• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • cyber attacks

    Cyber Command Expansion Threatened by Budget Cuts

    The Pentagon has approved a 500 percent personnel increase for Cyber Command—which protects the Pentagon’s information networks and engages in cyberspace operations—according to The Washington Post. In a world where cyber is becoming an increasingly important realm, few would disagree with the U.S. government’s desire for increased cyber capabilities. However, … More

    Iranians May Be Doling Out Payback for U.S. Sanctions

    This past week, the Financial Services Information Sharing and Analysis Center raised the cyber threat level from elevated to high, and warned banks of “recent credible intelligence” of possible cyber attacks to bring down their customer sites. The Financial Sector is constantly under attack, but it is normally from criminals. … More

    Secretary Clinton Declares U.S. and China Equal as Cyber Victims

    During her visit to China, Secretary of State Hillary Clinton made an inexcusable public declaration. She stated that America and China were both “victims of cyber attacks” and needed to act in partnership. Suggesting moral equivalence between America and China in the cyber realm is as preposterous as Elliot Ness … More

    Let the User Beware: You're Responsible for Your Cybersecurity

    It is said that a wise man learns from the mistakes of others. If that is the case, the U.S. would be wise to learn from the scary story of Mat Honan, a senior writer at the technology news publication Wired. Honan is a technologically savvy guy, but with only … More

    Syrian Hackers Undermine Media Integrity

    On August 3, the Syrian Electronic Army hacked into Reuters’s blogging site and published a fake interview with a Syrian rebel leader, saying his troops were withdrawing from the city of Aleppo following devastating loss of life. As Aleppo has been a center of the struggle between the Syrian military … More

    When It Comes to Cybersecurity, a Flexible Approach Is Key

    A majority of Americans agree that sharing information on cybersecurity threats is the best way to protect the country’s networks. According to a Washington Post poll, nearly two-thirds of Americans support responsible information sharing, while only 39 percent of Americans support the idea of mandatory regulations. These percentages span party … More

    Protecting the Grid: DOD Fortifies Itself Against Threat of Cyber Attacks

    Secretary of Defense Leon Panetta recently made the disturbing announcement that the U.S. military is currently unprepared for a well-executed cyber attack. His call to rapidly implement a transitional cyberwarfare intelligence framework—known as Joint Staff Transitional Cyberspace Operations Command and Control Concept of Operations—should be strongly considered. The Department of … More

    The Cyber Chickens Start to Roost

    On November 8, officials in Springfield, Illinois, discovered that cyber hackers had gained remote access to the city’s water utility. As The Washington Post reports, the hackers first stole the password and access codes from a local company that develops Supervisory Control and Data Acquisition (SCADA) systems. SCADA systems are … More

    Get Your Cyber War On

    According to an article in The Wall Street Journal, “The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. to respond using traditional military force.” Since the military has been … More

    Governments Increasingly Entangle World Wide Web

    While the Internet is emerging as an increasingly powerful tool for political activism—most recently demonstrated in the Middle East up-risings—so governments around the world are becoming more expert in the means and methods to control electronic communication. This is the conclusion reached by a new report by the respected human-rights … More