SmartPlanet: US Encouraged to Allow Private Retaliation Attacks Against Hackers — Pathetic Insanity Spurred on by Incapacity of USG — + Cyber-Idiocy Meta-RECAP

U.S. encouraged to allow firms to retaliate against hackers Throwing money at creating cyberpolice forces and technology to keep up with digital threats may not be the only tactics the U.S. will employ in the future. As a meeting between President Obama and the new president of China, Xi Jinping, draws near, former senior officials …

Marcus Aurelius: The Cyber-Dam Break — “Blame It On China” Goes Into High Gear

The Cyber-Dam Breaks Sensitive Army database of U.S. dams compromised; Chinese hackers suspected BY: Bill Gertz The Washington Free Beacon, May 1, 2013 U.S. intelligence agencies traced a recent cyber intrusion into a sensitive infrastructure database to the Chinese government or military cyber warriors, according to U.S. officials. The compromise of the U.S. Army Corps …

Mini-Me: Time for a GAO Audit of Claimed Cyber-War Capabilities and Investment Plans

Huh? Pentagon expands cyber-attack capabilities Jim Michaels USA Today, 21 April 2013 WASHINGTON – The U.S. military is increasing its budget for cyber-warfare and expanding its offensive capabilities, including the ability to blind an enemy’s radar or shut down its command systems in the event of war, according to two defense officials. In the 2014 …

Berto Jongman: State-Sponsored Industrial Cyber-Espionage

State-backed data spies hunt industrial secrets State-sponsored industrial espionage became a bigger cyber-threat to companies in 2012, a report indicates. Statistics gathered for Verizon’s annual data breach report suggested state-sponsored hacking attacks were now the number two cyber-threat. Top of the list were hackers looking to steal money after breaking into corporate networks, Often, the …

John Robb: Cyber-War with China — Wrong Answer (and Robert Steele with Better Answer)

Cyber Deterrence against China? The only route left is an Open Source Approach Is there a way to deter cyber attacks? Yes. Two ways. One takes a moral high ground. I won’t waste any time discussing that option. Why? After flame/stuxnet, and the unilateral escalation of the cyberweapons arms race by the US, that option …

Stuart Umpleby: Limitations of Hand-Held Dashboards + Cyber-Brain RECAP

Before Fruit Ninja, Cybernetics By WILL WILES New York Times, November 29, 2012 EXTRACT (Conclusion) The No. 10 Dashboard taps into the same desire to master available information — a desire that has only grown as the amount of information in circulation has increased. Where Cybersyn needed dedicated national infrastructure and rooms full of equipment, …

Berto Jongman: Cyber-World Crisis of Legitimacy and Representation

The crisis of legitimacy and representation Matthew Carpenter-Arevalo ForumBlog.org, Dec 17th, 2012 The ongoing spat between the cyber community and the United Nation’s International Telecommunications Union (ITU) reveals a much larger crisis that the world is increasingly facing – the crisis of the legitimacy of representation. The UN and the Internet are arguably two of …