Monthly Archives: October 2016

NUCLEAR WEAPONS IN THE CYBER AGE: NEW CHALLENGES FOR SECURITY, STRATEGY AND STABILITY

The threat of a broad cyber-attack creates a range of new pressures for national security policy and the role of nuclear weapons. Formulating a credible way to respond to the cyber challenge has be… Source: NUCLEAR WEAPONS IN THE CYBER … Continue reading

Posted in Uncategorized | Leave a comment

NUCLEAR WEAPONS IN THE CYBER AGE: NEW CHALLENGES FOR SECURITY, STRATEGY AND STABILITY

The threat of a broad cyber-attack creates a range of new pressures for national security policy and the role of nuclear weapons. Formulating a credible way to respond to the cyber challenge has been difficult, and this has been complicated by the considerable differences between nuclear and cyber: the problems and limitations of cyber defence and arms control, the likely need for some type of cross-domain deterrence/ retaliation strategy (that may or may not include nuclear weapons), the inherent difficulties of attribution, and the uncertainty of the nature and extent of any future cyber threat or attack. These dynamics make formulating a national nuclear-cyber strategy difficult and problematic.
Continue reading

Posted in Uncategorized | Leave a comment

ISIS-chan 英語説明テンプレなど: Counter ISIS…Japanese Style

ISIS-chan is a counter-terrorism movement on the cyber space by disturbing their search engine optimization (SEO) profile of related keywords with images of a cute character. Source: ISIS-chan 英語説明テンプレなど: Counter ISIS…Japanese Style

Posted in Uncategorized | Leave a comment

ISIS-chan 英語説明テンプレなど: Counter ISIS…Japanese Style

ISIS-chan is a counter-terrorism movement on the cyber space by disturbing their search engine optimization (SEO) profile of related keywords with images of a cute character.
Continue reading

Posted in Uncategorized | Leave a comment

It Takes a Coalition to Train Iraqi Army

Through the coalition’s train-and-equip efforts, 20,000 Iraqi Security Forces have been trained and given the weapons, technology and supplies to equip six full army brigades, Defense Secretary Ash Carter told the Senate Armed Services Committee April 28. “And we’ve provided two brigade sets to the Peshmerga (Kurdish militia), part of more than 12 million pounds of critical supplies donated by more than 20 countries,” Carter said. Those supplies included ammunition, small, medium and heavy weapons as well equipment to counter the threat of roadside bombs and booby traps, known as improvised explosive devices (IEDs).
Continue reading

Posted in Uncategorized | Leave a comment

Military Cyber-Security for the Digital Age

As the focus shifts from ground wars to technological warfare, military strategists need more comprehensive mechanisms for technological training and implementation. There is also a trend toward developing more agile proactive, rather than reactive, measures. Source: Military Cyber-Security for the … Continue reading

Posted in Uncategorized | Leave a comment

Military Cyber-Security for the Digital Age

The implementation of the DoD cyber defense mission is divided among a number of tactical teams, each responsible for a specific sector. There are currently 13 national missions team whose job it is to protect our country and its interests against cyber attacks. Continue reading

Posted in Uncategorized | Leave a comment

ISIS&AMERICAN MUSLIMS VOTE…”CLINTON”

EVERY BODY LOVES CLINTON…ISIS LEADER CALLS FOR AMERICAN MUSLIM VOTERS TO SUPPORT HILLARY CLINTON Source: ISIS&AMERICAN MUSLIMS VOTE…”CLINTON”

Posted in Uncategorized | Leave a comment

ISIS&AMERICAN MUSLIMS VOTE…”CLINTON”

ISIS LEADER CALLS FOR AMERICAN MUSLIM VOTERS TO SUPPORT HILLARY CLINTON Continue reading

Posted in Uncategorized | Leave a comment

ANONYMOUS VOTES TRUMP

  Source: ANONYMOUS VOTES TRUMP

Posted in Uncategorized | Leave a comment