Cyber Strategies for a World at War


U.S. Interests Face Challenges in Europe, Intelligence Chief Says

By Jim Garamone
American Forces Press Service

WASHINGTON, Feb. 16, 2009 – (This is the third in a series on the intelligence community’s annual threat assessment.)

Russia’s perceived strengths and its policies, tensions in Eurasia, Caucasus and Central Asia, and instability in the Balkans all pose challenges to U.S. interests in Europe, the director of national intelligence said Feb. 12.

Dennis C. Blair, a retired Navy admiral, told the Senate Select Committee on Intelligence that Russia continues to rebuild its military and, as events in Georgia last year show, use those forces to impress on the world that the nation is still relevant.

“Russian challenges to US interests now spring more from Moscow’s perceived strengths than from the state weaknesses characteristic of the 1990s,” Blair said in prepared testimony.

“U.S. involvement in Iraq and Afghanistan and general anti-Americanism have created openings for Russia to build alternative arrangements to the US-led international political and economic institutional order,” he said.

Russia is attempting to increase its ability to influence events, he said, by “actively cultivating relations with regional powers, including China, Iran, and Venezuela.”

Blair said Russia’s energy policy is aimed at increasing the country’s importance on the European continent.

“Moscow also is trying to maintain control over energy supply and transportation networks to Europe to East Asia, and protect and further enhance its market share in Europe through new bilateral energy partnerships and organizing a gas cartel with other major exporters,” he said.

Read the rest of this entry »


Filed under: Analysis, Business, cyber security, cyber war, Doctrine, government, History, Intelligence Community, Internet, Life, Military, News, Policy, Politics, Strategy, Technology, Terrorism, Training, War, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Nato’s cyber defence warriors

By Frank Gardner
February 3, 2009

Nato officials have told the BBC their computers are under constant attack from organisations and individuals bent on trying to hack into their secrets.

The attacks keep coming despite the establishment of a co-ordinated cyber defence policy with a quick-reaction cyber team on permanent standby.

The cyber defence policy was set up after a wave of cyber attacks on Nato member Estonia in 2007, and more recent attacks on Georgia – so what are they defending against and how do they do it?

Tower of Babel

Nato’s operational headquarters in Mons is a low, drab three-storey building – part of a sprawling complex set in rolling farmland south of Brussels.

The blue and white flag of the 26-nation alliance flutters in the cold breeze alongside the spangled banner of the EU.

Inside the canteen it is like a Tower of Babel with almost every language of Europe competing to be heard above the clatter of trays and dishes.

Our escort, a German army officer in immaculate uniform, leads us down a corridor to a hushed room where 20 or so military analysts sit hunched over computers; their desert boots and camouflage fatigues strangely out of place for a windowless room in Belgium.

This, explains Chris Evis, is the Incident Management Section, which he heads.

“We face the full gamut of threats. It varies from your kiddie who’s just trying to gain street cred amongst his friends to say he’s just defaced a Nato system to more focused targeted attacks against Nato information”.

Cyber attacks are not new – websites were being hacked into and brought down during the Kosovo war 10 years ago.

Continue reading…

Filed under: cyber war, Military, News, , , , , , , , , , , , , , ,

Intel director: Iran, cyber threats biggest worry

By Pamela Hess
January 16, 2009
Associated Press

WASHINGTON (AP) — Iran producing a nuclear weapon and a cyber attack on critical government or private computer networks top the list of concerns nagging at National Intelligence Director Michael McConnell as he prepares to leave office.

McConnell told reporters in an interview Friday that U.S. intelligence agencies do not have evidence to prove Iran has decided to build a nuclear warhead, but he shares the alarm of outgoing CIA Director Michael Hayden that the possibility may come soon. He said Tehran is two to three years away from having a long-range missile that could reach Europe, and continues to produce low-enriched uranium, the raw ingredient for the fissile material needed for a warhead.

“I’m very concerned Iran will continue down a path that will result in a nuclear weapon,” he said.

He is especially worried about the effect it would have in the Middle East, either kicking off a regional arms race or a war.

McConnell said that protection of U.S. computer networks — government, military and commercial — is another major worry.

“Cyber security is the soft underbelly of this country,” he said.

His fear is less that information would be stolen off the networks by hackers or spies but that they would destroy it outright.

“It could have a debilitating effect on the country,” he said.

The federal government is still building its cyber protection plan, with the Homeland Security Department nominally in charge. But McConnell said the spy agencies, especially the National Security Agency, have to play a key role in protecting domestic computer networks. That prospect alarms privacy and civil liberty advocacy groups, who oppose giving agencies meant to spy on foreign powers access to private citizens’ data and activities on the Internet.

Continue reading…

Filed under: cyber war, Intelligence Community, News, , , , , , , , , , , , , , ,

Waging a war with bits and bytes

By Mayank Tewari
January 11, 2009

Did you know that India and Pakistan have been fighting a cyber war for more than ten years now? That the Western world, particularly USA and a handful of European nations, have been shouting themselves hoarse at every international forum for the last two years alleging cyber intrusions by China?

Welcome to cyber warfare, a kind of conflict where no blood is shed but networks bleed, websites are attacked and defaced, e-mail servers are compromised and spying software is planted in them.

The cyber war between India and Pakistan began more than a decade ago when India went nuclear in May 1998. Angry at India for destabilising the region, hacker groups from Pakistan hacked into the website of Bhabha Atomic Research Centre (BARC). Within weeks, Indian hackers had their revenge by defacing hundreds of websites run by the Pakistani government and its affiliates. The war continues till date.

Continue reading…

Filed under: cyber war, News, , , , , , , ,

Global Trends

"The nature of conflict is changing. The risk of conflict will increase due to diverging interests among major powers, an expanding terror threat, continued instability in weak states, and the spread of lethal, disruptive technologies. Disrupting societies will become more common, with long-range precision weapons, cyber, and robotic systems to target infrastructure from afar, and more accessible technology to create weapons of mass destruction."
Global Trends and Key Implications Through 2035 from the National Intelligence Council Quadrennial Report GLOBAL TRENDS: The Paradox of Power

A World at War

The World is at War. It is a world war that is being fought right now, in real time, virtually everywhere on the planet. It is a world war that is, perhaps, more encompassing and global in nature than any other world war in history because, not only is it being fought by nations and their governments, it is also being fought by non-state actors such as terrorists, organized crime, unorganized crime, and many other known and unknown entities. It is a total world war being fought every day on the hidden and dark battle fields of the cyber domain. It is a war that, according to some intelligence estimates, has the potential to be as nearly as serious and as deadly as a nuclear war... [MORE]




Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real... [MORE]


  • Protecting Privacy August 15, 2017
    The E-Government Act of 2002 requires federal agencies to conduct privacy impact assessments for government systems that collect personal informatioon online to document how these systems collect, use, share, and maintain personally identifiable information. Learn about CTIIC's Privacy Impact process.
  • NESPIN Welcomes Connecticut Intelligence Center (CTIC) to Group of Agency Systems Connected to RISSNET July 27, 2017
    By: Donald Kennedy  Aug 15, 2016   The New England State Police Information Network (NESPIN) is pleased to welcome the Connecticut Intelligence Center (CTIC) to the group of partner agency systems connected to Regional Information Sharing Systems (RISS) and sharing criminal intelligence via RISSIntel.
  • Unpacking Cyber Terrorism July 26, 2017
    By: ISE Bloggers  May 31, 2016   The Information Sharing Environment (ISE) has always been focused on terrorism-related information sharing; with terrorist groups’ ever-increasing level of sophistication in their use of the Internet, it is only natural that information sharing play a role in tackling issues posed by cyber terrorism.
  • Homeland Security Advisor Tom Bossert Discusses Global Ransomware Attack May 22, 2017
    The President's Homeland Security Advisor, Tom Bossert, briefed the press on 15 May 2017 on the WannaCry ransomware attack that began spreading 12 May and affected computers in more than 150 countries. Bossert highlighted CTIIC's role in keeping the White House informed of unfolding events and discussed US responses and public/private coordination […]
  • Homeland Security Advisor Tom Bossert Discusses Global Ransomware Attack May 22, 2017
    The President's Homeland Security Advisor, Tom Bossert, briefed the press on 15 May 2017 on the WannaCry ransomware attack that began spreading 12 May and affected computers in more than 150 countries. Bossert highlighted CTIIC's role in keeping the White House informed of unfolding events and discussed US responses and public/private coordination […]


Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity... [MORE]


Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications... [MORE]



“When it comes to what government and business are doing together and separately with personal data scooped up from the ether, Mr. Schneier is as knowledgeable as it gets…. Mr. Schneier’s use of concrete examples of bad behavior with data will make even skeptics queasy and potentially push the already paranoid over the edge.” (Jonathan A. Knee - New York Times)... [MORE]


  • The Recruit(s): CIA K9s Level Up
    Feature Story: The fall 2017 CIA “puppy class” is in high gear. The girls and new boy have learned all of their target odors and have been training with their new human partners for several weeks. They can now detect over 20,000 different explosive mixtures!
  • A Day in the Life of a CIA Cartographer
    Featured Story: The CIA’s Directorate of Analysis (DA) provides the president and senior policymakers with written intelligence assessments on national security issues. The DA is relying increasingly on cartographers to help analysts visually communicate complex intelligence stories. DA cartographers produce reference maps and map folios, thematic maps that […]
  • November 10, 1997: Killer of CIA Officers at HQs Convicted
    Blog Post: On November 10, 1997, a jury in Fairfax County, Virginia, found Pakistani national Aimal Kasi guilty on one count of capital murder, one count of first degree murder, and three counts of malicious wounding—charges that stemmed from his shooting rampage at the entrance to CIA Headquarters in 1993. For many CIA officers, however, a more satisfying m […]
  • Pupdate: Training the Handlers
    Blog Post: The pups have finished their imprint training and have officially been paired with their human partners. As the pups continue to refine their skills, the handlers take advanced classes on subjects like firearms and explosives, as well as emergency veterinary care for dogs.
  • CIA Releases Nearly 470,000 Additional Files Recovered in May 2011 Raid on Usama Bin Ladin’s Compound
    Press Release: CIA Releases Nearly 470,000 Additional Files Recovered in May 2011 Raid on Usama Bin Ladin’s Compound


The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format about the incident response process, how attackers work, common tools, a methodology for network analysis developed over 12 years, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, and numerous other topics... [MORE]

RSS Defense Advanced Research Projects Agency (DARPA)

  • 2017/11/21 DARPA Digging for Ideas to Revolutionize Subterranean Mapping and Navigation November 21, 2017
    Subterranean warfare-whether involving human-made tunnels, underground urban infrastructure, or natural cave networks-has been an element of U.S. military operations from World War II and Vietnam to Iraq and Afghanistan. As above-ground commercial and military intelligence, surveillance, and reconnaissance (ISR) capabilities continue to grow more capable and […]
  • 2017/11/17 Nature’s Silent Sentinels Could Help Detect Security Threats November 17, 2017
    Few military requirements are as enduring as the need for timely, accurate information. To meet this demand, the Department of Defense invests heavily in the development of powerful electronic and mechanical sensors, and in the manpower to maintain and operate those sensors. DARPA has been involved on the research side of the equation since the Agency's […]
  • 2017/11/15 Developing “ABCs” for Exploiting New Phenomena in Light-Matter Interactions November 15, 2017
    A unique class of engineered light-manipulating materials, known as metamaterials or structured materials, makes use of patterns of strongly interacting wavelength or sub-wavelength-sized elements. Because of these intricate internal and surface structures, new properties have emerged, some exhibiting behavior that has resulted in rewriting long-understood […]
  • 2017/11/08 Steven H. Walker Appointed 21st DARPA Director November 8, 2017
    The Under Secretary of Defense for Acquisition, Technology, and Logistics, Ms. Ellen M. Lord, today announced the appointment of Dr. Steven H. Walker as the 21st director of the Defense Advanced Research Projects Agency (DARPA). A former DARPA program manager, deputy office director, and office director, Walker has devoted 13 of his more than 30 years of pub […]
  • 2017/10/16 DARPA Software Defined Radio (SDR) Hackfest Selects Teams to Explore Cyber-Physical Intersection of SDR and Drone Technology October 16, 2017
    The increased use of wireless and internet-enabled devices – from computers to home appliances – and the data they generate are creating opportunities and challenges for the defense and commercial sectors. To help explore and better understand the complex relationship created by the intersection of physical and cyber technology within the ever more congested […]


RSS Cyber News (Google)

  • This RSS feed URL is deprecated November 23, 2017
    This RSS feed URL is deprecated, please update. New URLs can be found in the footers at
  • 7 ways Cyber Monday is different from Black Friday - CBS News November 23, 2017
    CBS News7 ways Cyber Monday is different from Black FridayCBS NewsCyber Monday is often written off as Black Friday's less-awesome sibling, but that's unfair. In fact, until last last year, Cyber Monday had been consistently yielding more top-shelf, Editors' Choice deals than Black Friday. So what makes Cyber Monday ...Don't believe these […]
  • The best Cyber Monday travel deals this Thanksgiving season - Washington Post November 22, 2017
    Washington PostThe best Cyber Monday travel deals this Thanksgiving seasonWashington PostCrossFit your thumbs and charge up your mobile device because Cyber Monday is a ticktock away. Forget the sales on chenille socks and pour-over coffee makers. Instead, splurge on a vacation. Here is a roundup of the best Cyber Monday deals this ...and more »
  • Digital technology a great leveller, says Modi at cyber conference - The Hindu November 23, 2017
    The HinduDigital technology a great leveller, says Modi at cyber conferenceThe HinduInaugurating the fifth edition of the Global Conference on Cyber Space (GCCS) in New Delh, he said, "We all know how cyberspace has transformed the world in the last two decades. The seniors would recall the bulky mainframe computers of the seventies.PM Modi Inaugurates […]
  • $100 to Paris: How to navigate airlines' Black Friday and Cyber Monday sales - CNBC November 22, 2017
    CNBC$100 to Paris: How to navigate airlines' Black Friday and Cyber Monday salesCNBCAirlines want to get consumers away from the mall — like, thousands-of-miles-away far. Domestic and international carriers, along with hotels and online travel agencies, have jumped on the Black Friday and Cyber Monday bandwagon in recent years, ...
  • Germany's Cyber Valley aims to become leading AI hub - Financial Times November 23, 2017
    Financial TimesGermany's Cyber Valley aims to become leading AI hubFinancial TimesGermany's Max Planck Society creates Nobel Prize winners. Most recently, in 2014, physicist Stefan Hell, one of its scholars, was recognised for a breakthrough in microscope technology, allowing much smaller structures — less than 200 nanometres — to ...
  • Finally, India is gearing up to face cyber security threats - Economic Times November 23, 2017
    Economic TimesFinally, India is gearing up to face cyber security threatsEconomic Times“The recent Wannacry and Petya ransomware attacks on Indian businesses has escalated cyber security to a boardroom priority. Most enterprises are investing in next generation firewalls with advanced threat protection capabilities for advanced malware ...and more »
  • The Best Jean Sales Happening on Black Friday and Cyber Monday - Racked November 22, 2017
    RackedThe Best Jean Sales Happening on Black Friday and Cyber MondayRackedThere are so many sales happening this week, and we're here to bring you the best of the best. In case you're just joining this now, a recap: Through Cyber Monday, we'll be compiling lists of the absolute can't-miss sales — you can see our master list ...
  • Google's announced its Google Play Black Friday and Cyber Monday deals - BGR November 22, 2017
    BGRGoogle's announced its Google Play Black Friday and Cyber Monday dealsBGRGoogle's Black Friday hardware deals aren't too exciting unless you're really looking to buy discounted Home speakers and more Chromecast units. Sadly, the Pixel 2 or Google's Pixelbook aren't discounted for either Black Friday or Cyber Monday.20 Black F […]
  • Cyber Monday 2017: When is it, what deals are there and everything you need to know - Derby Telegraph November 23, 2017
    Derby TelegraphCyber Monday 2017: When is it, what deals are there and everything you need to knowDerby TelegraphBlack Friday originates from America and takes place on November 24, whereas the exclusive online sales take place on the following Monday. Here is everything you need to know about Cyber Monday this year. Cyber Monday will fall on November 27.and […]
  • Book These Black Friday And Cyber Monday Luxury Hotel Deals ... - Forbes November 22, 2017
    ForbesBook These Black Friday And Cyber Monday Luxury Hotel Deals ...ForbesThanksgiving through Cyber Monday, Sailrock Resort, a new resort located in South Caicos in the Turk and Caicos island chain, is offering travelers who book a ...Black Friday-Cyber Monday deals at 16 hotels that put luxury within ...Los Angeles Timesall 2 news articles »


RSS Cyber War News (Bing)

  • Expect Huge Travel Sales On Cyber Monday 2017 November 22, 2017
    Thanksgiving 2017 is looking to be bigger than ever and not just because of the excess traffic on the roads. Experts are predicting huge flash travel sales for Cyber Monday and Travel Deal Tuesday this year, with some companies kicking off the deals as ...
  • Cyber Monday's biggest deals and savings November 23, 2017
    The money-saving deals won’t end on Nov. 24. Cyber Monday shoppers can look forward to more special promotions in the wake of Black Friday. Cyber Monday – known as the day when companies offer a wide array of discounts online – is set to take place ...
  • German cyber agency calls for authority to hack back: Spiegel November 22, 2017
    FRANKFURT (Reuters) - Germany spy agencies should have the authority to digitally strike back against cyber criminals, the president of Germany’s new cyber security agency Zitis told Der Spiegel newsmagazine. “As a citizen I expect that our government ...
  • 4 things that are a better buy on Cyber Monday November 23, 2017
    Black Friday is the shopping holiday some consumers wait for all year. But savvy shoppers know that not every deal is worth it that day. So how do you decide whether to snag an early deal, or wait for better savings on Cyber Monday? We've rounded up the ...
  • Cyber Monday is forecast to be huge. The reason: can't shake a shopping habit November 22, 2017
    SAN FRANCISCO — Cyber Monday is forecast to be the largest online shopping day in U.S. history. Not bad for a made-up holiday that has its roots in the painful slowness of dial-up modems. This year, Americans are expected to spend $6.6 billion online ...
  • Best vacuum Black Friday and Cyber Monday deals 2017 November 23, 2017
    On Black Friday and into Cyber Monday, among the items we're expecting to see heavy discounts on is the trusty vacuum cleaner. They might not be the most glamorous of appliances, but no home can do without a decent dust buster. Whether's its cordless or ...
  • The Best Cyber Monday Tech Deals We've Found So Far November 22, 2017
    We put together a few different WIRED Black Friday Deals Guides to help you find the best deals at home over Thanksgiving weekend and avoid the horrible lines and madness at your local store or mall. Cyber Monday, which is November 27 this year, will ...
  • Google’s announced its Google Play Black Friday and Cyber Monday deals November 23, 2017
    Google’s Black Friday hardware deals aren’t too exciting unless you’re really looking to buy discounted Home speakers and more Chromecast units. Sadly, the Pixel 2 or Google’s Pixelbook aren’t discounted for either Black Friday or Cyber Monday.
  • Uber hid cyber attack that exposed data of 57 million customers and drivers November 23, 2017
    Uber is acknowledging that members of its cyber security team hid a data breach that impacted 57 million customers and drivers. The ride-share company has said that hackers were able to steal the names and driving licences of some 600,000 US drivers in a ...
  • The best Cyber Monday travel deals this Thanksgiving season November 22, 2017
    CrossFit your thumbs and charge up your mobile device because Cyber Monday is a ticktock away. Forget the sales on chenille socks and pour-over coffee makers. Instead, splurge on a vacation. Here is a roundup of the best Cyber Monday deals this ...


RSS Cyber Tag (Icerocket)


RSS Cyberwar Tag (Wordpress)


The Art of Attention

© 2016 PROSOCHĒ. All Rights Reserved.
Fair Use Policy ҩ Terms of Service ҩ Privacy Policy ҩ Contact

Cyber Threat Assessment



In this New York Times bestselling investigation, Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared... [MORE]


As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize–winning journalist Fred Kaplan... [MORE]



Support CSWW

Please help improve CSWW by providing us with your comments, concerns, and questions at our FEEDBACK page.

Editor, CSWW

Kurt Brindley is a retired U.S. Navy Senior Chief who specialized in the fields of tele-communications and C4SRI systems Upon retirement from the navy, he spent nearly a decade as a defense industry consultant. He now writes full time... [MORE]


Now in development for film by 20th Century Fox, award-winning CyberStorm depicts, in realistic and sometimes terrifying detail, what a full scale cyber attack against present-day New York City might look like from the perspective of one family trying to survive it... [MORE]