Saturday, June 18, 2016

21st Century Cyberwar Risks Escalating




NATO officially expands cyber-operations, in a move that can be construed as a de jure recognition of this new form of warfare:
Lolita C. Baldor. (June 14, 2016). Air, land, sea, cyber: NATO adds cyber to operation areas http://bigstory.ap.org/article/b7a8330df0114498a1611257d4cb5d58/air-land-sea-cyber-nato-adds-cyber-operation-areas

BRUSSELS (AP) — NATO agreed Tuesday to make cyber operations part of its war domain, along with air, sea and land operations, and to beef up the defense of its computer networks.

NATO Secretary-General Jens Stoltenberg said the decision to formally consider cyber operations a military domain is not aimed at any one country. He says the allies need to be able to better defend themselves and respond to attacks on their computer networks.
Of course, the US is an old pro at hacking:

US was 'key player in cyber-attacks on Iran's nuclear programme.' The Guardian, https://www.theguardian.com/world/2012/jun/01/obama-sped-up-cyberattack-iran

And is constantly innovating its hacking technology:
N.S.A. Devises Radio Pathway Into Computers http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?nl=todaysheadlines&emc=edit_th_20140115&_r=0

WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target....
Recently Japan's Nuclear Control Center was hacked and used as a relay point in an attack against another entity, whose name has remained secret:

Tokai-Based Nuclear Material Control Center in Japan Used as "Relay Point in Cyber-Attack" Friday, May 20, 2016, http://majiasblog.blogspot.com/2016/05/tokai-based-nuclear-material-control.html
More insanity!



PREVIOUS POSTS ON CYBER-SECURITY ISSUES

Majia's Blog: US Power Plants (Including Nuclear Plants) Vulnerable ...

Majia's Blog: Cyber-Weapons Beyond Control

Majia's Blog: Nuclear Madness Delivers Conditions for Delivering ...

Majia's Blog: Stuxnet Infected Chevron's Corp. Network in 2010

Majia's Blog: Stuxnet Work of US and Israel

Majia's Blog: New Computer Virus Larger Than Stuxnet Identified

Majia's Blog: Headline from Jan 26, 2011: If that is Stuxnet, What ...


 

2 comments:

  1. Indian point fired back up. The risks of cyber terrorism. One of a thousand doomsday scenarios that can play out with these monstrosities allowed to exist.

    ReplyDelete
  2. Nuclear power plants, all the contamination to get them and keep them going, are the pinnacle of apocalyptic terror of a government against its citizenry.

    ReplyDelete

Note: Only a member of this blog may post a comment.