Cyberpoints: Cyber-Exceptionalism In Warfighting

03/18/2010
"Only the dead have seen the end of war." —George Santayana [caption id="attachment_3466" align="alignnone" width="120" caption="John Wheeler"][/caption] By John Wheeler [email protected] Cyber-Exceptionalism in Warfighting “Cyber-Exceptionalism” refers to the set of ways in which American provisions for protection and defense of citizens and property, the police and military protections, differ so…

Copenhagen, Climategate and Cyber-Espionage: Russians, Chinese or Oil-Interests?

03/15/2010
By D.K. Matai The Climate Research Unit at the University of East Anglia, U.K. (Credit photo: http://www.cru.uea.ac.uk/) Just before the United Nations Framework Convention on Climate Change -- UNFCCC -- took place in Copenhagen in mid-December 2009, experts at the University of East Anglia's world-leading Climatic Research Unit were accused of…

Is the “Cold War” with China Becoming Serious? Placing the Cyber Conflict in a Strategic Context

03/07/2010
By D.K. Matai [caption id="attachment_5586" align="alignleft" width="200" caption="Secretary of State Hillary Clinton Addresses the U.S.-China Business Council (July 2009)"][/caption] A Growing Confrontation? China appears to be escalating its growing confrontation with the U.S. over Washington's announcement of a $6.4 billion defense deal with Taiwan. Under a 1979 Act of the…

Cyberpoints Weekly: Writing Cyber defense into Title 10

03/07/2010
"Only the dead have seen the end of war." George Santayana John Wheeler By John Wheeler [email protected] Writing Cyber defense into Title 10: Meeting the Challenge Head-on The public debate is increasingly acknowledging that the military must have a distinct and essential role in cyberspace. This realization emphasizes that warfighting is…

Cyberpoints Two:Measuring the Effectiveness of Military Recruiting in Cyber Careers

03/03/2010
By John Wheeler [email protected] John is writing a weekly column dedicated to the cyberspace domain: he will continue to provide regular insights into how to shape effective con-ops in the cyber domain and craft a Terms of Reference for facing XXIst Century cyber challenges. John has a wide range of…

Why The Great Firewall of China is Crumbling? Tunneling The Great Escape!

03/01/2010
By D.K. MATAI [caption id="attachment_5387" align="alignleft" width="300" caption="see: David Kravets, China Widens Net Censorship; Google Exile Looms, February 24th, 2010 (credit: www.wired.com)"][/caption] Powerful social media sites like Twitter, Facebook, and YouTube remain blocked in China.  China will have to concede defeat much sooner than it realizes in its war against…

Cyberpoints Weekly Column: A Slow Start for US Cybercom

02/25/2010
By John Wheeler [email protected] John is starting this week a new weekly column dedicated to the cyberspace domain: he will  continue to provide regular insights into how to shape effective con-ops in the cyber domain and craft a Terms of Reference for facing XXIst Century cyber challenges. John has a…

Chinese Jigsaw: What Does The Parallel Cyber Attack On India Mean?

02/20/2010
By D.K. Matai [caption id="attachment_5038" align="alignleft" width="400" caption="Sikkim Border Incident (credit: video from Indiatimes.com/click on picture to access video)"][/caption] In the latest sign of rising tensions between the two rival Asian powers, the Indian government has informed the world that computers in the Prime Minister's Office were hacked on December…