A Deep Dive Into Cyber Warfare We’ve entered a new era of warfare strategy. In this era, we attack the enemy by exploiting its defensive vulnerabilities- its network of electronics. In this Information Technology (IT) age, the United States and our adversaries depend on communication systems and computers to perform functions vital to national defense. […]
Malware, Intelligence and Espionage
Hacking with Malware It all depends whether you are a White Hat or Black Hat when it comes to a national intelligence agency’s anticipated outcome in a hacking scheme. Are you the good guy or bad guy in the hacking game? The hacker or hackee? Most would agree it’s best to be the hacker controlling […]