Skip to main content

Posts

Showing posts from November 27, 2015

WikiLeaks Alleges That Turkish Aircrafts Violated Greek Airspace Over 2,000 Times in 2014

By Anastassios Adamopoulos - Following the controversial takedown of a Russian Air Force aircraft by Turkish F-16 authorities, Wikileaks has released figures on Turkish violations of Greek airspace. A Wikileaks tweet, citing data compiled by the University of Thessaly, based on Greek military records, alleges that Turkey violated Greek airspace 2,444 times in 2014 alone, while there are 636 such violations in 2013. A United States classified cable, also released by Wikileaks on Tuesday, reports that in June 2005, the then Greek Foreign Minister Petros Molyviatis told the American Ambassador that Turkish aircrafts did not have to fly 40 times per day over disputed airspace to get their political point across and could instead limit it down to one flight per week. Greek Foreign Affairs Minister Nikos Kotzias held a phone conversation with Russian Foreign Affairs Minister Lavrov on Tuesday evening, that included discussions on Tuesday’s incident as well as the war in Syria,

Cyberwar Part 1: What IT Can Do To Survive

Are we at risk of being victims or casualties in a government cyberwar? In the first of this three-part series, we explore what the experts say about the current state of cyberwar -- and what it means to IT departments everywhere. Insider Threats: 10 Ways To Protect Your Data(Click image for larger view and slideshow.) Cyberwar is an ugly word, not only because of what it implies, but because the term is ill-defined. It's suggestive of digital attacks alone. That's simply not the case. It is far more likely that cyberattacks would be only one form of aggression in the otherwise familiar hells of war. The biggest question of all, for corporations and citizens alike, is: Are we here in the US simply in the midst of informal nation-state aggression, or are we in a full-fledged cyberwar? The distinction between the two situations may not matter for IT's purposes, since neither poses a serious threat to corporations. Nonetheless, it's important to understand the nature of th