102:. After a wave of high-profile attacks against US companies and government databases a panel of experts assembled by the George Washington University Center for Cyber and Homeland Security said policies should be eased to allow "active defense" measures to deter hackers and did not recommend hacking back "because don't want the cure to be worse than the disease". Relevantly on the February 2017
161:
In 2016 a digital illustration series by the German Foreal design studio called "Corporate
Warfare" visualized the power and impact of big brand corporations by branded torpedoes and atomic bombs. Dirk Schuster, cofounder of Foreal states that "big corporations can have more power than governments,
468:
36:; but can involve espionage, 'dirty' PR tactics, or physical theft. The intention is largely to destabilise or sink the value of the opposing company for financial gain, or to steal trade secrets from them.
811:
112:
The dramatic increase in the use of the
Internet for business purposes has exposed private entities to greater risks for cyber-attacks. Garcia and Horowitz propose a
616:
877:
129:
Low-grade corporate warfare is constantly being waged between technology giants by "patent trolls, insider blogs and corporate talking points".
126:
may be used to knock business competitors off line. They can be hired by corporations to disrupt the operation of competitors on the networks.
819:
273:
193:
109:
President Brad Smith stated that technology companies need to preserve trust and stability online by pledging neutrality in cyber conflict.
842:
571:
766:
732:
653:
545:
445:
351:
314:
52:
corporations guard their data and hire individuals to break into computer systems of their competitors. In the genre pioneered by
120:
and investigate a scenario in which firms plan for long-term security investment by considering the likelihood of cyber-attacks.
208:
149:
It has been speculated that the concept of "non-international armed conflict within the meaning of
Article 3 GC I to IV" of the
98:
controversially advocated that private companies should be allowed to "hack back" against nations or criminals trying to
57:
248:
872:
143:
72:
According to
Schwartau, companies are typically targeted by their competitors. Such warfare may include methods of
64:
which often maintain their own private armies and security forces and wage corporate warfare against each other.
150:
84:
789:
253:
233:
493:
882:
589:
243:
843:"'Mr. Robot' Season 2 Finale: Sam Esmail On Shocking Twist & Possible Donald Trump Season 3 Impact"
381:"A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios"
278:
238:
188:
73:
518:
132:
91:
25:
696:
283:
258:
762:
728:
649:
441:
347:
341:
310:
117:
643:
617:"DDoS for hire services offering to 'take down your competitor's web sites' going mainstream"
435:
412:
304:
678:
645:
Digital
Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks
392:
268:
61:
29:
602:
45:
669:
Cartwright, Shawn D. (February 2000). "SUPPLY CHAIN INTERDICTION and CORPORATE WARFARE".
28:
in which attacks on companies by other companies take place. Such warfare may be part of
519:"'Digital Geneva Convention' needed to deter nation-state hacking: Microsoft president"
228:
198:
103:
77:
53:
866:
139:
95:
469:"This Silicon Valley venture fund keeps betting millions on D.C.'s cyber community"
203:
178:
won't be fought with nukes, but with information, economics and corporate warfare.
33:
379:
Merrick, Kathryn; Hardhienata, Medria; Shafi, Kamran; Hu, Jiankun (22 July 2016).
756:
722:
153:
would be wide enough to allow for covering "a renaissance of corporate warfare".
113:
99:
223:
218:
165:
263:
175:
170:
106:
81:
49:
724:
Elimination of mercenarism in Africa: a need for a new continental approach
213:
397:
380:
758:
The
Chickenhawk Syndrome: War, Sacrifice, and Personal Responsibility
682:
123:
116:
approach which considers economic motivations for investment in
135:
in corporate warfare can be called supply chain interdiction.
727:. Institute for Security Studies (South Africa). 2008.
437:
Tech-Noir: The Fusion of
Science Fiction and Film Noir
790:"Big Brands Are Reimagined as Weapons of Destruction"
642:
Torrenzano, Richard; Davis, Mark (25 October 2011).
494:"U.S. Should Strike Back at Cyberattackers: Report"
87:and damaging a company's information systems.
8:
841:D'Alessandro, Anthony (22 September 2016).
546:"A Digital Geneva Convention? A Great Idea"
335:
333:
396:
90:Chris Rouland of the cybersecurity &
259:Cyber self-defense § "Hacking back"
142:of warfare mainly by the involvement of
792:. The Creators Project. 8 November 2016
761:. Rowman & Littlefield Publishers.
295:
162:so we put them in a military context".
598:
587:
570:Farwell, James P.; Rohozinski, Rafal.
374:
372:
370:
572:"Stuxnet and the Future of Cyber War"
343:Targeted Killing in International Law
274:Apple Inc. v. Samsung Electronics Co.
194:Decentralized autonomous organization
7:
168:, creator of the television series
14:
878:Fiction about corporate warfare
434:Meehan, Paul (13 August 2015).
138:The term may also refer to the
1:
755:Ryan, Cheyney (16 May 2009).
812:"FOREAL - CORPORATE WARFARE"
671:Journal of Business Strategy
340:Melzer, Nils (29 May 2008).
306:Internet Policies and Issues
413:"The Politics of Cyberpunk"
249:Supply chain cyber security
209:Military–industrial complex
60:is largely in the hands of
16:Form of information warfare
899:
144:private military companies
174:, states that "the next
151:Fourth Geneva Convention
85:confidential information
415:. The Cyberpunk Project
254:Proactive cyber defence
234:Competition (economics)
597:Cite journal requires
303:Kutais, B. G. (1999).
244:Parallel construction
498:www.securityweek.com
279:Yahoo! data breaches
239:Industrial espionage
189:Assassination market
133:Supply chain attacks
74:industrial espionage
816:www.weareforeal.com
697:"Corporate warfare"
544:Kaspersky, Eugene.
309:. Nova Publishers.
26:information warfare
822:on 2 February 2017
525:. 14 February 2017
284:Sony Pictures hack
873:Corporate warfare
398:10.3390/fi8030034
118:Internet security
22:Corporate warfare
890:
858:
857:
855:
853:
838:
832:
831:
829:
827:
818:. Archived from
808:
802:
801:
799:
797:
786:
780:
779:
777:
775:
752:
746:
745:
743:
741:
719:
713:
712:
710:
708:
693:
687:
686:
683:10.1108/eb040072
666:
660:
659:
639:
633:
632:
630:
628:
613:
607:
606:
600:
595:
593:
585:
583:
581:
576:
567:
561:
560:
558:
556:
541:
535:
534:
532:
530:
515:
509:
508:
506:
504:
490:
484:
483:
481:
479:
465:
459:
458:
456:
454:
431:
425:
424:
422:
420:
409:
403:
402:
400:
376:
365:
364:
362:
360:
337:
328:
327:
325:
323:
300:
269:Evil corporation
100:steal their data
62:megacorporations
30:economic warfare
898:
897:
893:
892:
891:
889:
888:
887:
863:
862:
861:
851:
849:
840:
839:
835:
825:
823:
810:
809:
805:
795:
793:
788:
787:
783:
773:
771:
769:
754:
753:
749:
739:
737:
735:
721:
720:
716:
706:
704:
701:Financial Times
695:
694:
690:
668:
667:
663:
656:
641:
640:
636:
626:
624:
615:
614:
610:
596:
586:
579:
577:
574:
569:
568:
564:
554:
552:
543:
542:
538:
528:
526:
517:
516:
512:
502:
500:
492:
491:
487:
477:
475:
473:Washington Post
467:
466:
462:
452:
450:
448:
433:
432:
428:
418:
416:
411:
410:
406:
385:Future Internet
378:
377:
368:
358:
356:
354:
339:
338:
331:
321:
319:
317:
302:
301:
297:
293:
288:
184:
159:
70:
46:science fiction
42:
17:
12:
11:
5:
896:
894:
886:
885:
880:
875:
865:
864:
860:
859:
833:
803:
781:
767:
747:
733:
714:
688:
661:
654:
634:
608:
599:|journal=
562:
536:
510:
485:
460:
446:
426:
404:
366:
352:
346:. OUP Oxford.
329:
315:
294:
292:
289:
287:
286:
281:
276:
271:
266:
261:
256:
251:
246:
241:
236:
231:
229:Corporatocracy
226:
221:
216:
211:
206:
201:
199:Smart contract
196:
191:
185:
183:
180:
158:
155:
114:game theoretic
104:RSA Conference
78:disinformation
69:
66:
54:William Gibson
41:
38:
15:
13:
10:
9:
6:
4:
3:
2:
895:
884:
881:
879:
876:
874:
871:
870:
868:
848:
844:
837:
834:
821:
817:
813:
807:
804:
791:
785:
782:
770:
768:9780742565050
764:
760:
759:
751:
748:
736:
734:9781920114404
730:
726:
725:
718:
715:
702:
698:
692:
689:
684:
680:
676:
672:
665:
662:
657:
655:9781429989381
651:
648:. Macmillan.
647:
646:
638:
635:
623:. 6 June 2012
622:
618:
612:
609:
604:
591:
573:
566:
563:
551:
547:
540:
537:
524:
520:
514:
511:
499:
495:
489:
486:
474:
470:
464:
461:
449:
447:9781476609737
443:
440:. McFarland.
439:
438:
430:
427:
414:
408:
405:
399:
394:
390:
386:
382:
375:
373:
371:
367:
355:
353:9780199533169
349:
345:
344:
336:
334:
330:
318:
316:9781590332269
312:
308:
307:
299:
296:
290:
285:
282:
280:
277:
275:
272:
270:
267:
265:
262:
260:
257:
255:
252:
250:
247:
245:
242:
240:
237:
235:
232:
230:
227:
225:
222:
220:
217:
215:
212:
210:
207:
205:
202:
200:
197:
195:
192:
190:
187:
186:
181:
179:
177:
173:
172:
167:
163:
156:
154:
152:
147:
145:
141:
140:privatization
136:
134:
130:
127:
125:
121:
119:
115:
110:
108:
105:
101:
97:
96:Endgame, Inc.
93:
88:
86:
83:
79:
75:
67:
65:
63:
59:
55:
51:
47:
39:
37:
35:
31:
27:
24:is a form of
23:
19:
883:Cyberwarfare
850:. Retrieved
846:
836:
824:. Retrieved
820:the original
815:
806:
794:. Retrieved
784:
772:. Retrieved
757:
750:
738:. Retrieved
723:
717:
705:. Retrieved
700:
691:
677:(2): 30–35.
674:
670:
664:
644:
637:
625:. Retrieved
620:
611:
590:cite journal
578:. Retrieved
565:
553:. Retrieved
549:
539:
527:. Retrieved
522:
513:
501:. Retrieved
497:
488:
476:. Retrieved
472:
463:
451:. Retrieved
436:
429:
417:. Retrieved
407:
388:
384:
357:. Retrieved
342:
320:. Retrieved
305:
298:
204:Private army
169:
164:
160:
148:
137:
131:
128:
122:
111:
89:
76:, spreading
71:
43:
34:cyberwarfare
21:
20:
18:
621:webroot.com
555:20 February
529:20 February
867:Categories
852:24 January
826:23 January
796:23 January
774:24 January
740:23 January
707:23 January
580:23 January
503:23 January
478:23 January
453:23 January
419:23 January
359:23 January
322:23 January
291:References
224:Defamation
219:Patent war
166:Sam Esmail
40:In fiction
391:(3): 34.
264:Proxy war
176:world war
171:Mr. Robot
107:Microsoft
92:cyberarms
50:cyberpunk
48:genre of
847:Deadline
182:See also
94:company
627:20 July
523:Reuters
214:Lawfare
124:Botnets
82:leaking
44:In the
765:
731:
703:. 2009
652:
550:Forbes
444:
350:
313:
575:(PDF)
68:Cyber
58:power
854:2017
828:2017
798:2017
776:2017
763:ISBN
742:2017
729:ISBN
709:2017
650:ISBN
629:2017
603:help
582:2017
557:2017
531:2017
505:2017
480:2017
455:2017
442:ISBN
421:2017
361:2017
348:ISBN
324:2017
311:ISBN
32:and
679:doi
393:doi
157:Art
869::
845:.
814:.
699:.
675:21
673:.
619:.
594::
592:}}
588:{{
548:.
521:.
496:.
471:.
387:.
383:.
369:^
332:^
146:.
80:,
56:,
856:.
830:.
800:.
778:.
744:.
711:.
685:.
681::
658:.
631:.
605:)
601:(
584:.
559:.
533:.
507:.
482:.
457:.
423:.
401:.
395::
389:8
363:.
326:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.