Small Wars Journal

cyber

Destination Atlanta: Ransomware Lessons for Municipalities and Law Enforcement

The rise of ransomware as an attack vector has continued to thrive and appears focused on those municipalities and law enforcement agencies with limited resources and unchecked system vulnerabilities. Of major concern are the evidentiary losses and reduction in consumer confidence within these governmental organizations requiring a new focus and financial expenditures to mitigate these attacks from occurring in the future.

About the Author(s)

Cyber-Realpolitik: US Foreign Policy and a Fragmented International System

Cyber-realpolitik or cyber-realism is an anarchic international system that is fragmented beyond the multiplicity of a multipolar distribution of state power. Nation-states are increasingly finding governance difficult as technology is propagated into the internet of things (IoT), and innovations in artificial intelligence (AI) and blockchain technology. The power to disrupt and appeal to public impulses are redistributed to tech companies and their executives, developers, coders, technicians, and computer engineers.

About the Author(s)

SWJ Primer: Chinese Cyber Espionage and Information Warfare

"There is no doubt that China poses one of the greatest espionage and cyber-attack threats to the United States. The Chinese government has committed to becoming the world’s cyber leader and has made no real attempt to hide that notion. When assessing Chinese cybersecurity, we look at the infrastructure the government has built to address cybersecurity. From creating some of the strictest domestic cyber laws in the world to building a cyber army larger than a standing army of most countries, proves that China is establishing a presence in cyber operations.

About the Author(s)

Cyber Offensive Operations: Is There a Digital Delta Force?

As cyber-attacks become more frequent and cause more damage, the US government and the vast majority of private and commercial companies dig deeper into a defensive posture. Offensive cyber operations do not happen, except for maybe a few confidential US military or government (NSA) operations that cannot be confirmed or denied. Over 90 percent of the internet, including the massive amounts of data the travel through it; belong to non-government entities that so far are unable to punch back against their attackers.

About the Author(s)

The Cyber Underground – Resistance to Active Measures and Propaganda: “The Disruptors” - Motto: “Think For Yourself”

A cyber underground, organized around special operations principles can create a nationwide and global network that will seek out, identify, understand, and expose active measures and propaganda.

About the Author(s)