Cadet 1st Class Jordan Keefer, center, coordinates cadet efforts to defend their network during the National Security Agency's Cyber Defense Exercise April 17, 2012. (U.S. Air Force photo/Raymond McCoy).
Richard Forno and Anupam Joshi, The Conversation/Scientific American: How U.S. "Cyber Bombs" against Terrorists Really Work
Clusters of software and hardware are being aimed at ISIS and other outlaw groups.
Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was “dropping cyberbombs,” taking its ongoing battle against the Islamic State group into the online world. Other American officials, including President Barack Obama, have discussed offensive cyber activities, too.
The American public has only glimpsed the country’s alleged cyberattack abilities. In 2012 The New York Times revealed the first digital weapon, the Stuxnet attack against Iran’s nuclear program. In 2013, former NSA contractor Edward Snowden released a classified presidential directive outlining America’s approach to conducting Internet-based warfare.
Read more ....
WNU Editor: An easy to read explanation. Bottom line .... a lot of people are involved when it comes to launching an attack.
No comments:
Post a Comment