Information operations · Cybersecurity · cyberwar

Eligible Receiver 97: Seminal DOD Cyber Exercise Included Mock Terror Strikes and Hostage Simulations


Eligible Receiver 97 was my introduction to Information Operations and cyber.   </end editorial> Washington, D.C., August 1, 2018 – An early classified Defense Department cybersecurity exercise named “Eligible Receiver 97” (ER97) featured a previously unpublicized series of mock terror attacks, hostage seizures, and special operations raids that went well beyond pure cyber activities in order to… Continue reading Eligible Receiver 97: Seminal DOD Cyber Exercise Included Mock Terror Strikes and Hostage Simulations

Cybersecurity · cyberwar · Cyberwarfare

8 top cyber attack maps and how to use them


Have worked in Cyber, cybersecurity, cyber warfare, and cyber policy, for close to 20 years, I can attest to how a briefing without graphics is about as boring as watching paint dry.  Good graphics about cyber are difficult to find. How many ways are there to show a packet of electrons being launched at a… Continue reading 8 top cyber attack maps and how to use them

Cybersecurity · cyberwar · Information operations · Information Warfare

Military Set for Cyber Attacks on Foreign Infrastructure


The very public disclosures of US cyber operations is as much a warning to China and Russia as anything else.  Everything LTG Nakasone brought up was common sense, such as performing reconnaissance on Russian and Chinese power infrastructure. The disclosures about Huawei were also intended to instill a wee bit of paranoia into Chinese minds,… Continue reading Military Set for Cyber Attacks on Foreign Infrastructure

Cybersecurity · cyberwar · Information operations · Information Warfare

Cyber-Enabled Economic Warfare: Assessing US Strategy


Insights from Samantha Ravich. thediplomat.com · by Mercy A. Kuo, The Diplomat · March 21, 2018 Trans-Pacific View author Mercy Kuo regularly engages subject-matter experts, policy practitioners, and strategic thinkers across the globe for their diverse insights into U.S. Asia policy. This conversation with Dr. Samantha Ravich –Principal Investigator on two projects at the Foundation for Defense of Democracies, the… Continue reading Cyber-Enabled Economic Warfare: Assessing US Strategy

cyberwar

On Offer: An Integrated Dashboard for Cyber Warfare


BY PATRICK TUCKER, TECHNOLOGY EDITOR Lockheed previews its response to a Pentagon quest for a tool to coordinate cyber effects in the land, air, sea and space domains. Called “Henosis,” from the Greek word for unity, Lockheed Martin’s new digital dashboard is meant to give commanders a single interface to organize cyber defense and offense in… Continue reading On Offer: An Integrated Dashboard for Cyber Warfare

cyber security · Cyber warfare · Cybersecurity · cyberwar · Cyberwarfare · Electronic Warfare · Influence · inform and influence activities · Information Control · Information operations · Information security · Information Warfare · InfowarCon · Misinformation · Political Warfare · Propaganda · Psychological Operations · Psychological Warfare · Psyop · Public Diplomacy · RT · Russian Trolls · SOF · Soft Power · SoftPower · Strategic Communication · Strategic Narratives · Sweden · Trolls

InfowarCon 2018: CALL FOR PAPERS


Guys and Gals of the information warfare community, information operations world, strategic communications, public diplomacy, cybersecurity, cyberwarfare, electronic warfare, etc – InfowarCon is THE event that you should attend.   I’ve been to quite a few of these through the years. Founded by Winn Schwartau back when the concept of information warfare was just gaining traction… Continue reading InfowarCon 2018: CALL FOR PAPERS

Cybersecurity · cyberwar · Information operations

“Mind Hacking”: Information Warfare in the Cyber Age


I disagree with many of the terms, assumptions, and arguments Mr. Rugge uses, but overall this is a pretty good article.  My biggest concern is the use of the term CEIW (cyber-enabled information warfare), as it places undue emphasis on cyber.  Using the term cyber in this context is actually redundant because there is almost nothing in… Continue reading “Mind Hacking”: Information Warfare in the Cyber Age