Is Cyber Warfare a Just Warfare?

Is Cyber Warfare a Just Warfare?

Cyber, Cyber Creativity, Cyber Dominance
What moral obligations does the United States have with regards to Cyber Warfare?  While major religions and dominant philosophies should be studied, this article provides a brief introduction to the Catholic perspective on this question. The Ethics of Electrics What is the morality of cyber warfare?  The Atlantic poses that question and suggests that answering this question now - when cyber is emerging - provides an opportunity to "get it right" from the start. It is clearly a very important question, as the article describes thoroughly.  The article identifies several important principles of just warfare (principles such as proportionality and distribution) and applies them to cyber warfare. Cyber warfare is often conducted behind the scenes, it sometimes falls into the category of espionage, which poses further moral challenges. Before directly…
Read More
Video: The Changing Nature of Warfare and Cyber Education

Video: The Changing Nature of Warfare and Cyber Education

Cyber, Cyber Creativity
In this video, I describe how to meet the challenge of the changing nature of warfare in the information age. The United States needs to organize for intellectual rigor using existing frameworks and by utilizing a coordinating authority to integrate these frameworks. See my presentation in the YouTube video embedded below, or access it directly by visiting the video directly on YouTube.com. https://youtu.be/1QMo5CO2y7I Cyber Operations are changing the nature of warfare and present a new concern for national security.  As the nation tries to wrestle with the implications of this new reality, we should realize that this is not the first time our Nation has been challenged by a change in warfare and we can learn from our history. In the past, lots of good people were doing good things…
Read More
Humans vs Cyber Security Tools.  Which one serves the other?

Humans vs Cyber Security Tools. Which one serves the other?

Cyber, Cyber Creativity
Unleash the power of your HUMAN potential in the cyber war.  Use cyber security tools and techniques that put the human first - not the data. The power of computers is essential for cyber defense, but the human is often ignored.  Should you continue to spend money and time investing in faster computers, better analytic tools, and fancy machine learning software?  Perhaps, but you should also consider that the humans are the most important part of the system, and that they can contribute in unique ways. (more…)
Read More
Defend Against Distributed Denial of Service Attacks – Watch A Grocery Store

Defend Against Distributed Denial of Service Attacks – Watch A Grocery Store

Cyber, Cyber Creativity
How can you defend your service from a distributed denial of service attack?  The Answer is at the grocery store.  Distribute your service to force your adversary to divide his forces or be ineffective. The Challenge of Distributed Denial of Service Attacks A Distributed Denial of Service attack (DDoS) aims to flood a computer providing a service (e.g. a web server) with so many requests from so many different sources that your server is overloaded and service is either degraded (i.e. very slow) or denied (by crashing the server).  This is similar to a website running slowly when it is being used a lot by legitimate users, except that the degradation is deliberate and intends to deny legitimate users access to the service temporarily or permenantly. (more…)
Read More
Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Cyber, Cyber Creativity
Why must we live in fear of identity theft?  Why must we pay companies to mitigate the effects of identity theft?  Instead, we can beat cyber hackers and protect against identity theft by fundamentally changing the way we use information to authenticate users.  If hackers steal information because it is valuable, then devaluing that information could negate the threat.  In cases like identity theft, this could make some hacks not worth the effort and could have other social benefits because you can actually share your birthdate with your friends. (more…)
Read More