This March, Future Tense has been exploring cyberwar as part of our ongoing project Futurography, which introduces readers to a new technological or scientific topic each month. Now’s your chance to show how much you’ve learned.
We suspect you’ll do pretty well, but you might want to brush up first by rereading a few of the articles we’ve published on the topic.
This article is part of the cyberwar installment of Futurography, a series in which Future Tense introduces readers to the technologies that will define tomorrow. Each month from January through June 2016, we’ll choose a new technology and break it down. Read more from Futurography on cyberwar:
- “What’s the Deal With Cyberwar?”
- “Your Cyberwar Cheat Sheet”
- “Inside ‘Eligible Receiver,’ the NSA’s Disturbingly Successful Hack of the American Military”
- “A Brief Guide to the Weapons of Cyberconflict”
- “The Fuzzy International Rules and Norms for War in Cyberspace”
- “Cyberweapons Aren’t Like Nuclear Weapons”
- “Will We Ever Solve Cybersecurity’s ‘Attribution Problem?’ ”