Cyberwar

Facebook Twitter

Volunteer Cyber Army Emerges In Estonia. Hide captionA massive 2007 cyberassault, traced to Russia, highlighted the need for Estonia to set up a Cyber Defense League, a force of programmers, computer scientists and software engineers who in wartime would function under a unified military command. iStockphoto A massive 2007 cyberassault, traced to Russia, highlighted the need for Estonia to set up a Cyber Defense League, a force of programmers, computer scientists and software engineers who in wartime would function under a unified military command.

Volunteer Cyber Army Emerges In Estonia

In April 2007, the Baltic republic of Estonia became the first country in the world to experience cyberwar. Government, financial and media computer networks were paralyzed by a series of attacks, which authorities ultimately concluded originated in Russia. In the years since that cyberassault, Estonia has distinguished itself once again: Now it is a model for how a country might defend itself during a cyberwar. EU carries out first cyberwarfare simulation - ComputerworldUK.com. Bruce Schneier: We need ‘cyberwar hotlines’ to match nuclear hotlines. Security expert Bruce Schneier has called for governments to establish ‘hotlines’ between their cyber commands, much like the those between nuclear commands, to help them battle against cyber attacks.

Bruce Schneier: We need ‘cyberwar hotlines’ to match nuclear hotlines

Cyber security is high on the national agenda, and is regarded as a top threat to the UK’s security. It is also top a concern for other nations around the world. Last month, the EU announced plans to cybercrime centre by 2013, and it agreed with the US to set up a working group on cybersecurity. Meanwhile, NATO also adopted its Strategic Concept Charter, which outlines plans to develop new capabilities to combat cyber attacks on military networks. Hiding our Cyberwar from Congress.

The AP noticed something troubling in Michael Vickers’ response to the Senate Armed Services Committee questions on his nomination to be Undersecretary of Defense for Intelligence: the government did not include descriptions of its cyberwar activities in the quarterly report on clandestine activities.

Hiding our Cyberwar from Congress

The Senate Armed Services Committee voiced concerns that cyber activities were not included in the quarterly report on clandestine activities. But Vickers, in his answer, suggested that such emerging high-tech operations are not specifically listed in the law — a further indication that cyber oversight is still a murky work in progress for the Obama administration.Vickers told the committee that the requirement specifically calls for clandestine human intelligence activity. But if confirmed, he said, he would review the reporting requirements and support expanding the information included in the report. AAAS "U.S. Government, Businesses Are Poorly Prepared for Cyber Attacks, Experts Say at AAAS"

The United States is ill-prepared to defend its vital infrastructure against a cyber attack, a former top cybersecurity official said during a recent panel discussion at AAAS.

AAAS "U.S. Government, Businesses Are Poorly Prepared for Cyber Attacks, Experts Say at AAAS"

Richard C. Clarke, special adviser for cybersecurity under President George W. Stuxnet Worm Used Against Iran Was Tested in Israel. New info on Stuxnet. Stuxnet continues to make headlines.

New info on Stuxnet

The New York Times published a long story on the latest findings, including these: President George Bush started an experimental cyber attack program against Iran already in 2008. The NY Times claims that Stuxnet was developed jointly by USA and Israel. They offer no direct proof though. Applying U.S. principles on Internet freedom - Glenn Greenwald. Hillary Clinton, speech on Internet freedom, Newseum, Washington, DC, January, 21, 2010: Countries or individuals that engage in cyber attacks should face consequences and international condemnation.

Applying U.S. principles on Internet freedom - Glenn Greenwald

In an interconnected world, an attack on one nation’s networks can be an attack on all. The New York Times, Saturday: Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role . . . . Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges. . . . the operations there, as well as related efforts in the United States, are among the newest and strongest clues suggesting that the virus was designed as an American-Israeli project to sabotage the Iranian program. . . . Risks of cyber war 'over-hyped' says OECD study. 17 January 2011 Last updated at 10:33 GMT A huge solar flare could give rise to a global cyber shock, warns the report The vast majority of hi-tech attacks described as acts of cyber war do not deserve the name, says a report.

Risks of cyber war 'over-hyped' says OECD study

The Organisation for Economic Cooperation and Development study is part of a series considering incidents that could cause global disruption. While pandemics and financial instability could cause problems, cyber attacks are unlikely to, it says. Instead, trouble caused by cyber attacks is likely to be localised and short-lived. Stuxnet-increasingly-sounding-like-movie-plot.shtml from techdirt.com. Like many people, I've been following the story of the Stuxnet worm with great interest.

stuxnet-increasingly-sounding-like-movie-plot.shtml from techdirt.com

As you probably know, this worm was apparently designed to infect Iranian nuclear operations to create problems -- and supposedly setting back their nuclear operations quite a bit. The NY Times came out with a fascinating investigative report about the background of Stuxnet over the weekend, and it's worth a read. What I found most entertaining was the rather Hollywood-trickery angle by which Stuxnet did its dirty work: The worm itself now appears to have included two major components.