A call to cyber arms.
نویسنده
چکیده
XI'AN, CHINA—The leaflet posted in the school of information engineering here at Xi'an Jiaotong University was brief but enticing, offering computer-savvy graduates a hefty stipend and the chance to serve their motherland. "I was curious," says Liu, who asked that only his surname be used in this article. It was the spring of 2007, and Liu, then 24 years old, was wrapping up a master's degree in computer algorithms. Encouraged by his supervisor, Liu called the number on the leaflet; that summer, he joined an elite corps of the People's Liberation Army (PLA) that writes code designed to cripple command-and-control systems of enemy naval vessels.
منابع مشابه
Keeping Cool Steps for Avoiding Conflict and Escalation in Cyberspace
International cyber conflicts will become more frequent and intense. Several current trends prompt this pessimism: ongoing quantitative and qualitative cyber arms races among state actors, the proliferation of cyber weapons among state and non-state actors, a widely shared conventional wisdom that these weapons favor offense over defense, and no broadly accepted definition of the cyber attacks ...
متن کاملA Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict
Throughout history, mankind has developed and employed novel weapons and countermeasures. Both offensive and defensive weapon systems are limited by the laws of nature. Consequently, military concepts and doctrines were designed by implicitly taking into account those limitations. The digital age has introduced a new class of weaponry that poses an initial challenge to the common understanding ...
متن کاملTowards a C2I Platform for Combating the Cyber-Threat
In my talk, I outline a number of cyber-attacks that have been reported in recent years, and examine the vulnerability of organisations and critical infrastructure to them. I then discuss an approach to combating cyber-threats that integrates specialised tools within a managed service platform to create a command, control an intelligence (C2I) system used to co-ordinated defences against a dive...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Science
دوره 339 6123 شماره
صفحات -
تاریخ انتشار 2013