-
The proliferation of long-range strike systems, particularly ballistic and cruise missiles, could allow an aggressor to launch a surprise mass attack on these target sets.
CENTERFORSECURITYPOLICY: Center for Security Policy | The Measure of a Superpower: A Two Major Regional Contingency Military for the 21st Century | Page: 3
-
Because the chances of that happening are far greater than an attack by someone bent on mass murder.
FORBES: The Insanity of Arming School Employees
-
The closest equivalent to a DDOS attack in the offline world would be a mass sit-in or a mob milling around a building, making entry and exit impossible.
ECONOMIST: WikiLeaks, protest and the law
-
From the conventional to the unconventional, from nations seeking weapons of mass destruction to the cell of terrorists planning the next attack, from the old danger of piracy to the new threat of cyber, we must be vigilant.
WHITEHOUSE: President Obama Speaks at the Air Force Academy Commencement Ceremony | The White House
-
Haslet-Davis, still conscious, knew it was an attack and thought medical workers would surely be overwhelmed by mass casualties.
CNN: Boston bombings destroy dancer's foot, but not her spirit
-
Using the handle Flashboy, Ternovskiy soon mastered the art of the denial-of-service attack, wherein a target system is paralyzed by a mass of incoming communication requests.
NEWYORKER: Roulette Russian
-
He told CNN that there needed to be greater investment in random searches by agents with explosive trace detection equipment and greater deployment of CCTV cameras, saying the extra investment needed in mass transit security amounted to a fraction of the economic cost of a successful attack.
CNN: SHARE THIS
-
Our goal is to take the smaller equipment that's flexible, put it on vessels of opportunity, and then coordinate better with our local state partners, including National Guard overflights, local fishermen's associations, and so forth, mass our effect and get it pointed up with a command and control system that can attack it on all levels.
WHITEHOUSE: A First-Hand Look at the Federal Response to the BP Oil Spill
-
If the millions of internet-connected Macs are left open to attack then this increases the chance that an effective Trojan or piece of spyware will reach critical mass and spread rapidly, and it also increases the incentive for a bright programmer to write Mac-specific malware that could affect me.
BBC: Steve Jobs waits on stage, AP