Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
Ramping Down Chinese Commercial Cyber Espionage, Emilio Iasiello
Ramping Down Chinese Commercial Cyber Espionage, Emilio Iasiello
Emilio Iasiello
While detractors believe that commercial cyber espionage hasn’t really stopped, recent Chinese efforts show a government trying to get a handle on its large spying apparatus that could include hired and independent contractors acting autonomously in addition to its other resources. While complete cessation may never occur, significant timely reduction demonstrates Beijing’s willingness to work with the United States as a partner and not a pariah, and provides a foundation from which the two governments can move forward on other cyber security areas where incongruity persists.
Are Cyber Weapons Effective Military Tools?, Emilio Iasiello
Are Cyber Weapons Effective Military Tools?, Emilio Iasiello
Emilio Iasiello
Cyber-attacks are often viewed in academic and military writings as strategic asymmetric weapons, great equalizers with the potential of leveling the battlefield between powerful nations and those less capable. More substantive examples demonstrate that cyber-attacks have been more successful in non-military activities, as they may serve as a clandestine weapon of subterfuge better positioned to incapacitate systems without alerting the victims, veiling the orchestrator’s true identity via proxy groups and plausible deniability. Consequently, this paper provides a counter argument to the idea that cyber tools are instrumental military weapons in modern day warfare; cyber weapons are more effective options during …
Hacking Back: Not The Right Solution, Emilio Iasiello
Hacking Back: Not The Right Solution, Emilio Iasiello
Emilio Iasiello
In cyberspace attackers enjoy an advantage over defenders, which has popularized the concept of “active cyber defense”— offensive actions intended to punish or deter the adversary. This article argues active cyber defense is not a practical course of action to obtain tactical and strategic objectives. Instead, “aggressive cyber defense,” a proactive security solution, is a more appropriate option.
Getting Ahead Of The Threat: Aviation And Cyber Security, Emilio Iasiello
Getting Ahead Of The Threat: Aviation And Cyber Security, Emilio Iasiello
Emilio Iasiello
No abstract provided.
Cyber Attack: A Dull Tool To Sharpen Foreign Policy, Emilio Iasiello
Cyber Attack: A Dull Tool To Sharpen Foreign Policy, Emilio Iasiello
Emilio Iasiello
This paper examines how cyber attacks, if indeed conducted by nation states, have been unsuccessful in supporting states' foreign policy objectives. By analyzing three prominent case studies, I show that as a result of geopolitical tensions, cyber attacks were implemented to further nation state objectives in support of foreign policy considerations and failed to achieve their respective outcomes despite successful deployment against their intended targets. The three case studies, hypothetical scenarios because attribution has not been confirmed, include: (1) the October 2012 distributed denial of service attacks targeting the U.S. banking sector; (2) the 2012 Stuxnet attack against Iran; and …