NSA Grafitti in Stockholm, Sweden. Image: beppek/Pixabay
This article was originally published by openDemocracy on 29 October, 2015.
In computing, a “segmentation fault” occurs when a program tries to access information that it has no business accessing.
Emotion vs. reason. Instinct vs. analysis. Heart vs. brain. Perhaps there is no other dichotomy in our intellectual history that still holds similar sway. From an early age, we are taught to dissect what goes on in our minds and neatly compartimentalise it into these two boxes. When, in 2015, we survey the challenges facing our democracies, it is easy to slide back into this old habit. » More
Espionage Image: Alan/Flickr
This article was originally published by War on the Rocks on 11 September, 2015.
After the OPM hack, there were suggestions that the Chinese might be building digital dossiers on every U.S. government official, or even on all Americans. More recent reports have the Russian and Chinese intelligence services exploiting personally identifiable information about Americans from security clearance databases, airline records, medical records and many other sources on a massive scale. The Los Angeles Times has reported that the head of the National Counterintelligence Executive has confirmed that foreign powers are doing these things. Other, anonymous sources told the Times that “at least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives … overseas has been compromised as a result.” It has even been suggested that the Russian and Chinese services are throwing data from the Ashley Madison breach into the mix. » More
The NASA Supercomputer “Discover”. Image: NASA Goddard Space Flight/Flickr
“Cyber incidents are a bit like a bar brawl – you might have a pretty good idea who started it, but you will never be absolutely sure”.
When it comes to managing contemporary cyber incidents and crises, the above statement couldn’t be more accurate. National cybersecurity strategies and international regimes are not only becoming increasingly common, they’re also proving difficult to implement and enforce. In this respect, some of the most pressing concerns are associated with key cybersecurity aspects like ‘terminology’, ‘perspective’ and ‘attribution’. » More
Computer screen. Image: hackNY.org/Flickr
On November 7, the Swiss Chairmanship of the Organization for Security and Co-operation in Europe (OSCE) held a conference in Vienna on confidence-building measures for cybersecurity. The event built on several positive international developments last year, including a bilateral agreement between the U.S. and Russia and the member states of the OSCE to adopt “an initial set of OSCE Confidence-Building Measures (CBMs) to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies.” Last week’s conference sought to promote the implementation of the latter and further negotiations. This includes a recent study commissioned by the Swiss Government, and available at the Global Cyber Definitions Database, which offers a compilation of existing cybersecurity-related terms in order to shed light on these differences. » More
“Call of Duty”- character. Image: Deviant-Dev/Deviantart
This article was originally published by War on the Rocks on 1 October 2014.
The Atlantic Council, seeking to enhance its exploration of the Future of Warfare with some new blood, recently hired Call of Duty: Black Ops series director Dave Anthony for an unpaid position as a senior fellow. At first glance, given the futuristic games Anthony has developed and the extensive consulting he has conducted with domain experts, the move seems like a no-brainer. Why not think outside the (policy) box with a man whose games rule the X-Box? Anthony’s Black Ops 2 in particular is seen by many defense analysts as a chilling vision of future warfare. However, this may have something to do with the fact that Anthony consulted many of them in the development process. » More