The Lawfare Podcast cover image

Lawfare Archive: Joel Brenner on America the Vulnerable

The Lawfare Podcast

00:00

Siber War - What's the Difference?

We use the word attax to get into somebody else's system and take information out of it, which is what's technically known as exploitation. And we use the word attack in its mil y sense when we want to damage a network or corrupt or destroy inf either destroy the information in it or destroy the equipment that's actually on. A computer scientists and the people who operate networks don't really regard probes necessarily as an attack. But it's legitimate to use the word in all these senses - but if you've got i you've got to really understand what differences are. That's why i've focussed on the exploitation. Because what i see is the slow hollowing out of of americ

Play episode from 05:34
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app