2. Introduction
• US military funding
• First Uses
• Automation
• Cold War
3. Cyber warfare?
New Battle Field –
“Battle Space”
• Anonymity
• US Cyber Command
• “Cyber Technologies now exist that are capable of destroying
critical networks, causing physical damage or altering the
performance of key systems. In the 21st Century, bits and
bytes are as Dangerous as bullets and bombs.
4. • Attacks on Georgia
• Iranian hack of US Drone
• Attack on Iranian Oil Terminals
• 2010 Stuxnet Worm
• “Hacktivists” – Most recently “The Unknowns”
• Defense: CYBERCOM
• Treat Cyberspace as Active Domain
• Employ active Defenses to stop malicious code
• Protect commercial networks, especially those vital to infrastructure
• Join with allies for collective cyber defense; mobilize industry to redesign
networks with security in mind
Create International Legal Structure for rules of Cyber Way
5. There’s an app for that!
Consumer products are:
• Engaging
• Cheap
• Video games, virtual
worlds, smartphones…
6. Robot Wars
• The future of the military?
• 2002 US Congress mandate
• “Tumbleweed”
• Ethical implications
• http://www.youtube.com/watch?v=Vu2IXk5Jbag&feature=rela
ted