Electronic warfare

Results: 1516



#Item
91Electronic warfare / Nuclear strategies / Military technology / International security / Cyberwarfare / Deterrence theory / United States Cyber Command / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Military science / International relations / Hacking

Deterring Malicious Behavior in Cyberspace Scott Jasper Abstract Recent incidents reveal cyberattacks are being employed and honed in a systematic, coordinated fashion to achieve the objectives of malicious actors. Deter

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2015-02-19 16:04:11
92Social psychology / War / Terrorism / Electronic warfare / Military technology / Cyberterrorism / Federal Bureau of Investigation / Computer insecurity / Malware / Computer crimes / Cyberwarfare / Crime

Attribution in Cyberspace: Challenges for U.S. Law Enforcement

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2015-04-24 12:07:52
93Electronic warfare / Hacking / Military technology / Public safety / War / International Multilateral Partnership Against Cyber Threats / Computer security / United States Department of Homeland Security / National Cyber Security Division / Cyberwarfare / Computer crimes / Security

S:HRCNSLRITE09ersec.4

Add to Reading List

Source URL: lauren.vortex.com

Language: English - Date: 2009-04-03 18:03:10
94Military / War / Computer network operations / Hacking / Military technology / CNO / Information warfare / Computer science / Cyber Operations / Military science / Electronic warfare / Cyberwarfare

Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:16:30
95Hacking / Military technology / Australian Defence Force / Military of Australia / War / Technology / Wideband Global SATCOM system / Department of Defence / Royal Australian Air Force / Cyberwarfare / Military science / Electronic warfare

Microsoft Word - SC 5-2.doc

Add to Reading List

Source URL: www.securitychallenges.org.au

Language: English - Date: 2011-06-23 06:59:56
96Security / Electronic warfare / Hacking / Military technology / War / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / United States Computer Emergency Readiness Team / United States Department of Homeland Security / Computer crimes / Cyberwarfare / Computer security

Cybersecurity and Information Sharing: Legal Challenges and Solutions

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2015-03-20 13:00:34
97Hacking / Military technology / Military science / War / National security / Computer security / Internet-related prefixes / Computer crime / Cyber-security regulation / Cyberwarfare / Security / Electronic warfare

Cyber Security. Points that need to be part of the conversation

Add to Reading List

Source URL: www.lynxspring.com

Language: English - Date: 2014-08-13 09:32:30
98Computer crimes / Electronic warfare / Hacking / Military technology / Mass surveillance / International Multilateral Partnership Against Cyber Threats / Cyberwarfare / Personally identifiable information / Internet privacy / Security / Ethics / National security

The Protecting Cyber Networks Act   Undermines Privacy, Enables Cyber­Surveillance, and Threatens Internet Security    By Robyn Greene, Policy Counsel    This month, the House of Representative

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-04-20 18:04:23
99Electronic warfare / Computer crimes / Hacking / Military technology / United States Cyber Command / Cyberterrorism / Cooperative Cyber Defence Centre of Excellence / Cyber Operations / Cyberspace / Military science / Cyberwarfare / Military

THE LAW OF CYBER WARFARE: QUO VADIS? Michael N. Schmitt* INTRODUCTION ....................................................................................................... 269   I.   NORMATIVE EVOLUTION..........

Add to Reading List

Source URL: journals.law.stanford.edu

Language: English - Date: 2014-06-29 15:47:46
100Electronic warfare / Hacking / Military technology / Cyberwarfare / National security / Military organization / United States Cyber Command / Department of Defense Cyber Crime Center / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Military science / Department of Defense Strategy for Operating in Cyberspace

Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:17:00
UPDATE