-
Hacking back across third party systems is more self help than self defense (rarely is the command and control computer linked directly to the system being attacked).
FORBES: Caution: Active Response to Cyber Attacks Has High Risk
-
According to reports, the plan calls for creating three types of forces under the Cyber Command: protecting computer systems that involve electrical grids and other kinds of infrastructure, offensive operations overseas as well as protection of the defence department's internal systems.
BBC: US Cyber Command in 'fivefold' staff expansion
-
XML, the human voice becomes a substitute for a computer mouse and the spoken command for a click.
ECONOMIST: Internet
-
One important issue is whether Cyber Command will get the authority to identify computer users who may have malicious intent.
NPR: U.S. Seeks To Define Rules On Cyberwar
-
Unlike past viruses that have hijacked armies of PCs, Storm doesn't place the command and control of the network in a single computer.
FORBES: Zombie Storm Rising
-
Anderson told attendees that the U.S. Space Command, the agency in charge of satellite communications, has begun to craft a computer network attack strategy.
CNN: U.S. Army kick-starts cyberwar machine
-
For the techie on your list, try In the Beginning Was the Command Line by Neal Stephenson, his extended essay on the relationship between culture and the computer.
NPR: The Least Material of Material Gifts
-
Unlike other botnets, Storm has no single command-and-control point--it functions as a peer-to-peer system where any hijacked computer can give and receive commands.
FORBES: Storm For Rent