- Cyber-warfare
Cyber-warfare (also known as "cybernetic war" [Jonathan V. Post, "Cybernetic War," "Omni," May 1979, pp.44-104, reprinted"The Omni Book of Computers & Robots", Zebra Books, ISBN 0-8217-1276] , or "cyberwar") is the use of
computer s and theInternet in conductingwar fare incyberspace . [ [http://www.dtic.mil/doctrine/jel/doddict/data/c/01473.html DOD - Cyberspace] ]Types of attacks
There are several methods of attack in cyber-warfare, this list is ranked in order of mildest to most severe.
* "
Cyber Espionage "': Cyber espionage is the act or practice of obtaining secrets (sensitive, proprietary of classified information) from individuals, competitors, rivals, groups, governments and enemies for military, political, or economic advantage using illegal exploitation methods on internet, networks, software and or computers.* Web
vandalism : Attacks that deface web pages, ordenial-of-service attack s. This is normally swiftly combated and of little harm.
*Propaganda : Political messages can be spread through or to anyone with access to the internet.
* Gathering data: Classified information that is not handled securely can be intercepted and even modified, makingespionage possible from the other side of the world. SeeTitan Rain andMoonlight Maze .
* Distributed Denial-of-Service Attacks: Large numbers of computers in one country launch aDoS attack against systems in another country.
* Equipment disruption: Military activities that use computers andsatellites for co-ordination are at risk from this type of attack. Orders and communications can be intercepted or replaced, putting soldiers at risk.
* Attacking critical infrastructure: Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack.
* Compromised Counterfeit Hardware": "Common hardware used in computers and networks that have malicious software hidden inside the software, firmware or even the microprocessors."Reported threats
The Internet security company
McAfee stated in their 2007 annual report that approximately 120 countries have been developing ways to use the Internet as a weapon and the targets are financial markets, government computer systems and utilities.In activities reminiscent of the
Cold War , which caused countries to engage in clandestine activities, intelligence agencies are routinely testing networks looking for weaknesses. These techniques for probing weaknesses in the internet and global networks are growing more sophisticated every year. [cite news | first=Peter | last=Griffiths | coauthors= | title=World faces "cyber cold war" threat | date= | publisher=Reuters | url =http://ca.news.yahoo.com/s/reuters/071129/tecnology/tech_britain_internet_col | work = | pages = | accessdate = 2007-11-30 | language = ]Jeff Green the senior vice president of McAfee Avert Labs was quoted as saying "
Cybercrime is now a global issue. It has evolved significantly and is no longer just a threat to industry and individuals but increasingly to national security." They predicted that future attacks will be even more sophisticated. "Attacks have progressed from initial curiosity probes to well-funded and well-organized operations for political, military, economic and technical espionage," [cite news | first= | last= | coauthors= | title=Cyber Crime: A 24/7 Global Battle | date= | publisher=Mcafee | url =http://www.mcafee.com/us/research/criminology_report/default.html | work = | pages = | accessdate = 2007-11-30 | language = ]The report from McAfee says that
China is at the forefront of the cyber war. China has been accused of cyber-attacks on India and Germany and the United States. China denies knowledge of these attacks. Arguments have been expressed regarding China’s involvement indicating, in the methods of computer Hackers who usezombie computer s, it only indicates that China has the most amount of computers that are vulnerable to be controlled. [cite news | first= | last= | coauthors= | title=China 'has .75M zombie computers' in U.S. | date= | publisher= | url =http://www.upi.com/International_Security/Emerging_Threats/Briefing/2007/09/17/china_has_75m_zombie_computers_in_us/7394/ | work = | pages = | accessdate = 2007-11-30 | language = ]In April 2007,
Estonia came under cyber-attack in the wake of relocation of theBronze Soldier of Tallinn . Estonian authorities, including Estonian Foreign Minister Urmas Paet accused the Kremlin of direct involvement in the cyberattacks [ [http://www.csmonitor.com/2007/0517/p99s01-duts.html Estonia accuses Russia of 'cyberattack'] ] . Estonia's defense minister later admitted he had no evidence linking cyber attacks to Russian authorities [ [http://en.rian.ru/world/20070906/76959190.html Estonia has no evidence of Kremlin involvement in cyber attacks] ] .Known attacks
*The
United States had come under attack from computers and computer networks situated inChina andRussia . SeeTitan Rain andMoonlight Maze [Jim Wolf,"U.S. Air Force prepares to fight in cyberspace",Reuters ,November 3 ,2006 ] . It is not clear if attackers originated in those countries or used compromised computers there. Fact|date=June 2008*On
May 17 ,2007 Estonia came under cyber attack. The Estonian parliament, ministries, banks, and media were targeted. [Ian Traynor, [http://www.guardian.co.uk/russia/article/0,,2081438,00.html 'Russia accused of unleashing cyberwar to disable Estonia"] , "The Guardian ",May 17 ,2007 ]*On first week of September 2007,
The Pentagon and various French, German and British government computers were attacked by hackers of Chinese origin. The Chinese government denies any involvement. Fact|date=June 2008*On
14 December ,2007 the website of the Kyrgyz Central Election Commission was defaced during its election. The message left on the website read "This site has been hacked by Dream of Estonian organization". During the election campaigns and riots preceding the election, there were cases ofDenial-of-service attack s against the KyrgyzISP s. [ [http://www.regnum.ru/english/932354.html Website of Kyrgyz Central Election Commission hacked by Estonian hackers] , Regnum,14 December ,2007 ]*In the second week of April hackers hacked the Indian MEA computers.
*Georgia fell under cyberattacks during the
2008 South Ossetia War .Cyber counterintelligence
Cyber counterintelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. [ [http://www.dtic.mil/doctrine/jel/doddict/data/c/01472.html DOD - Cyber Counterintelligence] ]
The intelligence community is coming to grips with the challenge of cyber warfare intelligence. Much of the advanced infrastructure used in traditional warfare, like satellite imagery, is ineffective in the realm of cyber. New techniques and technologies are required for intelligence agencies to operate in this field.
In May 2008, U.S. Strategic Command's - Col. Gary McAlum chief of staff - of the command's Joint Task Force for Global Network Operations, quoted approvingly from a new intelligence report by Kevin Coleman of the Technolytics Institute that stated China aims to achieve global "electronic dominance." This report was not released to the public, however it was clear that cyber warfare intelligence was being collected and used to assess the cyber weapons capabilities of each country.
ee also
*
Spy-Ops
*Black hat
*Computer insecurity
*Electromagnetic pulse weapons, known astransient electromagnetic device s
*Electronic warfare
*ELINT
*Espionage
*High Energy Radio Frequency weapons (HERF)
*iWar
*Information warfare
*SIGINT
*Unrestricted Warfare
*Air Force Cyber Command (Provisional) References
External links
*Spy-Ops Download Protecting your computer in the face of cyber attacks [http://www.spy-ops.com/Web/Protecting_Your_Computer_in_the_Face_of_Cyber_Attack.pdf]
* [http://www.the-diplomat.com/article.aspx?aeid=3301 World War 3.0]
* [http://www.cnn.com/2007/US/09/26/power.at.risk/index.html Sources: Staged cyber attack reveals vulnerability in power grid]
* [http://staff.washington.edu/dittrich/cyberwarfare.html Cyberwarfare reference materials]
* [http://news.zdnet.co.uk/internet/security/0,39020375,39119111,00.htm Cyber-warfare 'a reality in 12 months']
* [http://www.wired.com/news/conflict/0,2100,58901,00.html Iraq's Crash Course in Cyberwar]
* [http://web.archive.org/web/tecsoc.org/natsec/focuscyberwar.htm Special focus on cyber-warfare]
* [http://www.infowar-monitor.net/ Infowar Monitor]
* [http://attrition.org/security/commentary/cn-us-war.html US - Sino War in 2001 sparked by media hype over downed US spy plane]
* [http://leav-www.army.mil/fmso/documents/chechiw.htm Manipulating The Mass Consciousness: Russian And Chechen "Information War" Tactics In The 2nd Chechen-Russian Conflict] by Mr. Timothy L. Thomas, Foreign Military Studies Office, Fort Leavenworth, KS
Wikimedia Foundation. 2010.