recentpopularlog in

pierredv : cyberwar   23

'China to Target GPS First in Cyber War' - Senator Sasse | RNTF Sep 2019
In the article below, the Senator is quoted as saying dominant scenarios for cyber war have China “…sort of blowing up everything in the near-space early in a conflict, which would take away lots of things like GPS​…”

Actually “blowing up” enough widely distributed GPS satellites to disable the entire system would be very difficult. It is much easier to envision the system being “virtually blown up” by two or three high powered Chinese satellites jamming GPS signals across the face of the planet.
RNTF  GPS  cyberwar  China 
september 2019 by pierredv
United States Steps Up Digital Incursions Into Russia's Electric Power Grid, According to NYT, CircleID Jun 18
The United States has shifted its Russia strategy more towards offense and inserted potentially crippling malware inside Russia's electric power grid at a depth and with an aggressiveness that had never been tried before, according to a New York Times's story that broke over the weekend.
CircleID  cybersecurity  cyberwar 
june 2019 by pierredv
Israel’s Airstrike on Hamas Hackers: First Real-Time Physical Retaliation Against Cyberattack - CircleID May 2019
"Amid escalating violence between Israel and Gaza this weekend, the Israeli Defense Force claimed it bombed and partially destroyed the base of an active Hamas hacking group in Gaza"

"Although physical retaliations have occurred against cyberattacks in the past including in Estonia, Georgia and US 2015 airstrike to assassinate Islamic state hacker Junaid Hussain, these were all planned events plotted out over several months, notes Newman. Israel's weekend attack was a real-time response to the alleged base of an active Hamas hacking group. "
Israel  CircleID  hacking  retaliation  cybersecurity  cyberwar 
may 2019 by pierredv
Sorry sci-fi fans, real wars in space not the stuff of Hollywood - Jan 2017
"Savvy space warriors like Russia’s military already are giving us a taste of the future. They are jamming GPS navigation signals, electronically disrupting satellite communications links and sensors in space. Not quite star wars.
This form of electronic warfare in space is serious enough, however, that the U.S. military is now moving to defend its satellites and other space assets. There is in fact a real conversation under way about war in space, albeit one of cyber and electromagnetic attacks, not spaceships shooting at each other."

"As the Pentagon maps out strategies and tactics to defend its satellites, military lawyers are actively investigating how international law applies to outer space. ... As with other uses of military force, actions in space are restricted by international rules."
SpaceNews  jammin  interference  space  cyberwar  warfare  law 
january 2018 by pierredv
SWATs, SWEATERs, and ANSWERs: Air Force gets serious about spectrum warfare
"First, the term "spectrum warfare" is evolving quickly well-understood mainstream usage, and second, spectrum warfare rapidly is taking its place as a top U.S. military priority. For the uninitiated, spectrum warfare is an umbrella term that comprises the hitherto separate military disciplines of electronic warfare, cyber warfare, optical warfare, and navigation warfare."
USAF  spectru-warfare  war  cyberwar  navigation  jamming  EW  electronic-warfare 
november 2014 by pierredv
How America's Soldiers Fight for the Spectrum on the Battlefield | Threat Level |
"It is well known that America’s military dominates both the air and the sea. What’s less celebrated is that the US has also dominated the spectrum, a feat that is just as critical to the success of operations. Communications, navigation, battlefield logistics, precision munitions—all of these depend on complete and unfettered access to the spectrum, territory that must be vigilantly defended from enemy combatants. " "Yet despite the importance of this crucial resource, America’s grip on the spectrum has never been more tenuous." "The American military is scrambling to develop new tools and techniques that will help it preserve its electromagnetic edge. But that edge continues to shrink by the day, and very soon our inability to completely control the spectrum might result in a different kind of war."
history  spectrum  jamming  ex  Wired  via  Robert  Horvitz  cyberwar  Iraq  China  Afghanistan  GPS 
february 2014 by pierredv
Why a cyberwar won't happen - opinion - 09 September 2013 - New Scientist
Excerpts: What would an act of cyberwar look like? History suggests three features. To count as an armed attack, a computer breach would need to be violent. If it can't hurt or kill, it can't be war. An act of cyberwar would also need to be instrumental. In a military confrontation, one party generally uses force to compel the other party to do something they would otherwise not do. Finally, it would need to be political, in the sense that one opponent says, "If you don't do X, we'll strike you." ... Data breaches are not just a risk, but a real bleeding wound for the US, Europe and other advanced economies. But espionage is not war, and cyber espionage is not cyberwar. ... Talk of cyberwar ... is disrespectful ... kills nuance ... is in the interest of those with a harsher vision of the web's future ... The armed forces need to stay focused on fighting and winning the real wars of the future. That's hard enough. Let us not militarise the struggle for the free and liberal inter
cyberwar  military  doctrine  Thomas  Rid  NewScientist 
october 2013 by pierredv
Exclusive: Iran hijacked US drone, says Iranian engineer - Dec 2011
"Iran guided the CIA's "lost" stealth drone to an intact landing inside hostile territory by exploiting a navigational weakness long-known to the US military, according to an Iranian engineer now working on the captured drone's systems inside Iran."
navigation  GPS  jamming  warfare  cyberwar  CSMonitor 
december 2011 by pierredv
Cyber-intruder sparks response, debate - The Washington Post Nov 2011
story of malware, and Federal response to Sep 2008 incident "Like the running debates over the use of drones and other evolving military technologies, rapid advances in computing capability are forcing complex deliberations over the appropriate use of new tools and weapons. " p. 2: "One likely scenario is that an American soldier, official or contractor in Afghanistan — where the largest number of infections occurred — went to an Internet cafe, used a thumb drive in an infected computer and then inserted the drive in a classified machine." p. 3: "Questions over the role of offense in cybersecurity deterrence began in the 1990s, if not earlier, said Martin Libicki, a Rand Corp. cyberwarfare expert. One reason it is so difficult to craft rules, he said, is the tendency to cast cyberwar as “good, old-fashioned war in yet another domain.” Another reason ... is the overlap between cybersecurity operations and the classified world of intelligence."
usa  cyberwar  russia  security  cybersecurity  WashingtonPost  * 
december 2011 by pierredv
From the man who discovered Stuxnet, dire warnings one year later -
Ralph Langer, discoverer of Stuxnet: "That wakeup call lasted only about a week. Thereafter, everybody fell back into coma."
cyberwar  csmonitor  quotations  interviews 
september 2011 by pierredv
Slip-Up in Chinese Military TV Show Reveals More Than Intended | China News | Epoch Times
"A standard, even boring, piece of Chinese military propaganda screened in mid-July included what must have been an unintended but nevertheless damaging revelation: shots from a computer screen showing a Chinese military university is engaged in cyberwarfare against entities in the United States."
china  hacking  cyberwar 
august 2011 by pierredv
10 ways to prevent cyberconflict - Start cyberwar limitation talks -
Good list = Start cyberwar limitation talks = tighten network security = compel nations to assist those under attack = define what a cyberwar is = hold nations responsible for attacks = ban the "first use" of cyberweapons = launch and environmental-like initiative to clean up the internet = invent technologies to clean up the internet = rewrite cybersecurity laws = make infrastructure more secure
security  cyberwar  csmonitor 
march 2011 by pierredv
The new cyber arms race - Mark Clayton, Mar 2011
Very strong lead article. Many take-aways, key to me that interviews with experts indicates that "strategic, large-scale digital warfare" is less likely than "a prolonged period of aggressive cyberespionage, sabotage, and low-level attacks that damage electronic networks". (p.1) quote p.2: "It's 1946 in cyber[warfare]", James Mulvenon, a founding member of the Cyber Conflict Studies Association, a nonprofit group in Washington US is most vulnerable because it's so wired: "If the nation went to war today, in a cyberwar, we would lose," Mike McConnell, director of national intelligence from 2007 to 2009 (p.2) (p.3) "What Stuxnet represents is a future in which people with the funds will be able to buy a sophisticated attack like this on the black market," says Ralph Langner, a German cyber-security researcher and Stuxnet expert (p. 4) "US is now immersed in a continuous series of cyberconflicts" including with China
security  cybersecurity  cyberwar  hacking  geopolitics  csmonitor  **  quotations 
march 2011 by pierredv
Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant? -
The Stuxnet malware has infiltrated industrial computer systems worldwide. Now, cyber security sleuths say it's a search-and-destroy weapon meant to hit a single target. One expert suggests it may be after Iran's Bushehr nuclear power plant.
security  malware  cyberwar  csmonitor 
september 2010 by pierredv
Securing Cyberspace for the 44th Presidency | Center for Strategic and International Studies
By James Andrew Lewis
Dec 8, 2008
By James Andrew Lewis
Dec 8, 2008

The CSIS Commission on Cybersecurity for the 44th Presidency has released its final report, "Securing Cyberspace for the 44th Presidency." The Commission’s three major findings are:

1.Cybersecurity is now one of the major national security problems facing the United States;
2.Decisions and actions must respect American values related to privacy and civil liberties; and
3.Only a comprehensive

The CSIS Commission on Cybersecurity for the 44th Presidency has released its final report, "Securing Cyberspace for the 44th Presidency." The Commission’s three major findings are:
Cybersecurity is now one of the major national security problems facing the United States;
Decisions and actions must respect American values related to privacy and civil liberties; and
Only a comprehensive national security strategy that embraces both the domestic and international aspects of cybersecurity will improve the situation.
security  cybercrime  cyberwar  cybersecurity 
december 2009 by pierredv
Cyberattack in Estonia--what it really means - CNET News
quote: There's no extortion going on. They're not demanding to the Ministry of Finance, the Ministry of Agriculture, "Pay us $50 million, or we keep this up." They're not trying to disrupt e-commerce--they're making a political statement
security  politics  cyberwar  nationalism 
september 2009 by pierredv
Profile of a real cyberwar - Washington Times
"It is no secret that several countries, including the United States, China, Russia and Israel, have examined cyberwar capabilities. What those capabilities might be or how a cyberwar might look are shrouded in mystery. The denial-of-service attacks that made headlines are not it. "
"According to the article in Ha'aretz, Israeli intelligence has sought to systematically insert malware that can damage information systems within the Iranian nuclear program. It is believed those systems are not connected to the broader Internet and that the malware is inserted into equipment sold to the Iranian government. "
security  cyberwar 
august 2009 by pierredv

Copy this bookmark:

to read