The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age by Peter Kestner, 2024
Explores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts from Sun Tzu to Carl von Clausewitz, the author illustrates that, despite changed conditions such as time, location, means, and resources it is possible to learn from past actions and reactions.
Cyber Operations: A Case Study Approach by Jerry M. Couretas, 2024
Cyber Operations offers a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed.
India, Pakistan attempted to interfere in Canada's elections: CSIS
In the case of the 2019 election, CSIS said the Canadian government conducted what it called a "threat reduction measure" ahead of the vote, meant to "reduce the foreign interference threat posed by the Government of Pakistan."
"The situation was monitored and assessed to have effectively reduced the threat of interference," CSIS wrote.
Another step is severely beefed-up policing of political content. Although I'm critical of its use, #AI could, in this case, be used to pre-screen all #SM content. "Problematic" contents and accounts (tbd) would be evaluated by a likewise beefed-up #CyberPolice force, to be either forwarded to the prosecution or to the #CyberWarfare command/ #CyberIntelligence agents or discarded.
I...
...gegen den Westen. Wie der ehemalige #Mossad-Chef über einen weiteren Bestandteil, dieses #HybridenKriesgs, die #CyberWarfare schrieb: 365 Tage im Jahr, 24 Stunden am Tag.
The top U.S. #intelligence ofcl on Mon warned that the #war in #Gaza could embolden #terrorist groups, which are aligned in their opposition to the #UnitedStates for its support of #Israel.
“The crisis has galvanized #violence by a range of actors around the world. And while it is too early to tell, it is likely that the Gaza conflict will have a generational impact on #terrorism,” #ODNI#AvrilHaines, told an annual hearing on #GlobalSecurity#threats.
#VladimirPutin must be absolutely thrilled by how much ROI continues to accrue from his 2016 #Facebook ads to help elect #Trump, to say nothing of the hooker tapes he's probably holding over Trump's head.
#DonaldTrump has no official powers left and might soon be in shackles, but he's already turned the #GOP into the absolute best weapon that #Russia now commands.
"#Democrats on the #HouseIntelligenceCommittee released thousands of #Russian#Facebook ads on Thursday, offering the public its first in-depth look at the troubling messages used to heighten tensions among #Americans during and after the 2016 U.S. presidential election.
The release of the 👉ads, which Facebook says were purchased by the...
Ultimate Cyberwarfare for Evasive Cyber Tactics: Unravel the Techniques of Cyberwarfare, Hacktivism and Asymmetric Conflicts for Tactical Excellence With Real-World Use Cases and Strategic Insights by Chang Tang
The book begins by unraveling the tapestry of today's cyber landscape, exploring current threats, implementation strategies, and notable trends.
If this is true it will probably one of the most effective cyberattacks ever? Although you would think some offline backups are available.
"Cyber units of Ukraine’s Defence Intelligence attacked the tax system of Russia and managed to destroy the entire database and its backup copies. The intelligence adds that Russia will not be able to resuscitate its tax system fully." https://www.pravda.com.ua/eng/news/2023/12/12/7432737/ #cyberwarfare#ukraine#cybersecurity#russia
Hackers potentially linked to the Russian GRU Main Intelligence Directorate carried out a series of highly coordinated cyberattacks targeting Danish critical infrastructure in the nation's largest cyber incident on record, according to a new report.
@torproject And yes, I do need some with the ability to filter as contacts in #Russia that want to #flee basically have no other option than #Tor as #Roskomnadnozr systematically bricks #VPN's and #Proxies and only allows like #Webtunnel and #SSH connections the latter one propably for Russia's [#CyberWarfare] to pass through.
So even if they had like #GMail or #RiseUp that wouldn't fix their issues nor would it solve that need.
Cyberwarfare
1/2
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do.
Do not direct cyber-attacks against civilian objects
Do not use malware or other tools or techniques that spread automatically and damage military objectives and civilian objects indiscriminately
When planning a cyber-attack against a military objective, do everything feasible to avoid or minimise the effects your operation may have on civilians
Do not conduct any cyber-operation against medical and humanitarian facilities
Do not conduct any cyber-attack against objects indispensable to the survival of the population or that can release dangerous forces
Do not make threats of violence to spread terror among the civilian population
Do not incite violations of international humanitarian law
Comply with these rules even if the enemy does not
"A series of high-profile #cyberattacks from #Russia, #China and criminal networks in recent years have served as a wake up call to the Defense Department that #cyberwarfare has changed."
Japan's cybersecurity agency was reportedly breached by Chinese state hackers for 9 months before it was discovered.
Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) announced in August that personal data linked to email exchanges may have been compromised after it was hacked in October last year.
It was also reported by the Washington Post that the US NSA found Chinese military hackers have also breached the Japanese Defense networks.