Difference between revisions of "Cyberwarfare"

From Wikispooks
Jump to navigation Jump to search
Line 6: Line 6:
 
}}
 
}}
  
''Not to be confused with "[[cyberterrorosm]]", which is a behaviour of non-state "[[terrorists]]".''
+
''Not to be confused with "[[cyberterrorism]]", which is a behaviour of non-state "[[terrorists]]".''
  
 
'''Cyberwarfare''' is a [[plastic word]] used to promote fear uncertainty and doubt.
 
'''Cyberwarfare''' is a [[plastic word]] used to promote fear uncertainty and doubt.

Revision as of 17:24, 28 June 2019

Concept.png "Cyberwarfare"
(plastic word)Rdf-entity.pngRdf-icon.png
Cyberwarfare.jpg
Interest of• Association of Old Crows
• Below Gotham Labs
• Fred Chang
• George Eliason
• Global Commission on the Stability of Cyberspace
• Joel Harding
• Chris Quick
• Rian van Rijbroek
• The 77th Brigade

Not to be confused with "cyberterrorism", which is a behaviour of non-state "terrorists".

Cyberwarfare is a plastic word used to promote fear uncertainty and doubt.

Purposes

Bill Blunden opines that "the gilded hyperbole of Cyberwar being peddled to the public is dangerous because it distracts us from focusing on actual threats and constructive solutions."[1]

 

Examples

Page nameDescription
HBGaryCompany that developed sophisticated software for the control of sock puppets.
Russia/Cyberwarfare
StuxnetA production of the NSA and Unit 8200 installed with AIVD help, designed to sabotage Iranian efforts to develop nuclear weapons.

 

Related Quotation

PageQuoteAuthor
Matthijs Veenendaal“Trust is a key foundation of a well-functioning society. Without reliable communication, organizations cannot operate effciently, be they corporations or government institutions. Malicious actors are aiming to exploit vulnerabilities in communication flows. With the advent

of new technology, it is possible for adversaries to impersonate leaders and create false impressions among population.

The Tallinn based NATO Cooperative Cyber Defence Centre of Excellence will organize a session focusing on questions including: What is at stake? What can nations do to enhance and protect trust in democratic institutions? Or is it already too late?”
Matthijs Veenendaal

 

Related Documents

TitleTypePublication dateAuthor(s)Description
Document:CyberGuardian Cyber Security Education Programme for Children and Young Peoplebrainwashing concept paper30 January 2016Integrity InitiativeII puts lots of thought into how the military can train British children for cyberwarfare.
Document:Executive Summary Cyber Security Education Programme for Children and Young Peoplebrainwashing concept paper executive summary26 February 2016Integrity InitiativeII sums up its thought on how the military can train British children for cyberwarfare
Document:The Terrorists Among US- Traitors and Terror 3article21 June 2019George Eliason
Michael Jasinski
George Eliason interviews professor Michael Jasinski about the dire effects of outsourcing intelligence gathering and information dissemination.
File:Manufactured consent and cyberwar.pdfConference ProceedingsJune 2010Bill Blunden
File:US Psychological Warfare in Ukraine Targeting Online Independent Media Coverage.pdfarticle20 March 2015George EliasonCyberwarfare operations are getting targeted at anyone.
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References


57px-Notepad icon.png This is a page stub. Please add to it.