Featured in Cyber Warfare
Game changing military tech
Let’s dive headfirst into the world of emerging military tech. It’s a battlefield out there, and the rules of engagement are shifting fast.
How cyber warfare has changed over time
There’s no denying we’re living in a digital world. Technology growth is happening so rapidly, that it’s difficult for the…
Chinese espionage: How Beijing is stealing away US global supremacy
The US faces myriad conventional and unconventional threats: Russia, North Korea, Iran, terrorist organizations, climate change, and pandemics are just…
This ‘Einstein Box’ helps F-22s secretly communicate with unstealthy planes
America’s troops have very awesome tactical gear, even through all the teething problems that systems like the F-35 Lightning II have had. That said, all that gear can’t win a war unless you can come up with a good plan. During a…
Why ‘Stuxnet’ is still the greatest cyberattack victory to date
Cyberattacks are the best way for America’s enemies to mess around with the United States without triggering a full-scale war….
The Return of Cozy Bear: Russian hackers in the crosshairs of Western intelligence agencies — again
Six years ago, Dutch intelligence agents reportedly infiltrated a malicious group of hackers working out an office building not far from the Kremlin. Dutch agents hacked into a security camera that monitored people entering the Moscow building,
The first shots of World War III will almost certainly be digital
Last March, the White House announced plans to levy new sanctions against Russia for a list of digital transgressions that included their efforts to meddle with the 2016 presidential election. This apparent admission from a Trump administrati…
US Navy is ‘under cyber siege’ from Chinese hackers; hemorrhaging national secrets
An internal US Navy review concluded that the service and its various industry partners are “under cyber siege” from Chinese hackers who are building Beijing’s military capabilities while eroding the US’s advantage, The Wall Street Journal
When should cyber attacks be considered acts of war?
In the past 15 years, state-sponsored cyber attacks have increased significantly, from hacking government and military computers to obtain information to shutting down or defacing websites to interfering with power stations. And that’s just …
These wounded Marines hunted the Taliban in Afghanistan. Now they hunt child predators online.
Russia is trolling US troops with fake Facebook profiles of gorgeous women
When Russian President Vladimir Putin visited the studios of state-owned media outlet Russia Today in 2013, he reportedly instructed them to break “the Anglo-…
Feb 4, 2020
North Korea claims credit for major cyber attacks
In a shocking new revelation, a former computer expert from North Korea has exposed the role played by Pyongyang’s spy agency in some of the most successful cyber attacks.
Reality Winner sentenced to five years for Russia-hack leak
A U.S. intelligence worker who pleaded guilty to sending a secret report on Russian election cyberattacks to a news website was sentenced on Aug. 23, 2018 to five years in prison by a federal court in Georgia. Reality Winner, 26, a U.S. Air Fo…
The gloves are coming off for cyber warfare
President Donald Trump has reportedly removed restraints on how and when the US can launch cyberattacks on its adversaries — and it could make attacks on other countries more likely. Trump signed an order Aug. 15, 2018, reversing a series of…
Russian-backed forces using texts in psychological warfare
As the war in eastern Ukraine rages on, so too does Russia’s invasive electronic warfare — and it’s changing how war is fought by sending threats to individual soldier’s phones, and those of their families. Since the war began in 2014, Ru…
Russian hackers almost caused massive blackouts in 2017
Hackers working for Russia claimed “hundreds of victims” in 2017 in a major, long-running campaign that enabled them to gain control over some U.S. electric utilities, where they could have caused blackouts, the Wall Street Journal is reporting.