tag:blogger.com,1999:blog-9031840977303029006.post9076934248409118533..comments2023-11-05T12:28:35.236-08:00Comments on Digital Dao: The Cyber Warfare Component to Israel's Pillar of Cloud OpUnknownnoreply@blogger.comBlogger2125tag:blogger.com,1999:blog-9031840977303029006.post-67653749767062229082012-11-15T13:20:20.428-08:002012-11-15T13:20:20.428-08:00...I have to append my comment: Attacking against ......I have to append my comment: Attacking against cellular infrastructure can (as method is unknown) in deed be included in cyber warfare capabilities, however, it can be performed with EW (Electronic Warfare) by disabling bandwidth etc. - its matter of viewpoint here. Especially here. Can you really believe what one party is saying? #infowar<br /><br />Leaking credit card information seems to be one of the 'scariest' methods it is possible to enable during the full scale offensive, in THIS theater - or has someone witnessed any ICS (SCADA) insertions?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-9031840977303029006.post-51880739219134993692012-11-15T11:11:21.647-08:002012-11-15T11:11:21.647-08:00I would say, its 'information warfare' ope...I would say, its 'information warfare' operation in greater or lesser scale - I am not sure how well 'platformized' the real cyber network capabilities are for maneuver like this...Anonymousnoreply@blogger.com