Cyberwar

Facebook Twitter

Volunteer Cyber Army Emerges In Estonia. Hide captionA massive 2007 cyberassault, traced to Russia, highlighted the need for Estonia to set up a Cyber Defense League, a force of programmers, computer scientists and software engineers who in wartime would function under a unified military command. iStockphoto A massive 2007 cyberassault, traced to Russia, highlighted the need for Estonia to set up a Cyber Defense League, a force of programmers, computer scientists and software engineers who in wartime would function under a unified military command.

Volunteer Cyber Army Emerges In Estonia

In April 2007, the Baltic republic of Estonia became the first country in the world to experience cyberwar. Government, financial and media computer networks were paralyzed by a series of attacks, which authorities ultimately concluded originated in Russia. In the years since that cyberassault, Estonia has distinguished itself once again: Now it is a model for how a country might defend itself during a cyberwar. 2007 Cyberattack Targeted Country Private Sector Cooperation. EU carries out first cyberwarfare simulation - ComputerworldUK.com. Bruce Schneier: We need ‘cyberwar hotlines’ to match nuclear hotlines. Security expert Bruce Schneier has called for governments to establish ‘hotlines’ between their cyber commands, much like the those between nuclear commands, to help them battle against cyber attacks.

Bruce Schneier: We need ‘cyberwar hotlines’ to match nuclear hotlines

Cyber security is high on the national agenda, and is regarded as a top threat to the UK’s security. Hiding our Cyberwar from Congress. The AP noticed something troubling in Michael Vickers’ response to the Senate Armed Services Committee questions on his nomination to be Undersecretary of Defense for Intelligence: the government did not include descriptions of its cyberwar activities in the quarterly report on clandestine activities.

Hiding our Cyberwar from Congress

The Senate Armed Services Committee voiced concerns that cyber activities were not included in the quarterly report on clandestine activities. But Vickers, in his answer, suggested that such emerging high-tech operations are not specifically listed in the law — a further indication that cyber oversight is still a murky work in progress for the Obama administration.Vickers told the committee that the requirement specifically calls for clandestine human intelligence activity. But if confirmed, he said, he would review the reporting requirements and support expanding the information included in the report. But there seems to be some interesting carving out of programs to hide from Congress. AAAS "U.S. Government, Businesses Are Poorly Prepared for Cyber Attacks, Experts Say at AAAS"

The United States is ill-prepared to defend its vital infrastructure against a cyber attack, a former top cybersecurity official said during a recent panel discussion at AAAS.

AAAS "U.S. Government, Businesses Are Poorly Prepared for Cyber Attacks, Experts Say at AAAS"

Richard C. Clarke, special adviser for cybersecurity under President George W. Bush, said the federal government might be able to defend some of its own military and civilian networks. Stuxnet Worm Used Against Iran Was Tested in Israel. New info on Stuxnet. Stuxnet continues to make headlines.

New info on Stuxnet

The New York Times published a long story on the latest findings, including these: President George Bush started an experimental cyber attack program against Iran already in 2008. The NY Times claims that Stuxnet was developed jointly by USA and Israel. They offer no direct proof though. Israel has built a replica of the Iranian Natanz enrichment facility in their Negev Nuclear Research Center in Dimona. Embassy cables leaked by WikiLeaks seem to prove that Iran's nuclear program was indeed using Siemens PLC gear. The NY Times claims that Idaho National Laboratory at Idaho Falls used their security testing of the Siemens PLC systems to find vulnerabilities to be used in the Stuxnet attack. Image copyright Idaho National Laboratory & Siemens The target of the attack was to modify the operation of high-frequency power drives made by Vacon and Fararo Paya.

Applying U.S. principles on Internet freedom - Glenn Greenwald. Hillary Clinton, speech on Internet freedom, Newseum, Washington, DC, January, 21, 2010: Countries or individuals that engage in cyber attacks should face consequences and international condemnation.

Applying U.S. principles on Internet freedom - Glenn Greenwald

Risks of cyber war 'over-hyped' says OECD study. 17 January 2011 Last updated at 10:33 GMT A huge solar flare could give rise to a global cyber shock, warns the report The vast majority of hi-tech attacks described as acts of cyber war do not deserve the name, says a report. The Organisation for Economic Cooperation and Development study is part of a series considering incidents that could cause global disruption. While pandemics and financial instability could cause problems, cyber attacks are unlikely to, it says. Instead, trouble caused by cyber attacks is likely to be localised and short-lived. Stuxnet-increasingly-sounding-like-movie-plot.shtml from techdirt.com. Like many people, I've been following the story of the Stuxnet worm with great interest.

stuxnet-increasingly-sounding-like-movie-plot.shtml from techdirt.com

As you probably know, this worm was apparently designed to infect Iranian nuclear operations to create problems -- and supposedly setting back their nuclear operations quite a bit. The NY Times came out with a fascinating investigative report about the background of Stuxnet over the weekend, and it's worth a read. What I found most entertaining was the rather Hollywood-trickery angle by which Stuxnet did its dirty work: The worm itself now appears to have included two major components.

One was designed to send Iran’s nuclear centrifuges spinning wildly out of control. That latter part is, indeed, right out of a movie.