Destabilization & Disruption, Implants & Subterfuge …
Global connectivity and a worldwide open & dark Internet have activated a new operational field of battle, intrusion and influence. The security horizon is one of CyberProliferation. CyberAttacks must be acknowledged and confronted as security risks — and restricted. “Let’s negotiate this internationally.”
Battle for Hearts & Minds in the CyberAge
Follow a security reporter as he reveals ongoing probing, skirmishing, attacks and CyberWar today
Snapshot of Voting Vulnerabilities
350,000 Cybervoting Machines in the U.S.
DEF CON: U.S. Voting Systems have ‘staggering’ vulnerabilities
Follow an expert as she navigates CyberThreats to U.S. Voting Systems
Jennifer Cohn @jennycohn1
This startling video by @lulufriesdat shows that ES&S 650 central count scanners-used in 24 states-can be rigged to alter election results w/ ONE MINUTE of access. The video already has 1/4 million views.
Please watch & share broadly. #ManualAuditsNow https://t.co/acmGr3TJ31
— Jennifer Cohn ✍🏻 📢 (@jennycohn1) September 1, 2018
Espionage, data manipulation, destructive attacks, information warfare
Bulletin of Atomic Scientists: What would US citizens, or citizens of any Western democracy, have to actually change in their lives to be properly defended against the risk of major cyberattack?
David Sanger: Before we get to what they would have to change in their lives, they have to debate intelligently what it is we’re trying to do.
Suppose you and I were to sit down over a beer and put together a list of the kinds of civilian-related systems we think should be off limits to state-run cyberattacks.
We come up with: Election systems, the electrical grid, anything that gets in the way of emergency services. Anything that would affect hospitals and nursing homes, homeless shelters, the most vulnerable.
Then we’d say, “Okay, let’s get the United States to come out and negotiate this internationally.”