Enko Koceku examines NATO’s cyber defence strategy.
Breaking the long silence On Monday, May 6, 2013, the Pentagon released their annual report to Congress, explicitly accusing the People’s Liberation Army (PLA) of sponsoring cyber operations against American government agencies and industries. Analysts and observers of global affairs and international security have long suspected the complicity of the Chinese state in coordinating and sponsoring cyber […]
Public Safety Canada and the Department of Homeland Security in the United States recently announced the Cyber Security Action Plan of 2012, a bilateral initiative designed to improve both countries’ cyber security forces and protect mutually vulnerable digital infrastructure. This plan indicates that cyber security threats are not bound by national boundaries or confined to […]
By: Jason Wiseman Having focused on the various vulnerabilities we face in cyberspace, this article will analyze the most persistent and growing threat individual citizens are currently facing from the internet, cyber crime. This brief will focus on three things. First, what is cyber crime and how serious is it. Two, what are some of […]
By: Jason Wiseman After addressing the points of contention between states and cyber security, this brings us to a new juncture of the unknown, cyber terrorism. Having crept its way into the concerns of policy makers and security officials around the world, the issue of a cyber attack being initiated by a terrorist organization must […]
By: Jason Wiseman Of all the issues covered in this series of security briefs on cyberspace, none is more critical than cyber-espionage. As of today, cyber espionage is the most common and persistent threat to national security emanating from the digital realm. Not only is this an easier and newer intercept method, it is cheaper, […]
By: Jason Wiseman The movement of warfare into the dimension of cyberspace has already begun. This article will focus on three things. First, providing a comprehensive definition of what cyber war is. Second, a description of how it has been used so far in modern warfare. Third, the potential this new tool has to inflict […]