Just as the internet has connected people beyond borders, weaponized information is reshaping war, espionage and propaganda globally.
Like air power before it, the cyberwar fantasies of today are likely to become realities in the future.
You know your Uncle's old school Apple II he keeps in the basement running pong, yeah, a computer like that controls the United States nukes.
As the US draws red lines in cyberspace, it raises the risk of an eventual confrontation.
More than a week of cacophonous media and political gabble after the shocking Isis attacks on Paris make it clear that US presidential campaigns are no place to look for answers on this shocking and complex episode of new world chaos.
Hacker group Anonymous has joined the fight against the Islamic State terrorist group once again following last week’s attacks in Paris.
Many Western observers fear that cyber reform based on the principle of internet sovereignty might legitimize authoritarian control and undermine the cosmopolitan promise of the multistakeholder system. China, however, benefits too much from the current system to pose a credible alternative.
CAMBRIDGE - Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control.
If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.
We have the social network built, tested and it is jam packed with anti-bullying technology and new uses of anti-cyber war technology and processes to eliminate fake accounts and protect kids online.