1 - 4 of 4
Number of results to display per page
Search Results
2. Beyond Attribution: Seeking National Responsibility in Cyber Attacks
- Author:
- Jason Healey
- Publication Date:
- 02-2012
- Content Type:
- Policy Brief
- Institution:
- Atlantic Council
- Abstract:
- For more than two decades, cyber defenders, intelligence analysts, and policymakers have struggled to determine the source of the most damaging attacks. This "attribution problem" will only become more critical as we move into a new era of cyber conflict with even more attacks ignored, encouraged, supported, or conducted by national governments.
- Topic:
- Defense Policy, Science and Technology, Terrorism, International Security, and Reform
- Political Geography:
- China
3. Preparing for Cyber 9/12
- Author:
- Jason Healey
- Publication Date:
- 06-2012
- Content Type:
- Policy Brief
- Institution:
- Atlantic Council
- Abstract:
- Experts have warned about a massive surprise cyber attack since at least 1991, when Winn Schwartau testified to Congress about the dangers of an "electronic Pearl Harbor." More recently, the analogy has changed to a "cyber 9/11" but the fear is generally the same: the dependence of modern economies and societies on cyberspace means a digital attack could fundamentally disrupt our way of life and be remembered for decades as the day everything changed.
- Topic:
- Defense Policy, Economics, Science and Technology, and Terrorism
4. The Five Futures of Cyber Conflict and Cooperation
- Author:
- Jason Healey
- Publication Date:
- 12-2011
- Content Type:
- Policy Brief
- Institution:
- Atlantic Council
- Abstract:
- The word cyberspace is nearly thirty years old, and during that time, academics, theorists, and strategists have been considering how conflict will unfold in this new domain .As yet, though, little has been published on what kinds of different futures may await us .For example, many writers seem to imply that cyberspace itself is relatively static, when it is in fact constantly transformed through changes in usage and technology. Indeed, today's generation of digital natives has never known a world without the Internet, and their experience of cyberspace—especially in terms of security, privacy, and collaboration—will be very different from that of previous generations weaned on mainframes, modems, desktop computers, and AOL. If cyberspace is different and younger generations use it differently, then future conflict and cooperation in cyberspace may be unlike anything experienced or even envisioned by Cold War-era thinkers and strategists.
- Topic:
- Defense Policy, Science and Technology, Terrorism, and International Security
- Political Geography:
- North America