Skip to main content
    • by 
    •   48  
      Social MovementsComputer ScienceComputer Security And ReliabilityInformation Security
    • by 
    •   48  
      Social MovementsComputer ScienceComputer Security And ReliabilityInformation Security
In August 2008, the Russian Army invaded georgia. numerous, coordinated cyber attacks accompanied the military campaign. this represents the first instance of a large-scale computer network attack (CNA) conducted in tandem with major... more
    • by 
    •   7  
      Information SecurityCyberstudiesCyber ConflictCyber Terrorism
Political hackers and cyber militias have begun to play an increasingly significant role in cyber conflict. Non-state actors, hacktivist groups and patriotic hackers often participate in online hacking battles based on political,... more
    • by 
    •   5  
      HacktivismCyber ConflictCyber WarfareCyber Security
Recent cyberattacks, such as those carried out against Estonia and Georgia, have grayed the line between political hackers and legitimate combatants involved in cyberconflicts. There has been fierce debate as to whether these attacks are... more
    • by 
    •   7  
      HacktivismCyber ConflictCyber WarfareCyber Lawfare
With 2.7 billion Internet users in 2013, and greater network accessibility made possible by more affordable mobile technology devices, nation states can no longer ignore the potential impact of individuals’ actions in cyberspace.... more
    • by  and +1
    •   3  
      Non-state actorsCyber MilitiasCyberdefence
Military & National Guard Loyalty and Oath of Office, & MILITAR Y GUARDIA NACIONAL DE EE UU & 美国军事和国民警卫队... more
    • by 
    •   20  
      MilitaryRepublican PartyMilitary OrdersTreason
    • by 
    •   21  
      Military HistoryMilitary ScienceMilitary IntelligenceStrategy (Military Science)
Political hackers and cyber militias have begun to play an increasingly significant role in cyber conflict. Non-state actors, hacktivist groups and patriotic hackers often participate in online hacking battles based on political,... more
    • by 
    •   4  
      Cyber ConflictCyber WarfareCyber MilitiasCyberspace Operations