Cyber-warfare

Cyber-warfare

Cyber-warfare (also known as "cybernetic war" [Jonathan V. Post, "Cybernetic War," "Omni," May 1979, pp.44-104, reprinted"The Omni Book of Computers & Robots", Zebra Books, ISBN 0-8217-1276] , or "cyberwar") is the use of computers and the Internet in conducting warfare in cyberspace. [ [http://www.dtic.mil/doctrine/jel/doddict/data/c/01473.html DOD - Cyberspace] ]

Types of attacks

There are several methods of attack in cyber-warfare, this list is ranked in order of mildest to most severe.

* "Cyber Espionage"': Cyber espionage is the act or practice of obtaining secrets (sensitive, proprietary of classified information) from individuals, competitors, rivals, groups, governments and enemies for military, political, or economic advantage using illegal exploitation methods on internet, networks, software and or computers.

* Web vandalism: Attacks that deface web pages, or denial-of-service attacks. This is normally swiftly combated and of little harm.
* Propaganda: Political messages can be spread through or to anyone with access to the internet.
* Gathering data: Classified information that is not handled securely can be intercepted and even modified, making espionage possible from the other side of the world. See Titan Rain and Moonlight Maze.
* Distributed Denial-of-Service Attacks: Large numbers of computers in one country launch a DoS attack against systems in another country.
* Equipment disruption: Military activities that use computers and satellites for co-ordination are at risk from this type of attack. Orders and communications can be intercepted or replaced, putting soldiers at risk.
* Attacking critical infrastructure: Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack.
* Compromised Counterfeit Hardware": "Common hardware used in computers and networks that have malicious software hidden inside the software, firmware or even the microprocessors."

Reported threats

The Internet security company McAfee stated in their 2007 annual report that approximately 120 countries have been developing ways to use the Internet as a weapon and the targets are financial markets, government computer systems and utilities.

In activities reminiscent of the Cold War, which caused countries to engage in clandestine activities, intelligence agencies are routinely testing networks looking for weaknesses. These techniques for probing weaknesses in the internet and global networks are growing more sophisticated every year. [cite news | first=Peter | last=Griffiths | coauthors= | title=World faces "cyber cold war" threat | date= | publisher=Reuters | url =http://ca.news.yahoo.com/s/reuters/071129/tecnology/tech_britain_internet_col | work = | pages = | accessdate = 2007-11-30 | language = ]

Jeff Green the senior vice president of McAfee Avert Labs was quoted as saying "Cybercrime is now a global issue. It has evolved significantly and is no longer just a threat to industry and individuals but increasingly to national security." They predicted that future attacks will be even more sophisticated. "Attacks have progressed from initial curiosity probes to well-funded and well-organized operations for political, military, economic and technical espionage," [cite news | first= | last= | coauthors= | title=Cyber Crime: A 24/7 Global Battle | date= | publisher=Mcafee | url =http://www.mcafee.com/us/research/criminology_report/default.html | work = | pages = | accessdate = 2007-11-30 | language = ]

The report from McAfee says that China is at the forefront of the cyber war. China has been accused of cyber-attacks on India and Germany and the United States. China denies knowledge of these attacks. Arguments have been expressed regarding China’s involvement indicating, in the methods of computer Hackers who use zombie computers, it only indicates that China has the most amount of computers that are vulnerable to be controlled. [cite news | first= | last= | coauthors= | title=China 'has .75M zombie computers' in U.S. | date= | publisher= | url =http://www.upi.com/International_Security/Emerging_Threats/Briefing/2007/09/17/china_has_75m_zombie_computers_in_us/7394/ | work = | pages = | accessdate = 2007-11-30 | language = ]

In April 2007, Estonia came under cyber-attack in the wake of relocation of the Bronze Soldier of Tallinn. Estonian authorities, including Estonian Foreign Minister Urmas Paet accused the Kremlin of direct involvement in the cyberattacks [ [http://www.csmonitor.com/2007/0517/p99s01-duts.html Estonia accuses Russia of 'cyberattack'] ] . Estonia's defense minister later admitted he had no evidence linking cyber attacks to Russian authorities [ [http://en.rian.ru/world/20070906/76959190.html Estonia has no evidence of Kremlin involvement in cyber attacks] ] .

Known attacks

*The United States had come under attack from computers and computer networks situated in China and Russia. See Titan Rain and Moonlight Maze [Jim Wolf,"U.S. Air Force prepares to fight in cyberspace", Reuters, November 3, 2006] . It is not clear if attackers originated in those countries or used compromised computers there. Fact|date=June 2008

*On May 17, 2007 Estonia came under cyber attack. The Estonian parliament, ministries, banks, and media were targeted. [Ian Traynor, [http://www.guardian.co.uk/russia/article/0,,2081438,00.html 'Russia accused of unleashing cyberwar to disable Estonia"] , "The Guardian", May 17, 2007]

*On first week of September 2007, The Pentagon and various French, German and British government computers were attacked by hackers of Chinese origin. The Chinese government denies any involvement. Fact|date=June 2008

*On 14 December, 2007 the website of the Kyrgyz Central Election Commission was defaced during its election. The message left on the website read "This site has been hacked by Dream of Estonian organization". During the election campaigns and riots preceding the election, there were cases of Denial-of-service attacks against the Kyrgyz ISPs. [ [http://www.regnum.ru/english/932354.html Website of Kyrgyz Central Election Commission hacked by Estonian hackers] , Regnum, 14 December, 2007]

*In the second week of April hackers hacked the Indian MEA computers.

*Georgia fell under cyberattacks during the 2008 South Ossetia War.

Cyber counterintelligence

Cyber counterintelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. [ [http://www.dtic.mil/doctrine/jel/doddict/data/c/01472.html DOD - Cyber Counterintelligence] ]

The intelligence community is coming to grips with the challenge of cyber warfare intelligence. Much of the advanced infrastructure used in traditional warfare, like satellite imagery, is ineffective in the realm of cyber. New techniques and technologies are required for intelligence agencies to operate in this field.

In May 2008, U.S. Strategic Command's - Col. Gary McAlum chief of staff - of the command's Joint Task Force for Global Network Operations, quoted approvingly from a new intelligence report by Kevin Coleman of the Technolytics Institute that stated China aims to achieve global "electronic dominance." This report was not released to the public, however it was clear that cyber warfare intelligence was being collected and used to assess the cyber weapons capabilities of each country.

ee also

* Spy-Ops
* Black hat
* Computer insecurity
* Electromagnetic pulse weapons, known as transient electromagnetic devices
* Electronic warfare
* ELINT
* Espionage
* High Energy Radio Frequency weapons (HERF)
* iWar
* Information warfare
* SIGINT
* Unrestricted Warfare
* Air Force Cyber Command (Provisional)

References

External links

*Spy-Ops Download Protecting your computer in the face of cyber attacks [http://www.spy-ops.com/Web/Protecting_Your_Computer_in_the_Face_of_Cyber_Attack.pdf]
* [http://www.the-diplomat.com/article.aspx?aeid=3301 World War 3.0]
* [http://www.cnn.com/2007/US/09/26/power.at.risk/index.html Sources: Staged cyber attack reveals vulnerability in power grid]
* [http://staff.washington.edu/dittrich/cyberwarfare.html Cyberwarfare reference materials]
* [http://news.zdnet.co.uk/internet/security/0,39020375,39119111,00.htm Cyber-warfare 'a reality in 12 months']
* [http://www.wired.com/news/conflict/0,2100,58901,00.html Iraq's Crash Course in Cyberwar]
* [http://web.archive.org/web/tecsoc.org/natsec/focuscyberwar.htm Special focus on cyber-warfare]
* [http://www.infowar-monitor.net/ Infowar Monitor]
* [http://attrition.org/security/commentary/cn-us-war.html US - Sino War in 2001 sparked by media hype over downed US spy plane]
* [http://leav-www.army.mil/fmso/documents/chechiw.htm Manipulating The Mass Consciousness: Russian And Chechen "Information War" Tactics In The 2nd Chechen-Russian Conflict] by Mr. Timothy L. Thomas, Foreign Military Studies Office, Fort Leavenworth, KS


Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • cyber warfare — UK US noun [U] INTERNET ► the activity of using the internet to attack a country’s computers in order to damage things such as communication and transport systems or water and electricity supplies: »The use of cyber warfare can destabilise… …   Financial and business terms

  • Warfare — refers to the conduct of conflict between opponents, and usually involves escalation of aggression from the proverbial war of words between politicians and diplomats to full scale armed conflicts, waged until one side accepts defeat or peace… …   Wikipedia

  • Cyber War — Zweiter Weltkrieg: Frankreich. Nachrichtenhelferinnen an Vermittlungspult/Telefonanlage: PK KBK Lw zbV (Deutsche Wehrmacht; Bild: Bundesarchiv) Cyberwar ist ein Kofferwort aus den englischen Wörtern …   Deutsch Wikipedia

  • Cyber electronic warfare — (cyber EW) is any military action involving the use of electromagnetic energy to control the domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and/or exchange data via networked systems and… …   Wikipedia

  • Cyber Operations — (CO) is a classification of military operations that use of Computer Network Attack (CNA), Computer Network Defense (CND), Computer Network Exploitation (CNE) against an enemy to achieve military objectives.[1] Contents 1 History 2 Activities …   Wikipedia

  • Cyber spying — or Cyber espionage is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitors, rivals, groups, governments and… …   Wikipedia

  • Cyber Troopers Virtual-On: Operation Moongate — Developer(s) Sega AM3 Publisher(s) Sega …   Wikipedia

  • Information warfare — Warfare Military history Eras Prehistoric Ancient Medieval Gunpowder Industrial …   Wikipedia

  • United States Cyber Command — U.S. Cyber Command emblem Active 2009–current Country …   Wikipedia

  • Chinese Information Operations and Information Warfare — are based on concepts and terms similar to those used by the United States, but the Chinese have evolved them to be more suitable and relevant to Chinese culture and to communist doctrine. While the People s Republic of China has adopted the idea …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”