1821:Humanitarian aid
1759:Security dilemma
1580:Power projection
1363:Economy of force
1343:Chain of command
1058:Defence in depth
1043:Commerce raiding
861:Defeat in detail
197:Defense ministry
101:
92:
91:
82:
70:
69:
21:
13979:
13978:
13974:
13973:
13972:
13970:
13969:
13968:
13889:Warfare by type
13874:
13873:
13872:
13867:
13863:Other countries
13834:
13831:
13801:
13796:
13775:Future problems
13748:
13739:
13673:
13642:
13609:Climate fiction
13575:
13450:2012 phenomenon
13433:
13339:Sheep and Goats
13226:2 Thessalonians
13104:
13021:Gamma-ray burst
12975:
12890:
12881:Genetic erosion
12836:
12806:
12797:Water pollution
12765:Ozone depletion
12661:Desertification
12601:
12516:
12451:Doomsday device
12431:Nuclear warfare
12370:
12345:
12340:
12310:
12305:
12155:
11855:
11843:
11834:Copy protection
11824:Mobile security
11755:
11750:
11695:
11647:
11593:
11515:
11496:
11399:
11398:
11397:
11382:
11381:
11377:
11370:
11368:Further reading
11365:
11364:
11354:
11352:
11351:on 4 April 2017
11343:
11342:
11338:
11328:
11326:
11316:
11312:
11303:
11299:
11289:
11287:
11277:
11273:
11263:
11261:
11252:
11251:
11247:
11241:Wayback Machine
11232:
11228:
11217:
11213:
11200:
11196:
11186:
11184:
11177:
11173:
11165:
11161:
11151:
11149:
11141:
11140:
11136:
11126:
11124:
11111:
11110:
11106:
11075:
11071:
11058:
11054:
11047:
11043:
11030:
11026:
11020:Wayback Machine
11011:
11007:
10999:
10995:
10983:
10979:
10971:
10967:
10959:
10955:
10945:
10943:
10934:
10933:
10929:
10919:
10917:
10915:
10899:
10895:
10888:
10866:
10862:
10845:
10841:
10831:
10829:
10827:
10811:
10807:
10797:
10795:
10793:
10777:
10770:
10761:
10760:
10756:
10745:
10738:
10734:. 7 March 2017.
10723:
10719:
10709:
10707:
10696:
10695:
10691:
10681:
10679:
10667:
10663:
10653:
10651:
10639:
10635:
10625:
10623:
10611:
10607:
10575:
10569:
10565:
10526:
10522:
10512:
10510:
10501:
10500:
10496:
10486:
10484:
10475:
10474:
10470:
10455:
10451:
10442:
10438:
10428:
10426:
10416:
10412:
10408:. 11 June 2013.
10397:
10393:
10384:
10380:
10371:
10367:
10355:
10351:
10336:
10332:
10322:
10320:
10313:InformationWeek
10305:
10301:
10289:Hennigan, W.J.
10288:
10284:
10272:
10268:
10258:
10256:
10247:
10246:
10242:
10234:
10230:
10211:
10207:
10199:
10195:
10188:
10174:
10170:
10160:
10158:
10140:
10136:
10130:Foreign Affairs
10123:
10119:
10108:
10101:
10089:
10085:
10077:
10073:
10063:
10061:
10044:
10040:
10030:
10028:
10020:
10019:
10015:
10005:
10003:
9998:
9997:
9993:
9980:
9979:
9975:
9962:
9961:
9957:
9944:
9943:
9939:
9929:
9927:
9926:. 3 August 2015
9916:
9915:
9911:
9901:
9899:
9890:
9889:
9885:
9875:
9873:
9868:
9867:
9863:
9853:
9851:
9840:
9839:
9835:
9825:
9823:
9820:Digital Journal
9814:
9813:
9809:
9802:
9798:
9788:
9786:
9785:. 5 August 2015
9781:
9780:
9776:
9766:
9764:
9759:
9758:
9751:
9741:
9739:
9730:
9726:
9703:
9701:
9698:
9692:
9685:
9675:
9673:
9672:. 5 August 2015
9662:
9661:
9657:
9647:
9645:
9640:
9639:
9635:
9620:
9616:
9606:Wayback Machine
9596:
9592:
9579:
9575:
9565:
9563:
9554:
9553:
9549:
9541:
9537:
9522:
9518:
9512:Wayback Machine
9503:
9499:
9490:
9486:
9465:Future Internet
9457:
9453:
9443:
9441:
9436:
9435:
9431:
9418:
9417:
9413:
9404:
9403:
9399:
9387:
9383:
9378:. 4 April 2012.
9370:
9369:
9365:
9355:
9353:
9344:
9343:
9339:
9329:
9327:
9319:
9318:
9314:
9307:
9293:
9289:
9277:
9273:
9264:
9263:
9259:
9249:Wayback Machine
9240:
9236:
9215:
9211:
9202:
9201:
9197:
9188:
9187:
9183:
9173:
9171:
9162:
9161:
9157:
9148:
9147:
9143:
9133:
9131:
9126:
9125:
9121:
9111:
9109:
9094:
9090:
9069:
9065:
9055:
9053:
9044:
9043:
9039:
9033:Wayback Machine
9024:
9020:
9011:
9010:
9006:
8996:
8994:
8990:
8989:
8985:
8976:
8975:
8971:
8965:Wayback Machine
8956:
8952:
8948:, 24 March 2013
8942:Wayback Machine
8933:
8929:
8916:
8915:
8911:
8898:
8897:
8893:
8878:
8874:
8861:
8860:
8856:
8846:
8844:
8835:
8834:
8830:
8820:
8818:
8805:
8804:
8800:
8791:
8787:
8778:
8774:
8759:
8755:
8743:
8739:
8729:
8727:
8718:
8717:
8713:
8707:Wayback Machine
8697:
8693:
8689:, Wired (2018).
8684:
8680:
8672:David E Sanger
8671:
8667:
8654:
8653:
8649:
8644:. 27 June 2020.
8634:
8633:
8629:
8619:
8617:
8610:
8606:
8596:
8594:
8586:Lee, Se Young.
8584:
8580:
8570:
8568:
8564:
8560:
8559:
8555:
8545:
8543:
8528:
8527:
8523:
8513:Wayback Machine
8503:
8499:
8490:
8486:
8474:
8470:
8469:
8465:
8455:
8453:
8443:
8439:
8429:
8427:
8422:
8421:
8417:
8404:Pauli, Darren.
8402:
8398:
8390:
8386:
8374:
8370:
8360:
8358:
8343:
8342:
8338:
8295:
8291:
8281:
8279:
8270:
8269:
8265:
8255:
8253:
8245:
8244:
8235:
8228:
8224:
8214:
8212:
8203:
8202:
8198:
8188:
8186:
8171:
8167:
8157:
8155:
8147:
8146:
8142:
8132:
8130:
8120:
8116:
8106:
8104:
8095:
8094:
8090:
8080:
8078:
8075:The Independent
8069:
8068:
8064:
8054:
8052:
8034:
8030:
8020:
8018:
8010:
8009:
8005:
7995:
7993:
7983:
7979:
7969:
7967:
7957:
7953:
7938:
7934:
7929:. 22 June 2015.
7925:
7924:
7920:
7910:
7908:
7898:
7894:
7884:
7882:
7874:
7873:
7869:
7859:
7857:
7848:
7847:
7843:
7839:. 3 March 2010.
7828:
7824:
7814:
7812:
7799:
7798:
7794:
7784:
7782:
7769:
7768:
7761:
7751:Wayback Machine
7742:
7738:
7728:
7726:
7717:
7716:
7712:
7702:
7700:
7690:
7686:
7676:
7674:
7656:
7652:
7642:
7640:
7622:
7618:
7608:
7606:
7598:
7597:
7593:
7583:
7581:
7571:
7567:
7557:
7555:
7547:
7546:
7542:
7532:
7530:
7522:
7521:
7514:
7504:
7502:
7494:
7493:
7489:
7479:
7477:
7468:
7467:
7463:
7453:
7451:
7441:
7437:
7427:
7425:
7417:
7416:
7412:
7404:
7400:
7390:
7388:
7387:. 7 August 2019
7383:
7382:
7378:
7368:
7366:
7365:. 5 August 2019
7358:
7357:
7353:
7330:
7326:
7317:
7313:
7290:
7283:
7270:
7269:
7265:
7254:
7250:
7237:
7236:
7232:
7226:Wayback Machine
7216:
7212:
7206:The Tech Herald
7202:Wayback Machine
7192:
7188:
7178:Wayback Machine
7169:
7165:
7150:
7146:
7131:
7127:
7121:Wayback Machine
7112:
7108:
7104:, 14 April 2010
7096:
7089:
7079:
7077:
7069:
7068:
7064:
7052:
7050:
7041:
7040:
7032:
7028:
7012:
7002:
6998:
6977:
6975:
6955:
6951:
6944:
6926:
6922:
6917:
6913:
6903:
6901:
6891:
6887:
6877:
6875:
6865:
6861:
6851:
6849:
6841:
6840:
6836:
6826:
6824:
6815:
6814:
6810:
6759:
6755:
6745:
6743:
6732:
6728:
6693:
6689:
6676:
6675:
6671:
6666:. 18 June 2019.
6656:
6655:
6648:
6633:
6629:
6586:
6582:
6576:ABC News: Video
6574:
6570:
6562:
6558:
6550:
6546:
6533:
6529:
6523:Wayback Machine
6514:
6510:
6501:
6497:
6488:
6484:
6468:
6467:
6460:
6458:
6448:
6444:
6434:
6432:
6419:
6418:
6414:
6353:
6349:
6342:
6328:
6324:
6312:
6308:
6302:Wayback Machine
6293:
6289:
6273:
6272:
6264:
6260:
6250:
6248:
6238:
6234:
6224:
6222:
6212:
6208:
6198:
6196:
6186:
6182:
6158:
6154:
6144:
6142:
6132:
6128:
6118:
6116:
6095:
6091:
6081:
6079:
6067:
6063:
6053:
6051:
6035:
6034:
6030:
6024:Wayback Machine
6015:
6011:
5999:
5995:
5980:
5976:
5966:
5964:
5954:
5950:
5940:
5938:
5930:
5929:
5925:
5915:
5913:
5905:
5904:
5900:
5890:
5888:
5885:The White House
5879:
5878:
5874:
5864:
5862:
5842:
5838:
5828:
5826:
5815:
5814:
5810:
5803:
5787:
5783:
5775:
5768:
5762:
5758:
5743:
5742:
5738:
5731:
5715:
5711:
5701:
5699:
5690:
5689:
5685:
5648:
5644:
5630:
5623:
5611:
5604:
5594:
5592:
5579:
5578:
5574:
5561:
5557:
5514:
5510:
5475:
5471:
5461:
5459:
5452:Financial Times
5444:
5440:
5424:
5413:
5398:
5384:
5377:
5367:
5365:
5343:
5336:
5326:
5324:
5314:
5310:
5300:
5298:
5280:
5276:
5256:
5255:
5243:
5231:
5230:
5217:
5207:
5205:
5196:
5195:
5191:
5181:
5179:
5177:www.gchq.gov.uk
5171:
5170:
5166:
5156:
5154:
5153:. 30 April 2019
5145:
5144:
5140:
5130:
5128:
5120:
5119:
5115:
5099:
5098:
5094:
5080:
5076:
5041:
5037:
5027:
5025:
5016:
5015:
5011:
4995:
4994:
4982:
4968:
4964:
4959:
4954:
4768:
4740:
4699:
4695:Main category:
4640:
4636:Main category:
4634:
4629:
4532:
4514:
4443:
4423:
4417:
4401:non-state actor
4393:
4371:
4369:Cyber mercenary
4277:Mozilla Firefox
4094:William J. Lynn
4057:
4051:
4045:
4040:
4003:
3986:
3891:
3852:
3798:
3780:
3774:
3768:
3763:
3725:
3719:
3650:
3634:
3545:
3539:
3533:
3528:
3522:
3504:
3494:
3488:
3454:
3448:
3428:
3422:
3406:
3393:Area 1 Security
3373:
3368:
3348:
3343:
3338:
3328:
3264:
3258:
3249:
3145:
3081:is a series of
3069:Washington Post
3029:Informatisation
3020:
3014:
3009:
3001:
2995:
2947:
2931:
2914:
2904:
2883:
2866:
2842:
2833:'s statements.
2817:. Hackers from
2783:Cyber-ShockWave
2752:
2735:
2729:
2713:
2685:
2657:
2641:electrical grid
2595:national trauma
2574:vulnerabilities
2558:
2533:
2527:
2492:
2379:
2346:
2341:
2327:
2321:
2319:Types of threat
2305:cyber sanctions
2301:
2284:
2254:, warned of a "
2225:
2188:Paulo Shakarian
2167:
2070:
2041:
2040:
1991:
1981:
1980:
1946:
1938:
1937:
1878:
1868:
1867:
1841:Multilateralism
1826:Law enforcement
1786:
1776:
1775:
1744:Just war theory
1702:
1692:
1691:
1642:Geneva Protocol
1612:
1602:
1601:
1575:
1565:
1564:
1506:
1496:
1495:
1403:
1393:
1392:
1333:
1323:
1322:
1288:
1278:
1277:
1208:Network-centric
1128:
1118:
1117:
1020:
1010:
1009:
958:
948:
947:
896:Rapid dominance
801:
791:
790:
746:Electromagnetic
655:
645:
644:
631:
584:
532:
508:
498:
497:
493:Combat training
474:
451:
417:Combat systems:
413:
375:
371:Auxiliary ships
337:
297:
293:Military police
259:
182:
172:
171:
111:
85:
84:
83:
78:
46:
35:
28:
23:
22:
15:
12:
11:
5:
13977:
13967:
13966:
13961:
13956:
13951:
13946:
13941:
13936:
13931:
13926:
13921:
13916:
13911:
13906:
13901:
13896:
13891:
13886:
13869:
13868:
13866:
13865:
13860:
13855:
13850:
13845:
13839:
13836:
13835:
13830:
13829:
13822:
13815:
13807:
13798:
13797:
13795:
13794:
13793:
13792:
13787:
13782:
13777:
13772:
13770:Apocalypticism
13759:
13744:
13741:
13740:
13738:
13737:
13732:
13727:
13722:
13717:
13712:
13707:
13702:
13697:
13692:
13687:
13681:
13679:
13675:
13674:
13672:
13671:
13666:
13661:
13656:
13650:
13648:
13644:
13643:
13641:
13640:
13639:
13638:
13628:
13623:
13622:
13621:
13614:Disaster films
13611:
13606:
13605:
13604:
13599:
13589:
13587:Alien invasion
13583:
13581:
13577:
13576:
13574:
13573:
13568:
13563:
13562:
13561:
13556:
13546:
13541:
13536:
13535:
13534:
13529:
13527:Amillennialism
13524:
13514:
13512:Millenarianism
13509:
13508:
13507:
13497:
13492:
13487:
13482:
13477:
13472:
13467:
13465:Apocalypticism
13462:
13457:
13452:
13447:
13441:
13439:
13435:
13434:
13432:
13431:
13430:
13429:
13419:
13414:
13413:
13412:
13411:
13410:
13405:
13400:
13390:
13389:
13388:
13383:
13378:
13373:
13368:
13363:
13361:Dhu al-Qarnayn
13358:
13353:
13343:
13342:
13341:
13336:
13331:
13330:
13329:
13319:
13314:
13309:
13307:Great Apostasy
13304:
13303:
13302:
13301:
13300:
13295:
13290:
13285:
13280:
13275:
13270:
13265:
13260:
13245:
13240:
13239:
13238:
13233:
13223:
13218:
13213:
13208:
13207:
13206:
13196:
13186:
13181:
13180:
13179:
13174:
13164:
13154:
13152:Last Judgement
13149:
13148:
13147:
13142:
13132:
13131:
13130:
13125:
13114:
13112:
13110:Eschatological
13106:
13105:
13103:
13102:
13097:
13092:
13087:
13082:
13077:
13076:
13075:
13070:
13065:
13064:
13063:
13053:
13048:
13038:
13033:
13028:
13023:
13018:
13013:
13008:
13003:
12998:
12993:
12987:
12985:
12981:
12980:
12977:
12976:
12974:
12973:
12968:
12963:
12958:
12953:
12948:
12943:
12938:
12937:
12936:
12931:
12926:
12916:
12915:
12914:
12909:
12898:
12896:
12892:
12891:
12889:
12888:
12883:
12878:
12873:
12868:
12863:
12857:
12855:
12846:
12842:
12841:
12838:
12837:
12835:
12834:
12833:
12832:
12825:Overpopulation
12822:
12816:
12814:
12808:
12807:
12805:
12804:
12802:Water scarcity
12799:
12794:
12789:
12788:
12787:
12777:
12775:Sea level rise
12772:
12767:
12762:
12757:
12752:
12747:
12742:
12741:
12740:
12738:on marine life
12735:
12725:
12720:
12715:
12710:
12705:
12700:
12695:
12693:Global warming
12690:
12685:
12683:Global dimming
12680:
12675:
12674:
12673:
12663:
12658:
12653:
12648:
12643:
12641:Cascade effect
12638:
12637:
12636:
12626:
12620:
12618:
12616:Climate change
12609:
12603:
12602:
12600:
12599:
12594:
12589:
12588:
12587:
12582:
12577:
12567:
12562:
12557:
12552:
12551:
12550:
12545:
12535:
12530:
12524:
12522:
12518:
12517:
12515:
12514:
12509:
12508:
12507:
12502:
12497:
12483:
12482:
12481:
12476:
12466:
12460:
12459:
12458:
12453:
12448:
12446:Doomsday Clock
12443:
12438:
12428:
12427:
12426:
12416:
12411:
12406:
12405:
12404:
12399:
12397:Cyberterrorism
12394:
12384:
12378:
12376:
12372:
12371:
12369:
12368:
12367:
12366:
12356:
12350:
12347:
12346:
12339:
12338:
12331:
12324:
12316:
12307:
12306:
12304:
12303:
12301:Site isolation
12298:
12293:
12292:
12291:
12285:
12275:
12274:
12273:
12268:
12257:
12252:
12247:
12242:
12237:
12232:
12231:
12230:
12225:
12215:
12214:
12213:
12208:
12207:
12206:
12199:Authentication
12191:
12190:
12189:
12188:
12187:
12177:
12174:
12163:
12161:
12157:
12156:
12154:
12153:
12148:
12143:
12138:
12133:
12128:
12123:
12118:
12113:
12108:
12103:
12098:
12093:
12088:
12083:
12078:
12073:
12068:
12063:
12058:
12053:
12052:
12051:
12041:
12036:
12031:
12026:
12021:
12016:
12011:
12006:
12001:
11999:Email spoofing
11996:
11991:
11986:
11981:
11976:
11971:
11966:
11961:
11956:
11951:
11946:
11941:
11939:DOM clobbering
11936:
11931:
11926:
11921:
11919:Code injection
11916:
11911:
11910:
11909:
11904:
11899:
11894:
11886:
11881:
11876:
11871:
11865:
11863:
11857:
11856:
11846:
11844:
11842:
11841:
11836:
11831:
11826:
11821:
11816:
11811:
11806:
11801:
11799:Cyberterrorism
11796:
11791:
11790:
11789:
11787:Computer fraud
11784:
11774:
11769:
11763:
11761:
11757:
11756:
11749:
11748:
11741:
11734:
11726:
11720:
11719:
11708:
11694:
11693:External links
11691:
11690:
11689:
11680:
11651:
11645:
11630:
11597:
11592:978-0544251793
11591:
11578:
11565:Andy Greenberg
11561:
11540:
11538:978-3442157105
11526:
11519:
11513:
11500:
11494:
11479:
11477:978-0692911563
11465:
11451:
11437:
11434:978-0071772495
11414:
11396:
11395:
11390:
11384:
11383:
11372:
11371:
11369:
11366:
11363:
11362:
11336:
11310:
11297:
11271:
11245:
11226:
11211:
11194:
11171:
11159:
11134:
11104:
11069:
11052:
11041:
11024:
11005:
10993:
10977:
10965:
10953:
10942:. 19 July 2022
10927:
10913:
10893:
10886:
10860:
10839:
10825:
10805:
10791:
10768:
10754:
10736:
10717:
10706:. 7 March 2017
10689:
10661:
10633:
10605:
10563:
10520:
10494:
10468:
10449:
10436:
10410:
10391:
10378:
10365:
10363:, 1 June 2012.
10349:
10330:
10299:
10282:
10266:
10240:
10228:
10205:
10193:
10186:
10168:
10134:
10117:
10099:
10083:
10071:
10038:
10013:
9991:
9973:
9970:. 25 May 2018.
9955:
9937:
9909:
9883:
9861:
9833:
9807:
9796:
9774:
9749:
9724:
9683:
9655:
9633:
9614:
9590:
9573:
9547:
9535:
9516:
9497:
9484:
9471:(3): 672β687.
9451:
9429:
9411:
9397:
9381:
9363:
9337:
9312:
9305:
9287:
9271:
9257:
9234:
9209:
9195:
9181:
9155:
9141:
9119:
9088:
9086:, pages 15β16.
9070:Andrew Meier,
9063:
9037:
9018:
9004:
8983:
8980:. 14 May 2013.
8969:
8950:
8927:
8909:
8891:
8872:
8867:France Culture
8854:
8828:
8798:
8785:
8772:
8753:
8737:
8711:
8691:
8678:
8665:
8660:Foreign Policy
8647:
8627:
8604:
8578:
8553:
8521:
8497:
8484:
8463:
8437:
8415:
8396:
8384:
8368:
8336:
8309:(2): 183β206.
8289:
8263:
8233:
8222:
8196:
8165:
8140:
8114:
8088:
8062:
8028:
8003:
7977:
7951:
7932:
7918:
7892:
7867:
7841:
7836:Foreign Policy
7822:
7792:
7759:
7736:
7710:
7684:
7650:
7616:
7591:
7565:
7540:
7512:
7500:SearchSecurity
7487:
7461:
7435:
7410:
7398:
7376:
7351:
7340:(1): 111β128.
7324:
7311:
7281:
7263:
7248:
7230:
7210:
7186:
7163:
7144:
7125:
7106:
7087:
7062:
7053:|journal=
7026:
6996:
6958:Arquilla, John
6949:
6942:
6920:
6911:
6885:
6859:
6834:
6808:
6753:
6726:
6687:
6669:
6646:
6627:
6600:(2): 211β227.
6580:
6568:
6566:. 9 April 2009
6556:
6544:
6527:
6508:
6495:
6482:
6442:
6412:
6367:(5): 284β291.
6347:
6340:
6322:
6306:
6287:
6258:
6232:
6206:
6180:
6177:978-0071772495
6152:
6126:
6115:on 21 May 2014
6089:
6061:
6037:"Cyberwarfare"
6028:
6009:
5993:
5974:
5948:
5923:
5898:
5887:. 1 April 2015
5872:
5836:
5825:. 23 June 2019
5808:
5801:
5781:
5756:
5736:
5729:
5709:
5698:. 28 June 2013
5683:
5642:
5640:, 4 March 2010
5621:
5602:
5572:
5555:
5508:
5489:(3): 203β212.
5469:
5458:on 6 June 2015
5438:
5411:
5396:
5375:
5334:
5308:
5274:
5241:
5215:
5189:
5164:
5151:securelist.com
5138:
5113:
5092:
5074:
5035:
5024:. 13 June 2019
5009:
4980:
4961:
4960:
4958:
4955:
4953:
4952:
4947:
4942:
4937:
4932:
4927:
4922:
4917:
4912:
4907:
4906:
4905:
4900:
4895:
4890:
4880:
4878:Silent Horizon
4875:
4870:
4865:
4860:
4855:
4850:
4845:
4840:
4835:
4830:
4825:
4820:
4815:
4813:Cyberterrorism
4810:
4805:
4800:
4795:
4790:
4785:
4780:
4775:
4769:
4767:
4764:
4763:
4762:
4753:
4739:
4736:
4735:
4734:
4726:
4718:
4712:
4706:
4693:
4692:
4688:
4687:
4679:
4673:
4665:
4657:
4649:
4633:
4630:
4628:
4625:
4612:RSA Conference
4589:Vladimir Putin
4539:Tallinn Manual
4531:
4528:
4513:
4510:
4502:
4501:
4497:
4474:
4459:
4455:
4442:
4439:
4416:
4413:
4370:
4367:
4324:New York Times
4273:Microsoft Edge
4214:Foreign Policy
4096:, U.S. Deputy
4080:, in his book
4047:Main article:
4044:
4041:
4039:
4036:
4002:
3999:
3989:lawsuit named
3985:
3982:
3907:Al-Saud regime
3890:
3887:
3851:
3848:
3807:in the field.
3805:military power
3770:Main article:
3767:
3764:
3762:
3759:
3718:
3717:United Kingdom
3715:
3686:Ukrainian army
3649:
3646:
3633:
3630:
3625:Meet The Press
3535:Main article:
3532:
3529:
3521:
3518:
3487:
3484:
3471:Edward Snowden
3447:
3444:
3421:
3418:
3405:
3402:
3381:European Union
3372:
3369:
3367:
3364:
3347:
3344:
3342:
3339:
3327:
3324:
3284:United Kingdom
3280:European Union
3260:Main article:
3257:
3254:
3248:
3245:
3144:
3141:
3034:Foreign Policy
3016:Main article:
3013:
3010:
3008:
3005:
2997:Main article:
2994:
2991:
2983:European Union
2961:, part of the
2946:
2943:
2930:
2927:
2903:
2902:Private sector
2900:
2896:European Union
2892:United Nations
2882:
2879:
2865:
2862:
2841:
2838:
2791:National Guard
2751:
2748:
2733:Sandro Gaycken
2728:
2725:
2712:
2709:
2684:
2681:
2656:
2653:
2645:New York Times
2639:said that its
2635:In June 2019,
2620:Howard Schmidt
2589:only. Massive
2583:countermeasure
2557:
2554:
2529:Main article:
2526:
2523:
2494:Computers and
2491:
2488:
2484:
2483:
2480:European Union
2472:
2465:
2458:
2439:
2424:
2421:Edward Snowden
2378:
2375:
2345:
2342:
2323:Main article:
2320:
2317:
2300:
2297:
2283:
2280:
2268:WannaCry, 2017
2241:Howard Schmidt
2237:cyberterrorism
2224:
2221:
2166:
2163:
2128:United Kingdom
2079:is the use of
2072:
2071:
2069:
2068:
2061:
2054:
2046:
2043:
2042:
2039:
2038:
2033:
2028:
2023:
2018:
2013:
2008:
2006:Military terms
2003:
1998:
1992:
1987:
1986:
1983:
1982:
1979:
1978:
1973:
1968:
1963:
1958:
1953:
1947:
1944:
1943:
1940:
1939:
1936:
1935:
1930:
1925:
1920:
1915:
1910:
1905:
1900:
1895:
1890:
1885:
1879:
1874:
1873:
1870:
1869:
1866:
1865:
1860:
1859:
1858:
1853:
1843:
1838:
1833:
1828:
1823:
1818:
1813:
1808:
1803:
1798:
1793:
1787:
1782:
1781:
1778:
1777:
1774:
1773:
1768:
1767:
1766:
1764:Tripwire force
1756:
1751:
1746:
1741:
1734:
1729:
1724:
1719:
1714:
1709:
1703:
1698:
1697:
1694:
1693:
1690:
1689:
1684:
1679:
1674:
1669:
1664:
1659:
1654:
1649:
1644:
1639:
1634:
1629:
1624:
1619:
1613:
1608:
1607:
1604:
1603:
1600:
1599:
1598:
1597:
1587:
1582:
1576:
1571:
1570:
1567:
1566:
1563:
1562:
1561:
1560:
1555:
1550:
1540:
1535:
1534:
1533:
1528:
1518:
1513:
1507:
1502:
1501:
1498:
1497:
1494:
1493:
1484:
1479:
1478:
1477:
1467:
1462:
1457:
1452:
1447:
1442:
1437:
1432:
1427:
1422:
1417:
1416:
1415:
1404:
1399:
1398:
1395:
1394:
1391:
1390:
1385:
1380:
1375:
1370:
1365:
1360:
1355:
1350:
1345:
1340:
1334:
1329:
1328:
1325:
1324:
1321:
1320:
1315:
1310:
1305:
1300:
1295:
1289:
1286:Administrative
1284:
1283:
1280:
1279:
1276:
1275:
1270:
1265:
1260:
1255:
1250:
1245:
1240:
1235:
1230:
1225:
1220:
1215:
1213:New generation
1210:
1205:
1200:
1195:
1190:
1188:Fleet in being
1185:
1180:
1175:
1170:
1165:
1160:
1155:
1150:
1145:
1140:
1135:
1129:
1126:Grand strategy
1124:
1123:
1120:
1119:
1116:
1115:
1113:Scorched earth
1110:
1105:
1100:
1095:
1090:
1085:
1080:
1075:
1070:
1065:
1060:
1055:
1050:
1045:
1040:
1035:
1030:
1021:
1016:
1015:
1012:
1011:
1008:
1007:
1002:
997:
992:
987:
985:Deep operation
982:
977:
970:
965:
959:
954:
953:
950:
949:
946:
945:
940:
935:
930:
925:
920:
915:
914:
913:
903:
898:
893:
888:
883:
878:
873:
868:
863:
858:
853:
848:
843:
838:
833:
832:
831:
826:
821:
811:
802:
797:
796:
793:
792:
789:
788:
786:Unconventional
783:
778:
773:
768:
763:
758:
753:
748:
743:
734:
732:Disinformation
729:
724:
719:
714:
709:
704:
703:
702:
697:
687:
682:
677:
672:
667:
662:
656:
651:
650:
647:
646:
643:
642:
637:
630:
629:
628:
627:
626:
625:
615:
610:
605:
600:
595:
583:
582:
581:
580:
579:
578:
568:
563:
558:
553:
548:
543:
531:
530:
529:
528:
523:
518:
509:
504:
503:
500:
499:
496:
495:
490:
485:
483:Basic training
480:
473:
472:
467:
462:
457:
450:
449:
444:
439:
434:
429:
424:
419:
412:
411:
409:Reconnaissance
406:
401:
396:
391:
386:
381:
374:
373:
368:
363:
358:
353:
348:
343:
336:
335:
330:
328:Special forces
325:
320:
319:
318:
308:
303:
296:
295:
290:
285:
283:Reconnaissance
280:
275:
270:
265:
258:
257:
248:
243:
234:
229:
224:
219:
214:
209:
204:
199:
194:
189:
183:
178:
177:
174:
173:
170:
169:
168:
167:
162:
152:
151:
150:
145:
135:
134:
133:
126:Post-classical
123:
118:
112:
107:
106:
103:
102:
94:
93:
75:
74:
26:
9:
6:
4:
3:
2:
13976:
13965:
13962:
13960:
13957:
13955:
13952:
13950:
13947:
13945:
13942:
13940:
13937:
13935:
13932:
13930:
13927:
13925:
13922:
13920:
13917:
13915:
13912:
13910:
13907:
13905:
13902:
13900:
13897:
13895:
13892:
13890:
13887:
13885:
13882:
13881:
13879:
13864:
13861:
13859:
13858:United States
13856:
13854:
13851:
13849:
13846:
13844:
13841:
13840:
13837:
13828:
13823:
13821:
13816:
13814:
13809:
13808:
13805:
13791:
13788:
13786:
13785:Risk analysis
13783:
13781:
13778:
13776:
13773:
13771:
13768:
13767:
13760:
13758:
13757:
13752:
13746:
13745:
13742:
13736:
13733:
13731:
13730:Social crisis
13728:
13726:
13723:
13721:
13718:
13716:
13713:
13711:
13708:
13706:
13703:
13701:
13698:
13696:
13693:
13691:
13688:
13686:
13683:
13682:
13680:
13676:
13670:
13667:
13665:
13662:
13660:
13657:
13655:
13652:
13651:
13649:
13647:Organizations
13645:
13637:
13634:
13633:
13632:
13629:
13627:
13624:
13620:
13617:
13616:
13615:
13612:
13610:
13607:
13603:
13600:
13598:
13595:
13594:
13593:
13590:
13588:
13585:
13584:
13582:
13578:
13572:
13571:World to come
13569:
13567:
13564:
13560:
13557:
13555:
13552:
13551:
13550:
13547:
13545:
13542:
13540:
13537:
13533:
13530:
13528:
13525:
13523:
13520:
13519:
13518:
13517:Millennialism
13515:
13513:
13510:
13506:
13505:Messianic Age
13503:
13502:
13501:
13498:
13496:
13493:
13491:
13490:Gog and Magog
13488:
13486:
13483:
13481:
13480:Earth Changes
13478:
13476:
13473:
13471:
13468:
13466:
13463:
13461:
13458:
13456:
13453:
13451:
13448:
13446:
13443:
13442:
13440:
13436:
13428:
13425:
13424:
13423:
13420:
13418:
13415:
13409:
13406:
13404:
13401:
13399:
13396:
13395:
13394:
13391:
13387:
13384:
13382:
13379:
13377:
13374:
13372:
13369:
13367:
13364:
13362:
13359:
13357:
13354:
13352:
13349:
13348:
13347:
13344:
13340:
13337:
13335:
13332:
13328:
13325:
13324:
13323:
13320:
13318:
13317:New Jerusalem
13315:
13313:
13310:
13308:
13305:
13299:
13296:
13294:
13293:War in Heaven
13291:
13289:
13288:Two witnesses
13286:
13284:
13281:
13279:
13276:
13274:
13271:
13269:
13266:
13264:
13261:
13259:
13256:
13255:
13254:
13251:
13250:
13249:
13246:
13244:
13241:
13237:
13234:
13232:
13229:
13228:
13227:
13224:
13222:
13219:
13217:
13214:
13212:
13209:
13205:
13202:
13201:
13200:
13197:
13195:
13192:
13191:
13190:
13187:
13185:
13182:
13178:
13175:
13173:
13170:
13169:
13168:
13165:
13163:
13160:
13159:
13158:
13157:Second Coming
13155:
13153:
13150:
13146:
13143:
13141:
13138:
13137:
13136:
13133:
13129:
13126:
13124:
13121:
13120:
13119:
13116:
13115:
13113:
13111:
13107:
13101:
13098:
13096:
13093:
13091:
13088:
13086:
13083:
13081:
13078:
13074:
13071:
13069:
13066:
13062:
13059:
13058:
13057:
13054:
13052:
13049:
13047:
13044:
13043:
13042:
13039:
13037:
13034:
13032:
13029:
13027:
13024:
13022:
13019:
13017:
13014:
13012:
13009:
13007:
13004:
13002:
12999:
12997:
12994:
12992:
12989:
12988:
12986:
12982:
12972:
12969:
12967:
12964:
12962:
12959:
12957:
12954:
12952:
12949:
12947:
12944:
12942:
12939:
12935:
12932:
12930:
12927:
12925:
12922:
12921:
12920:
12917:
12913:
12910:
12908:
12905:
12904:
12903:
12900:
12899:
12897:
12893:
12887:
12884:
12882:
12879:
12877:
12874:
12872:
12869:
12867:
12864:
12862:
12859:
12858:
12856:
12854:
12850:
12847:
12843:
12831:
12828:
12827:
12826:
12823:
12821:
12818:
12817:
12815:
12813:
12809:
12803:
12800:
12798:
12795:
12793:
12790:
12786:
12783:
12782:
12781:
12778:
12776:
12773:
12771:
12768:
12766:
12763:
12761:
12758:
12756:
12753:
12751:
12748:
12746:
12743:
12739:
12736:
12734:
12731:
12730:
12729:
12726:
12724:
12721:
12719:
12716:
12714:
12711:
12709:
12706:
12704:
12701:
12699:
12696:
12694:
12691:
12689:
12686:
12684:
12681:
12679:
12676:
12672:
12669:
12668:
12667:
12664:
12662:
12659:
12657:
12656:Deforestation
12654:
12652:
12649:
12647:
12644:
12642:
12639:
12635:
12632:
12631:
12630:
12627:
12625:
12622:
12621:
12619:
12617:
12613:
12610:
12608:
12604:
12598:
12597:World War III
12595:
12593:
12590:
12586:
12583:
12581:
12578:
12576:
12573:
12572:
12571:
12568:
12566:
12563:
12561:
12558:
12556:
12553:
12549:
12546:
12544:
12541:
12540:
12539:
12536:
12534:
12531:
12529:
12526:
12525:
12523:
12519:
12513:
12512:Transhumanism
12510:
12506:
12503:
12501:
12498:
12496:
12493:
12492:
12491:
12487:
12484:
12480:
12477:
12475:
12472:
12471:
12470:
12467:
12464:
12461:
12457:
12454:
12452:
12449:
12447:
12444:
12442:
12439:
12437:
12434:
12433:
12432:
12429:
12425:
12422:
12421:
12420:
12417:
12415:
12412:
12410:
12407:
12403:
12400:
12398:
12395:
12393:
12390:
12389:
12388:
12385:
12383:
12380:
12379:
12377:
12375:Technological
12373:
12365:
12362:
12361:
12360:
12357:
12355:
12352:
12351:
12348:
12344:
12337:
12332:
12330:
12325:
12323:
12318:
12317:
12314:
12302:
12299:
12297:
12294:
12289:
12286:
12284:
12281:
12280:
12279:
12276:
12272:
12269:
12266:
12263:
12262:
12261:
12258:
12256:
12253:
12251:
12248:
12246:
12243:
12241:
12238:
12236:
12233:
12229:
12226:
12224:
12221:
12220:
12219:
12216:
12212:
12211:Authorization
12209:
12205:
12202:
12201:
12200:
12197:
12196:
12195:
12192:
12186:
12183:
12182:
12181:
12178:
12175:
12173:
12172:Secure coding
12170:
12169:
12168:
12165:
12164:
12162:
12158:
12152:
12149:
12147:
12144:
12142:
12141:SQL injection
12139:
12137:
12134:
12132:
12129:
12127:
12124:
12122:
12121:Vulnerability
12119:
12117:
12114:
12112:
12109:
12107:
12106:Trojan horses
12104:
12102:
12101:Software bugs
12099:
12097:
12094:
12092:
12089:
12087:
12084:
12082:
12079:
12077:
12074:
12072:
12069:
12067:
12064:
12062:
12059:
12057:
12054:
12050:
12047:
12046:
12045:
12042:
12040:
12037:
12035:
12032:
12030:
12027:
12025:
12022:
12020:
12017:
12015:
12012:
12010:
12007:
12005:
12002:
12000:
11997:
11995:
11992:
11990:
11989:Eavesdropping
11987:
11985:
11982:
11980:
11979:Data scraping
11977:
11975:
11972:
11970:
11967:
11965:
11962:
11960:
11957:
11955:
11952:
11950:
11949:Cryptojacking
11947:
11945:
11942:
11940:
11937:
11935:
11932:
11930:
11927:
11925:
11922:
11920:
11917:
11915:
11912:
11908:
11905:
11903:
11900:
11898:
11895:
11893:
11890:
11889:
11887:
11885:
11882:
11880:
11877:
11875:
11872:
11870:
11867:
11866:
11864:
11862:
11858:
11850:
11840:
11837:
11835:
11832:
11830:
11827:
11825:
11822:
11820:
11817:
11815:
11812:
11810:
11807:
11805:
11802:
11800:
11797:
11795:
11792:
11788:
11785:
11783:
11780:
11779:
11778:
11775:
11773:
11770:
11768:
11765:
11764:
11762:
11758:
11754:
11747:
11742:
11740:
11735:
11733:
11728:
11727:
11724:
11717:
11713:
11709:
11706:
11701:
11697:
11696:
11687:
11686:
11681:
11677:
11673:
11669:
11665:
11661:
11657:
11652:
11648:
11642:
11638:
11637:
11631:
11627:
11623:
11619:
11615:
11611:
11607:
11603:
11598:
11594:
11588:
11584:
11579:
11576:
11575:
11570:
11566:
11562:
11559:
11555:
11551:
11550:
11545:
11541:
11539:
11535:
11531:
11527:
11524:
11520:
11516:
11514:9781409427544
11510:
11506:
11501:
11497:
11491:
11487:
11486:
11480:
11478:
11474:
11470:
11466:
11464:
11460:
11456:
11452:
11450:
11449:0-19-538501-2
11446:
11442:
11438:
11435:
11431:
11427:
11423:
11419:
11415:
11413:
11412:1-59749-637-5
11409:
11406:. Syngress.
11405:
11401:
11400:
11394:
11391:
11389:
11386:
11385:
11380:
11375:
11350:
11346:
11340:
11325:
11321:
11314:
11307:
11301:
11286:
11282:
11275:
11259:
11255:
11249:
11242:
11238:
11235:
11230:
11223:
11222:
11215:
11208:
11204:
11198:
11182:
11175:
11168:
11163:
11148:
11144:
11138:
11122:
11118:
11114:
11108:
11100:
11096:
11092:
11088:
11084:
11080:
11073:
11066:
11062:
11056:
11050:
11045:
11038:
11037:Boston Herald
11034:
11028:
11021:
11017:
11014:
11009:
11002:
10997:
10990:
10986:
10981:
10974:
10969:
10962:
10957:
10941:
10937:
10931:
10916:
10914:9780745649740
10910:
10906:
10905:
10897:
10889:
10883:
10879:
10875:
10871:
10864:
10855:
10850:
10843:
10828:
10826:9781139446969
10822:
10818:
10817:
10809:
10794:
10792:9789813108981
10788:
10784:
10783:
10775:
10773:
10764:
10758:
10750:
10743:
10741:
10733:
10732:
10727:
10721:
10705:
10704:
10699:
10693:
10678:
10677:
10672:
10665:
10650:
10649:
10644:
10637:
10622:
10621:
10616:
10609:
10601:
10597:
10593:
10589:
10585:
10581:
10574:
10567:
10558:
10553:
10548:
10543:
10539:
10535:
10531:
10524:
10508:
10504:
10498:
10482:
10478:
10472:
10464:
10460:
10453:
10446:
10440:
10425:
10421:
10414:
10407:
10406:
10405:Computerworld
10401:
10395:
10388:
10382:
10375:
10369:
10362:
10359:
10353:
10345:
10341:
10334:
10318:
10314:
10310:
10303:
10296:
10292:
10286:
10279:
10275:
10270:
10254:
10250:
10244:
10237:
10232:
10225:
10221:
10220:archive.today
10217:
10214:
10209:
10202:
10197:
10189:
10187:9781612347639
10183:
10179:
10172:
10157:
10153:
10149:
10145:
10138:
10131:
10127:
10121:
10115:, 1 July 2010
10114:
10111:
10106:
10104:
10097:. 31 May 2011
10096:
10092:
10087:
10080:
10075:
10058:
10053:
10049:
10042:
10027:
10023:
10017:
10001:
9995:
9987:
9983:
9977:
9969:
9965:
9959:
9951:
9947:
9941:
9925:
9924:
9919:
9913:
9897:
9893:
9887:
9871:
9865:
9849:
9848:
9843:
9837:
9821:
9817:
9811:
9800:
9784:
9778:
9762:
9756:
9754:
9738:
9735:
9728:
9721:
9717:
9713:
9697:
9690:
9688:
9671:
9670:
9665:
9659:
9643:
9637:
9629:
9625:
9618:
9611:
9607:
9603:
9600:
9594:
9587:
9583:
9577:
9561:
9557:
9551:
9544:
9539:
9531:
9530:thehackernews
9527:
9520:
9513:
9509:
9506:
9501:
9494:
9488:
9479:
9474:
9470:
9466:
9462:
9455:
9439:
9433:
9425:
9421:
9415:
9407:
9401:
9394:
9390:
9385:
9377:
9373:
9367:
9351:
9347:
9341:
9326:
9322:
9316:
9308:
9306:9781612347639
9302:
9298:
9291:
9284:
9280:
9275:
9267:
9261:
9254:
9250:
9246:
9243:
9238:
9230:
9226:
9225:
9220:
9213:
9205:
9199:
9191:
9185:
9169:
9165:
9159:
9151:
9145:
9129:
9123:
9107:
9103:
9099:
9092:
9085:
9084:0-393-05178-1
9081:
9077:
9073:
9067:
9051:
9047:
9041:
9034:
9030:
9027:
9022:
9014:
9008:
8993:
8987:
8979:
8973:
8966:
8962:
8959:
8954:
8947:
8943:
8939:
8936:
8931:
8923:
8919:
8913:
8905:
8901:
8895:
8887:
8883:
8876:
8868:
8864:
8858:
8842:
8838:
8832:
8816:
8812:
8808:
8802:
8795:
8789:
8782:
8776:
8770:, 17 May 2007
8769:
8768:
8763:
8760:Ian Traynor,
8757:
8750:
8746:
8741:
8726:. 1 July 2010
8725:
8724:The Economist
8721:
8715:
8708:
8704:
8701:
8695:
8688:
8682:
8675:
8669:
8661:
8657:
8651:
8643:
8642:
8637:
8631:
8615:
8608:
8593:
8589:
8582:
8563:
8557:
8541:
8537:
8536:
8531:
8525:
8518:
8514:
8510:
8507:
8501:
8494:
8488:
8480:
8473:
8472:"White paper"
8467:
8452:
8448:
8441:
8425:
8419:
8411:
8407:
8400:
8393:
8388:
8381:
8377:
8372:
8356:
8352:
8351:
8346:
8340:
8332:
8328:
8324:
8320:
8316:
8312:
8308:
8304:
8300:
8293:
8277:
8273:
8267:
8252:
8251:BusinessToday
8248:
8242:
8240:
8238:
8231:
8226:
8210:
8206:
8200:
8184:
8180:
8176:
8169:
8154:
8150:
8144:
8129:
8125:
8118:
8102:
8098:
8092:
8076:
8072:
8066:
8051:
8047:
8043:
8039:
8032:
8017:
8013:
8007:
7992:
7988:
7981:
7966:
7962:
7955:
7947:
7943:
7936:
7928:
7922:
7907:
7903:
7896:
7881:
7877:
7871:
7855:
7851:
7845:
7838:
7837:
7832:
7826:
7810:
7806:
7802:
7796:
7780:
7776:
7772:
7766:
7764:
7756:
7755:Network World
7752:
7748:
7745:
7740:
7724:
7720:
7714:
7699:
7695:
7688:
7673:
7669:
7665:
7661:
7654:
7639:
7635:
7631:
7627:
7620:
7605:
7601:
7595:
7580:
7576:
7569:
7554:
7550:
7544:
7529:
7525:
7519:
7517:
7501:
7497:
7491:
7476:. 26 May 2021
7475:
7471:
7465:
7450:
7446:
7439:
7424:
7420:
7414:
7407:
7402:
7386:
7380:
7364:
7361:
7355:
7347:
7343:
7339:
7335:
7328:
7321:
7315:
7307:
7303:
7300:: 1377β1440.
7299:
7295:
7288:
7286:
7277:
7273:
7267:
7259:
7252:
7244:
7240:
7234:
7227:
7223:
7220:
7214:
7207:
7203:
7199:
7196:
7190:
7183:
7182:Computerworld
7179:
7175:
7172:
7167:
7159:
7155:
7148:
7140:
7136:
7129:
7122:
7118:
7115:
7110:
7103:
7099:
7094:
7092:
7076:
7072:
7066:
7058:
7045:
7037:
7030:
7022:
7018:
7011:
7007:
7000:
6993:
6992:
6987:
6973:
6969:
6968:
6963:
6959:
6953:
6945:
6939:
6935:
6931:
6924:
6915:
6900:
6896:
6889:
6874:
6870:
6863:
6848:
6844:
6838:
6822:
6818:
6812:
6804:
6800:
6796:
6792:
6788:
6784:
6780:
6776:
6772:
6768:
6767:Public Choice
6764:
6757:
6741:
6737:
6730:
6722:
6718:
6714:
6710:
6706:
6702:
6698:
6691:
6683:
6679:
6673:
6665:
6664:
6659:
6653:
6651:
6642:
6638:
6631:
6623:
6619:
6615:
6611:
6607:
6603:
6599:
6595:
6591:
6584:
6577:
6572:
6565:
6560:
6553:
6548:
6541:
6537:
6531:
6524:
6520:
6517:
6512:
6505:
6499:
6492:
6486:
6478:
6472:
6457:
6453:
6446:
6430:
6426:
6422:
6416:
6408:
6404:
6399:
6394:
6390:
6386:
6382:
6378:
6374:
6370:
6366:
6362:
6358:
6351:
6343:
6337:
6333:
6326:
6319:
6315:
6310:
6303:
6299:
6296:
6291:
6283:
6277:
6269:
6262:
6247:
6243:
6236:
6221:
6217:
6210:
6195:
6191:
6184:
6178:
6174:
6170:
6166:
6162:
6156:
6141:
6137:
6130:
6114:
6110:
6106:
6105:
6104:The Intercept
6100:
6093:
6078:
6077:
6072:
6065:
6050:
6046:
6042:
6038:
6032:
6025:
6021:
6018:
6013:
6007:, 4 June 2013
6006:
6002:
5997:
5989:
5985:
5978:
5963:
5959:
5952:
5937:
5933:
5927:
5912:
5908:
5902:
5886:
5882:
5876:
5861:
5857:
5853:
5852:
5847:
5840:
5824:
5823:
5818:
5812:
5804:
5802:9780300246681
5798:
5794:
5793:
5785:
5774:
5767:
5760:
5752:
5751:
5750:The Economist
5746:
5740:
5732:
5730:9780300220230
5726:
5722:
5721:
5713:
5697:
5693:
5687:
5679:
5675:
5671:
5667:
5663:
5659:
5658:
5653:
5646:
5639:
5638:
5633:
5628:
5626:
5619:, 6 June 2012
5618:
5614:
5609:
5607:
5590:
5586:
5582:
5576:
5568:
5567:
5559:
5551:
5547:
5543:
5539:
5535:
5531:
5527:
5523:
5519:
5512:
5504:
5500:
5496:
5492:
5488:
5484:
5480:
5473:
5457:
5453:
5449:
5442:
5436:
5435:9780061962233
5432:
5428:
5422:
5420:
5418:
5416:
5407:
5403:
5399:
5397:9780124079267
5393:
5389:
5382:
5380:
5364:
5360:
5356:
5352:
5348:
5341:
5339:
5323:
5319:
5312:
5297:
5293:
5289:
5285:
5278:
5270:
5266:
5260:
5252:
5248:
5244:
5242:9780415787079
5238:
5234:
5228:
5226:
5224:
5222:
5220:
5203:
5199:
5193:
5178:
5174:
5168:
5152:
5148:
5142:
5127:
5123:
5117:
5109:
5103:
5095:
5093:9780190276522
5089:
5085:
5078:
5070:
5066:
5062:
5058:
5054:
5050:
5046:
5039:
5023:
5019:
5013:
5005:
4999:
4991:
4987:
4983:
4981:9780199918096
4977:
4973:
4966:
4962:
4951:
4948:
4946:
4943:
4941:
4938:
4936:
4933:
4931:
4928:
4926:
4923:
4921:
4918:
4916:
4913:
4911:
4908:
4904:
4901:
4899:
4896:
4894:
4891:
4889:
4886:
4885:
4884:
4881:
4879:
4876:
4874:
4871:
4869:
4866:
4864:
4861:
4859:
4856:
4854:
4851:
4849:
4846:
4844:
4841:
4839:
4836:
4834:
4831:
4829:
4826:
4824:
4821:
4819:
4816:
4814:
4811:
4809:
4806:
4804:
4801:
4799:
4796:
4794:
4791:
4789:
4786:
4784:
4781:
4779:
4776:
4774:
4771:
4770:
4760:
4759:
4754:
4752:
4751:
4746:
4742:
4741:
4738:In television
4732:
4731:
4727:
4724:
4723:
4719:
4716:
4713:
4710:
4707:
4704:
4701:
4700:
4698:
4691:Documentaries
4690:
4689:
4685:
4684:
4680:
4677:
4674:
4671:
4670:
4666:
4663:
4662:
4658:
4655:
4654:
4650:
4647:
4646:
4642:
4641:
4639:
4624:
4621:
4616:
4613:
4608:
4606:
4601:
4599:
4594:
4590:
4586:
4582:
4578:
4573:
4571:
4567:
4562:
4560:
4556:
4552:
4551:cyber warfare
4548:
4544:
4543:jus ad bellum
4540:
4535:
4527:
4525:
4521:
4520:
4509:
4507:
4498:
4495:
4491:
4487:
4484:(CCD CoE) in
4483:
4479:
4475:
4472:
4468:
4464:
4460:
4456:
4453:
4449:
4448:
4447:
4438:
4435:
4433:
4428:
4422:
4412:
4410:
4406:
4405:Nation states
4402:
4398:
4392:
4388:
4387:Lazarus Group
4384:
4380:
4376:
4366:
4363:
4362:Kaspersky Lab
4359:
4355:
4351:
4347:
4342:
4340:
4339:Belfer Center
4335:
4333:
4329:
4325:
4320:
4318:
4314:
4310:
4306:
4302:
4298:
4294:
4290:
4286:
4282:
4278:
4274:
4270:
4269:Google Chrome
4266:
4262:
4258:
4254:
4250:
4245:
4241:
4239:
4233:
4231:
4227:
4222:
4220:
4216:
4215:
4209:
4206:
4204:
4201:In June 2012
4199:
4195:
4193:
4189:
4185:
4181:
4176:
4174:
4168:
4166:
4165:
4160:
4159:Thomas Carper
4156:
4155:Susan Collins
4152:
4151:Joe Lieberman
4147:
4145:
4141:
4137:
4133:
4129:
4125:
4120:
4118:
4114:
4110:
4105:
4103:
4099:
4095:
4091:
4087:
4086:The Economist
4083:
4079:
4074:
4072:
4071:
4066:
4062:
4056:
4050:
4043:United States
4038:North America
4035:
4032:
4026:
4024:
4023:Project Raven
4020:
4016:
4012:
4011:Ahmed Mansoor
4008:
3998:
3996:
3992:
3981:
3979:
3973:
3965:
3961:
3957:
3955:
3951:
3950:cyber warfare
3947:
3943:
3939:
3929:
3925:
3923:
3922:Chris Kubecka
3914:
3910:
3908:
3904:
3900:
3896:
3886:
3883:
3879:
3874:
3872:
3867:
3865:
3861:
3857:
3847:
3845:
3840:
3838:
3832:
3829:
3825:
3821:
3812:
3808:
3806:
3802:
3797:
3793:
3789:
3785:
3779:
3773:
3758:
3756:
3750:
3748:
3744:
3739:
3737:
3733:
3729:
3724:
3714:
3712:
3707:
3705:
3701:
3696:
3694:
3689:
3687:
3683:
3678:
3674:
3673:D-30 Howitzer
3670:
3667:
3663:
3659:
3655:
3652:According to
3645:
3643:
3639:
3629:
3627:
3626:
3621:
3617:
3613:
3609:
3605:
3601:
3600:James Clapper
3597:
3593:
3588:
3586:
3582:
3578:
3574:
3570:
3566:
3562:
3558:
3554:
3553:cyber-warfare
3550:
3544:
3538:
3527:
3517:
3514:
3508:
3503:
3499:
3493:
3483:
3480:
3476:
3472:
3467:
3463:
3459:
3453:
3443:
3441:
3437:
3433:
3427:
3417:
3415:
3411:
3401:
3399:
3394:
3390:
3386:
3382:
3378:
3363:
3361:
3357:
3353:
3337:
3333:
3323:
3321:
3316:
3311:
3308:
3299:
3295:
3293:
3289:
3285:
3281:
3277:
3276:Chris Kubecka
3273:
3269:
3263:
3253:
3244:
3242:
3237:
3235:
3231:
3227:
3223:
3218:
3216:
3212:
3207:
3205:
3199:
3196:
3191:
3188:
3184:
3180:
3176:
3172:
3168:
3163:
3161:
3156:
3154:
3150:
3140:
3137:
3135:
3131:
3127:
3123:
3119:
3114:
3111:
3107:
3102:
3100:
3095:
3090:
3088:
3084:
3083:cyber attacks
3080:
3076:
3074:
3070:
3066:
3063:
3059:
3055:
3050:
3048:
3042:
3040:
3036:
3035:
3030:
3026:
3019:
3004:
3000:
2990:
2986:
2984:
2979:
2977:
2972:
2968:
2964:
2960:
2955:
2953:
2942:
2940:
2936:
2926:
2924:
2919:
2913:
2909:
2899:
2897:
2893:
2889:
2888:United States
2878:
2875:
2871:
2861:
2859:
2855:
2851:
2847:
2837:
2834:
2832:
2828:
2824:
2820:
2816:
2812:
2808:
2802:
2798:
2796:
2792:
2788:
2784:
2779:
2775:
2772:
2771:Cyber Command
2768:
2764:
2760:
2755:
2747:
2745:
2739:
2734:
2724:
2722:
2718:
2708:
2706:
2702:
2698:
2694:
2690:
2687:In 2017, the
2680:
2676:
2674:
2670:
2666:
2662:
2652:
2650:
2646:
2642:
2638:
2632:
2629:
2623:
2621:
2617:
2615:
2611:
2607:
2603:
2598:
2596:
2592:
2591:power outages
2588:
2584:
2580:
2575:
2571:
2567:
2563:
2550:
2545:
2541:
2538:
2532:
2522:
2520:
2516:
2514:
2509:
2504:
2501:
2497:
2487:
2481:
2477:
2473:
2470:
2466:
2463:
2459:
2456:
2452:
2448:
2444:
2440:
2437:
2433:
2429:
2428:Angela Merkel
2425:
2422:
2418:
2415:
2414:
2413:
2406:
2402:
2398:
2394:
2391:
2387:
2383:
2374:
2372:
2368:
2364:
2360:
2359:cyber weapons
2356:
2355:Kaspersky Lab
2353:, founder of
2352:
2340:
2336:
2332:
2326:
2316:
2314:
2310:
2306:
2296:
2294:
2290:
2279:
2277:
2271:
2269:
2265:
2261:
2260:Ukraine, 2015
2257:
2253:
2248:
2246:
2242:
2238:
2234:
2233:Kaspersky Lab
2231:, founder of
2230:
2220:
2218:
2213:
2209:
2204:
2200:
2195:
2193:
2189:
2182:
2178:
2175:
2173:
2162:
2160:
2156:
2151:
2149:
2145:
2141:
2137:
2133:
2129:
2125:
2124:United States
2120:
2116:
2114:
2110:
2106:
2102:
2098:
2094:
2090:
2086:
2082:
2081:cyber attacks
2078:
2067:
2062:
2060:
2055:
2053:
2048:
2047:
2045:
2044:
2037:
2034:
2032:
2029:
2027:
2024:
2022:
2019:
2017:
2014:
2012:
2009:
2007:
2004:
2002:
1999:
1997:
1994:
1993:
1990:
1985:
1984:
1977:
1974:
1972:
1969:
1967:
1964:
1962:
1959:
1957:
1954:
1952:
1949:
1948:
1942:
1941:
1934:
1931:
1929:
1926:
1924:
1921:
1919:
1916:
1914:
1911:
1909:
1906:
1904:
1901:
1899:
1896:
1894:
1893:Warrior caste
1891:
1889:
1886:
1884:
1881:
1880:
1877:
1872:
1871:
1864:
1863:Show of force
1861:
1857:
1854:
1852:
1851:Peacebuilding
1849:
1848:
1847:
1844:
1842:
1839:
1837:
1834:
1832:
1829:
1827:
1824:
1822:
1819:
1817:
1814:
1812:
1809:
1807:
1804:
1802:
1799:
1797:
1794:
1792:
1789:
1788:
1785:
1780:
1779:
1772:
1769:
1765:
1762:
1761:
1760:
1757:
1755:
1752:
1750:
1747:
1745:
1742:
1740:
1739:
1735:
1733:
1730:
1728:
1725:
1723:
1720:
1718:
1715:
1713:
1710:
1708:
1707:Air supremacy
1705:
1704:
1701:
1696:
1695:
1688:
1685:
1683:
1680:
1678:
1675:
1673:
1670:
1668:
1665:
1663:
1660:
1658:
1655:
1653:
1650:
1648:
1647:Islamic rules
1645:
1643:
1640:
1638:
1635:
1633:
1630:
1628:
1627:Court-martial
1625:
1623:
1620:
1618:
1615:
1614:
1611:
1606:
1605:
1596:
1593:
1592:
1591:
1588:
1586:
1583:
1581:
1578:
1577:
1574:
1569:
1568:
1559:
1556:
1554:
1551:
1549:
1546:
1545:
1544:
1541:
1539:
1536:
1532:
1529:
1527:
1526:Arms industry
1524:
1523:
1522:
1519:
1517:
1514:
1512:
1509:
1508:
1505:
1500:
1499:
1492:
1488:
1485:
1483:
1480:
1476:
1473:
1472:
1471:
1468:
1466:
1463:
1461:
1458:
1456:
1453:
1451:
1448:
1446:
1443:
1441:
1438:
1436:
1433:
1431:
1428:
1426:
1423:
1421:
1418:
1414:
1411:
1410:
1409:
1406:
1405:
1402:
1397:
1396:
1389:
1386:
1384:
1381:
1379:
1376:
1374:
1371:
1369:
1366:
1364:
1361:
1359:
1356:
1354:
1351:
1349:
1346:
1344:
1341:
1339:
1336:
1335:
1332:
1327:
1326:
1319:
1316:
1314:
1311:
1309:
1306:
1304:
1301:
1299:
1296:
1294:
1291:
1290:
1287:
1282:
1281:
1274:
1271:
1269:
1266:
1264:
1261:
1259:
1256:
1254:
1251:
1249:
1246:
1244:
1241:
1239:
1236:
1234:
1231:
1229:
1226:
1224:
1221:
1219:
1216:
1214:
1211:
1209:
1206:
1204:
1201:
1199:
1196:
1194:
1191:
1189:
1186:
1184:
1181:
1179:
1176:
1174:
1171:
1169:
1166:
1164:
1161:
1159:
1156:
1154:
1151:
1149:
1146:
1144:
1143:Broken-backed
1141:
1139:
1136:
1134:
1131:
1130:
1127:
1122:
1121:
1114:
1111:
1109:
1106:
1104:
1101:
1099:
1096:
1094:
1091:
1089:
1086:
1084:
1081:
1079:
1076:
1074:
1071:
1069:
1066:
1064:
1061:
1059:
1056:
1054:
1051:
1049:
1046:
1044:
1041:
1039:
1036:
1034:
1031:
1029:
1026:
1025:
1024:
1019:
1014:
1013:
1006:
1003:
1001:
998:
996:
993:
991:
988:
986:
983:
981:
980:Expeditionary
978:
976:
975:
971:
969:
966:
964:
961:
960:
957:
952:
951:
944:
941:
939:
936:
934:
931:
929:
926:
924:
921:
919:
916:
912:
909:
908:
907:
904:
902:
899:
897:
894:
892:
889:
887:
884:
882:
879:
877:
874:
872:
869:
867:
864:
862:
859:
857:
854:
852:
851:Counterattack
849:
847:
844:
842:
839:
837:
834:
830:
827:
825:
822:
820:
817:
816:
815:
812:
810:
807:
806:
805:
800:
795:
794:
787:
784:
782:
779:
777:
776:Psychological
774:
772:
769:
767:
764:
762:
759:
757:
754:
752:
749:
747:
744:
742:
738:
735:
733:
730:
728:
725:
723:
720:
718:
715:
713:
712:Combined arms
710:
708:
705:
701:
698:
696:
693:
692:
691:
688:
686:
683:
681:
678:
676:
673:
671:
668:
666:
663:
661:
658:
657:
654:
649:
648:
641:
638:
636:
633:
632:
624:
621:
620:
619:
616:
614:
611:
609:
606:
604:
601:
599:
596:
594:
591:
590:
589:
586:
585:
577:
574:
573:
572:
569:
567:
564:
562:
559:
557:
554:
552:
551:Fortification
549:
547:
544:
542:
539:
538:
537:
534:
533:
527:
524:
522:
519:
517:
514:
513:
511:
510:
507:
502:
501:
494:
491:
489:
486:
484:
481:
479:
476:
475:
471:
468:
466:
463:
461:
458:
456:
453:
452:
448:
445:
443:
440:
438:
435:
433:
430:
428:
425:
423:
420:
418:
415:
414:
410:
407:
405:
402:
400:
397:
395:
392:
390:
387:
385:
382:
380:
377:
376:
372:
369:
367:
366:Landing craft
364:
362:
359:
357:
354:
352:
349:
347:
344:
342:
339:
338:
334:
331:
329:
326:
324:
321:
317:
314:
313:
312:
309:
307:
304:
302:
299:
298:
294:
291:
289:
286:
284:
281:
279:
276:
274:
271:
269:
266:
264:
261:
260:
256:
252:
251:Standing army
249:
247:
244:
242:
238:
235:
233:
230:
228:
225:
223:
220:
218:
215:
213:
210:
208:
205:
203:
200:
198:
195:
193:
190:
188:
185:
184:
181:
176:
175:
166:
163:
161:
158:
157:
156:
153:
149:
146:
144:
143:pike and shot
141:
140:
139:
136:
132:
129:
128:
127:
124:
122:
119:
117:
114:
113:
110:
105:
104:
100:
96:
95:
89:
81:
77:
76:
72:
71:
65:
61:
57:
52:
48:
44:
40:
33:
19:
18:Cyber warfare
13884:Cyberwarfare
13747:
13690:Cyberwarfare
13689:
13408:Third Temple
13263:Lake of fire
13073:Rogue planet
13041:Impact event
13031:Proton decay
12984:Astronomical
12934:Bioterrorism
12780:Supervolcano
12678:Flood basalt
12624:Anoxic event
12533:Collapsology
12521:Sociological
12392:Cyberwarfare
12391:
12245:Data masking
11804:Cyberwarfare
11803:
11718:at Wikibooks
11705:Cyberwarfare
11683:
11659:
11655:
11635:
11609:
11605:
11582:
11572:
11568:
11548:
11543:
11529:
11504:
11484:
11468:
11457:. O'Reilly.
11454:
11440:
11403:
11379:Cyberwarfare
11378:
11353:. Retrieved
11349:the original
11339:
11327:. Retrieved
11313:
11300:
11288:. Retrieved
11284:
11274:
11262:. Retrieved
11257:
11248:
11229:
11220:
11214:
11206:
11197:
11187:23 September
11185:. Retrieved
11174:
11162:
11150:. Retrieved
11146:
11137:
11125:. Retrieved
11121:the original
11116:
11107:
11082:
11078:
11072:
11064:
11059:Reed, John.
11055:
11044:
11036:
11027:
11008:
10996:
10988:
10980:
10968:
10956:
10944:. Retrieved
10939:
10930:
10918:. Retrieved
10903:
10896:
10869:
10863:
10842:
10830:. Retrieved
10815:
10808:
10796:. Retrieved
10781:
10757:
10729:
10720:
10708:. Retrieved
10701:
10692:
10680:. Retrieved
10674:
10664:
10652:. Retrieved
10646:
10636:
10624:. Retrieved
10618:
10608:
10586:(2): 38β57.
10583:
10579:
10566:
10557:10419/257052
10537:
10533:
10523:
10511:. Retrieved
10506:
10497:
10485:. Retrieved
10480:
10471:
10462:
10452:
10439:
10427:. Retrieved
10423:
10413:
10403:
10394:
10381:
10368:
10360:
10352:
10343:
10333:
10321:. Retrieved
10317:the original
10312:
10302:
10294:
10285:
10277:
10269:
10257:. Retrieved
10253:the original
10243:
10231:
10223:
10208:
10196:
10177:
10171:
10159:. Retrieved
10147:
10137:
10129:
10120:
10112:
10094:
10086:
10074:
10064:14 September
10062:. Retrieved
10057:the original
10051:
10041:
10029:. Retrieved
10025:
10016:
10004:. Retrieved
9994:
9985:
9976:
9967:
9958:
9949:
9940:
9928:. Retrieved
9921:
9912:
9900:. Retrieved
9895:
9886:
9874:. Retrieved
9864:
9852:. Retrieved
9845:
9836:
9824:. Retrieved
9819:
9810:
9799:
9787:. Retrieved
9777:
9765:. Retrieved
9740:. Retrieved
9736:
9727:
9702:. Retrieved
9674:. Retrieved
9667:
9658:
9646:. Retrieved
9636:
9627:
9617:
9609:
9593:
9585:
9576:
9564:. Retrieved
9559:
9550:
9538:
9529:
9519:
9500:
9487:
9468:
9464:
9454:
9442:. Retrieved
9432:
9423:
9414:
9400:
9392:
9384:
9375:
9366:
9354:. Retrieved
9349:
9340:
9328:. Retrieved
9325:The Register
9324:
9315:
9296:
9290:
9274:
9260:
9237:
9229:the original
9222:
9212:
9198:
9184:
9172:. Retrieved
9167:
9158:
9144:
9132:. Retrieved
9122:
9110:. Retrieved
9106:the original
9101:
9091:
9071:
9066:
9054:. Retrieved
9050:the original
9040:
9021:
9007:
8995:. Retrieved
8986:
8972:
8953:
8945:
8930:
8922:the original
8912:
8903:
8894:
8885:
8875:
8866:
8857:
8845:. Retrieved
8841:the original
8831:
8819:. Retrieved
8815:the original
8810:
8801:
8788:
8775:
8767:The Guardian
8765:
8756:
8748:
8740:
8728:. Retrieved
8723:
8714:
8694:
8681:
8668:
8659:
8650:
8639:
8630:
8618:. Retrieved
8607:
8595:. Retrieved
8591:
8581:
8571:24 September
8569:. Retrieved
8556:
8544:. Retrieved
8533:
8524:
8516:
8500:
8487:
8479:f-secure.com
8478:
8466:
8454:. Retrieved
8450:
8440:
8428:. Retrieved
8418:
8410:The Register
8409:
8399:
8387:
8379:
8371:
8359:. Retrieved
8355:the original
8348:
8339:
8306:
8302:
8292:
8280:. Retrieved
8275:
8266:
8254:. Retrieved
8250:
8225:
8213:. Retrieved
8208:
8199:
8189:16 September
8187:. Retrieved
8183:the original
8178:
8168:
8158:16 September
8156:. Retrieved
8152:
8143:
8133:14 September
8131:. Retrieved
8128:The Guardian
8127:
8117:
8105:. Retrieved
8100:
8091:
8079:. Retrieved
8074:
8065:
8053:. Retrieved
8041:
8031:
8019:. Retrieved
8015:
8006:
7994:. Retrieved
7990:
7980:
7968:. Retrieved
7964:
7954:
7945:
7935:
7921:
7909:. Retrieved
7905:
7895:
7883:. Retrieved
7870:
7858:. Retrieved
7854:The Guardian
7853:
7844:
7834:
7825:
7813:. Retrieved
7809:the original
7804:
7795:
7783:. Retrieved
7779:the original
7774:
7754:
7739:
7727:. Retrieved
7722:
7713:
7701:. Retrieved
7697:
7687:
7675:. Retrieved
7663:
7653:
7641:. Retrieved
7630:The Guardian
7629:
7619:
7607:. Retrieved
7603:
7594:
7582:. Retrieved
7578:
7568:
7556:. Retrieved
7552:
7543:
7531:. Retrieved
7527:
7503:. Retrieved
7499:
7490:
7478:. Retrieved
7473:
7464:
7452:. Retrieved
7448:
7438:
7426:. Retrieved
7422:
7413:
7401:
7389:. Retrieved
7379:
7367:. Retrieved
7362:
7354:
7337:
7333:
7327:
7314:
7297:
7293:
7276:www.navy.com
7275:
7266:
7251:
7243:Azerbaycan24
7242:
7233:
7213:
7205:
7193:Steve Ragan
7189:
7181:
7166:
7157:
7147:
7138:
7128:
7109:
7101:
7078:. Retrieved
7074:
7065:
7044:cite journal
7029:
7016:
6999:
6989:
6976:. Retrieved
6965:
6952:
6933:
6923:
6914:
6902:. Retrieved
6898:
6888:
6876:. Retrieved
6872:
6862:
6850:. Retrieved
6847:TechRepublic
6846:
6837:
6825:. Retrieved
6821:the original
6811:
6770:
6766:
6756:
6744:. Retrieved
6740:the original
6729:
6707:(3): 70β89.
6704:
6700:
6690:
6681:
6672:
6661:
6640:
6630:
6597:
6593:
6583:
6571:
6559:
6547:
6539:
6530:
6511:
6498:
6485:
6459:. Retrieved
6455:
6445:
6433:. Retrieved
6429:the original
6424:
6415:
6364:
6360:
6350:
6331:
6325:
6317:
6309:
6290:
6267:
6261:
6249:. Retrieved
6245:
6235:
6223:. Retrieved
6219:
6209:
6197:. Retrieved
6193:
6183:
6155:
6143:. Retrieved
6139:
6129:
6117:. Retrieved
6113:the original
6102:
6092:
6080:. Retrieved
6074:
6064:
6052:. Retrieved
6040:
6031:
6012:
6004:
5996:
5987:
5977:
5965:. Retrieved
5961:
5951:
5939:. Retrieved
5935:
5926:
5914:. Retrieved
5910:
5901:
5889:. Retrieved
5884:
5875:
5863:. Retrieved
5849:
5839:
5827:. Retrieved
5820:
5811:
5791:
5784:
5771:. NSI, Inc.
5759:
5748:
5739:
5719:
5712:
5700:. Retrieved
5686:
5661:
5655:
5645:
5635:
5616:
5593:. Retrieved
5588:
5584:
5575:
5565:
5558:
5528:(5): 30β35.
5525:
5521:
5511:
5486:
5482:
5472:
5460:. Retrieved
5456:the original
5451:
5441:
5426:
5387:
5366:. Retrieved
5354:
5350:
5325:. Retrieved
5321:
5311:
5299:. Retrieved
5287:
5277:
5232:
5206:. Retrieved
5204:. 4 May 2016
5201:
5192:
5180:. Retrieved
5176:
5167:
5155:. Retrieved
5150:
5141:
5129:. Retrieved
5125:
5116:
5083:
5077:
5055:(1): 82β85.
5052:
5048:
5038:
5026:. Retrieved
5021:
5012:
4971:
4965:
4798:Cyber spying
4756:
4755:Series 2 of
4748:
4729:
4720:
4714:
4708:
4702:
4681:
4667:
4659:
4651:
4643:
4609:
4602:
4592:
4585:Barack Obama
4574:
4563:
4536:
4533:
4517:
4515:
4503:
4452:The Pentagon
4444:
4436:
4424:
4394:
4343:
4336:
4323:
4321:
4265:web browsers
4246:
4242:
4234:
4223:
4212:
4210:
4207:
4202:
4200:
4196:
4177:
4169:
4162:
4148:
4121:
4113:Trojan Horse
4109:Soviet Union
4106:
4102:the Pentagon
4085:
4081:
4075:
4068:
4058:
4027:
4004:
3987:
3974:
3970:
3958:
3938:Leon Panetta
3934:
3919:
3903:Saudi Aramco
3892:
3889:Saudi Arabia
3878:Donald Trump
3875:
3868:
3853:
3843:
3841:
3833:
3817:
3799:
3751:
3740:
3726:
3708:
3700:Black-Energy
3697:
3690:
3651:
3635:
3623:
3615:
3589:
3576:
3546:
3511:(NCSC). The
3495:
3455:
3429:
3407:
3374:
3349:
3312:
3304:
3265:
3250:
3238:
3219:
3208:
3200:
3192:
3164:
3157:
3146:
3138:
3122:cyber attack
3115:
3106:Zhenhua Data
3103:
3091:
3077:
3068:
3062:FBI Director
3051:
3043:
3032:
3021:
3002:
2987:
2980:
2956:
2948:
2945:Preparedness
2932:
2915:
2884:
2867:
2843:
2835:
2831:Ilham Aliyev
2803:
2799:
2785:, which was
2780:
2776:
2756:
2753:
2730:
2717:Pearl Harbor
2714:
2686:
2677:
2673:British Army
2665:social media
2658:
2644:
2634:
2625:
2618:
2599:
2559:
2534:
2517:
2512:
2505:
2493:
2485:
2410:
2393:surveillance
2347:
2339:Threat actor
2302:
2285:
2272:
2249:
2226:
2214:
2211:
2206:
2202:
2197:
2184:
2180:
2176:
2168:
2152:
2121:
2117:
2109:manipulation
2077:Cyberwarfare
2076:
2075:
1976:Fifth column
1956:War resister
1951:Women in war
1846:Peacekeeping
1791:Arms control
1736:
1425:Mobilization
1420:Conscription
1378:Intelligence
1331:Organization
972:
901:Encirclement
781:Radiological
717:Conventional
634:
571:Subterranean
478:Development:
477:
454:
416:
378:
341:Naval units:
340:
333:Signal corps
300:
278:Intelligence
263:Specialties:
262:
187:Organization
138:Early modern
47:
13766:Categories
13735:Survivalism
13422:Zoroastrian
13278:Seven seals
13273:Seven bowls
13199:Historicism
13095:Solar flare
12971:Overfishing
12946:Defaunation
12733:coral reefs
12495:AI takeover
12414:Nanoweapons
12402:Cybergeddon
12387:Cyberattack
12185:Misuse case
12019:Infostealer
11994:Email fraud
11959:Data breach
11794:Cybergeddon
11662:(1): 5β32.
11612:(3): 4β21.
11560:, 169 pages
11308:(2019/2020)
11290:20 February
11264:20 February
11085:(1): 5β32.
10513:29 December
10487:29 December
9896:McAfee Blog
9356:24 February
9330:26 December
9253:Yahoo! News
9112:25 November
9072:Black Earth
8592:Global Post
8179:News.com.au
8107:12 December
8081:12 December
8055:12 December
8021:12 December
7996:12 December
7860:31 December
4925:Cyberattack
4910:Virtual war
4818:Cyberweapon
4788:Cyberattack
4463:White House
4432:open source
4287:(including
4285:smartphones
4267:(including
4226:North Korea
4070:casus belli
3761:Middle East
3755:Wall Street
3743:Iain Lobban
3654:CrowdStrike
3592:Jeh Johnson
3505: [
3498:Netherlands
3486:Netherlands
3326:North Korea
3272:South Korea
3256:South Korea
3247:Philippines
3213:(CBI). The
3130:Philippines
3118:Philippines
3065:James Comey
3058:data breach
2809:" attacked
2765:, told the
2736: [
2727:Motivations
2705:cybercrimes
2455:Afghanistan
2447:Philippines
2390:clandestine
2367:NetTraveler
2325:Cyberattack
2289:tit-for-tat
2252:Citizen Lab
2172:hacktivists
2148:North Korea
1961:War studies
1784:Non-warfare
1712:Appeasement
1677:Martial law
1516:War economy
1455:Transgender
1408:Recruitment
1168:Containment
1053:Culminating
1033:Anti-access
956:Operational
876:Envelopment
819:Air assault
700:Air cavalry
660:Air defence
640:Information
541:Cold-region
506:Battlespace
455:Historical:
301:Land units:
227:Space force
222:Coast guard
155:Late modern
116:Prehistoric
13904:Cybercrime
13878:Categories
13695:Depression
13685:Ransomware
13500:Messianism
13470:Armageddon
13455:Apocalypse
13243:Antichrist
13231:Man of sin
13128:Three Ages
12991:Big Crunch
12853:Extinction
12845:Biological
12607:Ecological
12479:Strangelet
12250:Encryption
12126:Web shells
12066:Ransomware
12014:Hacktivism
11777:Cybercrime
11426:0071772499
11152:8 November
11127:8 November
10946:8 November
10907:. Polity.
10854:1710.09616
10751:. Reuters.
10323:1 December
10161:22 October
10031:30 January
9930:3 November
9902:8 November
9876:3 November
9742:3 November
9704:3 November
9648:3 November
9174:16 October
9134:15 October
8546:4 November
8361:18 October
8282:8 November
8256:15 January
8215:5 February
8209:Yahoo News
7885:15 January
7815:15 January
7785:15 January
7729:8 November
7604:ccdcoe.org
7528:ccdcoe.org
7505:8 November
7480:8 November
7428:8 November
7322:. 407β429.
7080:8 November
6904:8 November
6746:30 January
6461:8 November
6435:10 October
6268:151 Essays
6169:0071772499
6082:1 February
5702:8 November
5664:(1): 1β8.
5595:6 December
4974:. Oxford.
4957:References
4930:Cybercrime
4793:Cybercrime
4750:South Park
4524:Thomas Rid
4419:See also:
4415:Cyberpeace
4375:Fancy Bear
4373:See also:
4180:Creech AFB
4124:USCYBERCOM
4090:cyberspace
4088:describes
4053:See also:
3844:MuddyWater
3776:See also:
3721:See also:
3658:Fancy Bear
3541:See also:
3524:See also:
3490:See also:
3450:See also:
3424:See also:
3320:Foal Eagle
2870:hacktivism
2864:Hacktivism
2823:Azerbaijan
2795:power grid
2763:USCYBERCOM
2655:Propaganda
2496:satellites
2462:Titan Rain
2361:, such as
2192:Clausewitz
2165:Definition
2105:propaganda
2021:War crimes
2011:Operations
1918:Foot drill
1888:Battle cry
1801:deterrence
1460:Harassment
1435:Specialism
1258:Technology
1253:Succession
1198:Liberation
1133:Asymmetric
1068:Empty fort
974:Blitzkrieg
943:Withdrawal
906:Investment
685:Camouflage
680:Biological
618:Underwater
593:Amphibious
512:Aerospace
379:Air units:
356:Submarines
165:fourth-gen
160:industrial
148:napoleonic
13909:Espionage
13580:Fictional
13427:Saoshyant
13312:New Earth
13283:The Beast
13216:Preterism
13189:Christian
13145:Kali Yuga
13090:Micronova
13085:Hypernova
12951:Dysgenics
12792:Verneshot
12698:Hypercane
12441:Dead Hand
12081:Shellcode
12076:Scareware
11924:Crimeware
11884:Backdoors
11676:153828543
11329:1 January
11099:153828543
10731:Computing
10600:244621961
10534:Economies
10259:11 August
10156:0362-4331
10113:Economist
9854:19 August
9826:19 August
9789:19 August
9767:19 August
9669:CNN Money
8997:11 August
8946:The Local
8821:5 January
8430:2 January
8331:249831452
8323:2347-7970
8050:0362-4331
7672:0956-1382
7638:0261-3077
7021:NDU Press
6827:11 August
6803:155001568
6787:0048-5829
6713:1936-1815
6614:1467-7954
6389:0096-3402
6276:cite book
6049:0362-4331
5860:0362-4331
5678:218770788
5591:(4). 2018
5542:1558-4046
5427:Cyber War
5406:846492852
5368:7 January
5357:: 70β94.
5322:The Verge
5296:1059-1028
5259:cite book
5251:980939904
5102:cite book
5061:0883-072X
4998:cite book
4990:802324804
4745:Cancelled
4722:Zero Days
4615:Microsoft
4397:mercenary
4379:Cozy Bear
4261:smart TVs
4192:keylogged
4082:Cyber War
3856:Hezbollah
3732:pipe bomb
3620:Joe Biden
3602:the U.S.
3543:Cozy Bear
3389:EU states
3358:over the
3288:W32.Dozer
3234:2014β4114
2971:blue team
2952:war games
2846:backbones
2434:with the
2377:Espionage
2276:grey zone
2199:security.
2097:espionage
1908:War novel
1811:Grey-zone
1771:War games
1732:Overmatch
1682:War crime
1632:Desertion
1622:Ceasefire
1617:Armistice
1504:Logistics
1482:Mercenary
1470:Volunteer
1401:Personnel
1373:Engineers
1318:Sociology
1273:World war
1268:Total war
1248:Strategic
1238:Religious
1223:Political
1218:Perpetual
1193:Irregular
1108:Offensive
1083:Defensive
1078:Deception
1038:Attrition
886:Guerrilla
881:Formation
824:Airbridge
756:Loitering
670:Artillery
323:Artillery
273:Engineers
241:Irregular
212:Air force
62:during a
13944:Sabotage
13720:Pandemic
13705:Epidemic
13700:Droughts
13554:Prewrath
13485:End time
13351:Al-Qa'im
13236:Katechon
13221:2 Esdras
13211:Idealism
13194:Futurism
13123:Maitreya
13118:Buddhist
12961:Pandemic
12409:Gray goo
12255:Firewall
12160:Defenses
12086:Spamming
12071:Rootkits
12044:Phishing
12004:Exploits
11626:16367311
11237:Archived
11016:Archived
10703:CBS News
10540:(1): 2.
10481:CBS News
10216:Archived
9847:BBC News
9602:Archived
9560:Ynetnews
9508:Archived
9444:18 March
9350:BBC News
9245:Archived
9078:, 2003,
9056:1 August
9029:Archived
8961:Archived
8938:Archived
8904:Le Monde
8703:Archived
8540:Archived
8517:PC World
8509:Archived
7970:3 August
7747:Archived
7723:ABC News
7703:8 August
7677:8 August
7643:7 August
7609:7 August
7600:"CCDCOE"
7584:7 August
7558:7 August
7533:7 August
7423:cyber.uk
7391:9 August
7369:9 August
7222:Archived
7198:Archived
7174:Archived
7117:Archived
7023:: 76β82.
6972:Archived
6899:Lexology
6795:30026642
6721:26481910
6641:Observer
6622:26296227
6519:Archived
6471:cite web
6407:28366962
6298:Archived
6140:Newsweek
6054:21 March
6020:Archived
5865:9 August
5829:9 August
5822:BBC News
5773:Archived
5550:17374534
5503:29263858
5069:26202046
4950:Firewall
4766:See also
4632:In films
4395:A cyber
4307:such as
4238:Cold War
4186:fleet's
4173:GhostNet
4015:Facebook
3736:cupcakes
3559:and the
3352:Ethiopia
3226:dark web
3224:and the
2967:red team
2894:and the
2787:wargamed
2750:Military
2689:WannaCry
2610:Istanbul
2490:Sabotage
2401:Facebook
2101:sabotage
1923:War song
1898:War film
1531:Materiel
1450:Children
1430:Training
1368:Medicine
1353:Doctrine
1308:Training
1243:Resource
1228:Princely
1178:Economic
1163:Conquest
1158:Colonial
1153:Cold war
1138:Blockade
1018:Strategy
990:Maneuver
751:Infantry
707:Chemical
561:Mountain
521:Airborne
384:Fighters
351:Warships
306:Infantry
232:Reserves
180:Military
66:in 2019.
13964:Hazards
13959:Spyware
13780:Hazards
13678:General
13549:Rapture
13398:Messiah
13386:Sufyani
13376:Israfil
13346:Islamic
13184:Messiah
13162:1 Enoch
12996:Big Rip
12708:Ecocide
12703:Ice age
12096:Spyware
12039:Payload
12034:Malware
11974:Viruses
11954:Botnets
11861:Threats
11355:3 April
11258:Reuters
10710:8 April
10682:8 April
10654:8 April
10626:7 March
10429:4 March
10026:Reuters
9923:YouTube
9720:archive
9716:YouTube
9566:5 March
9424:Reuters
9224:Reuters
9168:gpo.gov
8620:6 April
8597:6 April
8535:YouTube
8456:15 July
7965:Reuters
7454:6 March
7449:UC News
7363:Reuters
7306:2765010
6878:11 July
6852:11 July
6682:bbc.com
6398:5370589
6369:Bibcode
6251:22 June
5967:19 June
5941:19 June
5916:19 June
5891:19 June
5208:24 June
5126:FireEye
4945:Spyware
4935:Hacking
4833:IT risk
4676:Snowden
4557:-based
4555:Tallinn
4490:Estonia
4486:Tallinn
4358:iPhones
4301:Android
4253:Vault 7
4019:Twitter
3895:Shamoon
3824:Stuxnet
3677:X-Agent
3666:Android
3648:Ukraine
3575:at the
3496:In the
3446:Germany
3404:Estonia
2937:or the
2923:attacks
2819:Armenia
2807:hackers
2793:to the
2631:hacked.
2628:hackers
2519:Stuxnet
2508:Stuxnet
2500:C4ISTAR
2089:warfare
2036:Writers
2031:Weapons
1996:Battles
1945:Related
1933:Wargame
1928:Uniform
1876:Culture
1657:Perfidy
1652:Justice
1573:Science
1558:Outpost
1511:History
1491:Warrior
1487:Soldier
1475:foreign
1413:counter
1313:Service
1263:Theater
1203:Limited
1183:Endemic
1098:Nuclear
866:Foxhole
841:Cavalry
829:Airdrop
814:Airlift
799:Tactics
771:Nuclear
761:Missile
690:Cavalry
675:Barrage
653:Weapons
613:Surface
394:Command
389:Bombers
346:Frogman
316:Cavalry
288:Medical
255:Militia
237:Regular
217:Marines
131:castles
121:Ancient
109:History
88:outline
13853:Russia
13710:Famine
13636:Zombie
13438:Others
13393:Jewish
13371:Dajjal
13253:Events
13167:Daniel
13068:winter
12895:Others
12785:winter
12585:winter
12580:famine
12575:cobalt
12290:(SIEM)
12267:(HIDS)
12151:Zombie
11888:Bombs
11869:Adware
11674:
11643:
11624:
11589:
11556:
11536:
11511:
11492:
11475:
11461:
11447:
11432:
11424:
11410:
11376:about
11285:Forbes
11097:
10920:22 May
10911:
10884:
10832:22 May
10823:
10798:22 May
10789:
10598:
10507:DW.COM
10184:
10154:
10006:31 May
9676:15 May
9303:
9082:
8847:1 June
8730:2 July
8641:Quartz
8329:
8321:
8048:
7991:Forbes
7911:5 June
7698:Quartz
7670:
7636:
7304:
7260:. BBC.
7019:(70).
6991:SFGate
6978:15 May
6967:SFGate
6940:
6801:
6793:
6785:
6719:
6711:
6620:
6612:
6405:
6395:
6387:
6338:
6225:5 June
6199:5 June
6175:
6167:
6145:26 May
6119:21 May
6047:
5858:
5799:
5727:
5676:
5548:
5540:
5501:
5462:6 June
5433:
5404:
5394:
5327:10 May
5301:10 May
5294:
5249:
5239:
5182:10 May
5173:"GCHQ"
5157:10 May
5131:10 May
5090:
5067:
5059:
5028:10 May
4988:
4978:
4733:(2020)
4725:(2016)
4717:(2017)
4711:(2015)
4686:(2019)
4678:(2016)
4672:(2015)
4664:(2007)
4656:(2003)
4648:(1996)
4389:, and
4315:, and
4297:Google
4279:, and
3978:RasGas
3954:RasGas
3850:Israel
3794:, and
3632:Sweden
3531:Russia
3520:Norway
3440:Airbus
3420:France
3377:Cyprus
3371:Cyprus
3366:Europe
3341:Africa
3222:GitHub
3195:NCIIPC
3185:(NSA)
3087:McAfee
2976:France
2701:Maersk
2637:Russia
2614:Ankara
2606:Turkey
2476:Area 1
2451:Mexico
2445:, the
2405:Google
2337:, and
2146:, and
2140:Israel
2132:Russia
2016:Sieges
1700:Theory
1440:Morale
1298:Policy
1293:Branch
1073:Mosaic
1063:Fabian
1005:Covert
938:Trench
923:Screen
846:Charge
836:Battle
809:Aerial
727:Denial
695:Horses
623:Seabed
576:Tunnel
556:Jungle
546:Desert
516:Aerial
13843:China
13725:Riots
13417:Norse
13381:Mahdi
13140:Kalki
13135:Hindu
12465:(EMP)
12136:Worms
12131:Wiper
12049:Voice
11897:Logic
11672:S2CID
11622:S2CID
11183:. NPR
11095:S2CID
10849:arXiv
10648:WIRED
10596:S2CID
10576:(PDF)
10344:Wired
10278:Wired
9712:Video
9699:(PDF)
9102:ZDNet
8565:(PDF)
8475:(PDF)
8327:S2CID
8101:Axios
7334:Orbis
7013:(PDF)
6799:S2CID
6791:JSTOR
6717:JSTOR
6663:Wired
6618:JSTOR
6246:Wired
5988:Wired
5776:(PDF)
5769:(PDF)
5674:S2CID
5637:Wired
5546:S2CID
5499:S2CID
5288:Wired
5065:JSTOR
4758:COBRA
4458:time.
4399:is a
4350:Apple
4317:Linux
4313:macOS
4289:Apple
4136:ENISA
3984:Qatar
3899:Saudi
3693:Snake
3509:]
3385:Coreu
3356:Egypt
3346:Egypt
3143:India
3126:China
3073:China
3012:China
2840:Civil
2815:Tibet
2740:]
2697:Merck
2460:The "
2443:Kenya
2436:Stasi
2386:PRISM
2363:Flame
2136:China
2085:state
1989:Lists
1445:Women
1383:Ranks
1303:Staff
1233:Proxy
1148:Class
1103:Naval
1088:Depth
918:Swarm
911:Siege
891:Naval
871:Drone
766:Music
741:Robot
737:Drone
722:Cyber
665:Armor
635:Cyber
608:Green
603:Brown
566:Urban
526:Space
447:Radar
442:Sonar
311:Armor
268:Staff
246:Ranks
13848:Iran
11902:Time
11892:Fork
11641:ISBN
11587:ISBN
11554:ISBN
11534:ISBN
11509:ISBN
11490:ISBN
11473:ISBN
11459:ISBN
11445:ISBN
11430:ISBN
11422:ISBN
11408:ISBN
11357:2017
11331:2024
11292:2017
11266:2017
11189:2010
11154:2022
11129:2022
11117:NIST
10948:2022
10922:2017
10909:ISBN
10882:ISBN
10834:2017
10821:ISBN
10800:2017
10787:ISBN
10712:2017
10684:2017
10656:2017
10628:2017
10515:2016
10489:2016
10431:2017
10325:2011
10261:2020
10182:ISBN
10163:2020
10152:ISSN
10066:2021
10033:2019
10008:2018
9932:2017
9904:2022
9878:2017
9856:2012
9828:2012
9791:2012
9769:2012
9744:2017
9706:2017
9678:2019
9650:2017
9568:2022
9446:2015
9358:2022
9332:2016
9301:ISBN
9176:2016
9136:2016
9114:2008
9080:ISBN
9058:2016
8999:2020
8849:2018
8823:2019
8732:2010
8622:2013
8599:2013
8573:2011
8548:2017
8458:2019
8432:2017
8363:2012
8319:ISSN
8284:2022
8258:2013
8217:2024
8191:2020
8160:2020
8153:GSXT
8135:2020
8109:2018
8083:2018
8057:2018
8046:ISSN
8023:2018
7998:2018
7972:2011
7913:2015
7887:2013
7862:2010
7817:2013
7787:2013
7731:2022
7705:2019
7679:2019
7668:ISSN
7645:2019
7634:ISSN
7611:2019
7586:2019
7560:2019
7535:2019
7507:2022
7482:2022
7456:2022
7430:2022
7393:2019
7371:2019
7302:SSRN
7082:2022
7057:help
6986:Link
6980:2019
6938:ISBN
6906:2022
6880:2018
6854:2018
6829:2020
6783:ISSN
6748:2018
6709:ISSN
6610:ISSN
6477:link
6463:2022
6437:2020
6403:PMID
6385:ISSN
6336:ISBN
6282:link
6253:2019
6227:2015
6201:2015
6173:ISBN
6165:ISBN
6147:2014
6121:2014
6084:2014
6076:Time
6056:2021
6045:ISSN
5969:2021
5943:2021
5918:2021
5893:2021
5867:2019
5856:ISSN
5831:2019
5797:ISBN
5725:ISBN
5704:2022
5597:2019
5538:ISSN
5464:2015
5431:ISBN
5402:OCLC
5392:ISBN
5370:2020
5329:2019
5303:2019
5292:ISSN
5269:link
5265:link
5247:OCLC
5237:ISBN
5210:2021
5184:2019
5159:2019
5133:2019
5108:link
5088:ISBN
5057:ISSN
5030:2019
5022:NATO
5004:link
4986:OCLC
4976:ISBN
4940:DDoS
4838:iWar
4823:Duqu
4587:and
4564:The
4545:and
4537:The
4427:FIfF
4348:and
4295:and
4257:cars
4236:the
4017:and
4005:The
3820:Iran
3801:Iran
3766:Iran
3598:and
3594:the
3569:NATO
3436:EADS
3354:and
3334:and
3282:and
3239:The
3007:Asia
2981:The
2969:vs.
2957:The
2910:and
2821:and
2744:NATO
2721:9/11
2691:and
2612:and
2560:The
2467:The
2453:and
2403:and
2388:: a
2365:and
2144:Iran
2026:Wars
1543:Base
1093:Goal
1000:Raid
598:Blue
536:Land
207:Navy
202:Army
11907:Zip
11664:doi
11614:doi
11428:, "
11087:doi
10874:doi
10728:".
10588:doi
10552:hdl
10542:doi
10402:".
9714:on
9608:",
9584:",
9473:doi
8311:doi
7946:NPR
7880:NPR
7833:".
7342:doi
7298:100
6988:at
6775:doi
6771:128
6602:doi
6393:PMC
6377:doi
6220:CNN
6194:NPR
5666:doi
5530:doi
5491:doi
5359:doi
4598:ICT
4572:".
4299:'s
4293:iOS
4291:'s
4249:CIA
4182:'s
4063:of
3728:MI6
3669:app
3458:BND
3230:CVE
2811:CNN
2547:An
2537:DoS
2432:NSA
2397:NSA
2111:or
1610:Law
1553:FOB
1548:MOB
588:Sea
80:War
41:or
13880::
12488:/
11670:.
11660:35
11658:.
11620:.
11610:34
11608:.
11604:.
11567:,
11552:,
11322:.
11283:.
11256:.
11205:.
11145:.
11115:.
11093:.
11083:35
11081:.
11063:.
11035:.
10987:.
10938:.
10880:.
10771:^
10739:^
10700:.
10673:.
10645:.
10617:.
10594:.
10584:14
10582:.
10578:.
10550:.
10536:.
10532:.
10505:.
10479:.
10461:.
10422:.
10342:.
10311:.
10293:.
10276:.
10222:,
10150:.
10146:.
10128:,
10102:^
10093:.
10050:.
10024:.
9984:.
9966:.
9948:.
9920:.
9894:.
9844:.
9818:.
9752:^
9686:^
9666:.
9626:.
9558:.
9528:.
9467:.
9463:.
9422:.
9391:.
9374:.
9348:.
9323:.
9281:,
9251:,
9221:.
9166:.
9100:.
9074:.
8944:,
8902:.
8884:.
8865:.
8809:.
8764:,
8747:.
8722:.
8658:.
8638:.
8590:.
8532:.
8515:.
8477:.
8449:.
8408:.
8378:.
8347:.
8325:.
8317:.
8305:.
8301:.
8274:.
8249:.
8236:^
8207:.
8177:.
8151:.
8126:.
8099:.
8073:.
8044:.
8040:.
8014:.
7989:.
7963:.
7944:.
7904:.
7878:.
7852:.
7803:.
7773:.
7762:^
7753:.
7721:.
7696:.
7666:.
7662:.
7632:.
7628:.
7602:.
7577:.
7551:.
7526:.
7515:^
7498:.
7472:.
7447:.
7421:.
7338:59
7336:.
7296:.
7284:^
7274:.
7241:.
7204:.
7180:.
7156:.
7137:.
7100:,
7090:^
7073:.
7048::
7046:}}
7042:{{
7015:.
6970:.
6964:.
6897:.
6871:.
6845:.
6797:.
6789:.
6781:.
6769:.
6765:.
6715:.
6705:12
6703:.
6699:.
6680:.
6660:.
6649:^
6639:.
6616:.
6608:.
6598:17
6596:.
6592:.
6538:.
6473:}}
6469:{{
6454:.
6423:.
6401:.
6391:.
6383:.
6375:.
6365:72
6363:.
6359:.
6316:.
6278:}}
6274:{{
6244:.
6218:.
6192:.
6171:,
6138:.
6107:.
6101:.
6073:.
6043:.
6039:.
6003:,
5986:.
5960:.
5934:.
5909:.
5883:.
5854:.
5848:.
5819:.
5747:.
5694:.
5672:.
5662:67
5660:.
5654:.
5634:.
5624:^
5615:,
5605:^
5589:17
5587:.
5583:.
5544:.
5536:.
5524:.
5520:.
5497:.
5485:.
5481:.
5450:.
5414:^
5400:.
5378:^
5355:49
5353:.
5349:.
5337:^
5320:.
5290:.
5286:.
5261:}}
5257:{{
5245:.
5218:^
5200:.
5175:.
5149:.
5124:.
5104:}}
5100:{{
5063:.
5053:31
5051:.
5047:.
5020:.
5000:}}
4996:{{
4984:.
4411:.
4385:,
4381:,
4377:,
4334:.
4319:.
4311:,
4275:,
4271:,
4263:,
4259:,
3956:.
3839:.
3790:,
3786:,
3757:.
3738:.
3644:.
3587:.
3507:nl
3294:.
3206:.
3173:,
3169:,
3136:.
3132:,
3049:.
2954:.
2898:.
2890:,
2738:de
2699:,
2667:,
2597:.
2515:.
2449:,
2333:,
2295:.
2266:,
2142:,
2138:,
2134:,
2130:,
2126:,
2115:.
2107:,
2103:,
2099:,
1489:/
739:/
253:/
239:/
13826:e
13819:t
13812:v
12335:e
12328:t
12321:v
11745:e
11738:t
11731:v
11688:.
11678:.
11666::
11649:.
11628:.
11616::
11595:.
11517:.
11498:.
11436:"
11359:.
11333:.
11294:.
11268:.
11191:.
11156:.
11131:.
11101:.
11089::
10950:.
10924:.
10890:.
10876::
10857:.
10851::
10836:.
10802:.
10765:.
10724:"
10714:.
10686:.
10658:.
10630:.
10590::
10560:.
10554::
10544::
10538:8
10517:.
10491:.
10465:.
10433:.
10398:"
10385:"
10346:.
10327:.
10263:.
10190:.
10165:.
10068:.
10035:.
10010:.
9934:.
9906:.
9880:.
9858:.
9830:.
9793:.
9771:.
9746:.
9722:)
9718:-
9710:(
9708:.
9680:.
9652:.
9630:.
9570:.
9532:.
9481:.
9475::
9469:4
9448:.
9360:.
9334:.
9309:.
9178:.
9138:.
9116:.
9060:.
9001:.
8851:.
8825:.
8734:.
8624:.
8601:.
8575:.
8550:.
8519:.
8481:.
8460:.
8434:.
8412:.
8365:.
8333:.
8313::
8307:9
8286:.
8260:.
8219:.
8193:.
8162:.
8137:.
8111:.
8085:.
8059:.
8025:.
8000:.
7974:.
7948:.
7915:.
7889:.
7864:.
7829:"
7819:.
7789:.
7733:.
7707:.
7681:.
7647:.
7613:.
7588:.
7562:.
7537:.
7509:.
7484:.
7458:.
7432:.
7395:.
7373:.
7348:.
7344::
7308:.
7278:.
7160:.
7141:.
7084:.
7059:)
7055:(
7038:.
6994:)
6984:(
6982:.
6946:.
6908:.
6882:.
6856:.
6831:.
6805:.
6777::
6750:.
6723:.
6643:.
6624:.
6604::
6479:)
6465:.
6439:.
6409:.
6379::
6371::
6344:.
6284:)
6255:.
6229:.
6203:.
6149:.
6123:.
6086:.
6058:.
5990:.
5971:.
5945:.
5920:.
5895:.
5869:.
5833:.
5805:.
5733:.
5706:.
5680:.
5668::
5599:.
5552:.
5532::
5526:9
5505:.
5493::
5487:1
5466:.
5408:.
5372:.
5361::
5331:.
5305:.
5271:)
5253:.
5212:.
5186:.
5161:.
5135:.
5110:)
5096:.
5071:.
5032:.
5006:)
4992:.
4743:"
3438:(
3232:-
2457:.
2438:.
2423:.
2407:.
2065:e
2058:t
2051:v
90:)
86:(
45:.
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.