{"id":124,"date":"2012-02-17T19:29:36","date_gmt":"2012-02-17T19:29:36","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=124"},"modified":"2012-02-17T19:29:36","modified_gmt":"2012-02-17T19:29:36","slug":"cyberwar-1","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2012\/02\/17\/cyberwar-1\/","title":{"rendered":"Cyberwar &#8211; Is it Happening Now?"},"content":{"rendered":"<p>I was all set to write this great piece on Cyberwar and how it&#8217;s a bunch of fear-mongering by those who don&#8217;t understand it, but Scot Terban beat me to it.\u00a0 See his thought-provoking piece on <a href=\"http:\/\/www.infosecisland.com\/\" target=\"_blank\">InfosecIsland <\/a>or <a title=\"Krypt3ia\" href=\"http:\/\/krypt3ia.wordpress.com\/\" target=\"_blank\">his blog <\/a>titled: <a href=\"http:\/\/krypt3ia.wordpress.com\/2012\/02\/15\/dr-cyberlove-or-how-i-learned-to-stop-worrying-and-love-cyberwar\/\" target=\"_blank\">Dr. Cyberlove\u2026 Or, how I learned to stop worrying and love CYBERWAR!<\/a> (Here&#8217;s the link for those who are paranoid: <a href=\"http:\/\/krypt3ia.wordpress.com\/2012\/02\/15\/dr-cyberlove-or-how-i-learned-to-stop-worrying-and-love-cyberwar\/\">http:\/\/krypt3ia.wordpress.com\/2012\/02\/15\/dr-cyberlove-or-how-i-learned-to-stop-worrying-and-love-cyberwar\/<\/a>).\u00a0 It&#8217;s a great piece to get you thinking about Cyberwar and if we are indeed in one now.\u00a0<\/p>\n<p>According to Sen Joseph Lieberman and Jay Rockefeller, we are on the brink of a cyber disaster.\u00a0 They equate our cyber situation to 9\/11.\u00a0 Now I&#8217;m all for increasing focus on security, but not for the sake of FUD (Fear, Uncertainty, &amp; Doubt). Selling fear never works in the long term.<\/p>\n<p>Cyberwar is a sexy term that&#8217;s hotly debated.\u00a0 Many take one side or the other as to whether or not we are at war over the wires (or wireless).\u00a0 Can computers kill?\u00a0 Are we in the land of The Terminator and Tron?\u00a0 Are we on the brink of Cyber-Armageddon? Can people live without Twitter and Facebook?\u00a0<\/p>\n<p>These questions and more will be addressed in the seminar \/ webinar \/ debate Dr. Matt Crosston and I are having next Wednesday starting at 1pm. If you live in the Omaha area, you can participate in the debate in person, in the Bellevue University Hitchcock Humanities Center\u2019s Criss Auditorium. Presenters will be me, <a href=\"http:\/\/www.youtube.com\/watch?v=sJNcGPOsGnE\" target=\"_blank\">Ronald Woerner<\/a>, Assistant Professor and Director of Cybersecurity Studies in the University\u2019s College of Information Technology, and <a href=\"http:\/\/www.youtube.com\/watch?v=C0TD91qgnMo\" target=\"_blank\">Dr. Matthew D. Crosston<\/a>, Associate Professor, ISIS Program Director \u2013 International Security and Intelligence Studies Chair \u2013 Political Science.<br \/>\nPlease visit <a href=\"http:\/\/www.bellevue.edu\/cyberwar\/\" target=\"_blank\">http:\/\/www.bellevue.edu\/cyberwar\/<\/a> for more information and to register.<\/p>\n<p>Just call me Dr. Cyberlove&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was all set to write this great piece on Cyberwar and how it&#8217;s a bunch of fear-mongering by those who don&#8217;t understand it, but Scot Terban beat me to it.\u00a0 See his thought-provoking piece on InfosecIsland or his blog titled: Dr. Cyberlove\u2026 Or, how I learned to stop worrying and love CYBERWAR! (Here&#8217;s the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9],"tags":[],"class_list":["post-124","post","type-post","status-publish","format-standard","hentry","category-cyberwar"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=124"}],"version-history":[{"count":3,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/124\/revisions"}],"predecessor-version":[{"id":129,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/124\/revisions\/129"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}