
Lawfare Archive: Joel Brenner on America the Vulnerable
The Lawfare Podcast
00:00
Siber War - What's the Difference?
We use the word attax to get into somebody else's system and take information out of it, which is what's technically known as exploitation. And we use the word attack in its mil y sense when we want to damage a network or corrupt or destroy inf either destroy the information in it or destroy the equipment that's actually on. A computer scientists and the people who operate networks don't really regard probes necessarily as an attack. But it's legitimate to use the word in all these senses - but if you've got i you've got to really understand what differences are. That's why i've focussed on the exploitation. Because what i see is the slow hollowing out of of americ
Play episode from 05:34
Transcript


