Orlando Doctrine

By Brandon Dunlap | Curated news articles pertaining to the various stages of the Orlando Doctrine (www.orlandodoctrine.com) Network Use of Force Continuum.

German cyber security agency seeks power to ‘hack back’ in case of attack

In order to overcome present-day cyber security challenges, Germany must be able to “hack back” into the computers of alleged culprits, the head of …

Rep. Tom Graves: 'Hack back' bill will launch a new industry

One of the authors of a controversial ‘hack back’ bill in Congress believes the legislation can launch a new industry around “active defense” that …

US Wages Cyberwar Abroad Under Cover of “Activism” | Global Research - Centre for Research on Globalization

<i>The threat of cyberterrorism has competed for centre stage in American politics with fears of “Russian hackers” disrupting everything from elections</i> …

Security

Article Review 83 on “What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment” | ISSF

“For reasons unknown, Hollywood has decided that Nmap is the tool to show whenever hacking scenes are needed.”<p>Perhaps the most important question in …

Cybersecurity

Should you stay awake at night worrying about hackers on the grid?

Watt's all this about cyberspy threat leaks... Analysts weigh in<b>Analysis</b> The energy sector across multiple Western countries is under intensified …

Cybersecurity

Defending against cyberwar: How the cybersecurity elite are working to prevent a digital apocalypse

Cyberwar has evolved from the theoretical to the ominous. TechRepublic went inside one of the defenders vs. hackers war games that's helping …

Russia has developed a cyberweapon that can disrupt power grids, according to new research

Hackers allied with the Russian government have devised a cyberweapon that has the potential to be the most disruptive yet against electric systems that Americans depend on for daily life, according to U.S. researchers.<p>The malware, which researchers have dubbed CrashOverride, is known to have …

Cybersecurity

This Bill Would Make Revenge Hacking Legal

The Active Cyber Defense Certainty Act, proposed by a GOP congressman, appears to contemplate hacker-versus-hacker gladiatorial combat—and that has …

A vigilante is putting a huge amount of work into infecting IoT devices | Ars Technica

When it comes to features and robustness, Hajime surpasses its blackhat rivals.<p>Last week, Ars introduced readers to Hajime, the vigilante botnet that …

Information Security

German military can use 'offensive measures' against cyber attacks: minister

BERLIN (Reuters) - The German military has the authority to respond with "offensive measures" if its computer networks are attacked, German Defence Minister Ursula von der Leyen said on Wednesday, amid growing concerns among German lawmakers about control of such actions.<p>Von der Leyen, speaking at …

Germany

Darktrace's AI is now automatically responding to hacks – and stopping them

Darktrace's "digital antibodies" have stopped one Brexit-themed data protection threat: while trialling the machine-learning anti-hacking system's …

Cybersecurity

Here's Why SpaceX's Next Launch Is Going to Make History

Historic Grounds<p>SpaceX was all set to take off from the historic launchpad at Cape Canaveral this morning, but the unmanned mission was called off …

Exploration

IBM to use Jeopardy! winning machine Watson to fight cyber attacks

Perhaps better known for pitting its wits against the winners of a US television quiz show, IBM’s artificial intelligence asset is now being unleashed against cyber attackers.<p>Watson, originally designed as a question answering machine, beat two of the most successful Jeopardy! contestants in 2011 …

Your Government Wants to Militarize Social Media to Influence Your Beliefs

A conference in London this week brings together military and intelligence officials hoping to use social media as a tool in the armed forces.<p>A global conference of senior military and intelligence officials taking place in London this week reveals how governments increasingly view social media as …

An Ethical Hacker Explains How to Track Down the Bad Guy

These digital detectives show us how it's done.<p>The revolution will not be televised. It'll be sent to your inbox by us.<p><b>By Timothy Summers, University</b> …

Security

Is Cyber Warfare The Future Of War?

TestTube Plus is built for enthusiastic science fans seeking out comprehensive conversations on the geeky topics they love. Host Trace Dominguez digs …

Security

Unprecedented cyber attack takes Liberia's entire internet down

An unprecedented cyber attack has knocked Liberia's internet offline, as hackers targeted the nation's infrastructure using the same method that shut down hundreds of the world's most popular websites at the end of last month.<p>The attack, which is the same used to shut off sites including Netflix, …

Cybersecurity

A botnet launching a “test” cyberattack knocked out an entire country’s internet

After one botnet wreaked havoc in the US two weeks ago, another cut off internet access for an entire country.<p>Over the week of Oct. 31, a botnet called Botnet 14 pushed the country of Liberia offline by repeatedly attacking IP addresses owned by the two companies that co-own Liberia’s only fiber …

Information Security

We're living through the first world cyberwar – but just haven’t called it that

Nation states have been attacking each other electronically for a decade or more. Historians will eventually give it a name and a start and end date<p>The job of the historian is often to pull together broad themes and trends, then give them a snappy title that people will easily recognise and …

US military launches cyber attacks on ISIS in Mosul, and announces it | Ars Technica

Secretary of defense reveals cyber attacks in advance of ground battle for city.<p>In a briefing Monday afternoon, Defense Department leaders announced …

Cyber-attacks

Top tech company's IP was looted by China, so it plans to hack back

<b>360° Cyber Security Game</b> 'What are our options?' Prime Minister asks <i>The Reg</i>The poster child for the green energy revolution is in ruins: its …

Australian National University

Beyond cyber espionage lies cyber sabotage and cyber disinformation

Sabotage is a 'significant element' in every military's planning, and covert political influence is an age-old technique made cyber, says former …

Cybersecurity

Hackers are selling powerful cyber weapons to anyone with the money to buy them

When a tremor wobbles the ground underneath your feet, it's easy to keep your head down, keep typing, do whatever it is you were already doing. …

Cybercrime to cyber warfare: Australia woefully unprepared

If there was one event in 2016 that characterised Australia's total lack of preparedness against cyber attacks, it was the epic failure of the Census …

Panel to Trump: Train 100,000 hackers

The incoming Trump administration is being advised to train 100,000 hackers.<p>The new president should also make an effort to develop international norms for hacking, essentially drawing red lines to avoid cyber warfare or even armed conflict.<p>President Obama's special Commission on Enhancing National …

Cybersecurity

America’s next war may be fought online, and we’re underprepared

The United States is frighteningly unprepared for modern-day cyber warfare. While we focus on hot button security risks such as ISIS and domestic terrorism, we let the overwhelming threat of cyberwarfare remain a lesser priority. That’s a mistake. While cyber threats may pose less of an immediately …

Cybersecurity

NATO cyberwar challenge: Establish rules of engagement

<b>Tallinn, Estonia (CNN) —</b> In a red brick building on a 19th-century Russian czarist military compound in Tallinn, Estonia, a team of cyber experts is analyzing the hacking of the Democratic National Committee and how a Western democracy can legally respond.<p>Inside, the building is cutting-edge …

Russia