NATO officially expands cyber-operations, in a move that can be construed as a de jure recognition of this new form of warfare:
Lolita C. Baldor. (June 14, 2016). Air, land, sea, cyber: NATO adds cyber to operation areas http://bigstory.ap.org/article/b7a8330df0114498a1611257d4cb5d58/air-land-sea-cyber-nato-adds-cyber-operation-areas
BRUSSELS (AP) — NATO agreed Tuesday to make cyber operations part of its war domain, along with air, sea and land operations, and to beef up the defense of its computer networks.
NATO Secretary-General Jens Stoltenberg said the decision to formally consider cyber operations a military domain is not aimed at any one country. He says the allies need to be able to better defend themselves and respond to attacks on their computer networks.
Of course, the US is an old pro at hacking:
And is constantly innovating its hacking technology:
US was 'key player in cyber-attacks on Iran's nuclear programme.' The Guardian, https://www.theguardian.com/world/2012/jun/01/obama-sped-up-cyberattack-iran
N.S.A. Devises Radio Pathway Into Computers http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?nl=todaysheadlines&emc=edit_th_20140115&_r=0Recently Japan's Nuclear Control Center was hacked and used as a relay point in an attack against another entity, whose name has remained secret:
WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.
The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target....
Tokai-Based Nuclear Material Control Center in Japan Used as "Relay Point in Cyber-Attack" Friday, May 20, 2016, http://majiasblog.blogspot.com/2016/05/tokai-based-nuclear-material-control.htmlMore insanity!
PREVIOUS POSTS ON CYBER-SECURITY ISSUES
Majia's Blog: US Power Plants (Including Nuclear Plants) Vulnerable ...
Majia's Blog: Cyber-Weapons Beyond Control
Majia's Blog: Nuclear Madness Delivers Conditions for Delivering ...
Majia's Blog: Stuxnet Infected Chevron's Corp. Network in 2010
Majia's Blog: Stuxnet Work of US and Israel
Majia's Blog: New Computer Virus Larger Than Stuxnet Identified
Majia's Blog: Headline from Jan 26, 2011: If that is Stuxnet, What ...