Hacking

cyber-passwords

Hacking Tools

So, what’s in the hackers’ toolbox? There is a wide range of hacking tools that can be used in a cyber attack in order to wreak havoc to the enemy state. Some international law scholars classify the hacki... Read More...
Cyber warriors needed

‘Cyber warriors needed’

United States United States has set the example with the inauguration of US Cyber Command (USCYBERCOM) as an armed forces sub-unified command, subordinate to the Department of Defense, with the latter issuing ... Read More...
hacking networks

Targets: Networks as Military Objectives

The most 'soft' cyber attacks can range from jamming of television and radio transmissions, broadcasting of propaganda to taking down stock markets and banking systems with the result of spreading terror to the... Read More...
car hacking

Hacking Cars and Airplanes

Hacking Transports Targeting of transports, e.g. disrupting airport traffic and causing plane crashes by shutting down power to air traffic control towers,gaining access of rail computer systems and causing tr... Read More...
social engineering

Social Engineering: Hacking People

Hacking Humans  Social Engineering (Pretexting, Phishing, Reverse Social Engineering) To Err is Human Ian Mann, in his book 'Hacking the Human: Social Engineering Techniques and Security Countermeasure... Read More...
Stealing online information

Players: Hackers as Warriors

Who are the 'players' of this novel battlefield? As interstate relations are mainly the quintessence of international law, the actors operating in cyberspace that are of interest for the subject of this paper a... Read More...