Knowledge

Cyberwarfare

Source πŸ“

2521:, while extremely effective in delaying Iran's nuclear program for the development of nuclear weaponry, came at a high cost. For the first time, it became clear that not only could cyber weapons be defensive but they could be offensive. The large decentralization and scale of cyberspace makes it extremely difficult to direct from a policy perspective. Non-state actors can play as large a part in the cyberwar space as state actors, which leads to dangerous, sometimes disastrous, consequences. Small groups of highly skilled malware developers are able to as effectively impact global politics and cyber warfare as large governmental agencies. A major aspect of this ability lies in the willingness of these groups to share their exploits and developments on the web as a form of arms proliferation. This allows lesser hackers to become more proficient in creating the large scale attacks that once only a small handful were skillful enough to manage. In addition, thriving black markets for these kinds of cyber weapons are buying and selling these cyber capabilities to the highest bidder without regard for consequences. 3322:, South Korea's annual joint military exercise with the United States. North Korea's cyber warfare capabilities raise the alarm for South Korea, as North Korea is increasing its manpower through military academies specializing in hacking. Current figures state that South Korea only has 400 units of specialized personnel, while North Korea has more than 3,000 highly trained hackers; this portrays a huge gap in cyber warfare capabilities and sends a message to South Korea that it has to step up and strengthen its Cyber Warfare Command forces. Therefore, in order to be prepared from future attacks, South Korea and the United States will discuss further about deterrence plans at the Security Consultative Meeting (SCM). At SCM, they plan on developing strategies that focuses on accelerating the deployment of ballistic missiles as well as fostering its defense shield program, known as the Korean Air and Missile Defense. 51: 99: 3964: 3811: 2544: 2746:, advocates that states take cyber warfare seriously as they are viewed as an attractive activity by many nations, in times of war and peace. Offensive cyber operations offer a large variety of cheap and risk-free options to weaken other countries and strengthen their own positions. Considered from a long-term, geostrategic perspective, cyber offensive operations can cripple whole economies, change political views, agitate conflicts within or among states, reduce their military efficiency and equalize the capacities of high-tech nations to that of low-tech nations, and use access to their critical infrastructures to blackmail them. 2877:
or to cause widespread destruction, but to draw attention to their cause through well-publicized disruptions of select targets. Anonymous and other hacktivist groups are often portrayed in the media as cyber-terrorists, wreaking havoc by hacking websites, posting sensitive information about their victims, and threatening further attacks if their demands are not met. However, hacktivism is more than that. Actors are politically motivated to change the world, through the use of fundamentalism. Groups like Anonymous, however, have divided opinion with their methods.
4607:, has developed a project called the International Convention on Prohibition of Cyberwar in Internet. According to this project, cyberwar is defined as the use of Internet and related technological means by one state against the political, economic, technological and information sovereignty and independence of another state. Professor Merezhko's project suggests that the Internet ought to remain free from warfare tactics and be treated as an international landmark. He states that the Internet (cyberspace) is a "common heritage of mankind". 4119:. The malware caused the SCADA system running the pipeline to malfunction. The "Farewell Dossier" provided information on this attack, and wrote that compromised computer chips would become a part of Soviet military equipment, flawed turbines would be placed in the gas pipeline, and defective plans would disrupt the output of chemical plants and a tractor factory. This caused the "most monumental nonnuclear explosion and fire ever seen from space." However, the Soviet Union did not blame the United States for the attack. 3913: 13751: 11712: 3928: 2382: 3862:(IDF) intelligence estimates several countries in the Middle East used Russian hackers and scientists to operate on their behalf. As a result, Israel attached growing importance to cyber-tactics, and became, along with the U.S., France and a couple of other nations, involved in cyber-war planning. Many international high-tech companies are now locating research and development operations in Israel, where local hires are often veterans of the IDF's elite computer units. 3416:. The largest part of the attacks were coming from Russia and from official servers of the authorities of Russia. In the attack, ministries, banks, and media were targeted. This attack on Estonia, a seemingly small Baltic state, was so effective because of how most of Estonian government services are run online. Estonia has implemented an e-government, where banking services, political elections, taxes, and other components of a modern society are now all done online. 13763: 3997:, as allegedly orchestrating Qatar's cyber warfare campaign against Broidy. Further litigation revealed that the same cybercriminals who targeted Broidy had targeted as many as 1,200 other individuals, some of whom are also "well-known enemies of Qatar" such as senior officials of the U.A.E., Egypt, Saudi Arabia, and Bahrain. While these hackers almost always obscured their location, some of their activity was traced to a telecommunication network in Qatar. 3318:
30,000 computers were affected; it is one of the biggest attacks South Korea has faced in years. Although it remains uncertain as to who was involved in this incident, there has been immediate assertions that North Korea is connected, as it threatened to attack South Korea's government institutions, major national banks and traditional newspapers numerous times – in reaction to the sanctions it received from nuclear testing and to the continuation of
11849: 2540:
root nameservers. DoS attacks often leverage internet-connected devices with vulnerable security measures to carry out these large-scale attacks. DoS attacks may not be limited to computer-based methods, as strategic physical attacks against infrastructure can be just as devastating. For example, cutting undersea communication cables may severely cripple some regions and countries with regards to their information warfare ability.
2974:
severe disruptions in the power generation and distribution, 4G communication systems, maritime surveillance, water purification plant and other critical infrastructure components". CCDCE describe the aim of the exercise was to "maintain the operation of various systems under intense pressure, the strategic part addresses the capability to understand the impact of decisions made at the strategic and policy level." Ultimately,
3391:, on both sensitive and not so sensitive matters. The event exposed poor protection of routine exchanges among European Union officials and a coordinated effort from a foreign entity to spy on another country. "After over a decade of experience countering Chinese cyberoperations and extensive technical analysis, there is no doubt this campaign is connected to the Chinese government", said Blake Darche, one of the 11700: 2287:
large-scale action, typically over a protracted period of time, and may include objectives seeking to utilize violence or the aim to kill. A cyber war could accurately describe a protracted period of back-and-forth cyber attacks (including in combination with traditional military action) between warring states. To date, no such action is known to have occurred. Instead, armed forces have responded with
2315:, EO 13694 of 2015 and EO 13757 of 2016, specifically focused on the implementation of the cyber sanctions. Subsequent US presidents have issued similar Executive Orders. The US Congress has also imposed cyber sanctions in response to cyberwarfare. For example, the Iran Cyber Sanctions Act of 2016 imposes sanctions on specific individuals responsible for cyber attacks. 3298: 3031:" of their military through "increased education of soldiers in cyber warfare; improving the information network for military training, and has built more virtual laboratories, digital libraries and digital campuses." Through this informatisation, they hope to prepare their forces to engage in a different kind of warfare, against technically capable adversaries. 2150:, have active cyber capabilities for offensive and defensive operations. As states explore the use of cyber operations and combine capabilities, the likelihood of physical confrontation and violence playing out as a result of, or part of, a cyber operation is increased. However, meeting the scale and protracted nature of war is unlikely, thus ambiguity remains. 2278:", which came to prominence in 2017, describing hostile actions that fall below the traditional threshold of war. But as Kello explained, technological unpeace differs from the grey zone as the term is commonly used in that unpeace by definition is never overtly violent or fatal, whereas some grey-zone actions are violent, even if they are not acts of war. 2679:
today. People can convey their messages quickly across to a huge audience, and this can open a window for evil. Terrorist organizations can exploit this and may use this medium to brainwash people. It has been suggested that restricted media coverage of terrorist attacks would in turn decrease the number of terrorist attacks that occur afterwards.
8148: 2307:. Sometimes, it is not easy to detect the attacker, but suspicions may focus on a particular country or group of countries. In these cases, unilateral and multilateral economic sanctions can be used instead of cyberwarfare. For example, the United States has frequently imposed economic sanctions related to cyber attacks. Two 4434:, the establishment of cyber security centers, auditing of critical infrastructure cybersecurity, obligations to disclose vulnerabilities, disarmament, defensive security strategies, decentralization, education and widely applying relevant tools and infrastructures, encryption and other cyberdefenses. 3749:(GCHQ), said the UK faces a "real and credible" threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 times each month, such attacks threatened the UK's economic future, and some countries were already using cyber assaults to put pressure on other nations. 3197:
was finalizing policies related to national cyber security that would focus on domestic security solutions, reducing exposure through foreign technology. Other steps include the isolation of various security agencies to ensure that a synchronised attack could not succeed on all fronts and the planned
2207:
The warfare grounded on certain uses of ICTs within an offensive or defensive military strategy endorsed by a state and aiming at the immediate disruption or control of the enemy's resources, and which is waged within the informational environment, with agents and targets ranging both on the physical
3975:
According to Kubecka, in order to restore operations. Saudi Aramco used its large private fleet of aircraft and available funds to purchase much of the world's hard drives, driving the price up. New hard drives were required as quickly as possible so oil prices were not affected by speculation. By 1
3317:
stated that South Korea was going to improve cyber-defense strategies in hopes of preparing itself from possible cyber attacks. In March 2013, South Korea's major banks – Shinhan Bank, Woori Bank and NongHyup Bank – as well as many broadcasting stations – KBS, YTN and MBC – were hacked and more than
3251:
The Chinese are being blamed after a cybersecurity company, F-Secure Labs, found a malware, NanHaiShu, which targeted the Philippines Department of Justice. It sent information in an infected machine to a server with a Chinese IP address. The malware which is considered particularly sophisticated in
2678:
Jowell and O'Donnell (2006) state that "propaganda is the deliberate, systematic attempt to shape perceptions, manipulate cognitions, and direct behavior to achieve a response that furthers the desired intent of the propagandist" (p. 7). The internet is the most important means of communication
2539:
attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even
2502:
components that are responsible for orders and communications could lead to their interception or malicious replacement. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to disruption. According to Clarke, the civilian realm is also at risk, noting that the
2348:
Cyber warfare can present a multitude of threats towards a nation. At the most basic level, cyber attacks can be used to support traditional warfare. For example, tampering with the operation of air defenses via cyber means in order to facilitate an air attack. Aside from these "hard" threats, cyber
2273:
In 2017, Oxford academic Lucas Kello proposed a new term, "Unpeace", to denote highly damaging cyber actions whose non-violent effects do not rise to the level of traditional war. Such actions are neither warlike nor peace-like. Although they are non-violent, and thus not acts of war, their damaging
3884:
in May 2018, cyber warfare units in the United States and Israel monitoring internet traffic out of Iran noted a surge in retaliatory cyber attacks from Iran. Security firms warned that Iranian hackers were sending emails containing malware to diplomats who work in the foreign affairs offices of US
3834:
Iranian Cyber Police department, FATA, was dismissed one year after its creation in 2011 because of the arrest and death of Sattar Behesti, a blogger, in the custody of FATA. Since then, the main responsible institution for the cyberwarfare in Iran is the "Cyber Defense Command" operating under the
3515:
laid out a cyber strategy in 2011. The first focus is to improve the cyber defense handled by the Joint IT branch (JIVC). To improve intel operations, the intel community in the Netherlands (including the military intel organization, MIVD) has set up the Joint Sigint Cyber Unit (JSCU). The Ministry
2876:
to promote an agenda, and can potentially extend to attacks, theft and virtual sabotage that could be seen as cyberwarfare – or mistaken for it. Hacktivists use their knowledge and software tools to gain unauthorized access to computer systems they seek to manipulate or damage not for material gain
2576:
and to help industries enhance the security of control system networks. The federal government is also working to ensure that security is built in as the next generation of "smart grid" networks are developed. In April 2009, reports surfaced that China and Russia had infiltrated the U.S. electrical
2185:
Raymond Charles Parks and David P. Duggan focused on analyzing cyberwarfare in terms of computer networks and pointed out that "Cyberwarfare is a combination of computer network attack and defense and special technical operations." According to this perspective, the notion of cyber warfare brings a
4235:
In 2016 President Barack Obama authorized the planting of cyber weapons in Russian infrastructure in the final weeks of his presidency in response to Moscow's interference in the 2016 presidential election. On 29 December 2016 United States imposed the most extensive sanctions against Russia since
3988:
In March 2018 American Republican fundraiser Elliott Broidy filed a lawsuit against Qatar, alleging that Qatar's government stole and leaked his emails in order to discredit him because he was viewed "as an impediment to their plan to improve the country's standing in Washington." In May 2018, the
3468:
announced that his agency had observed up to five attacks a day on government authorities, thought mainly to originate in China. He confirmed the attackers had so far only accessed data and expressed concern that the stolen information could be used as the basis of future sabotage attacks against
3309:
was hacked, resulting in the theft of the personal details (including names, phone numbers, home and email addresses and resident registration numbers) of up to 35 million people. A trojaned software update was used to gain access to the SK Communications network. Links exist between this hack and
3112:
in China, the shareholders of Zhenhua Data Information Technology Co., Ltd. are two natural persons and one general partnership enterprise whose partners are natural persons. Wang Xuefeng, who is the chief executive and the shareholder of Zhenhua Data, has publicly boasted that he supports "hybrid
3044:
While China continues to be held responsible for a string of cyber-attacks on a number of public and private institutions in the United States, India, Russia, Canada, and France, the Chinese government denies any involvement in cyber-spying campaigns. The administration maintains the position that
2973:
exercise. The war game involved a fictional country, Berylia, which was "experiencing a deteriorating security situation, where a number of hostile events coincide with coordinated cyber attacks against a major civilian internet service provider and maritime surveillance system. The attacks caused
2885:
Cyber attacks, including ransomware, can be used to generate income. States can use these techniques to generate significant sources of income, which can evade sanctions and perhaps while simultaneously harming adversaries (depending on targets). This tactic was observed in August 2019 when it was
4568:(members of which include China and Russia) defines cyberwar to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other states". In September 2011, these countries proposed to the UN Secretary General a document called "International code of conduct for 4429:
runs a campaign for cyberpeace βˆ’ for the control of cyberweapons and surveillance technology and against the militarization of cyberspace and the development and stockpiling of offensive exploits and malware. Measures for cyberpeace include policymakers developing new rules and norms for warfare,
4033:
with the Justice Department, the three defendants also agreed to pay nearly $ 1.7 million in fines to evade prison sentences. The court documents revealed that the Emirates hacked into the computers and mobile phones of dissidents, activists, and journalists. They also attempted to break into the
3971:
On 29 August 2012 the same attackers behind Shamoon posted another pastie on PasteBin.com, taunting Saudi Aramco with proof they still retained access to the company network. The post contained the username and password on security and network equipment and the new password for the CEO Khalid Al-
3830:
It was a 500-kilobyte computer worm that infected at least 14 industrial sites in Iran, including the Natanz uranium-enrichment plant. Although the official authors of Stuxnet haven't been officially identified, Stuxnet is believed to be developed and deployed by the United States and Israel. The
3679:
spyware and posted online on military forums. The attack was claimed by Crowd-Strike to be successful, with more than 80% of Ukrainian D-30 Howitzers destroyed, the highest percentage loss of any artillery pieces in the army (a percentage that had never been previously reported and would mean the
2988:
As well as war games which serve a broader purpose to explore options and improve skills, cyber war games are targeted at preparing for specific threats. In 2018 the Sunday Times reported the UK government was conducting cyber war games which could "blackout Moscow". These types of war games move
2286:
The term "cyberwarfare" is distinct from the term "cyber war". Cyberwarfare includes techniques, tactics and procedures that may be involved in a cyber war, but the term does not imply scale, protraction or violence, which are typically associated with the term "war", which inherently refers to a
2118:
There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists. One view is that the term is a misnomer since no cyber attacks to date could be described as a war. An alternative view is that it is a suitable label for cyber attacks which cause
5447: 4243:
Economic sanctions are the most frequently used the foreign policy instruments by the United States today Thus, it is not surprising to see that economic sanctions are also used as counter policies against cyberattacks. According to Onder (2021), economic sanctions are also information gathering
3935:
Kubecka also detailed in her Black Hat USA talk Saudi Aramco placed the majority of their security budget on the ICS control network, leaving the business network at risk for a major incident. The virus has been noted to have behavior differing from other malware attacks, due to the destructive
3201:
On 26 November 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic
4617:
president Brad Smith suggested global rules – a "Digital Geneva Convention" – for cyber attacks that "ban the nation-state hacking of all the civilian aspects of our economic and political infrastructures". He also stated that an independent organization could investigate and publicly disclose
3959:
Saudi Aramco announced the attack on their Facebook page and went offline again until a company statement was issued on 25 August 2012. The statement falsely reported normal business was resumed on 25 August 2012. However a Middle Eastern journalist leaked photographs taken on 1 September 2012
2777:
Alexander sketched out the broad battlefield envisioned for the computer warfare command, listing the kind of targets that his new headquarters could be ordered to attack, including "traditional battlefield prizes – command-and-control systems at military headquarters, air defense networks and
9581: 4197:
On 21 November 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois. However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois
2169:
There is ongoing debate over how cyberwarfare should be defined and no absolute definition is widely agreed upon. While the majority of scholars, militaries, and governments use definitions that refer to state and state-sponsored actors, other definitions may include non-state actors, such as
4499:
In 2015, the Department of Defense released an updated cyber strategy memorandum detailing the present and future tactics deployed in the service of defense against cyberwarfare. In this memorandum, three cybermissions are laid out. The first cybermission seeks to arm and maintain existing
3924:, a former security advisor to Saudi Aramco after the attack and group leader of security for Aramco Overseas. It was an unnamed Saudi Aramco employee on the Information Technology team which opened a malicious phishing email, allowing initial entry into the computer network around mid-2012. 4445:
Cyber counter-intelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions.
4170:
In August 2010, the U.S. for the first time warned publicly about the Chinese military's use of civilian computer experts in clandestine cyber attacks aimed at American companies and government agencies. The Pentagon also pointed to an alleged China-based computer spying network dubbed
4457:
On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House cyber security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first
3236:), a compiled AutoIt script, and UAC bypass code dubbed UACME. Targets are believed to be mainly military and political assignments around Southeast Asia and the South China Sea and the attackers are believed to be of Indian origin and gathering intelligence from influential parties. 3695:", or "Ouroboros," to conduct a cyber attack on Ukraine during a period of political turmoil. The Snake tool kit began spreading into Ukrainian computer systems in 2010. It performed Computer Network Exploitation (CNE), as well as highly sophisticated Computer Network Attacks (CNA). 3442:) to identify and secure its main elements susceptible to cyber threats. In 2016 France had planned 2600 "cyber-soldiers" and a 440 million euros investment for cybersecurity products for this new army corps. An additional 4400 reservists constitute the heart of this army from 2019. 2219:, defined cyberwarfare as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption". The target's own cyber-physical infrastructure may be used by the adversary in case of a cyber conflict, thus weaponizing it. 3096:
that collected personal details of roughly 500 million guests is now known to be a part of a Chinese intelligence-gathering effort that also hacked health insurers and the security clearance files of millions more Americans, The hackers, are suspected of working on behalf of the
2965:, have conducted a yearly war game called Locked Shields since 2010 designed to test readiness and improve skills, strategy tactics and operational decision making of participating national organizations. Locked Shields 2019 saw 1200 participants from 30 countries compete in a 9601: 4364:
said many of its senior staff and managers were also hit by the ongoing attack, which it first suspected in early 2023. The oldest traces of infiltration date back to 2019. Kaspersky Lab said it had not shared the findings with Russian authorities until the FSB announcement.
2411:
Traditional espionage is not an act of war, nor is cyber-espionage, and both are generally assumed to be ongoing between major powers. Despite this assumption, some incidents can cause serious tensions between nations, and are often described as "attacks". For example:
9760: 3434:, ordered the creation of a cyber army, representing its fourth national army corps (along with ground, naval and air forces) under the French Ministry of Defense, to protect French and European interests on its soil and abroad. A contract was made with French firm 4138:(European Union Agency for Network and Information Security) which is headed by Prof. Udo Helmbrecht and there are now further plans to significantly expand ENISA's capabilities. The United Kingdom has also set up a cyber-security and "operations centre" based in 2804:
Examples of cyberwarfare driven by political motivations can be found worldwide. In 2008, Russia began a cyber attack on the Georgian government website, which was carried out along with Georgian military operations in South Ossetia. In 2008, Chinese "nationalist
3752:
On 12 November 2013, financial organizations in London conducted cyber war games dubbed "Waking Shark 2" to simulate massive internet-based attacks against bank and other financial organizations. The Waking Shark 2 cyber war games followed a similar exercise in
4488:, Estonia, in order to enhance the organization's cyber defence capability. The center was formally established on 14 May 2008, and it received full accreditation by NATO and attained the status of International Military Organization on 28 October 2008. Since 2852:, to the varying types of data communication mediums and network equipment. This would include: web servers, enterprise information systems, client server systems, communication links, network equipment, and the desktops and laptops in businesses and homes. 5455: 3189:
began in October 2012, and intends to boost up India's cyber security capabilities in the light of a group of experts findings that India faces a 470,000 shortfall of such experts despite the country's reputation of being an IT and software powerhouse.
8174: 4028:
In September 2021, three of the former American intelligence officers, Marc Baier, Ryan Adams, and Daniel Gericke, admitted to assisting the UAE in hacking crimes by providing them with advanced technology and violating US laws. Under a three-year
2773:
is the newest global combatant and its sole mission is cyberspace, outside the traditional battlefields of land, sea, air and space." It will attempt to find and, when necessary, neutralize cyberattacks and to defend military computer networks.
2920:
and as such is presumed to widely occur. It is typical that this type of crime is underreported to the extent they are known. According to McAfee's George Kurtz, corporations around the world face millions of cyberattacks a day. "Most of these
4221:(TAO) unit "has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People's Republic of China." 4167:", would grant the president emergency powers over parts of the Internet. However, all three co-authors of the bill issued a statement that instead, the bill " existing broad presidential authority to take over telecommunications networks". 3481:
announced that the BND would be given an additional budget of 100 million Euros to increase their cyber surveillance capability from 5% of total internet traffic in Germany to 20% of total traffic, the maximum amount allowed by German law.
3022:
According to Fritz, China has expanded its cyber capabilities and military technology by acquiring foreign military technology. Fritz states that the Chinese government uses "new space-based surveillance and intelligence gathering systems,
2949:
A number of countries conduct exercise to increase preparedness and explore the strategy, tactics and operations involved in conducting and defending against cyber attacks against hostile states, this is typically done in the form of
9598: 3395:
experts – the company revealing the stolen documents. The Chinese Embassy in the US did not return calls for comment. In 2019, another coordinated effort took place that allowed hackers to gain access to government (gov.cy) emails.
4526:, "Cyber War Will Not Take Place" which argued that all politically motivated cyber attacks are merely sophisticated versions of sabotage, espionage, or subversion – and that it is unlikely that cyber war will occur in the future. 4595:
providing "a direct secure voice communications line between the US cybersecurity coordinator and the Russian deputy secretary of the security council, should there be a need to directly manage a crisis situation arising from an
4142:(GCHQ), the British equivalent of the NSA. In the U.S. however, Cyber Command is only set up to protect the military, whereas the government and corporate infrastructures are primarily the responsibility respectively of the 2630:
have gotten into administrative computer systems of utility companies, but says those aren't linked to the equipment controlling the grid, at least not in developed countries. has never heard that the grid itself has been
2198:
Cyber war is an extension of policy by actions taken in cyber space by state or nonstate actors that constitute a serious threat to a nation's security or are conducted in response to a perceived threat against a nation's
4500:
capabilities in the area of cyberspace, the second cybermission focuses on prevention of cyberwarfare, and the third cybermission includes strategies for retaliation and preemption (as distinguished from prevention).
5772: 2510:
that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes
8182: 4622:
and not aid governments in offensive activity and to adopt a coordinated disclosure process for software and hardware vulnerabilities. A fact-binding body has also been proposed to regulate cyber operations.
4618:
evidence that attributes nation-state attacks to specific countries. Furthermore, he said that the technology sector should collectively and neutrally work together to protect Internet users and pledge to
9492: 4426: 2800:
The distributed nature of internet based attacks means that it is difficult to determine motivation and attacking party, meaning that it is unclear when a specific act should be considered an act of war.
8446: 3252:
nature was introduced by phishing emails that were designed to look like they were coming from an authentic sources. The information sent is believed to be relating to the South China Sea legal case.
6098: 3151:(CERT-In) in 2004 to thwart cyber attacks in India. That year, there were 23 reported cyber security breaches. In 2011, there were 13,301. That year, the government created a new subdivision, the 3944:. Once a system is infected, the virus continues to compile a list of files from specific locations on the system, upload them to the attacker, and erase them. Finally the virus overwrites the 3628:
that the United States will respond. The New York Times noted that Biden's comment "seems to suggest that Mr. Obama is prepared to order – or has already ordered – some kind of covert action".
8344: 2212:
Robinson et al. proposed in 2015 that the intent of the attacker dictates whether an attack is warfare or not, defining cyber warfare as "the use of cyber attacks with a warfare-like intent."
4437:
The topics of cyber peacekeeping and cyber peacemaking have also been studied by researchers, as a way to restore and strengthen peace in the aftermath of both cyber and traditional warfare.
8917: 3220:
In July 2016, Cymmetria researchers discovered and revealed the cyber attack dubbed 'Patchwork', which compromised an estimated 2500 corporate and government agencies using code stolen from
2675:
stated that this kind of attack from actors such as Russia "is a form of system warfare that seeks to de-legitimize the political and social system on which our military strength is based".
6451: 2239:" is a more accurate term than "cyberwar." He states that "with today's attacks, you are clueless about who did it or when they will strike again. It's not cyber-war, but cyberterrorism." 10725: 10215: 3614:
emails. Under U.S. law (50 U.S.C.Title 50 – War and National Defense, Chapter 15 – National Security, Subchapter III Accountability for Intelligence Activities) there must be a formal
7116: 2985:
conducts cyber war game scenarios with member states and foreign partner states to improve readiness, skills and observe how strategic and tactical decisions may affect the scenario.
2754:
With the emergence of cyber as a substantial threat to national and global security, cyber war, warfare and/or attacks also became a domain of interest and purpose for the military.
2291:
military cyber actions. For example, in June 2019, the United States launched a cyber attack against Iranian weapons systems in retaliation to the shooting down of a US drone in the
10399: 3501: 2258:", as militaristic responses may not be appropriate. However, to date, even serious cyber-attacks that have disrupted large parts of a nation's electrical grid (230,000 customers, 8070: 6297: 8508: 2181:'Cyberwarfare' is used in a broad context to denote interstate use of technological force within computer networks in which information is stored, shared, or communicated online. 10444: 3041:
highlight US concerns that China is using access to Microsoft source code and 'harvesting the talents of its private sector' to boost its offensive and defensive capabilities.
11417: 7197: 6160: 6019: 3194: 3152: 2581:(NERC) has issued a public notice that warns that the electrical grid is not adequately protected from cyber attack. China denies intruding into the U.S. electrical grid. One 4122:
In 2009, president Barack Obama declared America's digital infrastructure to be a "strategic national asset," and in May 2010 the Pentagon set up its new U.S. Cyber Command (
10201:
A Bill. To amend the Homeland Security Act of 2002 and other laws to enhance the security and resiliency of the cyber and communications infrastructure of the United States.
7469: 2769:
that computer network warfare is evolving so rapidly that there is a "mismatch between our technical capabilities to conduct operations and the governing laws and policies.
5880: 4084:(May 2010), had defined "cyberwarfare" as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption." 6816: 4194:, resisting all attempts to reverse the exploit, for the past two weeks. The Air Force issued a statement that the virus had "posed no threat to our operational mission". 3139:
In May 2024 The UK announced that it had taken a database offline that is used by its defense ministry after coming under a cyber attack attributed to the Chinese state.
7444: 5765: 2503:
security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.
9405: 9028: 3089:
in August 2011. China is widely believed to be the state actor behind these attacks which hit at least 72 organizations including governments and defense contractors.
10248: 9507: 3198:
appointment of a National Cyber Security Coordinator. As of that month, there had been no significant economic or physical damage to India related to cyber attacks.
2836:
Jobs in cyberwarfare have become increasingly popular in the military. All four branches of the United States military actively recruit for cyber warfare positions.
9999: 9244: 7941: 6189: 7173: 4454:
announced they spent more than $ 100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems.
2416: 8123: 4425:
The rise of cyber as a warfighting domain has led to efforts to determine how cyberspace can be used to foster peace. For example, the German civil rights panel
8587: 6971: 4022: 3688:
this number is incorrect and that losses in artillery weapons "were way below those reported" and that these losses "have nothing to do with the stated cause".
3162:(NPCIL) stated in February 2013 that his company alone was forced to block up to ten targeted attacks a day. CERT-In was left to protect less critical sectors. 8899: 8836: 7986: 3274:
and the United States. While many thought the attack was directed by North Korea, one researcher traced the attacks to the United Kingdom. Security researcher
3003:
Approximately 120 countries have been developing ways to use the Internet as a weapon and target financial markets, government computer systems and utilities.
7800: 7770: 2498:
that coordinate other activities are vulnerable components of a system and could lead to the disruption of equipment. Compromise of military systems, such as
13203: 12542: 12499: 9388: 11344: 11219: 6112: 2695:
cyber attacks, masquerading as ransomware, caused large-scale disruptions in Ukraine as well as to the U.K.'s National Health Service, pharmaceutical giant
2247:, said that "there is no cyberwar... I think that is a terrible metaphor and I think that is a terrible concept. There are no winners in that environment." 12468: 11547: 4604: 3873:. U.S. industry and military sources speculated that the Israelis may have used cyberwarfare to allow their planes to pass undetected by radar into Syria. 3290:
infections, malware used in part of the attack. Some of the companies used in the attack were partially owned by several governments, further complicating
12333: 9218: 8921: 4558: 4338: 4021:. He was given the code name Egret under the state-led covert project called Raven, which spied on top political opponents, dissidents, and journalists. 9623: 5744: 5580: 10200: 9891: 8229: 7746: 4104:
has formally recognized cyberspace as a new domain in warfare . . . has become just as critical to military operations as land, sea, air, and space."
4054: 3722: 3607: 3525: 3491: 3451: 3425: 9695: 2989:
beyond defensive preparedness, as previously described above and onto preparing offensive capabilities which can be used as deterrence, or for "war".
13824: 10047: 8354: 4761:, a British thriller series, revolves around a sustained campaign of cyberwar against the United Kingdom and the British government's response to it. 3104:
On 14 September 2020, a database showing personal details of about 2.4 million people around the world was leaked and published. A Chinese company,
3045:
China is also victim to an increasing number of cyber-attacks. Most reports about China's cyber warfare capabilities have yet to be confirmed by the
10748: 10212: 13596: 9963: 6476: 3400:
revealed that "Sea Turtle" hackers carried out a broad piracy campaign in the DNS countries, hitting 40 different organizations, including Cyprus.
3314: 2732: 9203: 7901: 7718: 2577:
grid and left behind software programs that could be used to disrupt the system, according to current and former national security officials. The
8702: 8096: 4163: 3061: 3046: 2578: 10872:. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol. 157. pp. 126–139. 9127: 7113: 13494: 11743: 6563: 6281: 5264: 5107: 5003: 4481: 3580: 3560: 2958: 2941:
which engage in cyberwarfare so as to better understand the field through actions like the researching and publishing of new security threats.
6918:
Palmer, Robert Kenneth. "Critical Infrastructure: Legislative Factors for Preventing a Cyber-Pearl Harbor." Va. JL & Tech. 18 (2013): 289.
6735: 12413: 4696: 3706:
that left more than 200,000 people temporarily without power. A mining company and a large railway operator were also victims of the attack.
3703: 3174: 2569: 2441:
The NSA recording nearly every cell phone conversation in the Bahamas, without the Bahamian government's permission, and similar programs in
59: 10308: 8405: 13923: 11112: 10357: 9163: 6842: 3595: 3053: 2259: 9945: 9371: 8391: 12547: 11236: 10670: 6518: 5906: 4579:. This difference of opinion has led to reluctance in the West to pursue global cyber arms control agreements. However, American General 3287: 10972: 10960: 9149: 8505: 6294: 2925:
don't gain any media attention or lead to strong political statements by victims." This type of crime is usually financially motivated.
2274:
effects on the economy and society may be greater than those of some armed attacks. This term is closely related to the concept of the "
12650: 8862: 7495: 3109: 2468: 4496:
says it will permanently base a computer crime expert in Estonia in 2009 to help fight international threats against computer systems.
3165:
A high-profile cyber attack on 12 July 2012 breached the email accounts of about 12,000 people, including those of officials from the
13928: 12287: 9265: 7625: 6135: 4597: 2933:
But not all those who engage in cyberwarfare do so for financial or ideological reasons. There are institutes and companies like the
11280: 7194: 6985: 6016: 3108:
compiled the database. According to the information from "National Enterprise Credit Information Publicity System", which is run by
13653: 13591: 10458: 9128:"Joint Statement from the Department of Homeland Security and Office of the Director of National Intelligence on Election Security" 9035:. Strategists must be aware that part of every political and military conflict will take place on the internet, says Kenneth Geers. 5695: 5612: 4782: 4067:
and the use of cyberwarfare as a platform for attack. The new United States military strategy makes explicit that a cyberattack is
1022: 11202: 7238: 50: 12326: 8937: 6000: 4466: 3990: 3866:
adds that "our Israeli friends have learned a thing or two from the programs we have been working on for more than two decades."
3148: 2561: 1454: 9189: 6820: 5317: 13953: 10935: 7005: 6636: 4139: 3831:
worm is said to be the most advanced piece of malware ever discovered and significantly increases the profile of cyberwarfare.
3746: 3397: 3209:
On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the
10373: 8613: 7153: 7134: 2659:
Cyber propaganda is an effort to control information in whatever form it takes, and influence public opinion. It is a form of
13893: 13817: 12732: 12264: 11644: 11557: 11493: 11462: 10885: 10502: 8881: 8635: 7875: 6941: 6339: 3836: 3661: 9733: 9025: 7574: 3456:
In 2013, Germany revealed the existence of their 60-person Computer Network Operation unit. The German intelligence agency,
3375:
The New York Times published an exposΓ© revealing an extensive three-year phishing campaign aimed against diplomats based in
3128:. Several government websites were targeted including the National coast watch and personal website of the president of the 2886:
revealed North Korea had generated $ 2 billion to fund its weapons program, avoiding the blanket of sanctions levied by the
13913: 12670: 10252: 9419: 6313: 5691: 3963: 3166: 10419: 9504: 9130:. Department of Homeland Security and Office of the Director of National Intelligence on Election Security. 7 October 2016 9045: 6551: 13225: 12665: 12564: 12295: 11060: 10290: 10125: 9241: 6420: 5881:"Executive Order – "Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities"" 3905:. The attackers posted a pastie on PasteBin.com hours prior to the wiper logic bomb occurring, citing oppression and the 2790: 2275: 1810: 98: 11000: 10984: 8375: 7170: 6503: 4153:(I-CT) introduced a bill called "Protecting Cyberspace as a National Asset Act of 2010", which he co-wrote with Senator 3243:, which is the Indian Military agency responsible for Cyberwarfare, is expected to become operational by November 2019. 13625: 12319: 11736: 11590: 11537: 11476: 11433: 8673: 7599: 7221: 6176: 5718: 4842: 4652: 4097: 3506: 3388: 3159: 3098: 2005: 1783: 393: 9981: 8960: 6961: 6894: 4575:
In contrast, the United approach focuses on physical and economic damage and injury, putting political concerns under
13857: 12645: 12227: 11512: 11448: 11411: 11323: 10912: 10824: 10790: 10185: 9304: 9097: 9083: 8423: 7271: 6215: 5800: 5728: 5656: 5434: 5395: 5240: 5091: 4979: 4637: 4565: 4337:
The United States topped the world in terms of cyberwarfare intent and capability, according to Harvard University's
4048: 3603: 3564: 3512: 3182: 2250:
Some experts take issue with the possible consequences linked to the warfare goal. In 2011, Ron Deibert, of Canada's
1459: 8991: 8230:
https://www.reuters.com/world/uk/uk-has-taken-military-database-offline-after-hack-reports-says-minister-2024-05-07/
7693: 4407:
for hire. State actors can use the cyber mercenaries as a front to try and distance themselves from the attack with
3976:
September 2012 gasoline resources were dwindling for the public of Saudi Arabia 17 days after the 15 August attack.
13918: 13810: 13210: 12906: 12023: 10697: 8840: 8655: 8246: 7849: 7808: 7778: 7659: 4902: 4229: 3710: 3170: 1537: 11032: 7319: 7035: 7009: 5172: 5017: 3941: 3155:(NCIIPC) to thwart attacks against energy, transport, banking, telecom, defense, space and other sensitive areas. 3027:, anti-radar, infrared decoys, and false target generators" to assist in this quest, and that they support their " 13257: 12754: 12727: 12358: 12277: 11373: 11348: 10675: 4897: 4493: 4143: 3359: 3210: 2766: 1882: 1520: 1307: 147: 10726:
Vault 7: Wikileaks reveals details of CIA's hacks of Android, iPhone Windows, Linux, MacOS, and even Samsung TVs
10386: 6817:"NotPetya: virus behind global attack 'masquerades' as ransomware but could be more dangerous, researchers warn" 2543: 13898: 12615: 11425: 11049: 6168: 4728: 4546: 4255:
and dated from 2013 to 2016, include details on CIA's software capabilities, such as the ability to compromise
4030: 4025:
deployed a secret hacking tool called Karma, to spy without requiring the target to engage with any web links.
1646: 11234:Π£ΠΊΡ€Π°Ρ—Π½ΡΡŒΠΊΠΈΠΉ Ρ†Π΅Π½Ρ‚Ρ€ ΠΏΠΎΠ»Ρ–Ρ‚ΠΈΡ‡Π½ΠΎΠ³ΠΎ ΠΌΠ΅Π½Π΅Π΄ΠΆΠΌΠ΅Π½Ρ‚Ρƒ – Зміст ΠΏΡƒΠ±Π»Ρ–ΠΊΠ°Ρ†Ρ–Ρ— – ΠšΠΎΠ½Π²Π΅Π½Ρ†ΠΈΡ ΠΎ Π·Π°ΠΏΡ€Π΅Ρ‰Π΅Π½ΠΈΠΈ использования ΠΊΠΈΠ±Π΅Ρ€Π²ΠΎΠΉΠ½Ρ‹ 10476: 9525: 9228: 2593:
caused by a cyber attack could disrupt the economy, distract from a simultaneous military attack, or create a
13948: 13005: 12911: 12363: 12090: 11729: 11704: 10614: 9320: 8471: 7926: 4208:
In August 2012, USA Today reported that the US conducted cyberattacks for tactical advantage in Afghanistan.
3897:
virus began destroying over 35,000 computer systems, rendering them inoperable. The virus used to target the
3611: 2970: 2063: 1510: 17: 10339: 8806: 8204: 7743: 5845: 5283: 2723:" to draw attention to the nontraditional, asymmetric, or irregular aspect of cyber action against a state. 2157:
used in response to a cyber-attack resulting in the loss of human life was observed on 5 May 2019, when the
13933: 13658: 13055: 12955: 11573: 10056: 9279:
Defense ministry denies reports of alleged artillery losses because of Russian hackers' break into software
5197: 4847: 4644: 4518: 4477: 4331: 3556: 3461: 3409: 3261: 3093: 3038: 2998: 2911: 2640: 2385: 2255: 2215:
In 2010, the former US National Coordinator for Security, Infrastructure Protection and Counter-terrorism,
2000: 699: 459: 11015: 10236:
ANNUAL REPORT TO CONGRESS Military and Security Developments Involving the People's Republic of China 2010
9012: 7418: 3960:
showing kilometers of petrol trucks unable to be loaded due to backed business systems still inoperable.
3810: 3610:. The New York Times reported the Obama administration formally accused Russia of stealing and disclosing 13789: 13538: 12737: 12687: 12282: 12203: 12003: 10642: 6070: 4882: 4327: 4248: 4123: 4116: 3672: 3214: 2762: 2719:" has been debated by scholars, drawing an analogy to the historical act of war. Others have used "cyber 2648: 2565: 2010: 1197: 994: 865: 403: 11685:
RΓΌdiger Wolfrum (Ed.) Max Planck Encyclopedia of Public International Law (Oxford University Press 2012)
11392: 10763:"Cyber Mercenaries: The Failures of Current Responses and the Imperative of International Collaboration" 10021: 8037: 7960: 7003: 6868: 3803:
has been both victim and perpetrator of several cyberwarfare operations. Iran is considered an emerging
13938: 13198: 13050: 13025: 12435: 12259: 12217: 11873: 11485:
Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland
9715: 8918:"Germany's 60-person Computer Network Operation (CNO) unit has been practicing for cyber war for years" 7359: 5268: 4827: 4300: 4218: 3665: 3335: 3178: 2806: 2688: 2627: 2334: 2312: 2267: 2244: 1474: 11715: 8699: 7548: 13668: 13601: 13444: 13176: 13171: 13045: 12875: 12717: 12504: 12120: 11838: 9782: 9663: 9437: 9075: 6657: 4892: 4757: 4583:
did endorse talks with Russia over a proposal to limit military attacks in cyberspace. In June 2013,
4205:
reported that president Obama had ordered the cyber attack on Iranian nuclear enrichment facilities.
3972:
Falih The attackers also referenced a portion of the Shamoon malware as further proof in the pastie.
3469:
arms manufacturers, telecommunications companies and government and military agencies. Shortly after
3413: 2857: 2849: 2826: 2582: 2573: 1584: 1092: 436: 310: 164: 31: 7850:"US embassy cables: China uses access to Microsoft source code to help plot cyber warfare, US fears" 7056: 5957: 13888: 13774: 13663: 13558: 13484: 13311: 12940: 12640: 12342: 12105: 11983: 11878: 11304:"Regulating the Use and Conduct of Cyber Operations: Challenges and a Fact-Finding Body Proposal", 11253: 10273: 9804:
Harper, Michael (31 August 2012). "RedOrbit: Energy Company RasGas Is Infected with Shamoon Virus".
6739: 4914: 4857: 4772: 4541:, published in 2013, is an academic, non-binding study on how international law, in particular the 4353: 4345: 4134:(NSA), to defend American military networks and attack other countries' systems. The EU has set up 4131: 4112: 3885:
allies and employees at telecommunications companies, trying to infiltrate their computer systems.
3640:
were subjected to a cyber-attack that caused them to shutdown a so-called Caxcis IT system used in
3474: 3203: 2934: 2536: 2530: 2431: 2396: 2035: 1902: 1449: 1142: 955: 803: 11601: 11180: 8686: 6241: 3869:
In September 2007, Israel carried out an airstrike on a suspected nuclear reactor in Syria dubbed
13769: 13338: 13193: 12489: 12193: 12145: 11808: 10847:
Robinson, Michael; Janicke, Helge; Jones, Kevin (2017). "An Introduction to Cyber Peacekeeping".
10316: 8539: 5790: 4887: 4867: 4420: 4382: 4183: 4111:
in 1982, a portion of a Trans-Siberia pipeline within its territory exploded, allegedly due to a
4064: 3827: 3783: 3457: 3267: 2703:
shipping company and other organizations around the world. These attacks are also categorized as
2263: 2154: 1988: 1970: 1726: 1285: 1207: 1152: 1032: 745: 408: 11120: 8761: 7902:"U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say" 7405: 4228:'s missile program for sabotaging test launches in their opening seconds. On 24 November 2014, 3713:. Several websites belonging to Ukrainian banks and government departments became inaccessible. 2860:
are also deemed vulnerable, especially due to current trends in computerization and automation.
13852: 13784: 13618: 13565: 13459: 13282: 13127: 12485: 5613:"Latest viruses could mean 'end of the world as we know it,' says the man who discovered Flame" 4744: 4470: 3681: 3584: 3536: 3310:
other malicious activity and it is believed to be part of a broader, concerted hacking effort.
3037:
magazine put the size of China's "hacker army" at anywhere from 50,000 to 100,000 individuals.
2938: 2716: 2373:, claiming that in an interconnected world, they have the potential to be equally destructive. 1855: 1830: 1552: 1464: 1337: 1212: 808: 785: 231: 130: 11305: 11233: 10902: 10814: 10780: 10090: 7305: 5631: 13883: 13842: 13188: 13000: 12462: 12423: 12234: 11968: 11048:
Lisa Lucile Owens, Justice and Warfare in Cyberspace, The Boston Review (2015), available at
9555: 8124:"Zhenhua Data leak: personal details of millions around world gathered by China tech company" 7043: 6515: 4682: 4660: 4408: 3859: 3017: 2660: 2548: 2389: 2330: 2158: 2108: 1444: 1377: 1330: 979: 942: 905: 823: 775: 659: 469: 277: 186: 10055: 8492: 8447:"Agencies take shape for special operations, space, cyber war | India News – Times of India" 8298: 4469:
cyber security initiatives are appropriately integrated, resourced and coordinated with the
3846:
is active since at least 2017 and is responsible for many cyber attacks on various sectors.
13847: 13553: 13350: 13252: 13117: 13079: 12829: 12633: 12527: 12254: 12166: 12115: 12060: 11928: 11901: 11883: 11781: 11752: 11143:"Tallinn manual 2.0 on the international law applicable to cyber operations | WorldCat.org" 10730: 10143: 10109: 8640: 7830: 7097: 6368: 4949: 4872: 4852: 4569: 4508:. Unlike conventional warfare, figuring out who is behind an attack can be very difficult. 4465:
announced that it will conduct a review of the country's cyber security to ensure that the
4431: 4006: 3795: 3771: 3478: 3240: 2917: 1835: 1737: 1594: 1589: 1407: 1372: 1107: 922: 780: 716: 570: 540: 137: 11848: 11523:
Implications of Privacy & Security Research for the Upcoming Battlefield of Things
9734:"Elisabeth Bumiller and Thom Shanker: Panetta Warns of Dire Threat of Cyberattack on U.S." 9542: 6099:"Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas" 5146: 5121: 5084:
Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare
4161:(D-DE). If signed into law, this controversial bill, which the American media dubbed the " 3362:, Ethiopian government websites have been hacked by the Egypt-based hackers in June 2020. 8: 13903: 13694: 13474: 13345: 13267: 12865: 12811: 12759: 12722: 12712: 12418: 12038: 11813: 11771: 11522: 8636:"An Egyptian cyber attack on Ethiopia by hackers is the latest strike over the Grand Dam" 6136:"The Intercept Wouldn't Reveal a Country the U.S. Is Spying On, So WikiLeaks Did Instead" 4802: 4187: 3940:
called the attack a "Cyber Pearl Harbor". Shamoon can spread from an infected machine to
3233: 3078: 2907: 2786: 2671:
and other digital means. In 2018, Sir Nicholas Carter, Chief of the General Staff of the
2586: 2392: 2191: 1686: 1671: 1547: 1434: 1412: 1387: 1347: 1257: 1067: 967: 917: 684: 674: 639: 431: 421: 191: 115: 42: 10078: 8793: 8038:"Marriott Data Breach Is Traced to Chinese Hackers as U.S. Readies Crackdown on Beijing" 7470:"Advanced threat actors engaged in cyberespionage in APAC up their game in new campaign" 6929: 6372: 5581:"Implications of Privacy & Security Research for the Upcoming Battlefield of Things" 3916:
Pastie announcing attack against Saudi Aramco by a group called Cutting Sword of Justice
2789:
on the cabinet level by former administration officials, raised issues ranging from the
2303:
In addition to retaliatory digital attacks, countries can respond to cyber attacks with
13908: 13397: 13392: 13370: 13355: 13247: 13035: 13015: 12965: 12928: 12918: 12769: 12606: 12222: 12150: 12055: 11671: 11621: 11254:"'Digital Geneva Convention' needed to deter nation-state hacking: Microsoft president" 11094: 10848: 10762: 10619: 10595: 10591: 10235: 8349: 8326: 8247:"Beware of the bugs: Can cyber attacks on India's critical infrastructure be thwarted?" 8036:
Sanger, David E.; Perlroth, Nicole; Thrush, Glenn; Rappeport, Alan (11 December 2018).
7805:
Culture Mandala: The Bulletin of the Centre for East-West Cultural and Economic Studies
7775:
Culture Mandala: The Bulletin of the Centre for East-West Cultural and Economic Studies
6798: 6790: 6716: 6617: 6397: 6356: 6275: 5850: 5673: 5545: 5498: 5258: 5101: 5064: 4997: 4668: 4580: 4430:
individuals and organizations building new tools and secure infrastructures, promoting
4390: 4244:
mechanisms for the sanctioning states about the capabilities of the sanctioned states.
4127: 3945: 3777: 3641: 3637: 3431: 3331: 2922: 2758: 2601: 2370: 2190:
and colleagues put forward the following definition of "cyber war" in 2013, drawing on
2020: 1875: 1795: 1716: 1661: 1636: 1557: 1503: 1469: 1400: 1317: 1227: 1132: 1077: 962: 927: 880: 755: 726: 679: 617: 592: 426: 240: 159: 55: 38: 8934: 8744: 8561: 6575: 3730:
reportedly infiltrated an Al Qaeda website and replaced the instructions for making a
13943: 13630: 13531: 13326: 13134: 13099: 13060: 13010: 12901: 12885: 12628: 12591: 12569: 12554: 12537: 12455: 12270: 12028: 11963: 11913: 11860: 11818: 11766: 11675: 11640: 11586: 11569:
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
11553: 11533: 11508: 11489: 11472: 11458: 11444: 11429: 11421: 11407: 11319: 11098: 10908: 10881: 10820: 10786: 10599: 10181: 10151: 9300: 9278: 9079: 8780: 8330: 8318: 8175:"Zhenhua Data: 35,000 Aussies being spied on by China as part of 'psychological war'" 8045: 7667: 7633: 7301: 6937: 6802: 6782: 6708: 6609: 6470: 6402: 6384: 6335: 6172: 6164: 6044: 6036: 5855: 5796: 5724: 5677: 5537: 5430: 5401: 5391: 5346: 5291: 5246: 5236: 5087: 5056: 4985: 4975: 4919: 4777: 4619: 4576: 4505: 4308: 4077: 4060: 3881: 3870: 3863: 3791: 3676: 3572: 3465: 3306: 3291: 3186: 3105: 2951: 2845: 2737: 2668: 2349:
warfare can also contribute towards "soft" threats such as espionage and propaganda.
2216: 2056: 1965: 1912: 1815: 1805: 1800: 1770: 1753: 1748: 1721: 1666: 1367: 1357: 1352: 1342: 1262: 1252: 1247: 1222: 1192: 1082: 1052: 1047: 1037: 1027: 1017: 932: 885: 855: 694: 487: 464: 398: 63: 11625: 10000:"UAE: Activist Ahmed Mansoor sentenced to 10 years in prison for social media posts" 6535: 6490: 5816: 5549: 5502: 3516:
of Defense oversees an offensive cyber force, called Defensive Cyber Command (DCC).
3193:
In February 2013, Information Technology Secretary J. Satyanarayana stated that the
2844:
Potential targets in internet sabotage include all aspects of the Internet from the
2025: 13963: 13958: 13779: 13714: 13543: 13521: 13365: 13333: 13321: 13297: 12923: 12870: 12860: 12819: 12749: 12744: 12473: 12381: 12239: 12179: 11943: 11933: 11828: 11663: 11613: 11387: 11086: 10873: 10671:"Vault 7: CIA hacking tools were used to spy on iOS, Android and Samsung smart TVs" 10587: 10551: 10541: 9472: 9282: 8310: 7341: 6774: 6662: 6601: 6392: 6376: 6108: 5665: 5636: 5529: 5490: 5358: 4862: 4807: 4304: 4232:
was a release of confidential data belonging to Sony Pictures Entertainment (SPE).
3994: 3787: 3229: 2873: 2350: 2292: 2228: 2112: 2092: 2030: 1995: 1927: 1820: 1758: 1651: 1579: 1572: 1429: 1362: 1312: 1302: 1177: 1097: 1057: 1042: 1004: 989: 860: 845: 798: 706: 664: 607: 602: 560: 383: 360: 267: 196: 125: 108: 11317: 9719: 8720:"War in the fifth domain. Are the mouse and keyboard the new weapons of conflict?" 6380: 3912: 2707:, specifically financial crime because they negatively affect a company or group. 2506:
In mid-July 2010, security experts discovered a malicious software program called
13608: 13449: 13020: 12880: 12796: 12784: 12764: 12660: 12450: 12430: 12353: 12130: 12110: 12008: 11833: 11823: 11667: 11634: 11483: 11240: 11090: 11019: 10877: 9841: 9605: 9511: 9248: 9032: 8964: 8941: 8706: 8512: 7750: 7257: 7225: 7201: 7177: 7120: 6677: 6522: 6301: 6075: 6023: 5983: 4934: 4561:
by an international group of approximately twenty experts between 2009 and 2012.
4400: 4276: 4093: 3692: 3392: 3133: 3028: 2853: 2782: 2692: 2622:, former Cyber-Security Coordinator of the US, commented on those possibilities: 2594: 2475: 2362: 2308: 2304: 2208:
and non-physical domains and whose level of violence may vary upon circumstances.
2187: 2174:, and transnational criminal organizations depending on the context of the work. 1840: 1825: 1743: 1699: 1641: 1297: 1292: 1182: 1172: 1087: 1062: 999: 840: 770: 760: 612: 597: 520: 492: 292: 272: 120: 13750: 9526:"Iranian Hackers Targeting Turkey and Arabian Peninsula in New Malware Campaign" 7445:"U.S. Needs New National Strategy in Era of Cyberaggression, UC Paper Concludes" 7345: 5958:"Text – H.R.5222 – 114th Congress (2015–2016): Iran Cyber Sanctions Act of 2016" 13586: 13526: 13511: 13464: 13360: 13306: 13166: 12824: 12801: 12774: 12692: 12682: 12584: 12579: 12445: 12396: 12300: 12198: 12048: 11998: 11973: 11938: 11918: 11798: 11786: 11602:"US Government Computer Penetration Programs and the Implications for Cyberwar" 11564: 9815: 9345: 9049: 7835: 7523: 7384: 6957: 5564: 5517: 5362: 4877: 4812: 4675: 4611: 4588: 4538: 4341:
Cyber 2022 Power Index, above China, Russia, the United Kingdom and Australia.
4280: 4272: 4213: 3906: 3685: 3624: 3470: 3380: 3283: 3279: 3033: 2982: 2895: 2891: 2696: 2651:
planted malware potentially capable of disrupting the Russian electrical grid.
2619: 2479: 2420: 2240: 2236: 2127: 2084: 2015: 1763: 1187: 1147: 1125: 1112: 1102: 1072: 984: 937: 740: 731: 622: 575: 555: 545: 515: 482: 370: 327: 282: 154: 87: 10530:"Regime Type, Issue Type and Economic Sanctions: The Role of Domestic Players" 9918:"Youtube – Chris Kubecka: How to Implement IT Security after a Cyber Meltdown" 9917: 9711: 8529: 8314: 6778: 6428: 5494: 3980:
was also affected by a different variant, crippling them in a similar manner.
13877: 13729: 13613: 13570: 13516: 13504: 13489: 13479: 13402: 13316: 13292: 13287: 13161: 13156: 13151: 13067: 12655: 12596: 12559: 12511: 12210: 12171: 12140: 12135: 11988: 11978: 11948: 11711: 10572: 10546: 10529: 10404: 10400:
Secret NSA hackers from TAO Office have been pwning China for nearly 15 years
10219: 10155: 9982:"Hackers Went After a Now-Disgraced G.O.P. Fund-Raiser. Now He Is After Them" 9321:"BlackEnergy malware activity spiked in runup to Ukraine power grid takedown" 8674:
Hacked European Cables Reveal a World of Anxiety About Trump, Russia and Iran
8322: 8049: 7671: 7637: 7320:
The ethics of cyber conflict. The Handbook of Information and Computer Ethics
6786: 6712: 6613: 6388: 6103: 6048: 5859: 5749: 5669: 5541: 5405: 5295: 5250: 5060: 4989: 4550: 4542: 4386: 4361: 4268: 4158: 4154: 4150: 4010: 3949: 3921: 3599: 3552: 3275: 3113:
warfare" through manipulation of public opinion and "psychological warfare".
2887: 2770: 2585:
would be to disconnect the power grid from the Internet and run the net with
2427: 2354: 2232: 2123: 1862: 1850: 1706: 1626: 1542: 1525: 1382: 1237: 1217: 895: 890: 870: 850: 765: 736: 711: 587: 565: 550: 525: 365: 287: 250: 245: 142: 12311: 11167: 10459:"U.S. Sanctions Russia Over Election Hacking; Moscow Threatens to Retaliate" 10048:"Ex-U.S. Intelligence Officers Admit to Hacking Crimes in Work for Emiratis" 8957: 6895:"What is the impact of ransomware on financial crime compliance in the UAE?" 4360:, including those of diplomats from China, Israel, NATO members, and Syria. 3927: 2916:
Computer hacking represents a modern threat in ongoing global conflicts and
2731:
There are a number of reasons nations undertake offensive cyber operations.
13755: 13421: 13407: 13262: 13072: 13040: 13030: 12933: 12779: 12677: 12623: 12532: 12244: 12100: 11142: 8837:"Terre, Air, Mer, Cyber ? La 4Γ¨me armΓ©e entre coup de com et rΓ©alitΓ©s" 8794:
From Nuclear War to Net War: Analogizing Cyber Attacks in International Law
8766: 6406: 4797: 4584: 4451: 4404: 4108: 4101: 3937: 3902: 3898: 3877: 3082: 2830: 2672: 2664: 2590: 2381: 2358: 2338: 2194:'s definition of war: "War is the continuation of politics by other means": 2161:
targeted and destroyed a building associated with an ongoing cyber-attack.
2049: 1975: 1955: 1950: 1845: 1790: 1424: 1419: 1242: 1157: 900: 535: 332: 236: 13802: 10445:
Obama's secret struggle to retaliate against Putin's election interference
9964:"GOP Fundraiser Elliott Broidy Expands Suit Alleging Qatar-Backed Hacking" 9105: 7801:"How China will use cyber warfare to leapfrog in military competitiveness" 7771:"How China will use cyber warfare to leapfrog in military competitiveness" 6605: 6001:"Cyber espionage bug attacking Middle East, but Israel untouched β€” so far" 3948:
of the infected computer, making it unusable. The virus has been used for
3901:
government by causing destruction to the state owned national oil company
3228:. Examples of weapons used are an exploit for the Sandworm vulnerability ( 2227:
There is debate on whether the term "cyber warfare" is accurate. In 2012,
13734: 13277: 13272: 13109: 13094: 12970: 12945: 12574: 12494: 12401: 12386: 12184: 12018: 11993: 11958: 11793: 11617: 9599:
Israel used electronic attack in air strike against Syrian mystery target
9252: 8719: 7987:"Marriott Breach – What Happened, How Serious Is It And Who Is Impacted?" 5931: 5533: 4924: 4909: 4817: 4787: 4504:
One of the hardest issues in cyber counterintelligence is the problem of
4462: 4264: 4256: 4225: 4224:
In 2014, Barack Obama ordered an intensification of cyberwarfare against
4069: 3804: 3754: 3742: 3699: 3653: 3591: 3548: 3547:
It has been claimed that Russian security services organized a number of
3497: 3271: 3129: 3121: 3117: 3064: 3057: 2454: 2446: 2366: 2324: 2288: 2251: 2177:
Examples of definitions proposed by experts in the field are as follows.
2147: 2080: 1960: 1711: 1676: 1515: 1202: 1167: 875: 818: 721: 505: 226: 221: 13416: 10556: 10079:
American Forces Press Service: Lynn Explains U.S. Cybersecurity Strategy
7218: 7070: 6794: 6762: 6720: 6696: 6621: 6589: 5651: 5068: 5044: 3858:, Israel alleges that cyber-warfare was part of the conflict, where the 3680:
loss of nearly the entire arsenal of the biggest artillery piece of the
2170:
terrorist groups, companies, political or ideological extremist groups,
13684: 13499: 13469: 13454: 13242: 13230: 12990: 12852: 12478: 12249: 12065: 12013: 11896: 11776: 11721: 11404:
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
9505:
Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon | Video on
8122:
Hurst, Daniel; Kuo, Lily; Graham-McLay, Charlotte (14 September 2020).
7942:"Massive Data Breach Puts 4 Million Federal Employees' Records at Risk" 6190:"Massive Data Breach Puts 4 Million Federal Employees' Records at Risk" 4929: 4792: 4749: 4523: 4374: 4349: 4288: 4284: 4191: 4179: 4089: 3668: 3657: 3319: 2869: 2822: 2794: 2704: 2495: 2461: 2171: 2104: 1917: 1887: 1609: 973: 9477: 9460: 9266:"Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units" 8958:"Germany to invest 100 million euros on internet surveillance: report" 7626:"EU to run war games to prepare for Russian and Chinese cyber-attacks" 6843:"NotPetya ransomware outbreak cost Merck more than $ 300M per quarter" 3967:
Tanker trucks unable to be loaded with gasoline due to Shamoon attacks
13426: 13215: 13144: 13089: 13084: 12950: 12791: 12697: 12440: 12125: 12080: 12075: 11923: 11891: 11324:"An International Attribution Mechanism for Hostile Cyber Operations" 10936:"What are the challenges of cybersecurity in times of peace and war?" 9668: 8614:"S. Korean military to prepare with U.S. for cyber warfare scenarios" 7020: 4721: 4614: 4492:
has led international efforts to fight cybercrime, the United States
4396: 4378: 4009:
has launched several cyber-attacks in the past targeting dissidents.
3936:
nature and the cost of the attack and recovery. US Defense Secretary
3855: 3731: 3619: 3581:
Russian, South Ossetian, Georgian and Azerbaijani sites were attacked
3542: 2464:" probes of American defense contractors computer systems since 2003. 2096: 1907: 1731: 1681: 1631: 1621: 1616: 1481: 1272: 1267: 1232: 669: 355: 322: 211: 11221:
US, Russia to install "cyber-hotline" to prevent accidental cyberwar
6590:"Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?" 4247:
In March 2017, WikiLeaks published more than 8,000 documents on the
3675:
artillery. The app, used by Ukrainian officers, was loaded with the
2604:
pushed a massive power outage for 12 hours in 44 of 81 provinces of
13719: 13704: 13235: 13220: 13122: 12960: 12408: 12085: 12043: 11906: 10853: 10702: 10340:"Exclusive: Comedy of Errors Led to False 'Water-Pump Hack' Report" 9846: 8588:"South Korea raises alert after hackers attack broadcasters, banks" 7332:
Kenney, Michael (2015). "Cyber-Terrorism in a Post-Stuxnet World".
5821: 5792:
Striking Back: The End of Peace in Cyberspace and How to Restore It
5569:. International Conference on Cyber Conflict (ICCC). Estonia: IEEE. 5478: 5448:"Security: A huge challenge from China, Russia and organised crime" 4260: 4237: 4172: 4115:
computer malware implanted in the pirated Canadian software by the
4014: 3735: 3691:
In 2014, the Russians were suspected to use a cyber weapon called "
3561:
2008 cyberattacks on Russia, South Ossetia, Georgia, and Azerbaijan
3351: 3225: 2966: 2829:, with Azerbaijani hackers targeting Armenian websites and posting 2609: 2400: 2100: 1922: 1897: 1530: 1162: 1137: 750: 305: 179: 11632: 9219:"Swedish forces exposed to extensive cyber attack: Dagens Nyheter" 7927:"U.S. gov't hack may be four (4) times larger than first reported" 7807:. Vol. 8, no. 1 October 2008. p. 43. Archived from 7777:. Vol. 8, no. 1 October 2008. p. 42. Archived from 7719:"Public servants prepare for cyber attacks at inaugural war games" 7239:"Azerbaijani hackers broke into over 90 armenian websites – VIDEO" 4534:
NIST, a cybersecurity framework, was published in 2014 in the US.
13699: 13548: 13385: 13375: 13183: 12995: 12707: 12702: 12095: 12070: 12033: 10901:
Ramsbotham, Oliver; Miall, Hugh; Woodhouse, Tom (11 April 2011).
10782:
The Future Information Society: Social and Technological Problems
10613:
Shane, Scott; Mazzetti, Mark; Rosenberg, Matthew (7 March 2017).
9922: 9223: 8814: 8534: 8406:"Copy paste slacker hackers pop corp locks in ode to stolen code" 8392:"Hacked by 'Pakistan cyber army', CBI website still not restored" 7658:
Wheeler, Caroline; Shipman, Tim; Hookham, Mark (7 October 2018).
7360:"North Korea took $ 2 billion in cyberattacks to fund weapons..." 6697:"Russian Information Warfare: Implications for Deterrence Theory" 6097:
Devereaux, Ryan; Greenwald, Glenn; Poitras, Laura (19 May 2014).
5723:. New Haven, Connecticut: Yale University Press. pp. 77–79. 5318:"Israel launched an airstrike in response to a Hamas cyberattack" 4944: 4832: 4554: 4489: 4485: 4252: 4018: 3894: 3823: 3379:. After accessing the state system the hackers had access to the 2818: 2518: 2507: 2499: 2088: 1932: 1892: 1656: 1490: 1486: 828: 813: 689: 350: 345: 315: 254: 216: 10573:"Economic sanctions outcomes: An information-driven explanation" 10420:"Trump Inherits a Secret Cyberwar Against North Korean Missiles" 9892:"Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems" 9869: 9783:"Jose Pagliery: The inside story of the biggest hack in history" 9641: 8272:"National Critical Information Infrastructure Protection Centre" 6452:"The internet is run under the sea. What if the cables are cut?" 3270:
against major government, news media, and financial websites in
3060:
targeting the records of as many as four million people. Later,
2262:) or affected access to medical care, thus endangering life (UK 58:'s 782nd Military Intelligence Battalion (Cyber) supporting the 13709: 13635: 11953: 11868: 11699: 11012: 10698:"WikiLeaks posts trove of CIA documents detailing mass hacking" 9664:"Jose Pagliery:The inside story of the biggest hack in history" 9420:"Wall Street banks learn how to survive in staged cyber attack" 7694:"The UK is practicing cyberattacks that could black out Moscow" 6990: 6966: 6867:
Perlroth, Nicole; Scott, Mark; Frenkel, Sheera (27 June 2017).
6637:"Iran Flexes Its Power by Transporting Turkey to the Stone Age" 5390:. Amsterdam: Morgan Kaufmann Publishers – Elsevier. p. 2. 4357: 4296: 3977: 3953: 3618:
prior to authorizing a covert attack. Then U.S. vice president
3563:. One identified young Russian hacker said that he was paid by 3439: 3376: 3301:
Visualization of 2009 cyber warfare attacks against South Korea
3221: 3101:(MSS), the country's Communist-controlled civilian spy agency. 3086: 2975: 2700: 2636: 2613: 2605: 2450: 2404: 2139: 2131: 1439: 835: 652: 388: 11418:
Reverse Deception: Organized Cyber Threat Counter-Exploitation
10868:
Akatyev, Nikolay; James, Joshua (2015). "Cyber Peacekeeping".
10643:"How the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks)" 10615:"WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents" 10503:"US expels 35 Russian diplomats, closes two compounds: report" 10022:"Inside the UAE's secret hacking team of American mercenaries" 8276:
National Critical Information Infrastructure Protection Centre
8205:"Philippines wards off cyber attacks from China-based hackers" 6161:
Reverse Deception: Organized Cyber Threat Counter-Exploitation
5795:. New Haven, Connecticut: Yale University Press. p. 218. 3153:
National Critical Information Infrastructure Protection Centre
13380: 13139: 10749:"Russia says US hacked thousands of Apple phones in spy plot" 10647: 10477:"U.S. imposes sanctions on Russia over election interference" 8035: 8011: 7272:"Become a Naval Cyber Warfare Engineer (CWE) : Navy.com" 7219:"International Cyber Warfare: Limitations and Possibilities". 7135:"In a doomsday cyber attack scenario, answers are unsettling" 6930:"Viewpoint: Cyberterrorism: Cyber "Pearl Harbor" is Imminent" 6242:"Hacking Diplomatic Cables Is Expected. Exposing Them Is Not" 5045:"Cyber Warfare: A Misrepresentation of the True Cyber Threat" 4972:
Cybersecurity and cyberwar : what everyone needs to know
4316: 4312: 4135: 4013:, an Emirati citizen, was jailed for sharing his thoughts on 3671:
whose original purpose was to control targeting data for the
3608:
interfering with the 2016 United States presidential election
3384: 3355: 3125: 3072: 3024: 2814: 2442: 2435: 2135: 910: 446: 441: 11577:, vol. LXVI, no. 20 (19 December 2019), pp. 14, 16, 20. 9346:"Ukraine crisis: 'Wiper' discovered in latest cyber-attacks" 8530:"28c3: Security Log Visualization with a Correlation Engine" 8506:
UK, Not North Korea, Source of DDOS Attacks, Researcher Says
8241: 8239: 8237: 7292:
Lin, Tom C. W. (14 April 2016). "Financial Weapons of War".
6564:
Xinhua: China denies intruding into the U.S. electrical grid
6355:
Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R. (2016).
4059:
Cyberwarfare in the United States is a part of the American
3952:
against the national oil companies Saudi Aramco and Qatar's
3460:, announced it was seeking to hire 130 "hackers" for a new " 13724: 11441:
Cyber Threats: The Emerging Fault Lines of the Nation State
11306:
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3540615
8687:
Hacking Diplomatic Cables Is Expected. Exposing Them Is Not
6525:. In.reuters.com (9 April 2009). Retrieved 8 November 2011. 5388:
Introduction to cyber-warfare: a multidisciplinary approach
4939: 4837: 4822: 4522:, a leading journal in that field, published an article by 3819: 3800: 3568: 3435: 3181:(ITBP). A government-private sector plan being overseen by 2962: 2743: 2720: 2486:
Out of all cyber attacks, 25% of them are espionage based.
2143: 206: 201: 9372:"Al Qaeda rocked by apparent cyberattack. But who did it?" 8762:"Russia accused of unleashing cyberwar to disable Estonia" 8071:"Marriott hotel cyber attack linked to Chinese spy agency" 7744:
Government-sponsored cyberattacks on the rise, McAfee says
7575:"NATO takes part in international cyber security exercise" 5692:"What limits does the law of war impose on cyber attacks?" 5284:"What Israel's Strike on Hamas Hackers Means For Cyberwar" 2825:
have actively participated in cyberwarfare as part of the
2478:
published details of a breach that compromised one of the
11003:. CBS News (10 February 2009). Retrieved 8 November 2011. 10238:. US Defense Department (PDF). Retrieved 8 November 2011. 10144:"Old Trick Threatens the Newest Weapons (Published 2009)" 9389:
Britain faces serious cyber threat, spy agency head warns
9217:
Ringstrom, Anna (25 January 2017). Goodman, David (ed.).
9204:"Biden Hints at U.S. Response to Russia for Cyberattacks" 8271: 8234: 8149:"National Enterprise Credit Information Publicity System" 7879: 7876:"China to make mastering cyber warfare A priority (2011)" 7258:"Nagorno-Karabakh: The Armenian-Azeri 'information wars'" 6216:"U.S. government hacked; feds think China is the culprit" 6096: 4292: 4240:, expelling 35 Russian diplomats from the United States. 3727: 3286:
companies unwittingly helped attack South Korea due to a
3085:
starting mid-2006, reported by Internet security company
2810: 2119:
physical damage to people and objects in the real world.
79: 11684: 10900: 10358:"Obama Order Sped Up Wave of Cyberattacks Against Iran." 10309:"Hacker Apparently Triggers Illinois Water Pump Burnout" 9624:"Without the nuclear deal, Iranian cyber attacks resume" 9150:"U.S. Says Russia Directed Hacks to Influence Elections" 8882:"Pourquoi la France se dote d'une cyber-armΓ©e – DΓ©fense" 8394:. Ndtv.com (4 December 2010). Retrieved 8 November 2011. 6763:"Terrorism as Theater: Analysis and Policy Implications" 5844:
Barnes, Julian E.; Gibbons-Neff, Thomas (22 June 2019).
5386:
Shakarian, Paulo; Shakarian, Jana; Ruef, Andrew (2013).
5345:
Robinson, Michael; Jones, Kevin; Helge, Janicke (2015).
3709:
Ukraine saw a massive surge in cyber attacks during the
3297: 3202:
Ideology, etc. The attack was done as a revenge for the
11469:
On Cyber: Towards an Operational Art for Cyber Conflict
11345:"Darknet, Hacker, Cyberwar – Der geheime Krieg im Netz" 10779:
Hofkirchner, Wolfgang; Burgin, Mark (24 January 2017).
10291:"Air Force says drone computer virus poses 'no threat'" 10180:. USA: University of Nebraska Press. pp. 235–236. 9299:. USA: University of Nebraska Press. pp. 221–222. 9164:"Presidential approval and reporting of covert actions" 8424:"APT Group 'Patchwork' Cuts-and-Pastes a Potent Attack" 7961:"State actor seen in "enormous" range of cyber attacks" 7114:
Cyber ShockWave Shows U.S. Unprepared For Cyber Threats
6869:"Cyberattack Hits Ukraine Then Spreads Internationally" 6578:. ABC News. (20 April 2009). Retrieved 8 November 2011. 6332:
Cybersecurity and Cyberwar: What Everyone Needs to Know
3814:
Flag of Cyber Police (FATA) of Islamic Republic of Iran
3477:'s cyber surveillance system, German Interior Minister 10813:
Grady, Mark F.; Parisi, Francesco (28 November 2005).
10612: 10126:"Defending a New Domain: The Pentagon's Cyberstrategy" 9732:
Bumiller, Elisabeth; Shanker, Thom (11 October 2012).
9493:
Stuxnet worm brings cyber warfare out of virtual world
8977: 7154:"Washington Group Tests Security in 'Cyber ShockWave'" 6678:"Russian military admits significant cyber-war effort" 5766:"The Characterization and Conditions of the Gray Zone" 5516:
Parks, Raymond C.; Duggan, David P. (September 2011).
5385: 4330:
planted malware potentially capable of disrupting the
2959:
Cooperative Cyber Defence Centre of Excellence (CCDCE)
2643:
has been under cyber-attack by the United States. The
12543:
Self-indication assumption doomsday argument rebuttal
11654:
Rid, Thomas (2012). "Cyber War Will Not Take Place".
11521:
Fritsch, Lothar & Fischer-HΓΌbner, Simone (2019).
11077:
Rid, Thomas (2012). "Cyber War Will Not Take Place".
11061:"Is the 'holy grail' of cyber security within reach?" 9696:"How to Implement IT Security after a Cyber Meltdown" 7657: 7496:"Cyber-war gaming: A cybersecurity tabletop exercise" 6504:"Hackers reportedly have embedded code in power grid" 6270:. Vol. 1 (1st ed.). Australia. p. 231. 3147:
The Department of Information Technology created the
2482:'s diplomatic communication channels for three years. 12469:
Safety of high-energy particle collision experiments
11482:
Cordesman, Anthony H.; Cordesman, Justin G. (2002).
10846: 10418:
Sanger, David E.; Broad, William J. (4 March 2017).
10213:
Senators Say Cybersecurity Bill Has No 'Kill Switch'
9842:"Shamoon virus targets energy sector infrastructure" 9440:. Flash//CRITIC Cyber Threat News. 16 September 2013 8900:"L'armée française consolide son commandement cyber" 8345:"5 lakh cyber warriors to bolster India's e-defence" 8121: 6893:
Elhais, Hassan Elhais-Dr Hassan (21 November 2021).
6866: 6516:"US concerned power grid vulnerable to cyber-attack" 6071:"Merkel Compared NSA To Stasi in Complaint To Obama" 5817:"US 'launched cyber-attack on Iran weapons systems'" 3660:
used Android malware to target the Ukrainian Army's
2778:
weapons systems that require computers to operate."
10985:"Senate Legislation Would Federalize Cybersecurity" 10742: 10740: 10046:Mazzetti, Mark; Goldman, Adam (14 September 2021). 8376:"36 government sites hacked by 'Indian Cyber Army'" 8303:
Journal of Asian Security and International Affairs
7195:
Report: The Cyber ShockWave event and its aftermath
6153: 5235:. Green, James A., 1981–. London. 7 November 2016. 4559:
NATO Cooperative Cyber Defence Centre of Excellence
2298: 11481: 11455:Inside Cyber Warfare: Mapping the Cyber Underworld 9582:Why Syria's Air Defenses Failed to Detect Israelis 7171:Cyber ShockWave CNN/BPC wargame: was it a failure? 7123:. Bipartisanpolicy.org. Retrieved 8 November 2011. 6450:Lewis, Sherryn Groch, Felicity (4 November 2022). 6354: 5843: 5344: 3993:, brother of the Emir of Qatar, and his associate 11563:Halpern, Sue, "The Drums of Cyberwar" (review of 11042: 10778: 10374:"US general: We hacked the enemy in Afghanistan." 9406:"Attack the City: why the banks are 'war gaming'" 8012:"Starwood Reservation Database Security Incident" 5745:"The Politics of Cyberspace: Grasping the Danger" 5233:Cyber warfare : a multidisciplinary analysis 3500:, Cyber Defense is nationally coordinated by the 3056:(OPM) announced that it had been the target of a 2203:Taddeo offered the following definition in 2012: 13875: 13597:List of apocalyptic and post-apocalyptic fiction 11181:"Seeing The Internet As An 'Information Weapon'" 10737: 10274:U.S. drone and predator fleet is being keylogged 9438:"Iran's military is preparing for cyber warfare" 8097:"Marriott cyberattack traced to Chinese hackers" 7549:"Agency leads NATO team in tough cyber exercise" 6421:"Understanding Denial-of-Service Attacks | CISA" 6334:. Oxford: Oxford University Press. p. 156. 6314:"Malware Hits Computerized Industrial Equipment" 5632:"White House Cyber Czar: 'There Is No Cyberwar'" 3120:announced that it had successfully fought off a 13862: 11583:@War: The Rise of the Military-Internet Complex 11525:. Journal of Information Warfare, 17(4), 72–87. 11416:Bodmer, Kilger, Carpenter, & Jones (2012). 10457:Lee, Carol E.; Sonne, Paul (30 December 2016). 10091:"Pentagon to Consider Cyberattacks Acts of War" 10045: 9731: 9190:"VP Biden Promises Response to Russian Hacking" 8935:"Hackers wanted to man front line in cyber war" 7899: 6736:"Dynamic Security Threats and the British Army" 6159:Bodmer, Kilger, Carpenter, & Jones (2012). 5984:"How Israel Spoofed Syria's Air Defense System" 5652:"Tracking the emerging arms race in cyberspace" 3350:In an extension of a bilateral dispute between 3313:With ongoing tensions on the Korean Peninsula, 3268:series of coordinated denial of service attacks 2579:North American Electric Reliability Corporation 2426:After the NSA's spying on Germany's Chancellor 30:"Cyberwar" redirects here. For other uses, see 13495:List of dates predicted for apocalyptic events 10249:"AP: Pentagon takes aim at China cyber threat" 9946:"GOP Fundraiser Sues Qatar Over Stolen Emails" 8700:Major and successful hackers' attack in Cyprus 7757:(29 November 2007). Retrieved 8 November 2011. 7184:(17 February 2010). Retrieved 8 November 2011. 7036:"Cyberwar – Das Internet als Kriegsschauplatz" 6956: 6927: 6357:"The psychological effects of cyber terrorism" 6329: 4969: 4482:Cooperative Cyber Defence Centre of Excellence 4175:which was revealed in a 2009 research report. 4055:Global surveillance disclosures (2013–present) 3931:Shamoon 1 attack timeline against Saudi Aramco 3893:On 15 August 2012 at 11:08 am local time, the 3723:Global surveillance disclosures (2013–present) 3526:Global surveillance disclosures (2013–present) 3492:Global surveillance disclosures (2013–present) 3452:Global surveillance disclosures (2013–present) 3426:Global surveillance disclosures (2013–present) 3387:, hackers accessed communications linking all 3175:Defense Research and Development Organizations 13818: 12500:Existential risk from artificial intelligence 12341: 12327: 11737: 11682:Woltag, Johann-Christoph: 'Cyber Warfare' in 11633:Janczewski, Lech; Colarik, Andrew M. (2007). 11530:Cyberwar – Das WettrΓΌsten hat lΓ€ngst begonnen 11502: 10746: 10206: 10105: 10103: 9395:(13 October 2010). Retrieved 8 November 2011. 9242:Ukraine's military denies Russian hack attack 9026:Cyberspace and the changing nature of warfare 8299:"Cyber Threats and Nuclear Security in India" 7385:"North Korea 'stole $ 2bn via cyber-attacks'" 6962:"Click, click... counting down to cyber 9/11" 6694: 6239: 6213: 5608: 5606: 4970:Singer, P. W.; Friedman, Allan (March 2014). 4198:Statewide Terrorism and Intelligence Center. 3664:. They distributed an infected version of an 2992: 2872:involves the subversive use of computers and 2570:United States Department of Homeland Security 2281: 2057: 60:3rd Brigade Combat Team, 1st Cavalry Division 11243:. Politik.org.ua. Retrieved 8 November 2011. 10867: 9755: 9753: 9556:"IAEA: Syria tried to build nuclear reactor" 9258: 8656:"The Ethiopian-Egyptian Water War Has Begun" 8579: 7939: 6932:. In Costigan, Sean S.; Perry, Jake (eds.). 6652: 6650: 6536:Electricity Grid in U.S. Penetrated By Spies 6475:: CS1 maint: multiple names: authors list ( 6187: 6090: 5907:"Sanctions Programs and Country Information" 4440: 3622:said on the American news interview program 3606:issued a joint statement accusing Russia of 3596:United States Secretary of Homeland Security 3430:In 2013, the French Minister of Defense, Mr 3054:United States Office of Personnel Management 13832: 12548:Self-referencing doomsday argument rebuttal 11402:Andress, Jason. Winterfeld, Steve. (2011). 11281:"A Digital Geneva Convention? A Great Idea" 11212: 11033:FBI to station cybercrime expert in Estonia 10812: 10495: 10443:Greg Miller, Ellen Nakashima, Adam Entous: 10417: 10387:U.S. NSA Unit 'TAO' Hacking China For Years 9689: 9687: 9612:, 8 October 2007. Retrieved 8 October 2007. 9588:, 3 October 2007. Retrieved 3 October 2007. 9192:. NBC News Meet the Press. 14 October 2016. 9098:"Coordinated Russia vs Georgia cyberattack" 8807:"Bienvenue sur Atlantico.fr – Atlantico.fr" 8751:. (17 May 2007). Retrieved 8 November 2011. 7408:, McAfee Security Insights, 13 January 2010 7287: 7285: 6658:"How Not To Prevent a Cyberwar With Russia" 6295:"Clarke: More defense needed in cyberspace" 5515: 5340: 5338: 3383:'s entire exchange database. By login into 3071:has reported that the attack originated in 2524: 2243:, former Cyber Security Coordinator in the 13825: 13811: 12651:Climate change and civilizational collapse 12334: 12320: 11744: 11730: 10100: 9644:. 15 August 2012. Cutting Sword of Justice 9523: 8562:"SK Hack by an Advanced Persistent Threat" 7984: 7419:"Financially Motivated Threats – cyber.uk" 6280:: CS1 maint: location missing publisher ( 5994: 5981: 5764:Popp, George; Canna, Sarah (Winter 2016). 5720:The Virtual Weapon and International Order 5603: 5263:: CS1 maint: location missing publisher ( 5106:: CS1 maint: location missing publisher ( 5002:: CS1 maint: location missing publisher ( 4553:. It was written at the invitation of the 4421:Cyberweapon Β§ Control and disarmament 3555:against other countries, most notably the 3110:State Administration for Market Regulation 2616:were among the places suffering blackout. 2535:In computing, a denial-of-service attack ( 2469:Office of Personnel Management data breach 2430:was revealed, the Chancellor compared the 2064: 2050: 12288:Security information and event management 11585:. Eamon Dolan/Houghton Mifflin Harcourt. 10852: 10640: 10555: 10545: 10081:. Defense.gov. Retrieved 8 November 2011. 9816:"Shamoon virus attacks Saudi oil company" 9750: 9476: 9216: 8781:"Cyber-war a growing threat warn experts" 6647: 6396: 6133: 6017:"A Note on the Laws of War in Cyberspace" 5955: 5763: 5421: 5419: 5417: 5415: 4703:Hacking the Infrastructure: Cyber Warfare 4511: 4178:On 6 October 2011, it was announced that 4034:systems of the US and rest of the world. 3826:worm, thought to specifically target its 2963:North Atlantic Treaty Organization (NATO) 2742:, a cyber security expert and adviser to 13654:Centre for the Study of Existential Risk 13592:Apocalyptic and post-apocalyptic fiction 11751: 11467:Conti, Gregory. Raymond, David. (2017). 11022:. Ccdcoe.org. Retrieved 8 November 2011. 10774: 10772: 10456: 10307:Schwartz, Mathew J. (21 November 2011). 10306: 10280:, October 2011. Retrieved 6 October 2011 9684: 9621: 8978:"National Cyber Security Centrum – NCSC" 8879: 8745:Estonia accuses Russia of 'cyber attack' 8353:. India. 16 October 2012. Archived from 8296: 7765: 7763: 7691: 7442: 7282: 6950: 6695:Ajir, Media; Vailliant, Bethany (2018). 6304:HometownAnnapolis.com, 24 September 2010 5696:International Committee of the Red Cross 5627: 5625: 5476: 5335: 4600:security incident" (White House quote). 4326:reported that American hackers from the 4251:. The confidential documents, codenamed 3962: 3926: 3920:The attack was well staged according to 3911: 3809: 3577:Department of the Defense of Information 3296: 2813:as it reported on Chinese repression on 2710: 2647:reported that American hackers from the 2555: 2542: 2471:, in the US, widely attributed to China. 2380: 1023:List of military strategies and concepts 49: 11606:IEEE Annals of the History of Computing 11503:Costigan, Sean S.; Perry, Jake (2012). 11420:. New York: McGraw-Hill Osborne Media. 11318:Yuval Shany; Michael N. Schmittwebsite= 11178: 10973:Pentagon Bill To Fix Cyber Attacks: ,0M 10668: 10226:, 24 June 2010. Retrieved 25 June 2010. 10203:. Senate.gov. 111th Congress 2D Session 10175: 10141: 9694:Kubecka, Christina (29 December 2015). 9693: 9458: 9294: 9095: 8863:"Vers une cyber-armΓ©e franΓ§aise ?" 8796:, 27 Berkeley J. Int'l Law. 192 (2009). 7572: 7033: 6634: 6163:. New York: McGraw-Hill Osborne Media. 5846:"U.S. Carried Out Cyberattacks on Iran" 5649: 5479:"Can information warfare ever be just?" 4603:A Ukrainian international law scholar, 4467:Federal government of the United States 4149:On 19 June 2010, United States Senator 4000: 3991:Mohammed bin Hamad bin Khalifa Al Thani 3579:. His tuition was paid for by the FSB. 3305:In July 2011, the South Korean company 3149:Indian Computer Emergency Response Team 3075:, citing unnamed government officials. 2978:was the winner of Locked Shields 2019. 2562:federal government of the United States 2399:collects user data from companies like 14: 13876: 11580: 11203:WSJ: U.S. Backs Talks on Cyber Warfare 11001:"White House Eyes Cyber Security Plan" 10975:. CBS News. Retrieved 8 November 2011. 10963:. Dtic.mil. Retrieved 8 November 2011. 10816:The Law and Economics of Cybersecurity 10337: 9803: 8880:Nouvelle, L'Usine (13 December 2016). 8783:. BBC News. Retrieved 8 November 2011. 8495:. BBC News. Retrieved 8 November 2011. 8444: 8172: 7958: 7623: 7399: 7331: 7256:Giles, Christopher (26 October 2020). 7132: 7093: 7091: 7006:Marine Corps Command and Staff College 6892: 6733: 6587: 6493:. BBC News. Retrieved 8 November 2011. 6330:Singer, P.W.; Friedman, Allan (2014). 6288: 6068: 5778:from the original on 5 September 2021. 5562: 5412: 5315: 5281: 4140:Government Communications Headquarters 4100:, states that "as a doctrinal matter, 4092:as "the fifth domain of warfare," and 3747:Government Communications Headquarters 3464:" unit. In March 2013, BND president 2928: 2797:to the limits of statutory authority. 2682: 2222: 27:Use of digital attacks against a state 13806: 12315: 12265:Host-based intrusion detection system 11725: 11278: 10769: 10570: 10527: 10118: 9514:. Ted.com. Retrieved 8 November 2011. 8542:from the original on 21 December 2021 7760: 7660:"UK war-games cyber attack on Moscow" 7518: 7516: 7255: 7008:. Quantico VA) (Third Quarter 2013). 6760: 6491:BBC: Spies 'infiltrate US power grid' 6449: 6361:The Bulletin of the Atomic Scientists 6265: 5982:Weinberger, Sharon (4 October 2007). 5788: 5716: 5622: 5563:Taddeo, Mariarosaria (19 July 2012). 5445: 5381: 5379: 5347:"Cyber Warfare Issues and Challenges" 5081: 5042: 4747:", an episode of the animated sitcom 4626: 4283:), and the operating systems of most 3704:a cyberattack on Ukraine's power-grid 2186:new paradigm into military doctrine. 12671:Tipping points in the climate system 11599: 10002:. Amnesty International. 31 May 2018 9834: 9610:Aviation Week & Space Technology 9586:Aviation Week & Space Technology 9495:. Google. Retrieved 8 November 2011. 9459:Denning, Dorothy E. (16 July 2012). 7098:"Cyber-War Nominee Sees Gaps in Law" 6734:Carter, Nicholas (22 January 2018). 6594:Journal of Conflict and Security Law 5566:An analysis for a just cyber warfare 5227: 5225: 5223: 5221: 5219: 4697:Documentary films about cyberwarfare 4529: 4107:When Russia was still a part of the 2880: 2568:is susceptible to cyberwarfare. The 2087:, causing comparable harm to actual 13924:Mass intelligence-gathering systems 12666:Extinction risk from climate change 12565:New World Order (conspiracy theory) 12296:Runtime application self-protection 11653: 11076: 11070: 10376:. Associated Press, 24 August 2012. 10110:"Cyberwar: War in the Fifth Domain" 9808: 9524:Lakshmanan, Ravie (10 March 2022). 8611: 7291: 7151: 7088: 6554:. (PDF). Retrieved 8 November 2011. 6181: 5198:"Who are the cyberwar superpowers?" 5122:"Advanced Persistent Threat Groups" 4478:2007 cyberwar waged against Estonia 4403:that carries out cyber attacks for 4356:(FSB) of compromising thousands of 3837:Joint Staff of Iranian Armed Forces 3828:Natanz nuclear enrichment facility. 3656:from 2014 to 2016, the Russian APT 2343: 2270:) have not led to military action. 24: 13626:List of fictional doomsday devices 11847: 11367: 11179:Gjelten, Tom (23 September 2010). 10747:Faulconbridge, Guy (1 June 2023). 9096:Danchev, Dancho (11 August 2008). 8888:– via www.usinenouvelle.com. 8493:"New cyberattacks hit South Korea" 7513: 5376: 4843:List of cyber attack threat trends 4653:Terminator 3: Rise of the Machines 4368: 4073:just as a traditional act of war. 3842:The Iranian state sponsored group 3160:Nuclear Power Corporation of India 3067:put the number at 18 million. The 2572:works with industries to identify 2318: 2095:. Some intended outcomes could be 25: 13975: 12646:Cataclysmic pole shift hypothesis 12228:Security-focused operating system 11692: 11636:Cyber Warfare and Cyber Terrorism 10870:Digital Forensics and Cyber Crime 10389:". Business Insider. 11 June 2013 10142:Markoff, John (26 October 2009). 9562:. Associated Press. 28 April 2011 9543:"Israel Adds Cyber-Attack to IDF" 8839:. 13 October 2014. Archived from 8403: 8173:Graham, Ben (13 September 2020). 7692:Detrixhe, John (7 October 2018). 7573:Allison, George (11 April 2019). 7406:"Google Attack Is Tip Of Iceberg" 6974:from the original on 1 March 2012 6506:. CNN. Retrieved 8 November 2011. 6069:Rayman, Noah (18 December 2013). 5936:United States Department of State 5657:Bulletin of the Atomic Scientists 5483:Ethics and Information Technology 5216: 4566:Shanghai Cooperation Organisation 4049:Cyberwarfare in the United States 3716: 3604:Director of National Intelligence 3412:in the wake of relocation of the 3398:Cisco's Talos Security Department 2901: 2369:which his company discovered, to 13929:Military intelligence collection 13762: 13761: 13749: 12907:Decline in amphibian populations 12024:Insecure direct object reference 11710: 11698: 11337: 11311: 11298: 11272: 11246: 11227: 11195: 11172: 11160: 11135: 11105: 11053: 11025: 11006: 10994: 10978: 10966: 10954: 10928: 10904:Contemporary Conflict Resolution 10894: 10861: 10840: 10806: 10755: 10718: 10690: 10662: 10641:Greenberg, Andy (7 March 2017). 10634: 10606: 10580:Journal of International Studies 10564: 10521: 10469: 10450: 10447:, Washington Post, 23. June 2017 10437: 10411: 10392: 10379: 10366: 10350: 10338:Zetter, Kim (30 November 2011). 10331: 10300: 10283: 10267: 10241: 10229: 10194: 10169: 10135: 10084: 10072: 10039: 10014: 9992: 9974: 9956: 9938: 9910: 9884: 9862: 9797: 9775: 9725: 9656: 9634: 9622:Perlroth, Nicole (12 May 2018). 9615: 9591: 9574: 9548: 9545:, Military.com, 10 February 2010 9536: 9517: 9498: 9485: 9452: 9430: 9412: 9398: 9382: 9364: 9338: 9313: 9288: 9272: 9268:. CrowdStrike. 22 December 2016. 9235: 9210: 9196: 9182: 9156: 9142: 9120: 9089: 9064: 9038: 9019: 9005: 8984: 8970: 8951: 8928: 8910: 8892: 8873: 8855: 8829: 8799: 8786: 8773: 8754: 8738: 8712: 8692: 8679: 8666: 8648: 8628: 8605: 8554: 8522: 8498: 8485: 8464: 8438: 8416: 8397: 8385: 8369: 8337: 8290: 8264: 8223: 8197: 8166: 8141: 8115: 8089: 8063: 8029: 8004: 7978: 7952: 7933: 7919: 7893: 7868: 7842: 7823: 7793: 7737: 7711: 7685: 7651: 7617: 7152:Ali, Sarmad (16 February 2010). 7133:Drogin, Bob (17 February 2010). 6635:Halpern, Micah (22 April 2015). 6534:Gorman, Siobhan. (8 April 2009) 6502:Meserve, Jeanne (8 April 2009). 5446:Blitz, James (1 November 2011). 4903:United States Army Cyber Command 4737: 4230:Sony Pictures Entertainment hack 4076:U.S. government security expert 4042: 4037: 3711:2022 Russian invasion of Ukraine 2299:Cyberwarfare and cyber sanctions 97: 54:Cyberwarfare specialists of the 13258:Four Horsemen of the Apocalypse 12755:Land surface effects on climate 12728:Human impact on the environment 12359:Future of an expanding universe 12278:Information security management 11201:Gorman, Siobhan. (4 June 2010) 11119:. 13 March 2017. Archived from 11031:Associated Press (11 May 2009) 10961:DOD – Cyber Counterintelligence 10676:International Business Times UK 10669:Murdock, Jason (7 March 2017). 9870:"Saudi Aramco hug, another one" 8585: 7900:Barrett, Devlin (5 June 2015). 7624:Boffey, Daniel (27 June 2019). 7592: 7566: 7541: 7488: 7462: 7436: 7411: 7377: 7352: 7325: 7312: 7264: 7249: 7231: 7211: 7187: 7164: 7145: 7126: 7107: 7063: 7027: 6997: 6921: 6912: 6886: 6860: 6835: 6809: 6754: 6727: 6688: 6670: 6628: 6581: 6569: 6557: 6545: 6528: 6509: 6496: 6489:Shiels, Maggie. (9 April 2009) 6483: 6443: 6413: 6348: 6323: 6307: 6266:Gupta, S.C. (8 November 2022). 6259: 6233: 6207: 6134:Schonfeld, Zach (23 May 2014). 6127: 6062: 6029: 6010: 5975: 5956:Ratcliffe, John (18 May 2016). 5949: 5924: 5911:U.S. Department of the Treasury 5899: 5873: 5837: 5809: 5782: 5757: 5737: 5710: 5684: 5643: 5573: 5556: 5509: 5470: 5439: 5309: 5282:Newman, Lily Hay (6 May 2019). 5275: 4898:Marine Corps Cyberspace Command 4783:Computer security organizations 4549:, apply to cyber conflicts and 4494:Federal Bureau of Investigation 4144:Department of Homeland Security 3909:as a reason behind the attack. 3888: 3880:'s decision to pull out of the 3565:Russian state security services 3502:National Cyber Security Centrum 3360:Grand Ethiopian Renaissance Dam 3211:Central Bureau of Investigation 3124:which was traced to hackers in 2944: 2767:Senate Armed Services Committee 2608:, impacting 40 million people. 2419:on many countries, revealed by 11505:Cyberspaces and global affairs 11488:. Greenwood Publishing Group. 10819:. Cambridge University Press. 10592:10.14254/2071-8330.2021/14-2/3 8491:Sudworth, John. (9 July 2009) 6934:Cyberspaces and Global Affairs 6819:. 28 June 2017. Archived from 6240:Liptak, Kevin (20 June 2015). 5585:Journal of Information Warfare 5190: 5165: 5139: 5114: 5075: 5036: 5010: 4963: 4547:international humanitarian law 4031:deferred prosecution agreement 3942:other computers on the network 3760: 3485: 3325: 3315:South Korea's defense ministry 3255: 3246: 3158:The executive director of the 2726: 2122:Many countries, including the 13: 1: 13954:Social engineering (security) 13204:Interpretations of Revelation 13006:Cosmological phase transition 12912:Decline in insect populations 12364:Ultimate fate of the universe 11571:, Doubleday, 2019, 348 pp.), 8749:The Christian Science Monitor 8445:Pandit, Rajat (16 May 2019). 7959:Finkle, Jim (3 August 2011). 6381:10.1080/00963402.2016.1216502 6214:Liptak, Kevin (4 June 2015). 5316:Liptak, Andrew (5 May 2019). 5049:American Intelligence Journal 4956: 4414: 3612:Democratic National Committee 2863: 2654: 2164: 13894:Computer security procedures 13659:Future of Humanity Institute 13056:Potentially hazardous object 12956:Interplanetary contamination 11668:10.1080/01402390.2011.608939 11656:Journal of Strategic Studies 11574:The New York Review of Books 11507:. Farnham, Surrey: Ashgate. 11393:Resources in other libraries 11209:. Retrieved 8 November 2011. 11091:10.1080/01402390.2011.608939 11079:Journal of Strategic Studies 11039:. Retrieved 8 November 2011. 10991:. Retrieved 8 November 2011. 10878:10.1007/978-3-319-25512-5_10 10132:, Sept/Oct. 2010, pp. 97–108 9461:"Stuxnet: What Has Changed?" 8779:Boyd, Clark. (17 June 2010) 8612:Kim, Eun-jung (April 2013). 8382:. Retrieved 8 November 2011. 8297:Poornima, B. (August 2022). 7940:Sanders, Sam (4 June 2015). 7075:www.careersinthemilitary.com 6542:. Retrieved 8 November 2011. 6188:Sanders, Sam (4 June 2015). 6026:, James A. Lewis, April 2010 5518:"Principles of Cyberwarfare" 4848:List of cyber warfare forces 4519:Journal of Strategic Studies 4352:were accused by the Russian 3557:2007 cyberattacks on Estonia 3278:presented evidence multiple 3262:2013 South Korea cyberattack 3217:(NIC) has begun an inquiry. 3167:Ministry of External Affairs 3092:The 2018 cyberattack on the 2999:List of cyber warfare forces 2912:Market for zero-day exploits 2781:One cyber warfare scenario, 2376: 2256:militarization of cyberspace 7: 13914:Hacking (computer security) 13539:Nemesis (hypothetical star) 12688:Global terrestrial stilling 12283:Information risk management 12204:Multi-factor authentication 11760:Related security categories 11443:. Oxford University Press. 11347:(in German). Archived from 11224:, Arstechnica, 18 June 2013 7346:10.1016/j.orbis.2014.11.009 6701:Strategic Studies Quarterly 5147:"APT trends report Q1 2019" 5018:"Cyberwar – does it exist?" 4883:United States Cyber Command 4765: 4631: 4591:agreed to install a secure 4328:United States Cyber Command 4117:Central Intelligence Agency 3734:with the recipe for making 3662:Rocket Forces and Artillery 3571:computers. He was studying 3567:to lead hacking attacks on 3473:leaked details of the U.S. 3266:In July 2009, there were a 3215:National Informatics Center 2749: 2649:United States Cyber Command 2489: 1521:Military–industrial complex 995:Operational manoeuvre group 10: 13980: 13051:Asteroid impact prediction 13026:Heat death of the universe 12436:Mutual assured destruction 12260:Intrusion detection system 12218:Computer security software 11874:Advanced persistent threat 11166:Russian Embassy to the UK 10178:The Evolution of Cyber War 10176:Mazanec, Brain M. (2015). 9763:. Symantec. 16 August 2012 9297:The Evolution of Cyber War 9295:Mazanec, Brain M. (2015). 9076:W. W. Norton & Company 8992:"Defensie Cyber Strategie" 7443:hoffmacd (18 April 2010). 5363:10.1016/j.cose.2014.11.007 4828:Fifth Dimension Operations 4694: 4635: 4620:remain neutral in conflict 4418: 4372: 4219:Tailored Access Operations 4052: 4046: 3781: 3775: 3769: 3720: 3647: 3540: 3534: 3523: 3489: 3449: 3445: 3423: 3403: 3336:WannaCry ransomware attack 3329: 3259: 3179:Indo-Tibetan Border Police 3099:Ministry of State Security 3015: 2996: 2993:Cyber activities by nation 2905: 2858:telecommunications systems 2856:, financial networks, and 2850:internet service providers 2600:Iranian hackers, possibly 2528: 2335:Advanced persistent threat 2328: 2322: 2282:Cyberwarfare vs. cyber war 36: 29: 13838: 13743: 13677: 13669:Nuclear Threat Initiative 13646: 13602:List of apocalyptic films 13579: 13445:2011 end times prediction 13437: 13177:Prophecy of Seventy Weeks 13172:Abomination of desolation 13108: 13046:Asteroid impact avoidance 12983: 12894: 12876:List of extinction events 12851: 12844: 12810: 12718:Environmental degradation 12614: 12605: 12520: 12505:Technological singularity 12374: 12349: 12343:Global catastrophic risks 12159: 11859: 11845: 11839:Digital rights management 11759: 11528:Gaycken, Sandro. (2012). 11388:Resources in your library 11113:"Cybersecurity Framework" 9628:The Sydney Morning Herald 9376:The Chris Science Monitor 8967:, Kazinform, 18 June 2013 8426:. Threatpost. 7 July 2016 8315:10.1177/23477970221099748 7856:. London. 4 December 2010 7071:"Careers in the Military" 7010:"Awaiting the Cyber 9/11" 6936:. Routledge. p. 75. 6779:10.1007/s11127-006-9051-y 6456:The Sydney Morning Herald 5753:. London. 26 August 2017. 4715:Darknet, Hacker, Cyberwar 4441:Cyber counterintelligence 3849: 3631: 3549:denial of service attacks 3530: 3519: 3513:Dutch Ministry of Defense 3419: 3414:Bronze Soldier of Tallinn 3370: 3365: 3340: 3183:National Security Advisor 2827:Nagorno-Karabakh conflict 1585:Loss-of-strength gradient 437:Combat information center 32:Cyberwar (disambiguation) 13664:Future of Life Institute 13566:Resurrection of the dead 13559:Post-tribulation rapture 12941:Colony collapse disorder 11984:Denial-of-service attack 11879:Arbitrary code execution 11639:. Idea Group Inc (IGI). 11549:Strategic Cyber Security 11544:Strategic Cyber Security 11542:Geers, Kenneth. (2011). 11532:. Goldmann/Randomhouse. 11169:. Retrieved 25 May 2012. 10547:10.3390/economies8010002 8676:, New York Times (2018). 7217:Lee, Andy (1 May 2012). 7176:23 February 2010 at the 7034:Gaycken, Sandro (2010). 6588:Buchan, Russell (2012). 5670:10.1177/0096340210393703 4915:Convention on Cybercrime 4858:Military-digital complex 4773:Automated teller machine 4638:Films about cyberwarfare 4461:On 9 February 2009, the 4354:Federal Security Service 4346:National Security Agency 4217:magazine article, NSA's 4132:National Security Agency 3983: 3854:In the 2006 war against 3698:On 23 December 2015 the 3475:National Security Agency 3345: 3204:Mumbai terrorist attacks 3171:Ministry of Home Affairs 3142: 3011: 2935:University of Cincinnati 2839: 2531:Denial-of-service attack 2525:Denial-of-service attack 2417:Massive spying by the US 2395:program under which the 2091:and/or disrupting vital 1903:Military science fiction 1388:Technology and equipment 804:List of military tactics 37:Not to be confused with 13919:Information sensitivity 13833:Cyberwarfare by country 12490:Artificial intelligence 12194:Computer access control 12146:Rogue security software 11809:Electromagnetic warfare 11453:Carr, Jeffrey. (2010). 11207:The Wall Street Journal 11065:Foreign Policy Magazine 11013:CCD COE – Cyber Defence 10463:The Wall Street Journal 9968:The Wall Street Journal 9950:The Wall Street Journal 9510:1 February 2014 at the 9206:. NYT. 15 October 2016. 9031:3 December 2008 at the 8963:1 November 2013 at the 7906:The Wall Street Journal 7318:Denning, D. E. (2008). 7158:The Wall Street Journal 6928:Molfino, Emily (2012). 6540:The Wall Street Journal 6521:30 October 2020 at the 6022:7 November 2015 at the 5495:10.1023/A:1010066528521 5477:Arquilla, John (1999). 5429:, HarperCollins (2010) 5043:Smith, Troy E. (2013). 4888:Air Force Cyber Command 4868:Proactive cyber defence 4480:, NATO established the 4473:and the private sector. 4383:Sandworm (hacker group) 4332:Russian electrical grid 4146:and private companies. 4065:proactive cyber defence 3876:Following US President 3784:Operation Olympic Games 3765: 3410:came under cyber attack 3408:In April 2007, Estonia 3006: 2264:National Health Service 2155:kinetic military action 1971:Wartime sexual violence 1727:Full-spectrum dominance 1538:Supply-chain management 13619:List of disaster films 13460:Apocalyptic literature 12560:Malthusian catastrophe 12486:Synthetic intelligence 12240:Obfuscation (software) 11969:Browser Helper Objects 11853: 11581:Harris, Shane (2014). 11239:7 October 2011 at the 10571:Onder, Mehmet (2021). 10528:Onder, Mehmet (2020). 10124:Lynn, William J. III. 9491:AFP (1 October 2010). 9247:7 January 2017 at the 9152:. NYT. 7 October 2016. 8792:Scott J. Shackelford, 8567:. Command Five Pty Ltd 8511:17 August 2009 at the 7051:Cite journal requires 6738:. RUSI. Archived from 5962:United States Congress 5351:Computers and Security 5082:Lucas, George (2017). 4512:Doubts about existence 4471:United States Congress 3968: 3932: 3917: 3815: 3745:, the director of the 3682:Ukrainian Armed Forces 3585:2008 South Ossetia War 3583:by hackers during the 3537:Cyberwarfare in Russia 3302: 2939:Kaspersky Security Lab 2868:Politically motivated 2633: 2552: 2408: 2357:, equates large-scale 2210: 2201: 2183: 2153:The first instance of 1883:Awards and decorations 1856:Peace through strength 1831:Low-intensity conflict 1465:Conscientious objector 1338:Area of responsibility 67: 13899:Computing terminology 13001:Coronal mass ejection 12463:Electromagnetic pulse 12424:Kinetic energy weapon 12235:Data-centric security 12116:Remote access trojans 11851: 11600:Hunt, Edward (2012). 11546:. NATO Cyber Centre. 10602:– via ProQuest. 10218:21 September 2012 at 9761:"The Shamoon Attacks" 7228:Jeju Peace Institute. 7224:27 March 2012 at the 7017:Joint Force Quarterly 6761:Cowen, Tyler (2006). 6300:24 March 2012 at the 5789:Kello, Lucas (2022). 5717:Kello, Lucas (2017). 5650:Deibert, Ron (2011). 5522:IEEE Security Privacy 5267:) CS1 maint: others ( 5086:. Oxford. p. 6. 4683:Terminator: Dark Fate 4661:Live Free or Die Hard 4610:On the February 2017 4409:plausible deniability 4190:data stream had been 4126:), headed by General 3966: 3930: 3915: 3860:Israel Defense Forces 3813: 3782:Further information: 3638:Sweden's armed forces 3462:cyber defence station 3330:Further information: 3300: 3116:In February 2024 The 3025:Anti-satellite weapon 3018:Cyberwarfare by China 2906:Further information: 2757:In the U.S., General 2715:The idea of a "cyber 2711:Surprise cyber attack 2661:psychological warfare 2624: 2556:Electrical power grid 2551:in the United Kingdom 2549:electrical substation 2546: 2384: 2331:List of hacker groups 2329:Further information: 2205: 2196: 2179: 2159:Israel Defense Forces 470:Torpedo data computer 460:Ship gun fire-control 53: 13949:Security engineering 13403:War of Gog and Magog 13080:Near-Earth supernova 12830:Human overpopulation 12634:Mass mortality event 12528:Anthropogenic hazard 12167:Application security 12061:Privilege escalation 11929:Cross-site scripting 11782:Cybersex trafficking 11753:Information security 11707:at Wikimedia Commons 11618:10.1109/mahc.2011.82 11439:Brenner, S. (2009). 10940:CyberPeace Institute 10785:. World Scientific. 9988:. 20 September 2018. 9642:"Pastie: 'Untitled'" 9170:. United States Code 8843:on 24 September 2020 8705:29 July 2020 at the 8662:. 22 September 2020. 8616:. Yonhap News Agency 8538:. 29 December 2011. 8185:on 17 September 2020 7749:17 June 2013 at the 7294:Minnesota Law Review 7245:. 27 September 2020. 7200:22 July 2011 at the 7119:19 July 2013 at the 7004:Magee, Clifford S. ( 6823:on 19 September 2020 5534:10.1109/MSP.2011.138 5202:World Economic Forum 4873:Signals intelligence 4853:List of cyberattacks 4570:information security 4516:In October 2011 the 4303:), as well as other 4211:According to a 2013 4098:Secretary of Defense 4007:United Arab Emirates 4001:United Arab Emirates 3822:was attacked by the 3796:Operation Newscaster 3772:Cyberwarfare by Iran 3702:malware was used in 3684:). According to the 3616:Presidential finding 3479:Hans-Peter Friedrich 3241:Defence Cyber Agency 3094:Marriott hotel chain 2918:industrial espionage 2313:Obama administration 2245:Obama administration 2001:Military occupations 1836:Military engineering 1738:Unrestricted Warfare 1595:Force multiplication 488:Military manoeuvrers 13934:Military technology 13475:Blood moon prophecy 13268:Number of the Beast 12866:Holocene extinction 12812:Earth Overshoot Day 12760:Ocean acidification 12723:Habitat destruction 12713:Ecological collapse 12419:Kinetic bombardment 12354:Future of the Earth 11814:Information warfare 11772:Automotive security 11716:The Information Age 11279:Kaspersky, Eugene. 11067:, 6 September 2012. 11018:31 May 2009 at the 10989:The Washington Post 10060:on 28 December 2021 9604:21 May 2011 at the 9597:Fulghum, David A. " 9580:Fulghum, David A. " 9408:. 13 November 2013. 9231:on 25 January 2017. 9108:on 12 December 2008 9046:"www.axisglobe.com" 8940:29 May 2013 at the 8906:. 12 December 2016. 8380:The Express Tribune 7831:China's Hacker Army 7725:. 19 September 2017 6684:. 21 February 2017. 6606:10.1093/jcsl/krs014 6373:2016BuAtS..72e.284G 6320:, 24 September 2010 6005:The Times of Israel 5617:The Times of Israel 5425:Clarke, Richard A. 4893:Fleet Cyber Command 4803:Cyber-arms industry 4476:In the wake of the 4188:command and control 4157:(R-ME) and Senator 3818:In September 2010, 3551:as a part of their 3134:Ferdinand Marcos Jr 3079:Operation Shady RAT 2929:Non-profit research 2908:Cyber-arms industry 2848:of the web, to the 2683:Economic disruption 2626:It's possible that 2587:droop speed control 2566:electric power grid 2223:Controversy of term 1687:Penal military unit 1672:Rules of engagement 1348:Command and control 968:Operations research 432:Director (military) 422:Fire-control system 192:Command and control 73:Part of a series on 43:information warfare 13790:Doomsday scenarios 13356:Beast of the Earth 13248:Book of Revelation 13036:Virtual black hole 13016:False vacuum decay 12966:Pollinator decline 12929:Biological warfare 12919:Biotechnology risk 12770:Resource depletion 12223:Antivirus software 12091:Social engineering 12056:Polymorphic engine 12009:Fraudulent dialers 11914:Hardware backdoors 11854: 11471:. Kopidion Press. 11260:. 14 February 2017 11123:on 8 November 2022 10620:The New York Times 10509:. 29 December 2016 10483:. 29 December 2016 10424:The New York Times 10361:The New York Times 10319:on 24 January 2012 10297:, 13 October 2011. 10148:The New York Times 10095:The New York Times 10052:The New York Times 9986:The New York Times 9898:. 19 December 2018 9737:The New York Times 9426:. 21 October 2013. 9393:The Globe and Mail 9352:. 24 February 2022 8886:Usinenouvelle.com/ 8869:. 29 January 2013. 8709:, BalkanEU (2019). 8698:Michalis Michael, 8504:Williams, Martin. 8451:The Times of India 8357:on 26 January 2013 8350:The Times of India 8103:. 12 December 2018 8077:. 12 December 2018 8042:The New York Times 7985:O'Flaherty, Kate. 7579:UK Defence Journal 7208:. 16 February 2010 7102:The New York Times 6873:The New York Times 6552:NERC Public Notice 6318:The New York Times 6041:The New York Times 5851:The New York Times 4730:The Perfect Weapon 4705:(2016) by Viceland 4669:Terminator Genisys 4627:In popular culture 4605:Alexander Merezhko 4581:Keith B. Alexander 4391:Iranian Cyber Army 4344:In June 2023, the 4322:In June 2019, the 4281:Opera Software ASA 4203:the New York Times 4184:drone and Predator 4130:, director of the 4128:Keith B. Alexander 3969: 3946:master boot record 3933: 3918: 3816: 3778:Iranian Cyber Army 3642:military exercises 3432:Jean-Yves Le Drian 3332:Sony Pictures hack 3303: 3052:In June 2015, the 3047:Chinese government 2759:Keith B. Alexander 2669:fake news websites 2602:Iranian Cyber Army 2553: 2513:The New York Times 2474:The security firm 2409: 2371:biological weapons 2311:issued during the 2235:, concluded that " 1796:Counter-insurgency 1717:Command of the sea 1662:Jewish laws on war 1637:Geneva Conventions 1173:Divide and conquer 963:Military operation 928:Tactical objective 427:Fire-control radar 404:Electronic-warfare 68: 56:United States Army 39:electronic warfare 13939:National security 13871: 13870: 13800: 13799: 13631:Zombie apocalypse 13532:Postmillennialism 13327:Great Tribulation 13100:Stellar collision 13061:Near-Earth object 13011:Geomagnetic storm 12979: 12978: 12902:Biodiversity loss 12886:Genetic pollution 12840: 12839: 12629:Biodiversity loss 12592:Societal collapse 12570:Nuclear holocaust 12555:Economic collapse 12538:Doomsday argument 12456:Antimatter weapon 12309: 12308: 12271:Anomaly detection 12176:Secure by default 12029:Keystroke loggers 11964:Drive-by download 11852:vectorial version 11819:Internet security 11767:Computer security 11703:Media related to 11646:978-1-59140-992-2 11558:978-9949-9040-7-5 11495:978-0-275-97423-7 11463:978-0-596-80215-8 11374:Library resources 11320:Naval War College 10887:978-3-319-25511-8 10372:Satter, Raphael. 10356:Sanger, David E. 10295:Los Angeles Times 10255:on 23 August 2010 9478:10.3390/fi4030672 9052:on 17 August 2016 8817:on 5 January 2019 8685:Lily Hay Newman, 8278:. 8 November 2022 8211:. 5 February 2024 8016:answers.kroll.com 7553:www.ncia.nato.int 7474:www.kaspersky.com 7139:Los Angeles Times 6943:978-1-4094-2754-4 6341:978-0-19-991809-6 5932:"Cyber Sanctions" 4920:Vulkan files leak 4778:Computer security 4577:freedom of speech 4530:Legal perspective 4506:cyber attribution 4450:On 7 April 2009, 4309:Microsoft Windows 4305:operating systems 4078:Richard A. Clarke 4061:military strategy 3882:Iran nuclear deal 3871:Operation Orchard 3864:Richard A. Clarke 3792:Operation Cleaver 3741:In October 2010, 3636:In January 2017, 3590:In October 2016, 3573:computer sciences 3466:Gerhard Schindler 3307:SK Communications 3292:cyber attribution 3187:Shivshankar Menon 3039:Diplomatic cables 2881:Income generation 2874:computer networks 2663:, except it uses 2217:Richard A. Clarke 2083:against an enemy 2074: 2073: 1966:Horses in warfare 1913:Anti-war movement 1816:Gunboat diplomacy 1806:Disaster response 1754:Philosophy of war 1749:Principles of war 1722:Deterrence theory 1667:Right of conquest 1590:Lanchester's laws 1358:Principles of war 1048:Counter-offensive 1028:Military campaign 933:Target saturation 856:Counterinsurgency 465:Gun data computer 399:Close air support 361:Aircraft carriers 64:training exercise 16:(Redirected from 13971: 13827: 13820: 13813: 13804: 13803: 13765: 13764: 13756:World portal 13754: 13753: 13715:Financial crisis 13544:Nibiru cataclysm 13522:Premillennialism 13366:Dhul-Suwayqatayn 13334:Son of perdition 13322:Olivet Discourse 13298:Whore of Babylon 12924:Biological agent 12871:Human extinction 12861:Extinction event 12849: 12848: 12820:Overexploitation 12750:Land consumption 12745:Land degradation 12612: 12611: 12474:Micro black hole 12382:Chemical warfare 12336: 12329: 12322: 12313: 12312: 12180:Secure by design 12111:Hardware Trojans 11944:History sniffing 11934:Cross-site leaks 11829:Network security 11746: 11739: 11732: 11723: 11722: 11714: 11702: 11679: 11650: 11629: 11596: 11518: 11499: 11361: 11360: 11358: 11356: 11341: 11335: 11334: 11332: 11330: 11315: 11309: 11302: 11296: 11295: 11293: 11291: 11276: 11270: 11269: 11267: 11265: 11250: 11244: 11231: 11225: 11218:Sean Gallagher, 11216: 11210: 11199: 11193: 11192: 11190: 11188: 11176: 11170: 11164: 11158: 11157: 11155: 11153: 11147:www.worldcat.org 11139: 11133: 11132: 11130: 11128: 11109: 11103: 11102: 11074: 11068: 11057: 11051: 11046: 11040: 11029: 11023: 11010: 11004: 10998: 10992: 10982: 10976: 10970: 10964: 10958: 10952: 10951: 10949: 10947: 10932: 10926: 10925: 10923: 10921: 10898: 10892: 10891: 10865: 10859: 10858: 10856: 10844: 10838: 10837: 10835: 10833: 10810: 10804: 10803: 10801: 10799: 10776: 10767: 10766: 10759: 10753: 10752: 10744: 10735: 10722: 10716: 10715: 10713: 10711: 10694: 10688: 10687: 10685: 10683: 10666: 10660: 10659: 10657: 10655: 10638: 10632: 10631: 10629: 10627: 10610: 10604: 10603: 10577: 10568: 10562: 10561: 10559: 10549: 10525: 10519: 10518: 10516: 10514: 10499: 10493: 10492: 10490: 10488: 10473: 10467: 10466: 10454: 10448: 10441: 10435: 10434: 10432: 10430: 10415: 10409: 10396: 10390: 10383: 10377: 10370: 10364: 10354: 10348: 10347: 10335: 10329: 10328: 10326: 10324: 10315:. Archived from 10304: 10298: 10287: 10281: 10271: 10265: 10264: 10262: 10260: 10251:. Archived from 10245: 10239: 10233: 10227: 10224:Information Week 10210: 10204: 10198: 10192: 10191: 10173: 10167: 10166: 10164: 10162: 10139: 10133: 10122: 10116: 10107: 10098: 10088: 10082: 10076: 10070: 10069: 10067: 10065: 10059: 10054:. Archived from 10043: 10037: 10036: 10034: 10032: 10018: 10012: 10011: 10009: 10007: 9996: 9990: 9989: 9978: 9972: 9971: 9960: 9954: 9953: 9952:. 26 March 2018. 9942: 9936: 9935: 9933: 9931: 9914: 9908: 9907: 9905: 9903: 9888: 9882: 9881: 9879: 9877: 9872:. 29 August 2012 9866: 9860: 9859: 9857: 9855: 9850:. 17 August 2012 9838: 9832: 9831: 9829: 9827: 9822:. 18 August 2012 9812: 9806: 9805: 9801: 9795: 9794: 9792: 9790: 9779: 9773: 9772: 9770: 9768: 9757: 9748: 9747: 9745: 9743: 9729: 9723: 9709: 9707: 9705: 9700: 9691: 9682: 9681: 9679: 9677: 9660: 9654: 9653: 9651: 9649: 9638: 9632: 9631: 9619: 9613: 9595: 9589: 9578: 9572: 9571: 9569: 9567: 9552: 9546: 9540: 9534: 9533: 9521: 9515: 9502: 9496: 9489: 9483: 9482: 9480: 9456: 9450: 9449: 9447: 9445: 9434: 9428: 9427: 9416: 9410: 9409: 9402: 9396: 9386: 9380: 9379: 9368: 9362: 9361: 9359: 9357: 9342: 9336: 9335: 9333: 9331: 9317: 9311: 9310: 9292: 9286: 9285:(6 January 2017) 9283:Interfax-Ukraine 9276: 9270: 9269: 9262: 9256: 9255:(6 January 2017) 9239: 9233: 9232: 9227:. Archived from 9214: 9208: 9207: 9200: 9194: 9193: 9186: 9180: 9179: 9177: 9175: 9160: 9154: 9153: 9146: 9140: 9139: 9137: 9135: 9124: 9118: 9117: 9115: 9113: 9104:. Archived from 9093: 9087: 9068: 9062: 9061: 9059: 9057: 9048:. Archived from 9042: 9036: 9023: 9017: 9016: 9015:. 29 March 2017. 9013:"Cyber commando" 9009: 9003: 9002: 9000: 8998: 8988: 8982: 8981: 8974: 8968: 8955: 8949: 8932: 8926: 8925: 8924:on 15 June 2013. 8920:. Archived from 8914: 8908: 8907: 8896: 8890: 8889: 8877: 8871: 8870: 8859: 8853: 8852: 8850: 8848: 8833: 8827: 8826: 8824: 8822: 8813:. Archived from 8811:www.atlantico.fr 8803: 8797: 8790: 8784: 8777: 8771: 8758: 8752: 8742: 8736: 8735: 8733: 8731: 8716: 8710: 8696: 8690: 8683: 8677: 8670: 8664: 8663: 8652: 8646: 8645: 8632: 8626: 8625: 8623: 8621: 8609: 8603: 8602: 8600: 8598: 8583: 8577: 8576: 8574: 8572: 8566: 8558: 8552: 8551: 8549: 8547: 8526: 8520: 8502: 8496: 8489: 8483: 8482: 8476: 8468: 8462: 8461: 8459: 8457: 8442: 8436: 8435: 8433: 8431: 8420: 8414: 8413: 8401: 8395: 8389: 8383: 8373: 8367: 8366: 8364: 8362: 8341: 8335: 8334: 8294: 8288: 8287: 8285: 8283: 8268: 8262: 8261: 8259: 8257: 8243: 8232: 8227: 8221: 8220: 8218: 8216: 8201: 8195: 8194: 8192: 8190: 8181:. Archived from 8170: 8164: 8163: 8161: 8159: 8145: 8139: 8138: 8136: 8134: 8119: 8113: 8112: 8110: 8108: 8093: 8087: 8086: 8084: 8082: 8067: 8061: 8060: 8058: 8056: 8033: 8027: 8026: 8024: 8022: 8008: 8002: 8001: 7999: 7997: 7982: 7976: 7975: 7973: 7971: 7956: 7950: 7949: 7937: 7931: 7930: 7923: 7917: 7916: 7914: 7912: 7897: 7891: 7890: 7888: 7886: 7872: 7866: 7865: 7863: 7861: 7846: 7840: 7827: 7821: 7820: 7818: 7816: 7811:on 10 March 2011 7797: 7791: 7790: 7788: 7786: 7781:on 10 March 2011 7767: 7758: 7741: 7735: 7734: 7732: 7730: 7715: 7709: 7708: 7706: 7704: 7689: 7683: 7682: 7680: 7678: 7664:The Sunday Times 7655: 7649: 7648: 7646: 7644: 7621: 7615: 7614: 7612: 7610: 7596: 7590: 7589: 7587: 7585: 7570: 7564: 7563: 7561: 7559: 7545: 7539: 7538: 7536: 7534: 7524:"Locked Shields" 7520: 7511: 7510: 7508: 7506: 7492: 7486: 7485: 7483: 7481: 7466: 7460: 7459: 7457: 7455: 7440: 7434: 7433: 7431: 7429: 7415: 7409: 7403: 7397: 7396: 7394: 7392: 7381: 7375: 7374: 7372: 7370: 7356: 7350: 7349: 7329: 7323: 7316: 7310: 7309: 7289: 7280: 7279: 7268: 7262: 7261: 7253: 7247: 7246: 7235: 7229: 7215: 7209: 7191: 7185: 7168: 7162: 7161: 7149: 7143: 7142: 7130: 7124: 7111: 7105: 7095: 7086: 7085: 7083: 7081: 7067: 7061: 7060: 7054: 7049: 7047: 7039: 7031: 7025: 7024: 7014: 7001: 6995: 6983: 6981: 6979: 6960:(27 July 2009). 6954: 6948: 6947: 6925: 6919: 6916: 6910: 6909: 6907: 6905: 6890: 6884: 6883: 6881: 6879: 6864: 6858: 6857: 6855: 6853: 6839: 6833: 6832: 6830: 6828: 6813: 6807: 6806: 6773:(1/2): 233–244. 6758: 6752: 6751: 6749: 6747: 6742:on 29 March 2018 6731: 6725: 6724: 6692: 6686: 6685: 6674: 6668: 6667: 6654: 6645: 6644: 6632: 6626: 6625: 6585: 6579: 6573: 6567: 6561: 6555: 6549: 6543: 6532: 6526: 6513: 6507: 6500: 6494: 6487: 6481: 6480: 6474: 6466: 6464: 6462: 6447: 6441: 6440: 6438: 6436: 6431:on 18 March 2021 6427:. Archived from 6425:us-cert.cisa.gov 6417: 6411: 6410: 6400: 6352: 6346: 6345: 6327: 6321: 6311: 6305: 6292: 6286: 6285: 6279: 6271: 6263: 6257: 6256: 6254: 6252: 6237: 6231: 6230: 6228: 6226: 6211: 6205: 6204: 6202: 6200: 6185: 6179: 6157: 6151: 6150: 6148: 6146: 6131: 6125: 6124: 6122: 6120: 6111:. Archived from 6109:First Look Media 6094: 6088: 6087: 6085: 6083: 6066: 6060: 6059: 6057: 6055: 6033: 6027: 6014: 6008: 5998: 5992: 5991: 5979: 5973: 5972: 5970: 5968: 5953: 5947: 5946: 5944: 5942: 5928: 5922: 5921: 5919: 5917: 5903: 5897: 5896: 5894: 5892: 5877: 5871: 5870: 5868: 5866: 5841: 5835: 5834: 5832: 5830: 5813: 5807: 5806: 5786: 5780: 5779: 5777: 5770: 5761: 5755: 5754: 5741: 5735: 5734: 5714: 5708: 5707: 5705: 5703: 5688: 5682: 5681: 5647: 5641: 5629: 5620: 5610: 5601: 5600: 5598: 5596: 5577: 5571: 5570: 5560: 5554: 5553: 5513: 5507: 5506: 5474: 5468: 5467: 5465: 5463: 5454:. Archived from 5443: 5437: 5423: 5410: 5409: 5383: 5374: 5373: 5371: 5369: 5342: 5333: 5332: 5330: 5328: 5313: 5307: 5306: 5304: 5302: 5279: 5273: 5272: 5262: 5254: 5229: 5214: 5213: 5211: 5209: 5194: 5188: 5187: 5185: 5183: 5169: 5163: 5162: 5160: 5158: 5143: 5137: 5136: 5134: 5132: 5118: 5112: 5111: 5105: 5097: 5079: 5073: 5072: 5040: 5034: 5033: 5031: 5029: 5014: 5008: 5007: 5001: 4993: 4967: 4863:Penetration test 4808:Cyber-collection 4709:Cyber War Threat 4645:Independence Day 4593:Cyberwar-Hotline 4164:Kill switch bill 3995:Ahmed Al-Rumaihi 3788:Operation Ababil 3510: 3177:(DRDO), and the 2854:Electrical grids 2761:, first head of 2741: 2693:Petya (NotPetya) 2564:admits that the 2351:Eugene Kaspersky 2344:Types of warfare 2309:Executive Orders 2293:Strait of Hormuz 2229:Eugene Kaspersky 2113:economic warfare 2093:computer systems 2066: 2059: 2052: 1821:Humanitarian aid 1759:Security dilemma 1580:Power projection 1363:Economy of force 1343:Chain of command 1058:Defence in depth 1043:Commerce raiding 861:Defeat in detail 197:Defense ministry 101: 92: 91: 82: 70: 69: 21: 13979: 13978: 13974: 13973: 13972: 13970: 13969: 13968: 13889:Warfare by type 13874: 13873: 13872: 13867: 13863:Other countries 13834: 13831: 13801: 13796: 13775:Future problems 13748: 13739: 13673: 13642: 13609:Climate fiction 13575: 13450:2012 phenomenon 13433: 13339:Sheep and Goats 13226:2 Thessalonians 13104: 13021:Gamma-ray burst 12975: 12890: 12881:Genetic erosion 12836: 12806: 12797:Water pollution 12765:Ozone depletion 12661:Desertification 12601: 12516: 12451:Doomsday device 12431:Nuclear warfare 12370: 12345: 12340: 12310: 12305: 12155: 11855: 11843: 11834:Copy protection 11824:Mobile security 11755: 11750: 11695: 11647: 11593: 11515: 11496: 11399: 11398: 11397: 11382: 11381: 11377: 11370: 11368:Further reading 11365: 11364: 11354: 11352: 11351:on 4 April 2017 11343: 11342: 11338: 11328: 11326: 11316: 11312: 11303: 11299: 11289: 11287: 11277: 11273: 11263: 11261: 11252: 11251: 11247: 11241:Wayback Machine 11232: 11228: 11217: 11213: 11200: 11196: 11186: 11184: 11177: 11173: 11165: 11161: 11151: 11149: 11141: 11140: 11136: 11126: 11124: 11111: 11110: 11106: 11075: 11071: 11058: 11054: 11047: 11043: 11030: 11026: 11020:Wayback Machine 11011: 11007: 10999: 10995: 10983: 10979: 10971: 10967: 10959: 10955: 10945: 10943: 10934: 10933: 10929: 10919: 10917: 10915: 10899: 10895: 10888: 10866: 10862: 10845: 10841: 10831: 10829: 10827: 10811: 10807: 10797: 10795: 10793: 10777: 10770: 10761: 10760: 10756: 10745: 10738: 10734:. 7 March 2017. 10723: 10719: 10709: 10707: 10696: 10695: 10691: 10681: 10679: 10667: 10663: 10653: 10651: 10639: 10635: 10625: 10623: 10611: 10607: 10575: 10569: 10565: 10526: 10522: 10512: 10510: 10501: 10500: 10496: 10486: 10484: 10475: 10474: 10470: 10455: 10451: 10442: 10438: 10428: 10426: 10416: 10412: 10408:. 11 June 2013. 10397: 10393: 10384: 10380: 10371: 10367: 10355: 10351: 10336: 10332: 10322: 10320: 10313:InformationWeek 10305: 10301: 10289:Hennigan, W.J. 10288: 10284: 10272: 10268: 10258: 10256: 10247: 10246: 10242: 10234: 10230: 10211: 10207: 10199: 10195: 10188: 10174: 10170: 10160: 10158: 10140: 10136: 10130:Foreign Affairs 10123: 10119: 10108: 10101: 10089: 10085: 10077: 10073: 10063: 10061: 10044: 10040: 10030: 10028: 10020: 10019: 10015: 10005: 10003: 9998: 9997: 9993: 9980: 9979: 9975: 9962: 9961: 9957: 9944: 9943: 9939: 9929: 9927: 9926:. 3 August 2015 9916: 9915: 9911: 9901: 9899: 9890: 9889: 9885: 9875: 9873: 9868: 9867: 9863: 9853: 9851: 9840: 9839: 9835: 9825: 9823: 9820:Digital Journal 9814: 9813: 9809: 9802: 9798: 9788: 9786: 9785:. 5 August 2015 9781: 9780: 9776: 9766: 9764: 9759: 9758: 9751: 9741: 9739: 9730: 9726: 9703: 9701: 9698: 9692: 9685: 9675: 9673: 9672:. 5 August 2015 9662: 9661: 9657: 9647: 9645: 9640: 9639: 9635: 9620: 9616: 9606:Wayback Machine 9596: 9592: 9579: 9575: 9565: 9563: 9554: 9553: 9549: 9541: 9537: 9522: 9518: 9512:Wayback Machine 9503: 9499: 9490: 9486: 9465:Future Internet 9457: 9453: 9443: 9441: 9436: 9435: 9431: 9418: 9417: 9413: 9404: 9403: 9399: 9387: 9383: 9378:. 4 April 2012. 9370: 9369: 9365: 9355: 9353: 9344: 9343: 9339: 9329: 9327: 9319: 9318: 9314: 9307: 9293: 9289: 9277: 9273: 9264: 9263: 9259: 9249:Wayback Machine 9240: 9236: 9215: 9211: 9202: 9201: 9197: 9188: 9187: 9183: 9173: 9171: 9162: 9161: 9157: 9148: 9147: 9143: 9133: 9131: 9126: 9125: 9121: 9111: 9109: 9094: 9090: 9069: 9065: 9055: 9053: 9044: 9043: 9039: 9033:Wayback Machine 9024: 9020: 9011: 9010: 9006: 8996: 8994: 8990: 8989: 8985: 8976: 8975: 8971: 8965:Wayback Machine 8956: 8952: 8948:, 24 March 2013 8942:Wayback Machine 8933: 8929: 8916: 8915: 8911: 8898: 8897: 8893: 8878: 8874: 8861: 8860: 8856: 8846: 8844: 8835: 8834: 8830: 8820: 8818: 8805: 8804: 8800: 8791: 8787: 8778: 8774: 8759: 8755: 8743: 8739: 8729: 8727: 8718: 8717: 8713: 8707:Wayback Machine 8697: 8693: 8689:, Wired (2018). 8684: 8680: 8672:David E Sanger 8671: 8667: 8654: 8653: 8649: 8644:. 27 June 2020. 8634: 8633: 8629: 8619: 8617: 8610: 8606: 8596: 8594: 8586:Lee, Se Young. 8584: 8580: 8570: 8568: 8564: 8560: 8559: 8555: 8545: 8543: 8528: 8527: 8523: 8513:Wayback Machine 8503: 8499: 8490: 8486: 8474: 8470: 8469: 8465: 8455: 8453: 8443: 8439: 8429: 8427: 8422: 8421: 8417: 8404:Pauli, Darren. 8402: 8398: 8390: 8386: 8374: 8370: 8360: 8358: 8343: 8342: 8338: 8295: 8291: 8281: 8279: 8270: 8269: 8265: 8255: 8253: 8245: 8244: 8235: 8228: 8224: 8214: 8212: 8203: 8202: 8198: 8188: 8186: 8171: 8167: 8157: 8155: 8147: 8146: 8142: 8132: 8130: 8120: 8116: 8106: 8104: 8095: 8094: 8090: 8080: 8078: 8075:The Independent 8069: 8068: 8064: 8054: 8052: 8034: 8030: 8020: 8018: 8010: 8009: 8005: 7995: 7993: 7983: 7979: 7969: 7967: 7957: 7953: 7938: 7934: 7929:. 22 June 2015. 7925: 7924: 7920: 7910: 7908: 7898: 7894: 7884: 7882: 7874: 7873: 7869: 7859: 7857: 7848: 7847: 7843: 7839:. 3 March 2010. 7828: 7824: 7814: 7812: 7799: 7798: 7794: 7784: 7782: 7769: 7768: 7761: 7751:Wayback Machine 7742: 7738: 7728: 7726: 7717: 7716: 7712: 7702: 7700: 7690: 7686: 7676: 7674: 7656: 7652: 7642: 7640: 7622: 7618: 7608: 7606: 7598: 7597: 7593: 7583: 7581: 7571: 7567: 7557: 7555: 7547: 7546: 7542: 7532: 7530: 7522: 7521: 7514: 7504: 7502: 7494: 7493: 7489: 7479: 7477: 7468: 7467: 7463: 7453: 7451: 7441: 7437: 7427: 7425: 7417: 7416: 7412: 7404: 7400: 7390: 7388: 7387:. 7 August 2019 7383: 7382: 7378: 7368: 7366: 7365:. 5 August 2019 7358: 7357: 7353: 7330: 7326: 7317: 7313: 7290: 7283: 7270: 7269: 7265: 7254: 7250: 7237: 7236: 7232: 7226:Wayback Machine 7216: 7212: 7206:The Tech Herald 7202:Wayback Machine 7192: 7188: 7178:Wayback Machine 7169: 7165: 7150: 7146: 7131: 7127: 7121:Wayback Machine 7112: 7108: 7104:, 14 April 2010 7096: 7089: 7079: 7077: 7069: 7068: 7064: 7052: 7050: 7041: 7040: 7032: 7028: 7012: 7002: 6998: 6977: 6975: 6955: 6951: 6944: 6926: 6922: 6917: 6913: 6903: 6901: 6891: 6887: 6877: 6875: 6865: 6861: 6851: 6849: 6841: 6840: 6836: 6826: 6824: 6815: 6814: 6810: 6759: 6755: 6745: 6743: 6732: 6728: 6693: 6689: 6676: 6675: 6671: 6666:. 18 June 2019. 6656: 6655: 6648: 6633: 6629: 6586: 6582: 6576:ABC News: Video 6574: 6570: 6562: 6558: 6550: 6546: 6533: 6529: 6523:Wayback Machine 6514: 6510: 6501: 6497: 6488: 6484: 6468: 6467: 6460: 6458: 6448: 6444: 6434: 6432: 6419: 6418: 6414: 6353: 6349: 6342: 6328: 6324: 6312: 6308: 6302:Wayback Machine 6293: 6289: 6273: 6272: 6264: 6260: 6250: 6248: 6238: 6234: 6224: 6222: 6212: 6208: 6198: 6196: 6186: 6182: 6158: 6154: 6144: 6142: 6132: 6128: 6118: 6116: 6095: 6091: 6081: 6079: 6067: 6063: 6053: 6051: 6035: 6034: 6030: 6024:Wayback Machine 6015: 6011: 5999: 5995: 5980: 5976: 5966: 5964: 5954: 5950: 5940: 5938: 5930: 5929: 5925: 5915: 5913: 5905: 5904: 5900: 5890: 5888: 5885:The White House 5879: 5878: 5874: 5864: 5862: 5842: 5838: 5828: 5826: 5815: 5814: 5810: 5803: 5787: 5783: 5775: 5768: 5762: 5758: 5743: 5742: 5738: 5731: 5715: 5711: 5701: 5699: 5690: 5689: 5685: 5648: 5644: 5630: 5623: 5611: 5604: 5594: 5592: 5579: 5578: 5574: 5561: 5557: 5514: 5510: 5475: 5471: 5461: 5459: 5452:Financial Times 5444: 5440: 5424: 5413: 5398: 5384: 5377: 5367: 5365: 5343: 5336: 5326: 5324: 5314: 5310: 5300: 5298: 5280: 5276: 5256: 5255: 5243: 5231: 5230: 5217: 5207: 5205: 5196: 5195: 5191: 5181: 5179: 5177:www.gchq.gov.uk 5171: 5170: 5166: 5156: 5154: 5153:. 30 April 2019 5145: 5144: 5140: 5130: 5128: 5120: 5119: 5115: 5099: 5098: 5094: 5080: 5076: 5041: 5037: 5027: 5025: 5016: 5015: 5011: 4995: 4994: 4982: 4968: 4964: 4959: 4954: 4768: 4740: 4699: 4695:Main category: 4640: 4636:Main category: 4634: 4629: 4532: 4514: 4443: 4423: 4417: 4401:non-state actor 4393: 4371: 4369:Cyber mercenary 4277:Mozilla Firefox 4094:William J. Lynn 4057: 4051: 4045: 4040: 4003: 3986: 3891: 3852: 3798: 3780: 3774: 3768: 3763: 3725: 3719: 3650: 3634: 3545: 3539: 3533: 3528: 3522: 3504: 3494: 3488: 3454: 3448: 3428: 3422: 3406: 3393:Area 1 Security 3373: 3368: 3348: 3343: 3338: 3328: 3264: 3258: 3249: 3145: 3081:is a series of 3069:Washington Post 3029:Informatisation 3020: 3014: 3009: 3001: 2995: 2947: 2931: 2914: 2904: 2883: 2866: 2842: 2833:'s statements. 2817:. Hackers from 2783:Cyber-ShockWave 2752: 2735: 2729: 2713: 2685: 2657: 2641:electrical grid 2595:national trauma 2574:vulnerabilities 2558: 2533: 2527: 2492: 2379: 2346: 2341: 2327: 2321: 2319:Types of threat 2305:cyber sanctions 2301: 2284: 2254:, warned of a " 2225: 2188:Paulo Shakarian 2167: 2070: 2041: 2040: 1991: 1981: 1980: 1946: 1938: 1937: 1878: 1868: 1867: 1841:Multilateralism 1826:Law enforcement 1786: 1776: 1775: 1744:Just war theory 1702: 1692: 1691: 1642:Geneva Protocol 1612: 1602: 1601: 1575: 1565: 1564: 1506: 1496: 1495: 1403: 1393: 1392: 1333: 1323: 1322: 1288: 1278: 1277: 1208:Network-centric 1128: 1118: 1117: 1020: 1010: 1009: 958: 948: 947: 896:Rapid dominance 801: 791: 790: 746:Electromagnetic 655: 645: 644: 631: 584: 532: 508: 498: 497: 493:Combat training 474: 451: 417:Combat systems: 413: 375: 371:Auxiliary ships 337: 297: 293:Military police 259: 182: 172: 171: 111: 85: 84: 83: 78: 46: 35: 28: 23: 22: 15: 12: 11: 5: 13977: 13967: 13966: 13961: 13956: 13951: 13946: 13941: 13936: 13931: 13926: 13921: 13916: 13911: 13906: 13901: 13896: 13891: 13886: 13869: 13868: 13866: 13865: 13860: 13855: 13850: 13845: 13839: 13836: 13835: 13830: 13829: 13822: 13815: 13807: 13798: 13797: 13795: 13794: 13793: 13792: 13787: 13782: 13777: 13772: 13770:Apocalypticism 13759: 13744: 13741: 13740: 13738: 13737: 13732: 13727: 13722: 13717: 13712: 13707: 13702: 13697: 13692: 13687: 13681: 13679: 13675: 13674: 13672: 13671: 13666: 13661: 13656: 13650: 13648: 13644: 13643: 13641: 13640: 13639: 13638: 13628: 13623: 13622: 13621: 13614:Disaster films 13611: 13606: 13605: 13604: 13599: 13589: 13587:Alien invasion 13583: 13581: 13577: 13576: 13574: 13573: 13568: 13563: 13562: 13561: 13556: 13546: 13541: 13536: 13535: 13534: 13529: 13527:Amillennialism 13524: 13514: 13512:Millenarianism 13509: 13508: 13507: 13497: 13492: 13487: 13482: 13477: 13472: 13467: 13465:Apocalypticism 13462: 13457: 13452: 13447: 13441: 13439: 13435: 13434: 13432: 13431: 13430: 13429: 13419: 13414: 13413: 13412: 13411: 13410: 13405: 13400: 13390: 13389: 13388: 13383: 13378: 13373: 13368: 13363: 13361:Dhu al-Qarnayn 13358: 13353: 13343: 13342: 13341: 13336: 13331: 13330: 13329: 13319: 13314: 13309: 13307:Great Apostasy 13304: 13303: 13302: 13301: 13300: 13295: 13290: 13285: 13280: 13275: 13270: 13265: 13260: 13245: 13240: 13239: 13238: 13233: 13223: 13218: 13213: 13208: 13207: 13206: 13196: 13186: 13181: 13180: 13179: 13174: 13164: 13154: 13152:Last Judgement 13149: 13148: 13147: 13142: 13132: 13131: 13130: 13125: 13114: 13112: 13110:Eschatological 13106: 13105: 13103: 13102: 13097: 13092: 13087: 13082: 13077: 13076: 13075: 13070: 13065: 13064: 13063: 13053: 13048: 13038: 13033: 13028: 13023: 13018: 13013: 13008: 13003: 12998: 12993: 12987: 12985: 12981: 12980: 12977: 12976: 12974: 12973: 12968: 12963: 12958: 12953: 12948: 12943: 12938: 12937: 12936: 12931: 12926: 12916: 12915: 12914: 12909: 12898: 12896: 12892: 12891: 12889: 12888: 12883: 12878: 12873: 12868: 12863: 12857: 12855: 12846: 12842: 12841: 12838: 12837: 12835: 12834: 12833: 12832: 12825:Overpopulation 12822: 12816: 12814: 12808: 12807: 12805: 12804: 12802:Water scarcity 12799: 12794: 12789: 12788: 12787: 12777: 12775:Sea level rise 12772: 12767: 12762: 12757: 12752: 12747: 12742: 12741: 12740: 12738:on marine life 12735: 12725: 12720: 12715: 12710: 12705: 12700: 12695: 12693:Global warming 12690: 12685: 12683:Global dimming 12680: 12675: 12674: 12673: 12663: 12658: 12653: 12648: 12643: 12641:Cascade effect 12638: 12637: 12636: 12626: 12620: 12618: 12616:Climate change 12609: 12603: 12602: 12600: 12599: 12594: 12589: 12588: 12587: 12582: 12577: 12567: 12562: 12557: 12552: 12551: 12550: 12545: 12535: 12530: 12524: 12522: 12518: 12517: 12515: 12514: 12509: 12508: 12507: 12502: 12497: 12483: 12482: 12481: 12476: 12466: 12460: 12459: 12458: 12453: 12448: 12446:Doomsday Clock 12443: 12438: 12428: 12427: 12426: 12416: 12411: 12406: 12405: 12404: 12399: 12397:Cyberterrorism 12394: 12384: 12378: 12376: 12372: 12371: 12369: 12368: 12367: 12366: 12356: 12350: 12347: 12346: 12339: 12338: 12331: 12324: 12316: 12307: 12306: 12304: 12303: 12301:Site isolation 12298: 12293: 12292: 12291: 12285: 12275: 12274: 12273: 12268: 12257: 12252: 12247: 12242: 12237: 12232: 12231: 12230: 12225: 12215: 12214: 12213: 12208: 12207: 12206: 12199:Authentication 12191: 12190: 12189: 12188: 12187: 12177: 12174: 12163: 12161: 12157: 12156: 12154: 12153: 12148: 12143: 12138: 12133: 12128: 12123: 12118: 12113: 12108: 12103: 12098: 12093: 12088: 12083: 12078: 12073: 12068: 12063: 12058: 12053: 12052: 12051: 12041: 12036: 12031: 12026: 12021: 12016: 12011: 12006: 12001: 11999:Email spoofing 11996: 11991: 11986: 11981: 11976: 11971: 11966: 11961: 11956: 11951: 11946: 11941: 11939:DOM clobbering 11936: 11931: 11926: 11921: 11919:Code injection 11916: 11911: 11910: 11909: 11904: 11899: 11894: 11886: 11881: 11876: 11871: 11865: 11863: 11857: 11856: 11846: 11844: 11842: 11841: 11836: 11831: 11826: 11821: 11816: 11811: 11806: 11801: 11799:Cyberterrorism 11796: 11791: 11790: 11789: 11787:Computer fraud 11784: 11774: 11769: 11763: 11761: 11757: 11756: 11749: 11748: 11741: 11734: 11726: 11720: 11719: 11708: 11694: 11693:External links 11691: 11690: 11689: 11680: 11651: 11645: 11630: 11597: 11592:978-0544251793 11591: 11578: 11565:Andy Greenberg 11561: 11540: 11538:978-3442157105 11526: 11519: 11513: 11500: 11494: 11479: 11477:978-0692911563 11465: 11451: 11437: 11434:978-0071772495 11414: 11396: 11395: 11390: 11384: 11383: 11372: 11371: 11369: 11366: 11363: 11362: 11336: 11310: 11297: 11271: 11245: 11226: 11211: 11194: 11171: 11159: 11134: 11104: 11069: 11052: 11041: 11024: 11005: 10993: 10977: 10965: 10953: 10942:. 19 July 2022 10927: 10913: 10893: 10886: 10860: 10839: 10825: 10805: 10791: 10768: 10754: 10736: 10717: 10706:. 7 March 2017 10689: 10661: 10633: 10605: 10563: 10520: 10494: 10468: 10449: 10436: 10410: 10391: 10378: 10365: 10363:, 1 June 2012. 10349: 10330: 10299: 10282: 10266: 10240: 10228: 10205: 10193: 10186: 10168: 10134: 10117: 10099: 10083: 10071: 10038: 10013: 9991: 9973: 9970:. 25 May 2018. 9955: 9937: 9909: 9883: 9861: 9833: 9807: 9796: 9774: 9749: 9724: 9683: 9655: 9633: 9614: 9590: 9573: 9547: 9535: 9516: 9497: 9484: 9471:(3): 672–687. 9451: 9429: 9411: 9397: 9381: 9363: 9337: 9312: 9305: 9287: 9271: 9257: 9234: 9209: 9195: 9181: 9155: 9141: 9119: 9088: 9086:, pages 15–16. 9070:Andrew Meier, 9063: 9037: 9018: 9004: 8983: 8980:. 14 May 2013. 8969: 8950: 8927: 8909: 8891: 8872: 8867:France Culture 8854: 8828: 8798: 8785: 8772: 8753: 8737: 8711: 8691: 8678: 8665: 8660:Foreign Policy 8647: 8627: 8604: 8578: 8553: 8521: 8497: 8484: 8463: 8437: 8415: 8396: 8384: 8368: 8336: 8309:(2): 183–206. 8289: 8263: 8233: 8222: 8196: 8165: 8140: 8114: 8088: 8062: 8028: 8003: 7977: 7951: 7932: 7918: 7892: 7867: 7841: 7836:Foreign Policy 7822: 7792: 7759: 7736: 7710: 7684: 7650: 7616: 7591: 7565: 7540: 7512: 7500:SearchSecurity 7487: 7461: 7435: 7410: 7398: 7376: 7351: 7340:(1): 111–128. 7324: 7311: 7281: 7263: 7248: 7230: 7210: 7186: 7163: 7144: 7125: 7106: 7087: 7062: 7053:|journal= 7026: 6996: 6958:Arquilla, John 6949: 6942: 6920: 6911: 6885: 6859: 6834: 6808: 6753: 6726: 6687: 6669: 6646: 6627: 6600:(2): 211–227. 6580: 6568: 6566:. 9 April 2009 6556: 6544: 6527: 6508: 6495: 6482: 6442: 6412: 6367:(5): 284–291. 6347: 6340: 6322: 6306: 6287: 6258: 6232: 6206: 6180: 6177:978-0071772495 6152: 6126: 6115:on 21 May 2014 6089: 6061: 6037:"Cyberwarfare" 6028: 6009: 5993: 5974: 5948: 5923: 5898: 5887:. 1 April 2015 5872: 5836: 5825:. 23 June 2019 5808: 5801: 5781: 5756: 5736: 5729: 5709: 5698:. 28 June 2013 5683: 5642: 5640:, 4 March 2010 5621: 5602: 5572: 5555: 5508: 5489:(3): 203–212. 5469: 5458:on 6 June 2015 5438: 5411: 5396: 5375: 5334: 5308: 5274: 5241: 5215: 5189: 5164: 5151:securelist.com 5138: 5113: 5092: 5074: 5035: 5024:. 13 June 2019 5009: 4980: 4961: 4960: 4958: 4955: 4953: 4952: 4947: 4942: 4937: 4932: 4927: 4922: 4917: 4912: 4907: 4906: 4905: 4900: 4895: 4890: 4880: 4878:Silent Horizon 4875: 4870: 4865: 4860: 4855: 4850: 4845: 4840: 4835: 4830: 4825: 4820: 4815: 4813:Cyberterrorism 4810: 4805: 4800: 4795: 4790: 4785: 4780: 4775: 4769: 4767: 4764: 4763: 4762: 4753: 4739: 4736: 4735: 4734: 4726: 4718: 4712: 4706: 4693: 4692: 4688: 4687: 4679: 4673: 4665: 4657: 4649: 4633: 4630: 4628: 4625: 4612:RSA Conference 4589:Vladimir Putin 4539:Tallinn Manual 4531: 4528: 4513: 4510: 4502: 4501: 4497: 4474: 4459: 4455: 4442: 4439: 4416: 4413: 4370: 4367: 4324:New York Times 4273:Microsoft Edge 4214:Foreign Policy 4096:, U.S. Deputy 4080:, in his book 4047:Main article: 4044: 4041: 4039: 4036: 4002: 3999: 3989:lawsuit named 3985: 3982: 3907:Al-Saud regime 3890: 3887: 3851: 3848: 3807:in the field. 3805:military power 3770:Main article: 3767: 3764: 3762: 3759: 3718: 3717:United Kingdom 3715: 3686:Ukrainian army 3649: 3646: 3633: 3630: 3625:Meet The Press 3535:Main article: 3532: 3529: 3521: 3518: 3487: 3484: 3471:Edward Snowden 3447: 3444: 3421: 3418: 3405: 3402: 3381:European Union 3372: 3369: 3367: 3364: 3347: 3344: 3342: 3339: 3327: 3324: 3284:United Kingdom 3280:European Union 3260:Main article: 3257: 3254: 3248: 3245: 3144: 3141: 3034:Foreign Policy 3016:Main article: 3013: 3010: 3008: 3005: 2997:Main article: 2994: 2991: 2983:European Union 2961:, part of the 2946: 2943: 2930: 2927: 2903: 2902:Private sector 2900: 2896:European Union 2892:United Nations 2882: 2879: 2865: 2862: 2841: 2838: 2791:National Guard 2751: 2748: 2733:Sandro Gaycken 2728: 2725: 2712: 2709: 2684: 2681: 2656: 2653: 2645:New York Times 2639:said that its 2635:In June 2019, 2620:Howard Schmidt 2589:only. Massive 2583:countermeasure 2557: 2554: 2529:Main article: 2526: 2523: 2494:Computers and 2491: 2488: 2484: 2483: 2480:European Union 2472: 2465: 2458: 2439: 2424: 2421:Edward Snowden 2378: 2375: 2345: 2342: 2323:Main article: 2320: 2317: 2300: 2297: 2283: 2280: 2268:WannaCry, 2017 2241:Howard Schmidt 2237:cyberterrorism 2224: 2221: 2166: 2163: 2128:United Kingdom 2079:is the use of 2072: 2071: 2069: 2068: 2061: 2054: 2046: 2043: 2042: 2039: 2038: 2033: 2028: 2023: 2018: 2013: 2008: 2006:Military terms 2003: 1998: 1992: 1987: 1986: 1983: 1982: 1979: 1978: 1973: 1968: 1963: 1958: 1953: 1947: 1944: 1943: 1940: 1939: 1936: 1935: 1930: 1925: 1920: 1915: 1910: 1905: 1900: 1895: 1890: 1885: 1879: 1874: 1873: 1870: 1869: 1866: 1865: 1860: 1859: 1858: 1853: 1843: 1838: 1833: 1828: 1823: 1818: 1813: 1808: 1803: 1798: 1793: 1787: 1782: 1781: 1778: 1777: 1774: 1773: 1768: 1767: 1766: 1764:Tripwire force 1756: 1751: 1746: 1741: 1734: 1729: 1724: 1719: 1714: 1709: 1703: 1698: 1697: 1694: 1693: 1690: 1689: 1684: 1679: 1674: 1669: 1664: 1659: 1654: 1649: 1644: 1639: 1634: 1629: 1624: 1619: 1613: 1608: 1607: 1604: 1603: 1600: 1599: 1598: 1597: 1587: 1582: 1576: 1571: 1570: 1567: 1566: 1563: 1562: 1561: 1560: 1555: 1550: 1540: 1535: 1534: 1533: 1528: 1518: 1513: 1507: 1502: 1501: 1498: 1497: 1494: 1493: 1484: 1479: 1478: 1477: 1467: 1462: 1457: 1452: 1447: 1442: 1437: 1432: 1427: 1422: 1417: 1416: 1415: 1404: 1399: 1398: 1395: 1394: 1391: 1390: 1385: 1380: 1375: 1370: 1365: 1360: 1355: 1350: 1345: 1340: 1334: 1329: 1328: 1325: 1324: 1321: 1320: 1315: 1310: 1305: 1300: 1295: 1289: 1286:Administrative 1284: 1283: 1280: 1279: 1276: 1275: 1270: 1265: 1260: 1255: 1250: 1245: 1240: 1235: 1230: 1225: 1220: 1215: 1213:New generation 1210: 1205: 1200: 1195: 1190: 1188:Fleet in being 1185: 1180: 1175: 1170: 1165: 1160: 1155: 1150: 1145: 1140: 1135: 1129: 1126:Grand strategy 1124: 1123: 1120: 1119: 1116: 1115: 1113:Scorched earth 1110: 1105: 1100: 1095: 1090: 1085: 1080: 1075: 1070: 1065: 1060: 1055: 1050: 1045: 1040: 1035: 1030: 1021: 1016: 1015: 1012: 1011: 1008: 1007: 1002: 997: 992: 987: 985:Deep operation 982: 977: 970: 965: 959: 954: 953: 950: 949: 946: 945: 940: 935: 930: 925: 920: 915: 914: 913: 903: 898: 893: 888: 883: 878: 873: 868: 863: 858: 853: 848: 843: 838: 833: 832: 831: 826: 821: 811: 802: 797: 796: 793: 792: 789: 788: 786:Unconventional 783: 778: 773: 768: 763: 758: 753: 748: 743: 734: 732:Disinformation 729: 724: 719: 714: 709: 704: 703: 702: 697: 687: 682: 677: 672: 667: 662: 656: 651: 650: 647: 646: 643: 642: 637: 630: 629: 628: 627: 626: 625: 615: 610: 605: 600: 595: 583: 582: 581: 580: 579: 578: 568: 563: 558: 553: 548: 543: 531: 530: 529: 528: 523: 518: 509: 504: 503: 500: 499: 496: 495: 490: 485: 483:Basic training 480: 473: 472: 467: 462: 457: 450: 449: 444: 439: 434: 429: 424: 419: 412: 411: 409:Reconnaissance 406: 401: 396: 391: 386: 381: 374: 373: 368: 363: 358: 353: 348: 343: 336: 335: 330: 328:Special forces 325: 320: 319: 318: 308: 303: 296: 295: 290: 285: 283:Reconnaissance 280: 275: 270: 265: 258: 257: 248: 243: 234: 229: 224: 219: 214: 209: 204: 199: 194: 189: 183: 178: 177: 174: 173: 170: 169: 168: 167: 162: 152: 151: 150: 145: 135: 134: 133: 126:Post-classical 123: 118: 112: 107: 106: 103: 102: 94: 93: 75: 74: 26: 9: 6: 4: 3: 2: 13976: 13965: 13962: 13960: 13957: 13955: 13952: 13950: 13947: 13945: 13942: 13940: 13937: 13935: 13932: 13930: 13927: 13925: 13922: 13920: 13917: 13915: 13912: 13910: 13907: 13905: 13902: 13900: 13897: 13895: 13892: 13890: 13887: 13885: 13882: 13881: 13879: 13864: 13861: 13859: 13858:United States 13856: 13854: 13851: 13849: 13846: 13844: 13841: 13840: 13837: 13828: 13823: 13821: 13816: 13814: 13809: 13808: 13805: 13791: 13788: 13786: 13785:Risk analysis 13783: 13781: 13778: 13776: 13773: 13771: 13768: 13767: 13760: 13758: 13757: 13752: 13746: 13745: 13742: 13736: 13733: 13731: 13730:Social crisis 13728: 13726: 13723: 13721: 13718: 13716: 13713: 13711: 13708: 13706: 13703: 13701: 13698: 13696: 13693: 13691: 13688: 13686: 13683: 13682: 13680: 13676: 13670: 13667: 13665: 13662: 13660: 13657: 13655: 13652: 13651: 13649: 13647:Organizations 13645: 13637: 13634: 13633: 13632: 13629: 13627: 13624: 13620: 13617: 13616: 13615: 13612: 13610: 13607: 13603: 13600: 13598: 13595: 13594: 13593: 13590: 13588: 13585: 13584: 13582: 13578: 13572: 13571:World to come 13569: 13567: 13564: 13560: 13557: 13555: 13552: 13551: 13550: 13547: 13545: 13542: 13540: 13537: 13533: 13530: 13528: 13525: 13523: 13520: 13519: 13518: 13517:Millennialism 13515: 13513: 13510: 13506: 13505:Messianic Age 13503: 13502: 13501: 13498: 13496: 13493: 13491: 13490:Gog and Magog 13488: 13486: 13483: 13481: 13480:Earth Changes 13478: 13476: 13473: 13471: 13468: 13466: 13463: 13461: 13458: 13456: 13453: 13451: 13448: 13446: 13443: 13442: 13440: 13436: 13428: 13425: 13424: 13423: 13420: 13418: 13415: 13409: 13406: 13404: 13401: 13399: 13396: 13395: 13394: 13391: 13387: 13384: 13382: 13379: 13377: 13374: 13372: 13369: 13367: 13364: 13362: 13359: 13357: 13354: 13352: 13349: 13348: 13347: 13344: 13340: 13337: 13335: 13332: 13328: 13325: 13324: 13323: 13320: 13318: 13317:New Jerusalem 13315: 13313: 13310: 13308: 13305: 13299: 13296: 13294: 13293:War in Heaven 13291: 13289: 13288:Two witnesses 13286: 13284: 13281: 13279: 13276: 13274: 13271: 13269: 13266: 13264: 13261: 13259: 13256: 13255: 13254: 13251: 13250: 13249: 13246: 13244: 13241: 13237: 13234: 13232: 13229: 13228: 13227: 13224: 13222: 13219: 13217: 13214: 13212: 13209: 13205: 13202: 13201: 13200: 13197: 13195: 13192: 13191: 13190: 13187: 13185: 13182: 13178: 13175: 13173: 13170: 13169: 13168: 13165: 13163: 13160: 13159: 13158: 13157:Second Coming 13155: 13153: 13150: 13146: 13143: 13141: 13138: 13137: 13136: 13133: 13129: 13126: 13124: 13121: 13120: 13119: 13116: 13115: 13113: 13111: 13107: 13101: 13098: 13096: 13093: 13091: 13088: 13086: 13083: 13081: 13078: 13074: 13071: 13069: 13066: 13062: 13059: 13058: 13057: 13054: 13052: 13049: 13047: 13044: 13043: 13042: 13039: 13037: 13034: 13032: 13029: 13027: 13024: 13022: 13019: 13017: 13014: 13012: 13009: 13007: 13004: 13002: 12999: 12997: 12994: 12992: 12989: 12988: 12986: 12982: 12972: 12969: 12967: 12964: 12962: 12959: 12957: 12954: 12952: 12949: 12947: 12944: 12942: 12939: 12935: 12932: 12930: 12927: 12925: 12922: 12921: 12920: 12917: 12913: 12910: 12908: 12905: 12904: 12903: 12900: 12899: 12897: 12893: 12887: 12884: 12882: 12879: 12877: 12874: 12872: 12869: 12867: 12864: 12862: 12859: 12858: 12856: 12854: 12850: 12847: 12843: 12831: 12828: 12827: 12826: 12823: 12821: 12818: 12817: 12815: 12813: 12809: 12803: 12800: 12798: 12795: 12793: 12790: 12786: 12783: 12782: 12781: 12778: 12776: 12773: 12771: 12768: 12766: 12763: 12761: 12758: 12756: 12753: 12751: 12748: 12746: 12743: 12739: 12736: 12734: 12731: 12730: 12729: 12726: 12724: 12721: 12719: 12716: 12714: 12711: 12709: 12706: 12704: 12701: 12699: 12696: 12694: 12691: 12689: 12686: 12684: 12681: 12679: 12676: 12672: 12669: 12668: 12667: 12664: 12662: 12659: 12657: 12656:Deforestation 12654: 12652: 12649: 12647: 12644: 12642: 12639: 12635: 12632: 12631: 12630: 12627: 12625: 12622: 12621: 12619: 12617: 12613: 12610: 12608: 12604: 12598: 12597:World War III 12595: 12593: 12590: 12586: 12583: 12581: 12578: 12576: 12573: 12572: 12571: 12568: 12566: 12563: 12561: 12558: 12556: 12553: 12549: 12546: 12544: 12541: 12540: 12539: 12536: 12534: 12531: 12529: 12526: 12525: 12523: 12519: 12513: 12512:Transhumanism 12510: 12506: 12503: 12501: 12498: 12496: 12493: 12492: 12491: 12487: 12484: 12480: 12477: 12475: 12472: 12471: 12470: 12467: 12464: 12461: 12457: 12454: 12452: 12449: 12447: 12444: 12442: 12439: 12437: 12434: 12433: 12432: 12429: 12425: 12422: 12421: 12420: 12417: 12415: 12412: 12410: 12407: 12403: 12400: 12398: 12395: 12393: 12390: 12389: 12388: 12385: 12383: 12380: 12379: 12377: 12375:Technological 12373: 12365: 12362: 12361: 12360: 12357: 12355: 12352: 12351: 12348: 12344: 12337: 12332: 12330: 12325: 12323: 12318: 12317: 12314: 12302: 12299: 12297: 12294: 12289: 12286: 12284: 12281: 12280: 12279: 12276: 12272: 12269: 12266: 12263: 12262: 12261: 12258: 12256: 12253: 12251: 12248: 12246: 12243: 12241: 12238: 12236: 12233: 12229: 12226: 12224: 12221: 12220: 12219: 12216: 12212: 12211:Authorization 12209: 12205: 12202: 12201: 12200: 12197: 12196: 12195: 12192: 12186: 12183: 12182: 12181: 12178: 12175: 12173: 12172:Secure coding 12170: 12169: 12168: 12165: 12164: 12162: 12158: 12152: 12149: 12147: 12144: 12142: 12141:SQL injection 12139: 12137: 12134: 12132: 12129: 12127: 12124: 12122: 12121:Vulnerability 12119: 12117: 12114: 12112: 12109: 12107: 12106:Trojan horses 12104: 12102: 12101:Software bugs 12099: 12097: 12094: 12092: 12089: 12087: 12084: 12082: 12079: 12077: 12074: 12072: 12069: 12067: 12064: 12062: 12059: 12057: 12054: 12050: 12047: 12046: 12045: 12042: 12040: 12037: 12035: 12032: 12030: 12027: 12025: 12022: 12020: 12017: 12015: 12012: 12010: 12007: 12005: 12002: 12000: 11997: 11995: 11992: 11990: 11989:Eavesdropping 11987: 11985: 11982: 11980: 11979:Data scraping 11977: 11975: 11972: 11970: 11967: 11965: 11962: 11960: 11957: 11955: 11952: 11950: 11949:Cryptojacking 11947: 11945: 11942: 11940: 11937: 11935: 11932: 11930: 11927: 11925: 11922: 11920: 11917: 11915: 11912: 11908: 11905: 11903: 11900: 11898: 11895: 11893: 11890: 11889: 11887: 11885: 11882: 11880: 11877: 11875: 11872: 11870: 11867: 11866: 11864: 11862: 11858: 11850: 11840: 11837: 11835: 11832: 11830: 11827: 11825: 11822: 11820: 11817: 11815: 11812: 11810: 11807: 11805: 11802: 11800: 11797: 11795: 11792: 11788: 11785: 11783: 11780: 11779: 11778: 11775: 11773: 11770: 11768: 11765: 11764: 11762: 11758: 11754: 11747: 11742: 11740: 11735: 11733: 11728: 11727: 11724: 11717: 11713: 11709: 11706: 11701: 11697: 11696: 11687: 11686: 11681: 11677: 11673: 11669: 11665: 11661: 11657: 11652: 11648: 11642: 11638: 11637: 11631: 11627: 11623: 11619: 11615: 11611: 11607: 11603: 11598: 11594: 11588: 11584: 11579: 11576: 11575: 11570: 11566: 11562: 11559: 11555: 11551: 11550: 11545: 11541: 11539: 11535: 11531: 11527: 11524: 11520: 11516: 11514:9781409427544 11510: 11506: 11501: 11497: 11491: 11487: 11486: 11480: 11478: 11474: 11470: 11466: 11464: 11460: 11456: 11452: 11450: 11449:0-19-538501-2 11446: 11442: 11438: 11435: 11431: 11427: 11423: 11419: 11415: 11413: 11412:1-59749-637-5 11409: 11406:. Syngress. 11405: 11401: 11400: 11394: 11391: 11389: 11386: 11385: 11380: 11375: 11350: 11346: 11340: 11325: 11321: 11314: 11307: 11301: 11286: 11282: 11275: 11259: 11255: 11249: 11242: 11238: 11235: 11230: 11223: 11222: 11215: 11208: 11204: 11198: 11182: 11175: 11168: 11163: 11148: 11144: 11138: 11122: 11118: 11114: 11108: 11100: 11096: 11092: 11088: 11084: 11080: 11073: 11066: 11062: 11056: 11050: 11045: 11038: 11037:Boston Herald 11034: 11028: 11021: 11017: 11014: 11009: 11002: 10997: 10990: 10986: 10981: 10974: 10969: 10962: 10957: 10941: 10937: 10931: 10916: 10914:9780745649740 10910: 10906: 10905: 10897: 10889: 10883: 10879: 10875: 10871: 10864: 10855: 10850: 10843: 10828: 10826:9781139446969 10822: 10818: 10817: 10809: 10794: 10792:9789813108981 10788: 10784: 10783: 10775: 10773: 10764: 10758: 10750: 10743: 10741: 10733: 10732: 10727: 10721: 10705: 10704: 10699: 10693: 10678: 10677: 10672: 10665: 10650: 10649: 10644: 10637: 10622: 10621: 10616: 10609: 10601: 10597: 10593: 10589: 10585: 10581: 10574: 10567: 10558: 10553: 10548: 10543: 10539: 10535: 10531: 10524: 10508: 10504: 10498: 10482: 10478: 10472: 10464: 10460: 10453: 10446: 10440: 10425: 10421: 10414: 10407: 10406: 10405:Computerworld 10401: 10395: 10388: 10382: 10375: 10369: 10362: 10359: 10353: 10345: 10341: 10334: 10318: 10314: 10310: 10303: 10296: 10292: 10286: 10279: 10275: 10270: 10254: 10250: 10244: 10237: 10232: 10225: 10221: 10220:archive.today 10217: 10214: 10209: 10202: 10197: 10189: 10187:9781612347639 10183: 10179: 10172: 10157: 10153: 10149: 10145: 10138: 10131: 10127: 10121: 10115:, 1 July 2010 10114: 10111: 10106: 10104: 10097:. 31 May 2011 10096: 10092: 10087: 10080: 10075: 10058: 10053: 10049: 10042: 10027: 10023: 10017: 10001: 9995: 9987: 9983: 9977: 9969: 9965: 9959: 9951: 9947: 9941: 9925: 9924: 9919: 9913: 9897: 9893: 9887: 9871: 9865: 9849: 9848: 9843: 9837: 9821: 9817: 9811: 9800: 9784: 9778: 9762: 9756: 9754: 9738: 9735: 9728: 9721: 9717: 9713: 9697: 9690: 9688: 9671: 9670: 9665: 9659: 9643: 9637: 9629: 9625: 9618: 9611: 9607: 9603: 9600: 9594: 9587: 9583: 9577: 9561: 9557: 9551: 9544: 9539: 9531: 9530:thehackernews 9527: 9520: 9513: 9509: 9506: 9501: 9494: 9488: 9479: 9474: 9470: 9466: 9462: 9455: 9439: 9433: 9425: 9421: 9415: 9407: 9401: 9394: 9390: 9385: 9377: 9373: 9367: 9351: 9347: 9341: 9326: 9322: 9316: 9308: 9306:9781612347639 9302: 9298: 9291: 9284: 9280: 9275: 9267: 9261: 9254: 9250: 9246: 9243: 9238: 9230: 9226: 9225: 9220: 9213: 9205: 9199: 9191: 9185: 9169: 9165: 9159: 9151: 9145: 9129: 9123: 9107: 9103: 9099: 9092: 9085: 9084:0-393-05178-1 9081: 9077: 9073: 9067: 9051: 9047: 9041: 9034: 9030: 9027: 9022: 9014: 9008: 8993: 8987: 8979: 8973: 8966: 8962: 8959: 8954: 8947: 8943: 8939: 8936: 8931: 8923: 8919: 8913: 8905: 8901: 8895: 8887: 8883: 8876: 8868: 8864: 8858: 8842: 8838: 8832: 8816: 8812: 8808: 8802: 8795: 8789: 8782: 8776: 8770:, 17 May 2007 8769: 8768: 8763: 8760:Ian Traynor, 8757: 8750: 8746: 8741: 8726:. 1 July 2010 8725: 8724:The Economist 8721: 8715: 8708: 8704: 8701: 8695: 8688: 8682: 8675: 8669: 8661: 8657: 8651: 8643: 8642: 8637: 8631: 8615: 8608: 8593: 8589: 8582: 8563: 8557: 8541: 8537: 8536: 8531: 8525: 8518: 8514: 8510: 8507: 8501: 8494: 8488: 8480: 8473: 8472:"White paper" 8467: 8452: 8448: 8441: 8425: 8419: 8411: 8407: 8400: 8393: 8388: 8381: 8377: 8372: 8356: 8352: 8351: 8346: 8340: 8332: 8328: 8324: 8320: 8316: 8312: 8308: 8304: 8300: 8293: 8277: 8273: 8267: 8252: 8251:BusinessToday 8248: 8242: 8240: 8238: 8231: 8226: 8210: 8206: 8200: 8184: 8180: 8176: 8169: 8154: 8150: 8144: 8129: 8125: 8118: 8102: 8098: 8092: 8076: 8072: 8066: 8051: 8047: 8043: 8039: 8032: 8017: 8013: 8007: 7992: 7988: 7981: 7966: 7962: 7955: 7947: 7943: 7936: 7928: 7922: 7907: 7903: 7896: 7881: 7877: 7871: 7855: 7851: 7845: 7838: 7837: 7832: 7826: 7810: 7806: 7802: 7796: 7780: 7776: 7772: 7766: 7764: 7756: 7755:Network World 7752: 7748: 7745: 7740: 7724: 7720: 7714: 7699: 7695: 7688: 7673: 7669: 7665: 7661: 7654: 7639: 7635: 7631: 7627: 7620: 7605: 7601: 7595: 7580: 7576: 7569: 7554: 7550: 7544: 7529: 7525: 7519: 7517: 7501: 7497: 7491: 7476:. 26 May 2021 7475: 7471: 7465: 7450: 7446: 7439: 7424: 7420: 7414: 7407: 7402: 7386: 7380: 7364: 7361: 7355: 7347: 7343: 7339: 7335: 7328: 7321: 7315: 7307: 7303: 7300:: 1377–1440. 7299: 7295: 7288: 7286: 7277: 7273: 7267: 7259: 7252: 7244: 7240: 7234: 7227: 7223: 7220: 7214: 7207: 7203: 7199: 7196: 7190: 7183: 7182:Computerworld 7179: 7175: 7172: 7167: 7159: 7155: 7148: 7140: 7136: 7129: 7122: 7118: 7115: 7110: 7103: 7099: 7094: 7092: 7076: 7072: 7066: 7058: 7045: 7037: 7030: 7022: 7018: 7011: 7007: 7000: 6993: 6992: 6987: 6973: 6969: 6968: 6963: 6959: 6953: 6945: 6939: 6935: 6931: 6924: 6915: 6900: 6896: 6889: 6874: 6870: 6863: 6848: 6844: 6838: 6822: 6818: 6812: 6804: 6800: 6796: 6792: 6788: 6784: 6780: 6776: 6772: 6768: 6767:Public Choice 6764: 6757: 6741: 6737: 6730: 6722: 6718: 6714: 6710: 6706: 6702: 6698: 6691: 6683: 6679: 6673: 6665: 6664: 6659: 6653: 6651: 6642: 6638: 6631: 6623: 6619: 6615: 6611: 6607: 6603: 6599: 6595: 6591: 6584: 6577: 6572: 6565: 6560: 6553: 6548: 6541: 6537: 6531: 6524: 6520: 6517: 6512: 6505: 6499: 6492: 6486: 6478: 6472: 6457: 6453: 6446: 6430: 6426: 6422: 6416: 6408: 6404: 6399: 6394: 6390: 6386: 6382: 6378: 6374: 6370: 6366: 6362: 6358: 6351: 6343: 6337: 6333: 6326: 6319: 6315: 6310: 6303: 6299: 6296: 6291: 6283: 6277: 6269: 6262: 6247: 6243: 6236: 6221: 6217: 6210: 6195: 6191: 6184: 6178: 6174: 6170: 6166: 6162: 6156: 6141: 6137: 6130: 6114: 6110: 6106: 6105: 6104:The Intercept 6100: 6093: 6078: 6077: 6072: 6065: 6050: 6046: 6042: 6038: 6032: 6025: 6021: 6018: 6013: 6007:, 4 June 2013 6006: 6002: 5997: 5989: 5985: 5978: 5963: 5959: 5952: 5937: 5933: 5927: 5912: 5908: 5902: 5886: 5882: 5876: 5861: 5857: 5853: 5852: 5847: 5840: 5824: 5823: 5818: 5812: 5804: 5802:9780300246681 5798: 5794: 5793: 5785: 5774: 5767: 5760: 5752: 5751: 5750:The Economist 5746: 5740: 5732: 5730:9780300220230 5726: 5722: 5721: 5713: 5697: 5693: 5687: 5679: 5675: 5671: 5667: 5663: 5659: 5658: 5653: 5646: 5639: 5638: 5633: 5628: 5626: 5619:, 6 June 2012 5618: 5614: 5609: 5607: 5590: 5586: 5582: 5576: 5568: 5567: 5559: 5551: 5547: 5543: 5539: 5535: 5531: 5527: 5523: 5519: 5512: 5504: 5500: 5496: 5492: 5488: 5484: 5480: 5473: 5457: 5453: 5449: 5442: 5436: 5435:9780061962233 5432: 5428: 5422: 5420: 5418: 5416: 5407: 5403: 5399: 5397:9780124079267 5393: 5389: 5382: 5380: 5364: 5360: 5356: 5352: 5348: 5341: 5339: 5323: 5319: 5312: 5297: 5293: 5289: 5285: 5278: 5270: 5266: 5260: 5252: 5248: 5244: 5242:9780415787079 5238: 5234: 5228: 5226: 5224: 5222: 5220: 5203: 5199: 5193: 5178: 5174: 5168: 5152: 5148: 5142: 5127: 5123: 5117: 5109: 5103: 5095: 5093:9780190276522 5089: 5085: 5078: 5070: 5066: 5062: 5058: 5054: 5050: 5046: 5039: 5023: 5019: 5013: 5005: 4999: 4991: 4987: 4983: 4981:9780199918096 4977: 4973: 4966: 4962: 4951: 4948: 4946: 4943: 4941: 4938: 4936: 4933: 4931: 4928: 4926: 4923: 4921: 4918: 4916: 4913: 4911: 4908: 4904: 4901: 4899: 4896: 4894: 4891: 4889: 4886: 4885: 4884: 4881: 4879: 4876: 4874: 4871: 4869: 4866: 4864: 4861: 4859: 4856: 4854: 4851: 4849: 4846: 4844: 4841: 4839: 4836: 4834: 4831: 4829: 4826: 4824: 4821: 4819: 4816: 4814: 4811: 4809: 4806: 4804: 4801: 4799: 4796: 4794: 4791: 4789: 4786: 4784: 4781: 4779: 4776: 4774: 4771: 4770: 4760: 4759: 4754: 4752: 4751: 4746: 4742: 4741: 4738:In television 4732: 4731: 4727: 4724: 4723: 4719: 4716: 4713: 4710: 4707: 4704: 4701: 4700: 4698: 4691:Documentaries 4690: 4689: 4685: 4684: 4680: 4677: 4674: 4671: 4670: 4666: 4663: 4662: 4658: 4655: 4654: 4650: 4647: 4646: 4642: 4641: 4639: 4624: 4621: 4616: 4613: 4608: 4606: 4601: 4599: 4594: 4590: 4586: 4582: 4578: 4573: 4571: 4567: 4562: 4560: 4556: 4552: 4551:cyber warfare 4548: 4544: 4543:jus ad bellum 4540: 4535: 4527: 4525: 4521: 4520: 4509: 4507: 4498: 4495: 4491: 4487: 4484:(CCD CoE) in 4483: 4479: 4475: 4472: 4468: 4464: 4460: 4456: 4453: 4449: 4448: 4447: 4438: 4435: 4433: 4428: 4422: 4412: 4410: 4406: 4405:Nation states 4402: 4398: 4392: 4388: 4387:Lazarus Group 4384: 4380: 4376: 4366: 4363: 4362:Kaspersky Lab 4359: 4355: 4351: 4347: 4342: 4340: 4339:Belfer Center 4335: 4333: 4329: 4325: 4320: 4318: 4314: 4310: 4306: 4302: 4298: 4294: 4290: 4286: 4282: 4278: 4274: 4270: 4269:Google Chrome 4266: 4262: 4258: 4254: 4250: 4245: 4241: 4239: 4233: 4231: 4227: 4222: 4220: 4216: 4215: 4209: 4206: 4204: 4201:In June 2012 4199: 4195: 4193: 4189: 4185: 4181: 4176: 4174: 4168: 4166: 4165: 4160: 4159:Thomas Carper 4156: 4155:Susan Collins 4152: 4151:Joe Lieberman 4147: 4145: 4141: 4137: 4133: 4129: 4125: 4120: 4118: 4114: 4110: 4105: 4103: 4099: 4095: 4091: 4087: 4086:The Economist 4083: 4079: 4074: 4072: 4071: 4066: 4062: 4056: 4050: 4043:United States 4038:North America 4035: 4032: 4026: 4024: 4023:Project Raven 4020: 4016: 4012: 4011:Ahmed Mansoor 4008: 3998: 3996: 3992: 3981: 3979: 3973: 3965: 3961: 3957: 3955: 3951: 3950:cyber warfare 3947: 3943: 3939: 3929: 3925: 3923: 3922:Chris Kubecka 3914: 3910: 3908: 3904: 3900: 3896: 3886: 3883: 3879: 3874: 3872: 3867: 3865: 3861: 3857: 3847: 3845: 3840: 3838: 3832: 3829: 3825: 3821: 3812: 3808: 3806: 3802: 3797: 3793: 3789: 3785: 3779: 3773: 3758: 3756: 3750: 3748: 3744: 3739: 3737: 3733: 3729: 3724: 3714: 3712: 3707: 3705: 3701: 3696: 3694: 3689: 3687: 3683: 3678: 3674: 3673:D-30 Howitzer 3670: 3667: 3663: 3659: 3655: 3652:According to 3645: 3643: 3639: 3629: 3627: 3626: 3621: 3617: 3613: 3609: 3605: 3601: 3600:James Clapper 3597: 3593: 3588: 3586: 3582: 3578: 3574: 3570: 3566: 3562: 3558: 3554: 3553:cyber-warfare 3550: 3544: 3538: 3527: 3517: 3514: 3508: 3503: 3499: 3493: 3483: 3480: 3476: 3472: 3467: 3463: 3459: 3453: 3443: 3441: 3437: 3433: 3427: 3417: 3415: 3411: 3401: 3399: 3394: 3390: 3386: 3382: 3378: 3363: 3361: 3357: 3353: 3337: 3333: 3323: 3321: 3316: 3311: 3308: 3299: 3295: 3293: 3289: 3285: 3281: 3277: 3276:Chris Kubecka 3273: 3269: 3263: 3253: 3244: 3242: 3237: 3235: 3231: 3227: 3223: 3218: 3216: 3212: 3207: 3205: 3199: 3196: 3191: 3188: 3184: 3180: 3176: 3172: 3168: 3163: 3161: 3156: 3154: 3150: 3140: 3137: 3135: 3131: 3127: 3123: 3119: 3114: 3111: 3107: 3102: 3100: 3095: 3090: 3088: 3084: 3083:cyber attacks 3080: 3076: 3074: 3070: 3066: 3063: 3059: 3055: 3050: 3048: 3042: 3040: 3036: 3035: 3030: 3026: 3019: 3004: 3000: 2990: 2986: 2984: 2979: 2977: 2972: 2968: 2964: 2960: 2955: 2953: 2942: 2940: 2936: 2926: 2924: 2919: 2913: 2909: 2899: 2897: 2893: 2889: 2888:United States 2878: 2875: 2871: 2861: 2859: 2855: 2851: 2847: 2837: 2834: 2832: 2828: 2824: 2820: 2816: 2812: 2808: 2802: 2798: 2796: 2792: 2788: 2784: 2779: 2775: 2772: 2771:Cyber Command 2768: 2764: 2760: 2755: 2747: 2745: 2739: 2734: 2724: 2722: 2718: 2708: 2706: 2702: 2698: 2694: 2690: 2687:In 2017, the 2680: 2676: 2674: 2670: 2666: 2662: 2652: 2650: 2646: 2642: 2638: 2632: 2629: 2623: 2621: 2617: 2615: 2611: 2607: 2603: 2598: 2596: 2592: 2591:power outages 2588: 2584: 2580: 2575: 2571: 2567: 2563: 2550: 2545: 2541: 2538: 2532: 2522: 2520: 2516: 2514: 2509: 2504: 2501: 2497: 2487: 2481: 2477: 2473: 2470: 2466: 2463: 2459: 2456: 2452: 2448: 2444: 2440: 2437: 2433: 2429: 2428:Angela Merkel 2425: 2422: 2418: 2415: 2414: 2413: 2406: 2402: 2398: 2394: 2391: 2387: 2383: 2374: 2372: 2368: 2364: 2360: 2359:cyber weapons 2356: 2355:Kaspersky Lab 2353:, founder of 2352: 2340: 2336: 2332: 2326: 2316: 2314: 2310: 2306: 2296: 2294: 2290: 2279: 2277: 2271: 2269: 2265: 2261: 2260:Ukraine, 2015 2257: 2253: 2248: 2246: 2242: 2238: 2234: 2233:Kaspersky Lab 2231:, founder of 2230: 2220: 2218: 2213: 2209: 2204: 2200: 2195: 2193: 2189: 2182: 2178: 2175: 2173: 2162: 2160: 2156: 2151: 2149: 2145: 2141: 2137: 2133: 2129: 2125: 2124:United States 2120: 2116: 2114: 2110: 2106: 2102: 2098: 2094: 2090: 2086: 2082: 2081:cyber attacks 2078: 2067: 2062: 2060: 2055: 2053: 2048: 2047: 2045: 2044: 2037: 2034: 2032: 2029: 2027: 2024: 2022: 2019: 2017: 2014: 2012: 2009: 2007: 2004: 2002: 1999: 1997: 1994: 1993: 1990: 1985: 1984: 1977: 1974: 1972: 1969: 1967: 1964: 1962: 1959: 1957: 1954: 1952: 1949: 1948: 1942: 1941: 1934: 1931: 1929: 1926: 1924: 1921: 1919: 1916: 1914: 1911: 1909: 1906: 1904: 1901: 1899: 1896: 1894: 1893:Warrior caste 1891: 1889: 1886: 1884: 1881: 1880: 1877: 1872: 1871: 1864: 1863:Show of force 1861: 1857: 1854: 1852: 1851:Peacebuilding 1849: 1848: 1847: 1844: 1842: 1839: 1837: 1834: 1832: 1829: 1827: 1824: 1822: 1819: 1817: 1814: 1812: 1809: 1807: 1804: 1802: 1799: 1797: 1794: 1792: 1789: 1788: 1785: 1780: 1779: 1772: 1769: 1765: 1762: 1761: 1760: 1757: 1755: 1752: 1750: 1747: 1745: 1742: 1740: 1739: 1735: 1733: 1730: 1728: 1725: 1723: 1720: 1718: 1715: 1713: 1710: 1708: 1707:Air supremacy 1705: 1704: 1701: 1696: 1695: 1688: 1685: 1683: 1680: 1678: 1675: 1673: 1670: 1668: 1665: 1663: 1660: 1658: 1655: 1653: 1650: 1648: 1647:Islamic rules 1645: 1643: 1640: 1638: 1635: 1633: 1630: 1628: 1627:Court-martial 1625: 1623: 1620: 1618: 1615: 1614: 1611: 1606: 1605: 1596: 1593: 1592: 1591: 1588: 1586: 1583: 1581: 1578: 1577: 1574: 1569: 1568: 1559: 1556: 1554: 1551: 1549: 1546: 1545: 1544: 1541: 1539: 1536: 1532: 1529: 1527: 1526:Arms industry 1524: 1523: 1522: 1519: 1517: 1514: 1512: 1509: 1508: 1505: 1500: 1499: 1492: 1488: 1485: 1483: 1480: 1476: 1473: 1472: 1471: 1468: 1466: 1463: 1461: 1458: 1456: 1453: 1451: 1448: 1446: 1443: 1441: 1438: 1436: 1433: 1431: 1428: 1426: 1423: 1421: 1418: 1414: 1411: 1410: 1409: 1406: 1405: 1402: 1397: 1396: 1389: 1386: 1384: 1381: 1379: 1376: 1374: 1371: 1369: 1366: 1364: 1361: 1359: 1356: 1354: 1351: 1349: 1346: 1344: 1341: 1339: 1336: 1335: 1332: 1327: 1326: 1319: 1316: 1314: 1311: 1309: 1306: 1304: 1301: 1299: 1296: 1294: 1291: 1290: 1287: 1282: 1281: 1274: 1271: 1269: 1266: 1264: 1261: 1259: 1256: 1254: 1251: 1249: 1246: 1244: 1241: 1239: 1236: 1234: 1231: 1229: 1226: 1224: 1221: 1219: 1216: 1214: 1211: 1209: 1206: 1204: 1201: 1199: 1196: 1194: 1191: 1189: 1186: 1184: 1181: 1179: 1176: 1174: 1171: 1169: 1166: 1164: 1161: 1159: 1156: 1154: 1151: 1149: 1146: 1144: 1143:Broken-backed 1141: 1139: 1136: 1134: 1131: 1130: 1127: 1122: 1121: 1114: 1111: 1109: 1106: 1104: 1101: 1099: 1096: 1094: 1091: 1089: 1086: 1084: 1081: 1079: 1076: 1074: 1071: 1069: 1066: 1064: 1061: 1059: 1056: 1054: 1051: 1049: 1046: 1044: 1041: 1039: 1036: 1034: 1031: 1029: 1026: 1025: 1024: 1019: 1014: 1013: 1006: 1003: 1001: 998: 996: 993: 991: 988: 986: 983: 981: 980:Expeditionary 978: 976: 975: 971: 969: 966: 964: 961: 960: 957: 952: 951: 944: 941: 939: 936: 934: 931: 929: 926: 924: 921: 919: 916: 912: 909: 908: 907: 904: 902: 899: 897: 894: 892: 889: 887: 884: 882: 879: 877: 874: 872: 869: 867: 864: 862: 859: 857: 854: 852: 851:Counterattack 849: 847: 844: 842: 839: 837: 834: 830: 827: 825: 822: 820: 817: 816: 815: 812: 810: 807: 806: 805: 800: 795: 794: 787: 784: 782: 779: 777: 776:Psychological 774: 772: 769: 767: 764: 762: 759: 757: 754: 752: 749: 747: 744: 742: 738: 735: 733: 730: 728: 725: 723: 720: 718: 715: 713: 712:Combined arms 710: 708: 705: 701: 698: 696: 693: 692: 691: 688: 686: 683: 681: 678: 676: 673: 671: 668: 666: 663: 661: 658: 657: 654: 649: 648: 641: 638: 636: 633: 632: 624: 621: 620: 619: 616: 614: 611: 609: 606: 604: 601: 599: 596: 594: 591: 590: 589: 586: 585: 577: 574: 573: 572: 569: 567: 564: 562: 559: 557: 554: 552: 551:Fortification 549: 547: 544: 542: 539: 538: 537: 534: 533: 527: 524: 522: 519: 517: 514: 513: 511: 510: 507: 502: 501: 494: 491: 489: 486: 484: 481: 479: 476: 475: 471: 468: 466: 463: 461: 458: 456: 453: 452: 448: 445: 443: 440: 438: 435: 433: 430: 428: 425: 423: 420: 418: 415: 414: 410: 407: 405: 402: 400: 397: 395: 392: 390: 387: 385: 382: 380: 377: 376: 372: 369: 367: 366:Landing craft 364: 362: 359: 357: 354: 352: 349: 347: 344: 342: 339: 338: 334: 331: 329: 326: 324: 321: 317: 314: 313: 312: 309: 307: 304: 302: 299: 298: 294: 291: 289: 286: 284: 281: 279: 276: 274: 271: 269: 266: 264: 261: 260: 256: 252: 251:Standing army 249: 247: 244: 242: 238: 235: 233: 230: 228: 225: 223: 220: 218: 215: 213: 210: 208: 205: 203: 200: 198: 195: 193: 190: 188: 185: 184: 181: 176: 175: 166: 163: 161: 158: 157: 156: 153: 149: 146: 144: 143:pike and shot 141: 140: 139: 136: 132: 129: 128: 127: 124: 122: 119: 117: 114: 113: 110: 105: 104: 100: 96: 95: 89: 81: 77: 76: 72: 71: 65: 61: 57: 52: 48: 44: 40: 33: 19: 18:Cyber warfare 13884:Cyberwarfare 13747: 13690:Cyberwarfare 13689: 13408:Third Temple 13263:Lake of fire 13073:Rogue planet 13041:Impact event 13031:Proton decay 12984:Astronomical 12934:Bioterrorism 12780:Supervolcano 12678:Flood basalt 12624:Anoxic event 12533:Collapsology 12521:Sociological 12392:Cyberwarfare 12391: 12245:Data masking 11804:Cyberwarfare 11803: 11718:at Wikibooks 11705:Cyberwarfare 11683: 11659: 11655: 11635: 11609: 11605: 11582: 11572: 11568: 11548: 11543: 11529: 11504: 11484: 11468: 11457:. O'Reilly. 11454: 11440: 11403: 11379:Cyberwarfare 11378: 11353:. Retrieved 11349:the original 11339: 11327:. Retrieved 11313: 11300: 11288:. Retrieved 11284: 11274: 11262:. Retrieved 11257: 11248: 11229: 11220: 11214: 11206: 11197: 11187:23 September 11185:. Retrieved 11174: 11162: 11150:. Retrieved 11146: 11137: 11125:. Retrieved 11121:the original 11116: 11107: 11082: 11078: 11072: 11064: 11059:Reed, John. 11055: 11044: 11036: 11027: 11008: 10996: 10988: 10980: 10968: 10956: 10944:. Retrieved 10939: 10930: 10918:. Retrieved 10903: 10896: 10869: 10863: 10842: 10830:. Retrieved 10815: 10808: 10796:. Retrieved 10781: 10757: 10729: 10720: 10708:. Retrieved 10701: 10692: 10680:. Retrieved 10674: 10664: 10652:. Retrieved 10646: 10636: 10624:. Retrieved 10618: 10608: 10586:(2): 38–57. 10583: 10579: 10566: 10557:10419/257052 10537: 10533: 10523: 10511:. Retrieved 10506: 10497: 10485:. Retrieved 10480: 10471: 10462: 10452: 10439: 10427:. Retrieved 10423: 10413: 10403: 10394: 10381: 10368: 10360: 10352: 10343: 10333: 10321:. Retrieved 10317:the original 10312: 10302: 10294: 10285: 10277: 10269: 10257:. Retrieved 10253:the original 10243: 10231: 10223: 10208: 10196: 10177: 10171: 10159:. Retrieved 10147: 10137: 10129: 10120: 10112: 10094: 10086: 10074: 10064:14 September 10062:. Retrieved 10057:the original 10051: 10041: 10029:. Retrieved 10025: 10016: 10004:. Retrieved 9994: 9985: 9976: 9967: 9958: 9949: 9940: 9928:. Retrieved 9921: 9912: 9900:. Retrieved 9895: 9886: 9874:. Retrieved 9864: 9852:. Retrieved 9845: 9836: 9824:. Retrieved 9819: 9810: 9799: 9787:. Retrieved 9777: 9765:. Retrieved 9740:. Retrieved 9736: 9727: 9702:. Retrieved 9674:. Retrieved 9667: 9658: 9646:. Retrieved 9636: 9627: 9617: 9609: 9593: 9585: 9576: 9564:. Retrieved 9559: 9550: 9538: 9529: 9519: 9500: 9487: 9468: 9464: 9454: 9442:. Retrieved 9432: 9423: 9414: 9400: 9392: 9384: 9375: 9366: 9354:. Retrieved 9349: 9340: 9328:. Retrieved 9325:The Register 9324: 9315: 9296: 9290: 9274: 9260: 9237: 9229:the original 9222: 9212: 9198: 9184: 9172:. Retrieved 9167: 9158: 9144: 9132:. Retrieved 9122: 9110:. Retrieved 9106:the original 9101: 9091: 9071: 9066: 9054:. Retrieved 9050:the original 9040: 9021: 9007: 8995:. Retrieved 8986: 8972: 8953: 8945: 8930: 8922:the original 8912: 8903: 8894: 8885: 8875: 8866: 8857: 8845:. Retrieved 8841:the original 8831: 8819:. Retrieved 8815:the original 8810: 8801: 8788: 8775: 8767:The Guardian 8765: 8756: 8748: 8740: 8728:. Retrieved 8723: 8714: 8694: 8681: 8668: 8659: 8650: 8639: 8630: 8618:. Retrieved 8607: 8595:. Retrieved 8591: 8581: 8571:24 September 8569:. Retrieved 8556: 8544:. Retrieved 8533: 8524: 8516: 8500: 8487: 8479:f-secure.com 8478: 8466: 8454:. Retrieved 8450: 8440: 8428:. Retrieved 8418: 8410:The Register 8409: 8399: 8387: 8379: 8371: 8359:. Retrieved 8355:the original 8348: 8339: 8306: 8302: 8292: 8280:. Retrieved 8275: 8266: 8254:. Retrieved 8250: 8225: 8213:. Retrieved 8208: 8199: 8189:16 September 8187:. Retrieved 8183:the original 8178: 8168: 8158:16 September 8156:. Retrieved 8152: 8143: 8133:14 September 8131:. Retrieved 8128:The Guardian 8127: 8117: 8105:. Retrieved 8100: 8091: 8079:. Retrieved 8074: 8065: 8053:. Retrieved 8041: 8031: 8019:. Retrieved 8015: 8006: 7994:. Retrieved 7990: 7980: 7968:. Retrieved 7964: 7954: 7945: 7935: 7921: 7909:. Retrieved 7905: 7895: 7883:. Retrieved 7870: 7858:. Retrieved 7854:The Guardian 7853: 7844: 7834: 7825: 7813:. Retrieved 7809:the original 7804: 7795: 7783:. Retrieved 7779:the original 7774: 7754: 7739: 7727:. Retrieved 7722: 7713: 7701:. Retrieved 7697: 7687: 7675:. Retrieved 7663: 7653: 7641:. Retrieved 7630:The Guardian 7629: 7619: 7607:. Retrieved 7603: 7594: 7582:. Retrieved 7578: 7568: 7556:. Retrieved 7552: 7543: 7531:. Retrieved 7527: 7503:. Retrieved 7499: 7490: 7478:. Retrieved 7473: 7464: 7452:. Retrieved 7448: 7438: 7426:. Retrieved 7422: 7413: 7401: 7389:. Retrieved 7379: 7367:. Retrieved 7362: 7354: 7337: 7333: 7327: 7314: 7297: 7293: 7276:www.navy.com 7275: 7266: 7251: 7243:Azerbaycan24 7242: 7233: 7213: 7205: 7193:Steve Ragan 7189: 7181: 7166: 7157: 7147: 7138: 7128: 7109: 7101: 7078:. Retrieved 7074: 7065: 7044:cite journal 7029: 7016: 6999: 6989: 6976:. Retrieved 6965: 6952: 6933: 6923: 6914: 6902:. Retrieved 6898: 6888: 6876:. Retrieved 6872: 6862: 6850:. Retrieved 6847:TechRepublic 6846: 6837: 6825:. Retrieved 6821:the original 6811: 6770: 6766: 6756: 6744:. Retrieved 6740:the original 6729: 6707:(3): 70–89. 6704: 6700: 6690: 6681: 6672: 6661: 6640: 6630: 6597: 6593: 6583: 6571: 6559: 6547: 6539: 6530: 6511: 6498: 6485: 6459:. Retrieved 6455: 6445: 6433:. Retrieved 6429:the original 6424: 6415: 6364: 6360: 6350: 6331: 6325: 6317: 6309: 6290: 6267: 6261: 6249:. Retrieved 6245: 6235: 6223:. Retrieved 6219: 6209: 6197:. Retrieved 6193: 6183: 6155: 6143:. Retrieved 6139: 6129: 6117:. Retrieved 6113:the original 6102: 6092: 6080:. Retrieved 6074: 6064: 6052:. Retrieved 6040: 6031: 6012: 6004: 5996: 5987: 5977: 5965:. Retrieved 5961: 5951: 5939:. Retrieved 5935: 5926: 5914:. Retrieved 5910: 5901: 5889:. Retrieved 5884: 5875: 5863:. Retrieved 5849: 5839: 5827:. Retrieved 5820: 5811: 5791: 5784: 5771:. NSI, Inc. 5759: 5748: 5739: 5719: 5712: 5700:. Retrieved 5686: 5661: 5655: 5645: 5635: 5616: 5593:. Retrieved 5588: 5584: 5575: 5565: 5558: 5528:(5): 30–35. 5525: 5521: 5511: 5486: 5482: 5472: 5460:. Retrieved 5456:the original 5451: 5441: 5426: 5387: 5366:. Retrieved 5354: 5350: 5325:. Retrieved 5321: 5311: 5299:. Retrieved 5287: 5277: 5232: 5206:. Retrieved 5204:. 4 May 2016 5201: 5192: 5180:. Retrieved 5176: 5167: 5155:. Retrieved 5150: 5141: 5129:. Retrieved 5125: 5116: 5083: 5077: 5055:(1): 82–85. 5052: 5048: 5038: 5026:. Retrieved 5021: 5012: 4971: 4965: 4798:Cyber spying 4756: 4755:Series 2 of 4748: 4729: 4720: 4714: 4708: 4702: 4681: 4667: 4659: 4651: 4643: 4609: 4602: 4592: 4585:Barack Obama 4574: 4563: 4536: 4533: 4517: 4515: 4503: 4452:The Pentagon 4444: 4436: 4424: 4394: 4343: 4336: 4323: 4321: 4265:web browsers 4246: 4242: 4234: 4223: 4212: 4210: 4207: 4202: 4200: 4196: 4177: 4169: 4162: 4148: 4121: 4113:Trojan Horse 4109:Soviet Union 4106: 4102:the Pentagon 4085: 4081: 4075: 4068: 4058: 4027: 4004: 3987: 3974: 3970: 3958: 3938:Leon Panetta 3934: 3919: 3903:Saudi Aramco 3892: 3889:Saudi Arabia 3878:Donald Trump 3875: 3868: 3853: 3843: 3841: 3833: 3817: 3799: 3751: 3740: 3726: 3708: 3700:Black-Energy 3697: 3690: 3651: 3635: 3623: 3615: 3589: 3576: 3546: 3511:(NCSC). The 3495: 3455: 3429: 3407: 3374: 3349: 3312: 3304: 3265: 3250: 3238: 3219: 3208: 3200: 3192: 3164: 3157: 3146: 3138: 3122:cyber attack 3115: 3106:Zhenhua Data 3103: 3091: 3077: 3068: 3062:FBI Director 3051: 3043: 3032: 3021: 3002: 2987: 2980: 2956: 2948: 2945:Preparedness 2932: 2915: 2884: 2867: 2843: 2835: 2831:Ilham Aliyev 2803: 2799: 2785:, which was 2780: 2776: 2756: 2753: 2730: 2717:Pearl Harbor 2714: 2686: 2677: 2673:British Army 2665:social media 2658: 2644: 2634: 2625: 2618: 2599: 2559: 2534: 2517: 2512: 2505: 2493: 2485: 2410: 2393:surveillance 2347: 2339:Threat actor 2302: 2285: 2272: 2249: 2226: 2214: 2211: 2206: 2202: 2197: 2184: 2180: 2176: 2168: 2152: 2121: 2117: 2109:manipulation 2077:Cyberwarfare 2076: 2075: 1976:Fifth column 1956:War resister 1951:Women in war 1846:Peacekeeping 1791:Arms control 1736: 1425:Mobilization 1420:Conscription 1378:Intelligence 1331:Organization 972: 901:Encirclement 781:Radiological 717:Conventional 634: 571:Subterranean 478:Development: 477: 454: 416: 378: 341:Naval units: 340: 333:Signal corps 300: 278:Intelligence 263:Specialties: 262: 187:Organization 138:Early modern 47: 13766:Categories 13735:Survivalism 13422:Zoroastrian 13278:Seven seals 13273:Seven bowls 13199:Historicism 13095:Solar flare 12971:Overfishing 12946:Defaunation 12733:coral reefs 12495:AI takeover 12414:Nanoweapons 12402:Cybergeddon 12387:Cyberattack 12185:Misuse case 12019:Infostealer 11994:Email fraud 11959:Data breach 11794:Cybergeddon 11662:(1): 5–32. 11612:(3): 4–21. 11560:, 169 pages 11308:(2019/2020) 11290:20 February 11264:20 February 11085:(1): 5–32. 10513:29 December 10487:29 December 9896:McAfee Blog 9356:24 February 9330:26 December 9253:Yahoo! News 9112:25 November 9072:Black Earth 8592:Global Post 8179:News.com.au 8107:12 December 8081:12 December 8055:12 December 8021:12 December 7996:12 December 7860:31 December 4925:Cyberattack 4910:Virtual war 4818:Cyberweapon 4788:Cyberattack 4463:White House 4432:open source 4287:(including 4285:smartphones 4267:(including 4226:North Korea 4070:casus belli 3761:Middle East 3755:Wall Street 3743:Iain Lobban 3654:CrowdStrike 3592:Jeh Johnson 3505: [ 3498:Netherlands 3486:Netherlands 3326:North Korea 3272:South Korea 3256:South Korea 3247:Philippines 3213:(CBI). The 3130:Philippines 3118:Philippines 3065:James Comey 3058:data breach 2809:" attacked 2765:, told the 2736: [ 2727:Motivations 2705:cybercrimes 2455:Afghanistan 2447:Philippines 2390:clandestine 2367:NetTraveler 2325:Cyberattack 2289:tit-for-tat 2252:Citizen Lab 2172:hacktivists 2148:North Korea 1961:War studies 1784:Non-warfare 1712:Appeasement 1677:Martial law 1516:War economy 1455:Transgender 1408:Recruitment 1168:Containment 1053:Culminating 1033:Anti-access 956:Operational 876:Envelopment 819:Air assault 700:Air cavalry 660:Air defence 640:Information 541:Cold-region 506:Battlespace 455:Historical: 301:Land units: 227:Space force 222:Coast guard 155:Late modern 116:Prehistoric 13904:Cybercrime 13878:Categories 13695:Depression 13685:Ransomware 13500:Messianism 13470:Armageddon 13455:Apocalypse 13243:Antichrist 13231:Man of sin 13128:Three Ages 12991:Big Crunch 12853:Extinction 12845:Biological 12607:Ecological 12479:Strangelet 12250:Encryption 12126:Web shells 12066:Ransomware 12014:Hacktivism 11777:Cybercrime 11426:0071772499 11152:8 November 11127:8 November 10946:8 November 10907:. Polity. 10854:1710.09616 10751:. Reuters. 10323:1 December 10161:22 October 10031:30 January 9930:3 November 9902:8 November 9876:3 November 9742:3 November 9704:3 November 9648:3 November 9174:16 October 9134:15 October 8546:4 November 8361:18 October 8282:8 November 8256:15 January 8215:5 February 8209:Yahoo News 7885:15 January 7815:15 January 7785:15 January 7729:8 November 7604:ccdcoe.org 7528:ccdcoe.org 7505:8 November 7480:8 November 7428:8 November 7322:. 407–429. 7080:8 November 6904:8 November 6746:30 January 6461:8 November 6435:10 October 6268:151 Essays 6169:0071772499 6082:1 February 5702:8 November 5664:(1): 1–8. 5595:6 December 4974:. Oxford. 4957:References 4930:Cybercrime 4793:Cybercrime 4750:South Park 4524:Thomas Rid 4419:See also: 4415:Cyberpeace 4375:Fancy Bear 4373:See also: 4180:Creech AFB 4124:USCYBERCOM 4090:cyberspace 4088:describes 4053:See also: 3844:MuddyWater 3776:See also: 3721:See also: 3658:Fancy Bear 3541:See also: 3524:See also: 3490:See also: 3450:See also: 3424:See also: 3320:Foal Eagle 2870:hacktivism 2864:Hacktivism 2823:Azerbaijan 2795:power grid 2763:USCYBERCOM 2655:Propaganda 2496:satellites 2462:Titan Rain 2361:, such as 2192:Clausewitz 2165:Definition 2105:propaganda 2021:War crimes 2011:Operations 1918:Foot drill 1888:Battle cry 1801:deterrence 1460:Harassment 1435:Specialism 1258:Technology 1253:Succession 1198:Liberation 1133:Asymmetric 1068:Empty fort 974:Blitzkrieg 943:Withdrawal 906:Investment 685:Camouflage 680:Biological 618:Underwater 593:Amphibious 512:Aerospace 379:Air units: 356:Submarines 165:fourth-gen 160:industrial 148:napoleonic 13909:Espionage 13580:Fictional 13427:Saoshyant 13312:New Earth 13283:The Beast 13216:Preterism 13189:Christian 13145:Kali Yuga 13090:Micronova 13085:Hypernova 12951:Dysgenics 12792:Verneshot 12698:Hypercane 12441:Dead Hand 12081:Shellcode 12076:Scareware 11924:Crimeware 11884:Backdoors 11676:153828543 11329:1 January 11099:153828543 10731:Computing 10600:244621961 10534:Economies 10259:11 August 10156:0362-4331 10113:Economist 9854:19 August 9826:19 August 9789:19 August 9767:19 August 9669:CNN Money 8997:11 August 8946:The Local 8821:5 January 8430:2 January 8331:249831452 8323:2347-7970 8050:0362-4331 7672:0956-1382 7638:0261-3077 7021:NDU Press 6827:11 August 6803:155001568 6787:0048-5829 6713:1936-1815 6614:1467-7954 6389:0096-3402 6276:cite book 6049:0362-4331 5860:0362-4331 5678:218770788 5591:(4). 2018 5542:1558-4046 5427:Cyber War 5406:846492852 5368:7 January 5357:: 70–94. 5322:The Verge 5296:1059-1028 5259:cite book 5251:980939904 5102:cite book 5061:0883-072X 4998:cite book 4990:802324804 4745:Cancelled 4722:Zero Days 4615:Microsoft 4397:mercenary 4379:Cozy Bear 4261:smart TVs 4192:keylogged 4082:Cyber War 3856:Hezbollah 3732:pipe bomb 3620:Joe Biden 3602:the U.S. 3543:Cozy Bear 3389:EU states 3358:over the 3288:W32.Dozer 3234:2014–4114 2971:blue team 2952:war games 2846:backbones 2434:with the 2377:Espionage 2276:grey zone 2199:security. 2097:espionage 1908:War novel 1811:Grey-zone 1771:War games 1732:Overmatch 1682:War crime 1632:Desertion 1622:Ceasefire 1617:Armistice 1504:Logistics 1482:Mercenary 1470:Volunteer 1401:Personnel 1373:Engineers 1318:Sociology 1273:World war 1268:Total war 1248:Strategic 1238:Religious 1223:Political 1218:Perpetual 1193:Irregular 1108:Offensive 1083:Defensive 1078:Deception 1038:Attrition 886:Guerrilla 881:Formation 824:Airbridge 756:Loitering 670:Artillery 323:Artillery 273:Engineers 241:Irregular 212:Air force 62:during a 13944:Sabotage 13720:Pandemic 13705:Epidemic 13700:Droughts 13554:Prewrath 13485:End time 13351:Al-Qa'im 13236:Katechon 13221:2 Esdras 13211:Idealism 13194:Futurism 13123:Maitreya 13118:Buddhist 12961:Pandemic 12409:Gray goo 12255:Firewall 12160:Defenses 12086:Spamming 12071:Rootkits 12044:Phishing 12004:Exploits 11626:16367311 11237:Archived 11016:Archived 10703:CBS News 10540:(1): 2. 10481:CBS News 10216:Archived 9847:BBC News 9602:Archived 9560:Ynetnews 9508:Archived 9444:18 March 9350:BBC News 9245:Archived 9078:, 2003, 9056:1 August 9029:Archived 8961:Archived 8938:Archived 8904:Le Monde 8703:Archived 8540:Archived 8517:PC World 8509:Archived 7970:3 August 7747:Archived 7723:ABC News 7703:8 August 7677:8 August 7643:7 August 7609:7 August 7600:"CCDCOE" 7584:7 August 7558:7 August 7533:7 August 7423:cyber.uk 7391:9 August 7369:9 August 7222:Archived 7198:Archived 7174:Archived 7117:Archived 7023:: 76–82. 6972:Archived 6899:Lexology 6795:30026642 6721:26481910 6641:Observer 6622:26296227 6519:Archived 6471:cite web 6407:28366962 6298:Archived 6140:Newsweek 6054:21 March 6020:Archived 5865:9 August 5829:9 August 5822:BBC News 5773:Archived 5550:17374534 5503:29263858 5069:26202046 4950:Firewall 4766:See also 4632:In films 4395:A cyber 4307:such as 4238:Cold War 4186:fleet's 4173:GhostNet 4015:Facebook 3736:cupcakes 3559:and the 3352:Ethiopia 3226:dark web 3224:and the 2967:red team 2894:and the 2787:wargamed 2750:Military 2689:WannaCry 2610:Istanbul 2490:Sabotage 2401:Facebook 2101:sabotage 1923:War song 1898:War film 1531:Materiel 1450:Children 1430:Training 1368:Medicine 1353:Doctrine 1308:Training 1243:Resource 1228:Princely 1178:Economic 1163:Conquest 1158:Colonial 1153:Cold war 1138:Blockade 1018:Strategy 990:Maneuver 751:Infantry 707:Chemical 561:Mountain 521:Airborne 384:Fighters 351:Warships 306:Infantry 232:Reserves 180:Military 66:in 2019. 13964:Hazards 13959:Spyware 13780:Hazards 13678:General 13549:Rapture 13398:Messiah 13386:Sufyani 13376:Israfil 13346:Islamic 13184:Messiah 13162:1 Enoch 12996:Big Rip 12708:Ecocide 12703:Ice age 12096:Spyware 12039:Payload 12034:Malware 11974:Viruses 11954:Botnets 11861:Threats 11355:3 April 11258:Reuters 10710:8 April 10682:8 April 10654:8 April 10626:7 March 10429:4 March 10026:Reuters 9923:YouTube 9720:archive 9716:YouTube 9566:5 March 9424:Reuters 9224:Reuters 9168:gpo.gov 8620:6 April 8597:6 April 8535:YouTube 8456:15 July 7965:Reuters 7454:6 March 7449:UC News 7363:Reuters 7306:2765010 6878:11 July 6852:11 July 6682:bbc.com 6398:5370589 6369:Bibcode 6251:22 June 5967:19 June 5941:19 June 5916:19 June 5891:19 June 5208:24 June 5126:FireEye 4945:Spyware 4935:Hacking 4833:IT risk 4676:Snowden 4557:-based 4555:Tallinn 4490:Estonia 4486:Tallinn 4358:iPhones 4301:Android 4253:Vault 7 4019:Twitter 3895:Shamoon 3824:Stuxnet 3677:X-Agent 3666:Android 3648:Ukraine 3575:at the 3496:In the 3446:Germany 3404:Estonia 2937:or the 2923:attacks 2819:Armenia 2807:hackers 2793:to the 2631:hacked. 2628:hackers 2519:Stuxnet 2508:Stuxnet 2500:C4ISTAR 2089:warfare 2036:Writers 2031:Weapons 1996:Battles 1945:Related 1933:Wargame 1928:Uniform 1876:Culture 1657:Perfidy 1652:Justice 1573:Science 1558:Outpost 1511:History 1491:Warrior 1487:Soldier 1475:foreign 1413:counter 1313:Service 1263:Theater 1203:Limited 1183:Endemic 1098:Nuclear 866:Foxhole 841:Cavalry 829:Airdrop 814:Airlift 799:Tactics 771:Nuclear 761:Missile 690:Cavalry 675:Barrage 653:Weapons 613:Surface 394:Command 389:Bombers 346:Frogman 316:Cavalry 288:Medical 255:Militia 237:Regular 217:Marines 131:castles 121:Ancient 109:History 88:outline 13853:Russia 13710:Famine 13636:Zombie 13438:Others 13393:Jewish 13371:Dajjal 13253:Events 13167:Daniel 13068:winter 12895:Others 12785:winter 12585:winter 12580:famine 12575:cobalt 12290:(SIEM) 12267:(HIDS) 12151:Zombie 11888:Bombs 11869:Adware 11674:  11643:  11624:  11589:  11556:  11536:  11511:  11492:  11475:  11461:  11447:  11432:  11424:  11410:  11376:about 11285:Forbes 11097:  10920:22 May 10911:  10884:  10832:22 May 10823:  10798:22 May 10789:  10598:  10507:DW.COM 10184:  10154:  10006:31 May 9676:15 May 9303:  9082:  8847:1 June 8730:2 July 8641:Quartz 8329:  8321:  8048:  7991:Forbes 7911:5 June 7698:Quartz 7670:  7636:  7304:  7260:. BBC. 7019:(70). 6991:SFGate 6978:15 May 6967:SFGate 6940:  6801:  6793:  6785:  6719:  6711:  6620:  6612:  6405:  6395:  6387:  6338:  6225:5 June 6199:5 June 6175:  6167:  6145:26 May 6119:21 May 6047:  5858:  5799:  5727:  5676:  5548:  5540:  5501:  5462:6 June 5433:  5404:  5394:  5327:10 May 5301:10 May 5294:  5249:  5239:  5182:10 May 5173:"GCHQ" 5157:10 May 5131:10 May 5090:  5067:  5059:  5028:10 May 4988:  4978:  4733:(2020) 4725:(2016) 4717:(2017) 4711:(2015) 4686:(2019) 4678:(2016) 4672:(2015) 4664:(2007) 4656:(2003) 4648:(1996) 4389:, and 4315:, and 4297:Google 4279:, and 3978:RasGas 3954:RasGas 3850:Israel 3794:, and 3632:Sweden 3531:Russia 3520:Norway 3440:Airbus 3420:France 3377:Cyprus 3371:Cyprus 3366:Europe 3341:Africa 3222:GitHub 3195:NCIIPC 3185:(NSA) 3087:McAfee 2976:France 2701:Maersk 2637:Russia 2614:Ankara 2606:Turkey 2476:Area 1 2451:Mexico 2445:, the 2405:Google 2337:, and 2146:, and 2140:Israel 2132:Russia 2016:Sieges 1700:Theory 1440:Morale 1298:Policy 1293:Branch 1073:Mosaic 1063:Fabian 1005:Covert 938:Trench 923:Screen 846:Charge 836:Battle 809:Aerial 727:Denial 695:Horses 623:Seabed 576:Tunnel 556:Jungle 546:Desert 516:Aerial 13843:China 13725:Riots 13417:Norse 13381:Mahdi 13140:Kalki 13135:Hindu 12465:(EMP) 12136:Worms 12131:Wiper 12049:Voice 11897:Logic 11672:S2CID 11622:S2CID 11183:. NPR 11095:S2CID 10849:arXiv 10648:WIRED 10596:S2CID 10576:(PDF) 10344:Wired 10278:Wired 9712:Video 9699:(PDF) 9102:ZDNet 8565:(PDF) 8475:(PDF) 8327:S2CID 8101:Axios 7334:Orbis 7013:(PDF) 6799:S2CID 6791:JSTOR 6717:JSTOR 6663:Wired 6618:JSTOR 6246:Wired 5988:Wired 5776:(PDF) 5769:(PDF) 5674:S2CID 5637:Wired 5546:S2CID 5499:S2CID 5288:Wired 5065:JSTOR 4758:COBRA 4458:time. 4399:is a 4350:Apple 4317:Linux 4313:macOS 4289:Apple 4136:ENISA 3984:Qatar 3899:Saudi 3693:Snake 3509:] 3385:Coreu 3356:Egypt 3346:Egypt 3143:India 3126:China 3073:China 3012:China 2840:Civil 2815:Tibet 2740:] 2697:Merck 2460:The " 2443:Kenya 2436:Stasi 2386:PRISM 2363:Flame 2136:China 2085:state 1989:Lists 1445:Women 1383:Ranks 1303:Staff 1233:Proxy 1148:Class 1103:Naval 1088:Depth 918:Swarm 911:Siege 891:Naval 871:Drone 766:Music 741:Robot 737:Drone 722:Cyber 665:Armor 635:Cyber 608:Green 603:Brown 566:Urban 526:Space 447:Radar 442:Sonar 311:Armor 268:Staff 246:Ranks 13848:Iran 11902:Time 11892:Fork 11641:ISBN 11587:ISBN 11554:ISBN 11534:ISBN 11509:ISBN 11490:ISBN 11473:ISBN 11459:ISBN 11445:ISBN 11430:ISBN 11422:ISBN 11408:ISBN 11357:2017 11331:2024 11292:2017 11266:2017 11189:2010 11154:2022 11129:2022 11117:NIST 10948:2022 10922:2017 10909:ISBN 10882:ISBN 10834:2017 10821:ISBN 10800:2017 10787:ISBN 10712:2017 10684:2017 10656:2017 10628:2017 10515:2016 10489:2016 10431:2017 10325:2011 10261:2020 10182:ISBN 10163:2020 10152:ISSN 10066:2021 10033:2019 10008:2018 9932:2017 9904:2022 9878:2017 9856:2012 9828:2012 9791:2012 9769:2012 9744:2017 9706:2017 9678:2019 9650:2017 9568:2022 9446:2015 9358:2022 9332:2016 9301:ISBN 9176:2016 9136:2016 9114:2008 9080:ISBN 9058:2016 8999:2020 8849:2018 8823:2019 8732:2010 8622:2013 8599:2013 8573:2011 8548:2017 8458:2019 8432:2017 8363:2012 8319:ISSN 8284:2022 8258:2013 8217:2024 8191:2020 8160:2020 8153:GSXT 8135:2020 8109:2018 8083:2018 8057:2018 8046:ISSN 8023:2018 7998:2018 7972:2011 7913:2015 7887:2013 7862:2010 7817:2013 7787:2013 7731:2022 7705:2019 7679:2019 7668:ISSN 7645:2019 7634:ISSN 7611:2019 7586:2019 7560:2019 7535:2019 7507:2022 7482:2022 7456:2022 7430:2022 7393:2019 7371:2019 7302:SSRN 7082:2022 7057:help 6986:Link 6980:2019 6938:ISBN 6906:2022 6880:2018 6854:2018 6829:2020 6783:ISSN 6748:2018 6709:ISSN 6610:ISSN 6477:link 6463:2022 6437:2020 6403:PMID 6385:ISSN 6336:ISBN 6282:link 6253:2019 6227:2015 6201:2015 6173:ISBN 6165:ISBN 6147:2014 6121:2014 6084:2014 6076:Time 6056:2021 6045:ISSN 5969:2021 5943:2021 5918:2021 5893:2021 5867:2019 5856:ISSN 5831:2019 5797:ISBN 5725:ISBN 5704:2022 5597:2019 5538:ISSN 5464:2015 5431:ISBN 5402:OCLC 5392:ISBN 5370:2020 5329:2019 5303:2019 5292:ISSN 5269:link 5265:link 5247:OCLC 5237:ISBN 5210:2021 5184:2019 5159:2019 5133:2019 5108:link 5088:ISBN 5057:ISSN 5030:2019 5022:NATO 5004:link 4986:OCLC 4976:ISBN 4940:DDoS 4838:iWar 4823:Duqu 4587:and 4564:The 4545:and 4537:The 4427:FIfF 4348:and 4295:and 4257:cars 4236:the 4017:and 4005:The 3820:Iran 3801:Iran 3766:Iran 3598:and 3594:the 3569:NATO 3436:EADS 3354:and 3334:and 3282:and 3239:The 3007:Asia 2981:The 2969:vs. 2957:The 2910:and 2821:and 2744:NATO 2721:9/11 2691:and 2612:and 2560:The 2467:The 2453:and 2403:and 2388:: a 2365:and 2144:Iran 2026:Wars 1543:Base 1093:Goal 1000:Raid 598:Blue 536:Land 207:Navy 202:Army 11907:Zip 11664:doi 11614:doi 11428:, " 11087:doi 10874:doi 10728:". 10588:doi 10552:hdl 10542:doi 10402:". 9714:on 9608:", 9584:", 9473:doi 8311:doi 7946:NPR 7880:NPR 7833:". 7342:doi 7298:100 6988:at 6775:doi 6771:128 6602:doi 6393:PMC 6377:doi 6220:CNN 6194:NPR 5666:doi 5530:doi 5491:doi 5359:doi 4598:ICT 4572:". 4299:'s 4293:iOS 4291:'s 4249:CIA 4182:'s 4063:of 3728:MI6 3669:app 3458:BND 3230:CVE 2811:CNN 2547:An 2537:DoS 2432:NSA 2397:NSA 2111:or 1610:Law 1553:FOB 1548:MOB 588:Sea 80:War 41:or 13880:: 12488:/ 11670:. 11660:35 11658:. 11620:. 11610:34 11608:. 11604:. 11567:, 11552:, 11322:. 11283:. 11256:. 11205:. 11145:. 11115:. 11093:. 11083:35 11081:. 11063:. 11035:. 10987:. 10938:. 10880:. 10771:^ 10739:^ 10700:. 10673:. 10645:. 10617:. 10594:. 10584:14 10582:. 10578:. 10550:. 10536:. 10532:. 10505:. 10479:. 10461:. 10422:. 10342:. 10311:. 10293:. 10276:. 10222:, 10150:. 10146:. 10128:, 10102:^ 10093:. 10050:. 10024:. 9984:. 9966:. 9948:. 9920:. 9894:. 9844:. 9818:. 9752:^ 9686:^ 9666:. 9626:. 9558:. 9528:. 9467:. 9463:. 9422:. 9391:. 9374:. 9348:. 9323:. 9281:, 9251:, 9221:. 9166:. 9100:. 9074:. 8944:, 8902:. 8884:. 8865:. 8809:. 8764:, 8747:. 8722:. 8658:. 8638:. 8590:. 8532:. 8515:. 8477:. 8449:. 8408:. 8378:. 8347:. 8325:. 8317:. 8305:. 8301:. 8274:. 8249:. 8236:^ 8207:. 8177:. 8151:. 8126:. 8099:. 8073:. 8044:. 8040:. 8014:. 7989:. 7963:. 7944:. 7904:. 7878:. 7852:. 7803:. 7773:. 7762:^ 7753:. 7721:. 7696:. 7666:. 7662:. 7632:. 7628:. 7602:. 7577:. 7551:. 7526:. 7515:^ 7498:. 7472:. 7447:. 7421:. 7338:59 7336:. 7296:. 7284:^ 7274:. 7241:. 7204:. 7180:. 7156:. 7137:. 7100:, 7090:^ 7073:. 7048:: 7046:}} 7042:{{ 7015:. 6970:. 6964:. 6897:. 6871:. 6845:. 6797:. 6789:. 6781:. 6769:. 6765:. 6715:. 6705:12 6703:. 6699:. 6680:. 6660:. 6649:^ 6639:. 6616:. 6608:. 6598:17 6596:. 6592:. 6538:. 6473:}} 6469:{{ 6454:. 6423:. 6401:. 6391:. 6383:. 6375:. 6365:72 6363:. 6359:. 6316:. 6278:}} 6274:{{ 6244:. 6218:. 6192:. 6171:, 6138:. 6107:. 6101:. 6073:. 6043:. 6039:. 6003:, 5986:. 5960:. 5934:. 5909:. 5883:. 5854:. 5848:. 5819:. 5747:. 5694:. 5672:. 5662:67 5660:. 5654:. 5634:. 5624:^ 5615:, 5605:^ 5589:17 5587:. 5583:. 5544:. 5536:. 5524:. 5520:. 5497:. 5485:. 5481:. 5450:. 5414:^ 5400:. 5378:^ 5355:49 5353:. 5349:. 5337:^ 5320:. 5290:. 5286:. 5261:}} 5257:{{ 5245:. 5218:^ 5200:. 5175:. 5149:. 5124:. 5104:}} 5100:{{ 5063:. 5053:31 5051:. 5047:. 5020:. 5000:}} 4996:{{ 4984:. 4411:. 4385:, 4381:, 4377:, 4334:. 4319:. 4311:, 4275:, 4271:, 4263:, 4259:, 3956:. 3839:. 3790:, 3786:, 3757:. 3738:. 3644:. 3587:. 3507:nl 3294:. 3206:. 3173:, 3169:, 3136:. 3132:, 3049:. 2954:. 2898:. 2890:, 2738:de 2699:, 2667:, 2597:. 2515:. 2449:, 2333:, 2295:. 2266:, 2142:, 2138:, 2134:, 2130:, 2126:, 2115:. 2107:, 2103:, 2099:, 1489:/ 739:/ 253:/ 239:/ 13826:e 13819:t 13812:v 12335:e 12328:t 12321:v 11745:e 11738:t 11731:v 11688:. 11678:. 11666:: 11649:. 11628:. 11616:: 11595:. 11517:. 11498:. 11436:" 11359:. 11333:. 11294:. 11268:. 11191:. 11156:. 11131:. 11101:. 11089:: 10950:. 10924:. 10890:. 10876:: 10857:. 10851:: 10836:. 10802:. 10765:. 10724:" 10714:. 10686:. 10658:. 10630:. 10590:: 10560:. 10554:: 10544:: 10538:8 10517:. 10491:. 10465:. 10433:. 10398:" 10385:" 10346:. 10327:. 10263:. 10190:. 10165:. 10068:. 10035:. 10010:. 9934:. 9906:. 9880:. 9858:. 9830:. 9793:. 9771:. 9746:. 9722:) 9718:- 9710:( 9708:. 9680:. 9652:. 9630:. 9570:. 9532:. 9481:. 9475:: 9469:4 9448:. 9360:. 9334:. 9309:. 9178:. 9138:. 9116:. 9060:. 9001:. 8851:. 8825:. 8734:. 8624:. 8601:. 8575:. 8550:. 8519:. 8481:. 8460:. 8434:. 8412:. 8365:. 8333:. 8313:: 8307:9 8286:. 8260:. 8219:. 8193:. 8162:. 8137:. 8111:. 8085:. 8059:. 8025:. 8000:. 7974:. 7948:. 7915:. 7889:. 7864:. 7829:" 7819:. 7789:. 7733:. 7707:. 7681:. 7647:. 7613:. 7588:. 7562:. 7537:. 7509:. 7484:. 7458:. 7432:. 7395:. 7373:. 7348:. 7344:: 7308:. 7278:. 7160:. 7141:. 7084:. 7059:) 7055:( 7038:. 6994:) 6984:( 6982:. 6946:. 6908:. 6882:. 6856:. 6831:. 6805:. 6777:: 6750:. 6723:. 6643:. 6624:. 6604:: 6479:) 6465:. 6439:. 6409:. 6379:: 6371:: 6344:. 6284:) 6255:. 6229:. 6203:. 6149:. 6123:. 6086:. 6058:. 5990:. 5971:. 5945:. 5920:. 5895:. 5869:. 5833:. 5805:. 5733:. 5706:. 5680:. 5668:: 5599:. 5552:. 5532:: 5526:9 5505:. 5493:: 5487:1 5466:. 5408:. 5372:. 5361:: 5331:. 5305:. 5271:) 5253:. 5212:. 5186:. 5161:. 5135:. 5110:) 5096:. 5071:. 5032:. 5006:) 4992:. 4743:" 3438:( 3232:- 2457:. 2438:. 2423:. 2407:. 2065:e 2058:t 2051:v 90:) 86:( 45:. 34:. 20:)

Index

Cyber warfare
Cyberwar (disambiguation)
electronic warfare
information warfare

United States Army
3rd Brigade Combat Team, 1st Cavalry Division
training exercise
War
outline

History
Prehistoric
Ancient
Post-classical
castles
Early modern
pike and shot
napoleonic
Late modern
industrial
fourth-gen
Military
Organization
Command and control
Defense ministry
Army
Navy
Air force
Marines

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑