Cyber-warfare
Encyclopedia
Cyberwarfare refers to politically motivated hacking
Computer crime
Computer crime, or cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Such crimes may threaten a nation’s security and financial health...

 to conduct sabotage
Cyber spying
Cyber spying or Cyber espionage is the act or practice of obtaining secrets without the permission of the holder of the information , from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using illegal exploitation methods on...

 and espionage
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...

. It is a form of information warfare
Information warfare
The term Information Warfare is primarily an American concept involving the use and management of information technology in pursuit of a competitive advantage over an opponent...

 sometimes seen as analogous to conventional warfare
Conventional warfare
Conventional warfare is a form of warfare conducted byusing conventional military weapons and battlefield tactics between two or more states in open confrontation. The forces on each side are well-defined, and fight using weapons that primarily target the opposing army...

 although this analogy is controversial for both its accuracy and its political motivation.

Government security expert Richard A. Clarke
Richard A. Clarke
Richard Alan Clarke was a U.S. government employee for 30 years, 1973–2003. He worked for the State Department during the presidency of Ronald Reagan. In 1992, President George H.W. Bush appointed him to chair the Counter-terrorism Security Group and to a seat on the United States National...

, in his book Cyber War (May 2010), defines "cyberwarfare" as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption." The Economist describes cyberwarfare as "the fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon
The Pentagon
The Pentagon is the headquarters of the United States Department of Defense, located in Arlington County, Virginia. As a symbol of the U.S. military, "the Pentagon" is often used metonymically to refer to the Department of Defense rather than the building itself.Designed by the American architect...

 has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space."

In 2009, President Barack Obama declared America's digital infrastructure to be a "strategic national asset," and in May 2010 the Pentagon set up its new U.S. Cyber Command (USCYBERCOM
United States Cyber Command
United States Cyber Command is an armed forces sub-unified command subordinate to United States Strategic Command. The command is located in Fort Meade, Maryland and led by General Keith B. Alexander. USCYBERCOM centralizes command of cyberspace operations, organizes existing cyber resources and...

), headed by General Keith B. Alexander
Keith B. Alexander
General Keith B. Alexander, USA is the current Director, National Security Agency , Chief, Central Security Service and Commander, United States Cyber Command. He previously served as Deputy Chief of Staff, G-2, U.S. Army from 2003 to 2005...

, director of the National Security Agency
National Security Agency
The National Security Agency/Central Security Service is a cryptologic intelligence agency of the United States Department of Defense responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting U.S...

 (NSA), to defend American military networks and attack other countries' systems. The United Kingdom has also set up a cyber-security and "operations centre" based in Government Communications Headquarters
Government Communications Headquarters
The Government Communications Headquarters is a British intelligence agency responsible for providing signals intelligence and information assurance to the UK government and armed forces...

 (GCHQ), the British equivalent of the NSA. In the U.S. however, Cyber Command is only set up to protect the military, whereas the government and corporate infrastructures are primarily the responsibility respectively of the Department of Homeland Security and private companies.

In February 2010, top American lawmakers warned that the "threat of a crippling attack on telecommunications and computer networks was sharply on the rise." According to The Lipman Report, numerous key sectors of the U.S. economy along with that of other nations, are currently at risk, including cyber threats to public and private facilities, banking and finance, transportation, manufacturing, medical, education and government, all of which are now dependent on computers for daily operations. In 2009, President Obama stated that "cyber intruders have probed our electrical grids."

The Economist writes that China has plans of "winning informationised wars by the mid-21st century". They note that other countries are likewise organizing for cyberwar, among them Russia, Israel and North Korea. Iran boasts of having the world's second-largest cyber-army. James Gosler, a government cybersecurity specialist, worries that the U.S. has a severe shortage of computer security specialists, estimating that there are only about 1,000 qualified people in the country today, but needs a force of 20,000 to 30,000 skilled experts. At the July 2010 Black Hat
Black Hat Briefings
The Black Hat Conference is a computer security conference that brings together a variety of people interested in information security. Representatives of federal agencies and corporations attend along with hackers. The Briefings take place regularly in Las Vegas, Barcelona and Tokyo...

 computer security conference
Computer security conference
A computer security conference is a term that describes a convention for individuals involved in computer security. They generally serve as a meeting place for system and network administrators, hackers, and computer security experts....

, Michael Hayden, former deputy director of national intelligence, challenged thousands of attendees to help devise ways to "reshape the Internet's security architecture", explaining, "You guys made the cyberworld look like the north German plain."

Espionage and national security breaches

Cyber espionage is the act or practice of obtaining secrets (sensitive, proprietary or classified information) from individuals, competitors, rivals, groups, governments and enemies also for military, political, or economic advantage using illegal exploitation methods on internet, networks, software and or computers. Classified information that is not handled securely can be intercepted and even modified, making espionage
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...

 possible from the other side of the world. Specific attacks on the United States have been given codenames like Titan Rain
Titan Rain
Titan Rain was the designation given by the federal government of the United States to a series of coordinated attacks on American computer systems since 2003...

 and Moonlight Maze
Moonlight Maze
The name Moonlight Maze refers to an incident in which U.S. officials accidentally discovered a pattern of probing of computer systems at The Pentagon, NASA, United States Department of Energy, private universities, and research labs that had begun in March 1998 and had been going on for nearly two...

. General Alexander notes that the recently established Cyber Command is currently trying to determine whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security."

Sabotage

Military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to disruption. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.

In mid July 2010, security experts discovered a malicious software program called Stuxnet
Stuxnet
Stuxnet is a computer worm discovered in June 2010. It initially spreads via Microsoft Windows, and targets Siemens industrial software and equipment...

 that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes The New York Times.

Electrical power grid

The federal government of the United States
Federal government of the United States
The federal government of the United States is the national government of the constitutional republic of fifty states that is the United States of America. The federal government comprises three distinct branches of government: a legislative, an executive and a judiciary. These branches and...

 admits that the electric power transmission
Electric power transmission
Electric-power transmission is the bulk transfer of electrical energy, from generating power plants to Electrical substations located near demand centers...

 is susceptible to cyberwarfare. The United States Department of Homeland Security
United States Department of Homeland Security
The United States Department of Homeland Security is a cabinet department of the United States federal government, created in response to the September 11 attacks, and with the primary responsibilities of protecting the territory of the United States and protectorates from and responding to...

 works with industry to identify vulnerabilities
Vulnerability (computing)
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw...

 and to help industry enhance the security of control system networks, the federal government is also working to ensure that security is built in as the next generation of "smart grid" networks are developed. In April 2009, reports surfaced that China
China
Chinese civilization may refer to:* China for more general discussion of the country.* Chinese culture* Greater China, the transnational community of ethnic Chinese.* History of China* Sinosphere, the area historically affected by Chinese culture...

 and Russia
Russia
Russia or , officially known as both Russia and the Russian Federation , is a country in northern Eurasia. It is a federal semi-presidential republic, comprising 83 federal subjects...

 had infiltrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national security officials. The North American Electric Reliability Corporation (NERC) has issued a public notice that warns that the electrical grid is not adequately protected from cyber attack. China denies intruding into the U.S. electrical grid. One countermeasure
Countermeasure (computer)
In Computer Security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.The definition is...

 would be to disconnect the power grid from the Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

 and run the net with droop speed control
Droop speed control
In electricity generation, droop speed control is the primary instantaneous system using net frequency deviations to distribute with stability load changes over generating plants....

 only. Massive power outage
Power outage
A power outage is a short- or long-term loss of the electric power to an area.There are many causes of power failures in an electricity network...

s caused by a cyber attack, could disrupt the economy, distract from a simultaneous military attack, or create a national trauma
National trauma
A national trauma is a crisis or a tragic experience which affects the spirit of a nation or an ethnicity, sometimes for generations to come. Large-scale disasters like war or genocide inevitably have this effect, but in an otherwise stable and prosperous country even a specific event can be...

.

Howard Schmidt
Howard Schmidt
Howard A. Schmidt is the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States.One of Schmidt's leading policy objectives is the development of "National Strategy for...

, Cyber-Security Coordinator of the US, commented on those possibilities:


It’s possible that hackers have gotten into administrative computer systems of utility companies, but says those aren’t linked to the equipment controlling the grid, at least not in developed countries. [Schmidt] has never heard that the grid itself has been hacked.

Military

In the U.S., General Keith B. Alexander
Keith B. Alexander
General Keith B. Alexander, USA is the current Director, National Security Agency , Chief, Central Security Service and Commander, United States Cyber Command. He previously served as Deputy Chief of Staff, G-2, U.S. Army from 2003 to 2005...

, first head of the recently formed USCYBERCOM
United States Cyber Command
United States Cyber Command is an armed forces sub-unified command subordinate to United States Strategic Command. The command is located in Fort Meade, Maryland and led by General Keith B. Alexander. USCYBERCOM centralizes command of cyberspace operations, organizes existing cyber resources and...

, told the Senate Armed Services Committee that computer network warfare is evolving so rapidly that there is a "mismatch between our technical capabilities to conduct operations and the governing laws and policies. Cyber Command is the newest global combatant and its sole mission is cyberspace, outside the traditional battlefields of land, sea, air and space." It will attempt to find and, when necessary, neutralize cyberattacks and to defend military computer networks.

Alexander sketched out the broad battlefield envisioned for the computer warfare command, listing the kind of targets that his new headquarters could be ordered to attack, including "traditional battlefield prizes – command-and-control systems at military headquarters, air defense networks and weapons systems that require computers to operate."

One cyber warfare scenario, Cyber ShockWave
Cyber ShockWave
Cyber ShockWave, similar to the Cyber Storm Exercise, was a 4-hour wargame conducted by the Washington, D.C. think tank Bipartisan Policy Center on February 16, 2010. Former high-ranking Cabinet and National Security Officials role played a cabinet level response to a cyberwarfare scenario. ...

, which was wargame
Military simulation
Military simulations, also known informally as war games, are simulations in which theories of warfare can be tested and refined without the need for actual hostilities. Many professional contemporary analysts object to the term wargames as this is generally taken to be referring to the civilian...

d on the cabinet level by former administration officials, raised issues ranging from the National Guard to the power grid to the limits of statutory authority.

The distributed nature of internet based attacks means that it is difficult to determine motivation and attacking party, meaning that it is unclear when a specific act should be considered an act of war.

Civil

Potential targets in internet sabotage include all aspects of the Internet from the backbones
Internet backbone
The Internet backbone refers to the principal data routes between large, strategically interconnected networks and core routers in the Internet...

 of the web, to the Internet Service Providers, to the varying types of data communication mediums and network equipment. This would include: web servers, enterprise information systems, client server systems, communication links, network equipment, and the desktops and laptops in businesses and homes. Electrical grids and telecommunication systems are also deemed vulnerable, especially due to current trends in automation.

Private sector

Computer hacking represents a modern threat in ongoing industrial espionage
Industrial espionage
Industrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security purposes...

 and as such is presumed to widely occur. It is typical that this type of crime is underreported. According to McAfee's George Kurtz, corporations around the world face millions of cyberattacks a day. "Most of these attacks
Attack (computer)
In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.- IETF :Internet Engineering Task Force defines attack in RFC 2828 as:...

 don’t gain any media attention or lead to strong political statements by victims." This type of crime is usually financially motivated.

Cyberwarfare by country

The Internet security company McAfee
McAfee
McAfee, Inc. is a computer security company headquartered in Santa Clara, California, USA. It markets software and services to home users, businesses and the public sector. On August 19, 2010, electronics company Intel agreed to purchase McAfee for $7.68 billion...

 stated in their 2007 annual report that approximately 120 countries have been developing ways to use the Internet as a weapon and target financial markets, government computer systems and utilities.

Cyberwarfare in the United States

Cyberwarfare in the United States is the United States
United States
The United States of America is a federal constitutional republic comprising fifty states and a federal district...

 military strategy
Military strategy
Military strategy is a set of ideas implemented by military organizations to pursue desired strategic goals. Derived from the Greek strategos, strategy when it appeared in use during the 18th century, was seen in its narrow sense as the "art of the general", 'the art of arrangement' of troops...

 of proactive cyber defence
Proactive Cyber Defence
Proactive Cyber Defence means acting in anticipation to oppose an attack against computers and networks. Proactive cyber defence will most often require additional security from internet service providers....

 and the use of cyberwarfare as a platform for attack. The new United States military strategy, makes explicit that a cyberattack is casus belli
Casus belli
is a Latin expression meaning the justification for acts of war. means "incident", "rupture" or indeed "case", while means bellic...

 for a traditional act of war.

In August 2010, the U.S. for the first time is publicly warning about the Chinese military's use of civilian computer experts in clandestine cyber attacks aimed at American companies and government agencies. The Pentagon also pointed to an alleged China-based computer spying network dubbed GhostNet
GhostNet
GhostNet is the name given by researchers at the Information Warfare Monitor to a large-scale cyber spying operation discovered in March 2009. The operation is likely associated with an Advanced Persistent Threat...

 that was revealed in a research report last year. The Pentagon stated:
"The People's Liberation Army
People's Liberation Army
The People's Liberation Army is the unified military organization of all land, sea, strategic missile and air forces of the People's Republic of China. The PLA was established on August 1, 1927 — celebrated annually as "PLA Day" — as the military arm of the Communist Party of China...

 is using "information warfare units" to develop viruses
Computer virus
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability...

 to attack enemy computer systems and networks, and those units include civilian computer professionals. Commander Bob Mehal, will monitor the PLA's buildup of its cyberwarfare capabilities and will continue to develop capabilities to counter any potential threat."


The United States Department of Defense
United States Department of Defense
The United States Department of Defense is the U.S...

 sees the use of computer
Computer
A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem...

s and the Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

 to conduct war
War
War is a state of organized, armed, and often prolonged conflict carried on between states, nations, or other parties typified by extreme aggression, social disruption, and usually high mortality. War should be understood as an actual, intentional and widespread armed conflict between political...

fare in cyberspace
Cyberspace
Cyberspace is the electronic medium of computer networks, in which online communication takes place.The term "cyberspace" was first used by the cyberpunk science fiction author William Gibson, though the concept was described somewhat earlier, for example in the Vernor Vinge short story "True...

 as a threat to national security. The United States Joint Forces Command
United States Joint Forces Command
United States Joint Forces Command was a former Unified Combatant Command of the United States Armed Forces. USJFCOM was a functional command that provided specific services to the military. The last commander was Army Gen. Raymond T. Odierno...

 describes some of its attributes:
Cyberspace technology is emerging as an "instrument of power" in societies, and is becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. With low barriers to entry, coupled with the anonymous nature of activities in cyberspace, the list of potential adversaries is broad. Furthermore, the globe-spanning range of cyberspace and its disregard for national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies.


In February 2010, the United States Joint Forces Command
United States Joint Forces Command
United States Joint Forces Command was a former Unified Combatant Command of the United States Armed Forces. USJFCOM was a functional command that provided specific services to the military. The last commander was Army Gen. Raymond T. Odierno...

 released a study which included a summary of the threats posed by the internet:
With very little investment, and cloaked in a veil of anonymity, our adversaries will inevitably attempt to harm our national interests. Cyberspace will become a main front in both irregular and traditional conflicts. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. Through cyberspace, enemies will target industry, academia, government, as well as the military in the air, land, maritime, and space domains. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Indeed, adversaries have already taken advantage of computer networks and the power of information technology not only to plan and execute savage acts of terrorism, but also to influence directly the perceptions and will of the U.S. Government and the American population.

American "Kill switch bill"

On June 19, 2010, United States Senator Joe Lieberman
Joe Lieberman
Joseph Isadore "Joe" Lieberman is the senior United States Senator from Connecticut. A former member of the Democratic Party, he was the party's nominee for Vice President in the 2000 election. Currently an independent, he remains closely affiliated with the party.Born in Stamford, Connecticut,...

 (I-CT) introduced a bill called "Protecting Cyberspace as a National Asset Act of 2010", which he co-wrote with Senator Susan Collins
Susan Collins
Susan Margaret Collins is the junior United States Senator from Maine and a member of the Republican Party. First elected to the Senate in 1996, she is the ranking member of the Senate Committee on Homeland Security and Governmental Affairs...

 (R-ME) and Senator Thomas Carper (D-DE). If signed into law, this controversial bill, which the American media dubbed the "Kill switch bill", would grant the President
President of the United States
The President of the United States of America is the head of state and head of government of the United States. The president leads the executive branch of the federal government and is the commander-in-chief of the United States Armed Forces....

 emergency powers over parts of the Internet. However, all three co-authors of the bill issued a statement that instead, the bill "[narrowed] existing broad Presidential authority to take over telecommunications networks".

Cyberwarfare in China

Diplomatic cables highlight US concerns that China is using access to Microsoft source code and 'harvesting the talents of its private sector' to boost its offensive and defensive capabilities.

Cyber counterintelligence

Cyber counter-intelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions.
  • On April 7, 2009, The Pentagon
    The Pentagon
    The Pentagon is the headquarters of the United States Department of Defense, located in Arlington County, Virginia. As a symbol of the U.S. military, "the Pentagon" is often used metonymically to refer to the Department of Defense rather than the building itself.Designed by the American architect...

     announced they spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems.

  • On April 1, 2009, U.S. lawmakers pushed for the appointment of a White House cyber security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first time.

  • On February 9, 2009, the White House
    White House
    The White House is the official residence and principal workplace of the president of the United States. Located at 1600 Pennsylvania Avenue NW in Washington, D.C., the house was designed by Irish-born James Hoban, and built between 1792 and 1800 of white-painted Aquia sandstone in the Neoclassical...

     announced that it will conduct a review of the nation's cyber security to ensure that the Federal government of the United States
    Federal government of the United States
    The federal government of the United States is the national government of the constitutional republic of fifty states that is the United States of America. The federal government comprises three distinct branches of government: a legislative, an executive and a judiciary. These branches and...

     cyber security initiatives are appropriately integrated, resourced and coordinated with the United States Congress
    United States Congress
    The United States Congress is the bicameral legislature of the federal government of the United States, consisting of the Senate and the House of Representatives. The Congress meets in the United States Capitol in Washington, D.C....

     and the private sector.

  • In the wake of the cyberwar of 2007 waged against Estonia, NATO established the Cooperative Cyber Defence Centre of Excellence
    CCDCOE
    CCDCOE, officially the Cooperative Cyber Defence Centre of Excellence is one of NATO Centres of Excellence, located in Tallinn, Estonia.The CCDCOE was established in the wake of the 2007 cyberattacks on Estonia and the Bronze Night events.-History:...

     (CCD CoE) in Tallinn
    Tallinn
    Tallinn is the capital and largest city of Estonia. It occupies an area of with a population of 414,940. It is situated on the northern coast of the country, on the banks of the Gulf of Finland, south of Helsinki, east of Stockholm and west of Saint Petersburg. Tallinn's Old Town is in the list...

    , Estonia, in order to enhance the organization’s cyber defence capability. The center was formally established on the 14th of May, 2008, and it received full accreditation by NATO and attained the status of International Military Organization on October 28, 2008. Since Estonia has led international efforts to fight cybercrime, the United States Federal Bureau of Investigation
    Federal Bureau of Investigation
    The Federal Bureau of Investigation is an agency of the United States Department of Justice that serves as both a federal criminal investigative body and an internal intelligence agency . The FBI has investigative jurisdiction over violations of more than 200 categories of federal crime...

     says it will permanently base a computer crime expert in Estonia in 2009 to help fight international threats against computer systems.

Controversy over terms

There is debate on whether the term "cyberwarfare" is accurate. In October 2011, for instance, the Journal of Strategic Studies, a leading journal in that field, published an article by Thomas Rid, "Cyber War Will Not Take Place." An act of cyber war would have to be potentially lethal, instrumental, and political. Then not one single cyber offense on record constitutes an act of war on its own. Instead, all politically motivated cyber attacks, Rid argued, are merely sophisticated versions of three activities that are as old as warfare itself: sabotage, espionage, and subversion.

Howard Schmidt
Howard Schmidt
Howard A. Schmidt is the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States.One of Schmidt's leading policy objectives is the development of "National Strategy for...

, an American cybersecurity expert, argued in March 2010 that "there is no cyberwar... I think that is a terrible metaphor and I think that is a terrible concept. There are no winners in that environment." Other experts, however, believe that this type of activity already constitutes a war. The warfare analogy is often seen intended to motivate a militaristic response when that is not necessarily appropriate. Ron Deibert, of Canada's Citizen Lab, has warned of a "militarization of cyberspace."

Incidents

  • On November 21, 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois. However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence Center.
  • On October 6, 2011, it was announced that Creech AFB's drone
    Drone
    -Nature:The male sex of social Hymenopterans, such as a* Drone * male wasp* male ant-Chemicals:An abbreviation referring to one of two psychoactive drugs:* Mephedrone* 4-Methoxymethcathinone, commonly known as methedrone-Vehicles:...

     and predator fleet's command and control data stream has been keylogged, resisting all attempts to reverse the exploit, for the past two weeks. The Air Force issued a statement that the virus had "posed no threat to our operational mission".
  • In July 2011, the South Korean company SK Communications was hacked, resulting in the theft of the personal details (including names, phone numbers, home and email addresses and resident registration numbers) of up to 35 million people. A trojaned software update was used to gain access to the SK Communications network. Links exist between this hack and other malicious activity and it is believed to be part of a broader, concerted hacking effort.

  • Operation Shady RAT
    Operation Shady RAT
    Operation Shady RAT is an ongoing series of cyber attacks starting in mid-2006 reported by Dmitri Alperovitch, Vice President of Threat Research at Internet security company McAfee in August 2011, who also led and named the Night Dragon and Operation Aurora cyberespionage intrusion investigations...

     is an ongoing series of cyber attacks starting mid-2006, reported by Internet security company McAfee
    McAfee
    McAfee, Inc. is a computer security company headquartered in Santa Clara, California, USA. It markets software and services to home users, businesses and the public sector. On August 19, 2010, electronics company Intel agreed to purchase McAfee for $7.68 billion...

     in August 2011. The attacks have hit at least 72 organizations including governments and defense contractors.

  • On December 4 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the Central Bureau of Investigation
    Central Bureau of Investigation
    The Central Bureau of Investigation is a government agency of India that serves as a criminal investigation body, national security agency and intelligence agency. It was established on 1 April 1963 and evolved from the Special Police Establishment founded in 1941...

     (CBI). The National Informatics Center (NIC) has begun an inquiry.

  • On November 26 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a revenge of the Mumbai terrorist attack which had confirmed the involvement of Pakistani terrorists.

  • In October 2010, Iain Lobban
    Iain Lobban
    Iain Robert Lobban, CB is the Director of British intelligence gathering facility GCHQ, having succeeded Sir David Pepper in July 2008.-Education and career:...

    , the director of the Government Communications Headquarters
    Government Communications Headquarters
    The Government Communications Headquarters is a British intelligence agency responsible for providing signals intelligence and information assurance to the UK government and armed forces...

     (GCHQ), said Britain
    United Kingdom
    The United Kingdom of Great Britain and Northern IrelandIn the United Kingdom and Dependencies, other languages have been officially recognised as legitimate autochthonous languages under the European Charter for Regional or Minority Languages...

     faces a “real and credible” threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 times each month, such attacks threatened Britain’s economic future, and some countries were already using cyber assaults to put pressure on other nations.

  • In September 2010, Iran
    Iran
    Iran , officially the Islamic Republic of Iran , is a country in Southern and Western Asia. The name "Iran" has been in use natively since the Sassanian era and came into use internationally in 1935, before which the country was known to the Western world as Persia...

     was attacked by the Stuxnet
    Stuxnet
    Stuxnet is a computer worm discovered in June 2010. It initially spreads via Microsoft Windows, and targets Siemens industrial software and equipment...

     worm, thought to specifically target its Natanz nuclear enrichment facility.
    Nuclear program of Iran
    The nuclear program of Iran was launched in the 1950s with the help of the United States as part of the Atoms for Peace program. The support, encouragement and participation of the United States and Western European governments in Iran's nuclear program continued until the 1979 Iranian Revolution...

     The worm is said to be the most advanced piece of malware ever discovered and significantly increases the profile of cyberwarfare.

  • In May 2010, In response to Indian Cyber Army defacing Pakistani websites, 1000+ India
    India
    India , officially the Republic of India , is a country in South Asia. It is the seventh-largest country by geographical area, the second-most populous country with over 1.2 billion people, and the most populous democracy in the world...

    n websites were defaced by PakHaxors, TeaMp0isoN, UrduHack & ZCompany Hacking Crew, among those were the Indian CID website, local government of Kerala, Box Office of Indian, Brahmos missile website, Indian HP helpdesk, Indian Institute of Science, and The Indian Directorate General of Shipping.

  • In July 2009, there were a series of coordinated denial of service attacks
    July 2009 cyber attacks
    The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States...

     against major government, news media, and financial websites in South Korea
    South Korea
    The Republic of Korea , , is a sovereign state in East Asia, located on the southern portion of the Korean Peninsula. It is neighbored by the People's Republic of China to the west, Japan to the east, North Korea to the north, and the East China Sea and Republic of China to the south...

     and the United States
    United States
    The United States of America is a federal constitutional republic comprising fifty states and a federal district...

    . While many thought the attack was directed by North Korea, one researcher traced the attacks to the United Kingdom.

  • Russian, South Ossetian, Georgian and Azerbaijani sites were attacked
    Cyberattacks during the 2008 South Ossetia war
    During the 2008 South Ossetia war a series of cyberattacks swamped and disabled websites of numerous South Ossetian, Russian, Georgian, and Azerbaijani organisations.- Details :...

     by hackers during the 2008 South Ossetia War
    2008 South Ossetia war
    The 2008 South Ossetia War or Russo-Georgian War was an armed conflict in August 2008 between Georgia on one side, and Russia and separatist governments of South Ossetia and Abkhazia on the other....

    .

  • In 2007 the website of the Kyrgyz
    Kyrgyzstan
    Kyrgyzstan , officially the Kyrgyz Republic is one of the world's six independent Turkic states . Located in Central Asia, landlocked and mountainous, Kyrgyzstan is bordered by Kazakhstan to the north, Uzbekistan to the west, Tajikistan to the southwest and China to the east...

     Central Election Commission was defaced during its election. The message left on the website read "This site has been hacked by Dream of Estonian organization". During the election campaigns and riots preceding the election, there were cases of Denial-of-service attack
    Denial-of-service attack
    A denial-of-service attack or distributed denial-of-service attack is an attempt to make a computer resource unavailable to its intended users...

    s against the Kyrgyz ISPs.

  • In September 2007, Israel carried out an airstrike on Syria dubbed Operation Orchard
    Operation Orchard
    Operation Orchard was an Israeli airstrike on a nuclear reactor in the Deir ez-Zor region of Syria carried out just after midnight on September 6, 2007. The White House and Central Intelligence Agency later confirmed that American intelligence had also indicated the site was a nuclear facility...

    . U.S. industry and military sources speculated that the Israelis may have used cyberwarfare to allow their planes to pass undetected by radar into Syria.

  • In April 2007, Estonia
    Estonia
    Estonia , officially the Republic of Estonia , is a state in the Baltic region of Northern Europe. It is bordered to the north by the Gulf of Finland, to the west by the Baltic Sea, to the south by Latvia , and to the east by Lake Peipsi and the Russian Federation . Across the Baltic Sea lies...

     came under cyber attack
    2007 cyberattacks on Estonia
    Cyberattacks on Estonia refers to a series of cyber attacks that began April 27, 2007 and swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country's row with Russia about the relocation of the Bronze Soldier of...

     in the wake of relocation of the Bronze Soldier of Tallinn
    Bronze Soldier of Tallinn
    The Bronze Soldier is the informal name of a controversial Soviet World War II war memorial in Tallinn, Estonia, built at the site of several war graves, which were relocated to the nearby Tallinn Military Cemetery in 2007...

    . The largest part of the attacks were coming from Russia and from official servers of the authorities of Russia. In the attack, ministries, banks, and media were targeted.

  • In the 2006 war against Hezbollah, Israel
    Israel
    The State of Israel is a parliamentary republic located in the Middle East, along the eastern shore of the Mediterranean Sea...

     alleges that cyber-warfare was part of the conflict, where the Israel Defense Force (IDF) intelligence estimates several countries in the Middle East used Russian hackers and scientists to operate on their behalf. As a result, Israel attached growing importance to cyber-tactics, and became, along with the U.S., France and a couple of other nations, involved in cyber-war planning. Many international high-tech companies are now locating research and development operations in Israel, where local hires are often veterans of the IDF's elite computer units. Richard A. Clarke
    Richard A. Clarke
    Richard Alan Clarke was a U.S. government employee for 30 years, 1973–2003. He worked for the State Department during the presidency of Ronald Reagan. In 1992, President George H.W. Bush appointed him to chair the Counter-terrorism Security Group and to a seat on the United States National...

     adds that "our Israeli friends have learned a thing or two from the programs we have been working on for more than two decades."

Efforts at prohibition

The Shanghai Cooperation Organisation (members include China and Russia) defines cyberwar to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other states". In contrast, the United States' approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech
Freedom of speech
Freedom of speech is the freedom to speak freely without censorship. The term freedom of expression is sometimes used synonymously, but includes any act of seeking, receiving and imparting information or ideas, regardless of the medium used...

. This difference of opinion has led to reluctance in the West to pursue global cyber arms control agreements.
However, American
United States
The United States of America is a federal constitutional republic comprising fifty states and a federal district...

 General Keith B. Alexander
Keith B. Alexander
General Keith B. Alexander, USA is the current Director, National Security Agency , Chief, Central Security Service and Commander, United States Cyber Command. He previously served as Deputy Chief of Staff, G-2, U.S. Army from 2003 to 2005...

 did endorse talks with Russia
Russia
Russia or , officially known as both Russia and the Russian Federation , is a country in northern Eurasia. It is a federal semi-presidential republic, comprising 83 federal subjects...

 over a proposal to limit military attacks in cyberspace.

A Ukrainian professor of International Law, Alexander Merezhko, has developed a project called the International Convention on Prohibition of Cyberwar in Internet. According to this project, cyberwar is defined as the use of Internet and related technological means by one state against political, economic, technological and information sovereignty and independence of any other state. Professor Merezhko's project suggests that the Internet ought to remain free from warfare tactics and be treated as an international landmark. He states that the Internet (cyberspace) is a "common heritage of mankind."

See also

  • Air Force Cyber Command (Provisional)
    Air Force Cyber Command (Provisional)
    Air Force Cyber Command was a proposed United States Air Force Major Command that existed only in provisional status...

  • Chinese intelligence operations in the United States
    Chinese intelligence operations in the United States
    The People's Republic of China has and is currently using a widespread effort to acquire U.S. military technology and classified information. To fulfill its long-term military development goals, the PRC uses a variety of methods to obtain U.S. technology; including espionage, the exploitation of...

  • Computer insecurity
    Computer insecurity
    Computer insecurity refers to the concept that a computer system is always vulnerable to attack, and that this fact creates a constant battle between those looking to improve security, and those looking to circumvent security.-Security and systems design:...

  • Cyber Operations
    Cyber Operations
    Cyber Operations is a classification of military operations that use of Computer Network Attack , Computer Network Defense ,Computer Network Exploitation against an enemy to achieve military objectives.- History :...

  • Cyber ShockWave
    Cyber ShockWave
    Cyber ShockWave, similar to the Cyber Storm Exercise, was a 4-hour wargame conducted by the Washington, D.C. think tank Bipartisan Policy Center on February 16, 2010. Former high-ranking Cabinet and National Security Officials role played a cabinet level response to a cyberwarfare scenario. ...

  • Cyber spying
    Cyber spying
    Cyber spying or Cyber espionage is the act or practice of obtaining secrets without the permission of the holder of the information , from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using illegal exploitation methods on...

  • Cyberterrorism
  • Cyberwarfare in Russia
  • Denial-of-service attack
    Denial-of-service attack
    A denial-of-service attack or distributed denial-of-service attack is an attempt to make a computer resource unavailable to its intended users...

  • Electronic warfare
    Electronic warfare
    Electronic warfare refers to any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults via the spectrum. The purpose of electronic warfare is to deny the opponent the advantage of, and ensure friendly...

  • Espionage
    Espionage
    Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...

  • Hacker (computer security)
    Hacker (computer security)
    In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...

  • Industrial espionage
    Industrial espionage
    Industrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security purposes...

  • Information warfare
    Information warfare
    The term Information Warfare is primarily an American concept involving the use and management of information technology in pursuit of a competitive advantage over an opponent...

  • IT risk
    IT risk
    Information technology risk, or IT risk, IT-related risk, is a risk related to information technology. This relatively new term due to an increasing awareness that information security is simply one facet of a multitude of risks that are relevant to IT and the real world processes it...

  • iWar
    IWar
    iWar is the term used by NATO to describe a form of Internet-based warfare.-iWar comparisons:iWar is distinct from cyber-warfare, cyber-terrorism and information warfare. These refer to sensitive military and critical infrastructure assets, and to battlefield communications and satellite intelligence...

  • List of cyber attack threat trends
  • Penetration test
    Penetration test
    A penetration test, occasionally pentest, is a method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders and malicious insiders...

  • Proactive Cyber Defence
    Proactive Cyber Defence
    Proactive Cyber Defence means acting in anticipation to oppose an attack against computers and networks. Proactive cyber defence will most often require additional security from internet service providers....

  • Signals intelligence
  • Stuxnet
    Stuxnet
    Stuxnet is a computer worm discovered in June 2010. It initially spreads via Microsoft Windows, and targets Siemens industrial software and equipment...

  • U.S. Cyber Command
    United States Cyber Command
    United States Cyber Command is an armed forces sub-unified command subordinate to United States Strategic Command. The command is located in Fort Meade, Maryland and led by General Keith B. Alexander. USCYBERCOM centralizes command of cyberspace operations, organizes existing cyber resources and...

    • Air Forces Cyber Command
    • Army Cyber Command
    • Fleet Cyber Command
      United States Tenth Fleet
      The Tenth Fleet is a functional formation of the United States Navy responsible for the Navy's cyber warfare programs. It was first created as an anti submarine warfare coordinating organization during the Battle of the Atlantic in the Second World War...

    • Marine Corps Forces Cyberspace Command
      United States Marine Corps Forces Cyberspace Command
      The United States Marine Corps Forces Cyberspace Command is a functional formation of the United States Marine Corps to protect critical infrastructure from cyberwarfare...



Further reading

  • Andress, Jason. Winterfeld, Steve. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress. ISBN 1597496375
  • Brenner, S. (2009). Cyber Threats: The Emerging Fault Lines of the Nation State. Oxford University Press. ISBN 0195385012
  • Carr, Jeffrey. (2010). Inside Cyber Warfare: Mapping the Cyber Underworld. O'Reilly. ISBN 9780596802158
  • Cordesman, Anthony H., Cordesman, Justin G. Cyber-threats, Information Warfare, and Critical Infrastructure Protection, Greenwood Publ. (2002)
  • Janczewski, Lech; Colarik, Andrew M. Cyber Warfare and Cyber Terrorism IGI Global (2008)
  • Rid, Thomas (2011) "Cyber War Will Not Take Place," Journal of Strategic Studies, DOI:10.1080/01402390.2011.608939
  • Ventre, D. (2007). La guerre de l'information. Hermes-Lavoisier. 300 pages
  • Ventre, D. (2009). Information Warfare. Wiley – ISTE. ISBN 9781848210943
  • Ventre, D. (Edit.) (2010). Cyberguerre et guerre de l'information. Stratégies, règles, enjeux. Hermes-Lavoisier. ISBN 978-2-7462-3004-0
  • Ventre, D. (2011). Cyberespace et acteurs du cyberconflit. Hermes-Lavoisier. 288 pages
  • Ventre, D. (Edit.) (2011). Cyberwar and Information Warfare. Wiley. 460 pages
  • Ventre, D. (2011). Cyberattaque et Cyberdéfense. Hermes-Lavoisier. 336 pages

External links

Books

Videos
  • "Sabotaging the System" video, "60 Minutes", Nov. 8, 2009, CBS News, 15 minutes [site not found]
  • "Cyber ShockWave" (simulation of a cyber attack), Feb. 16, 2010, video from the Bipartisan Policy Center
    Bipartisan Policy Center
    The is a non-profit organization that "drives principled solutions through rigorous analysis, reasoned negotiation, and respectful dialogue." Founded in 2007 by former Senate Majority Leaders Howard Baker, Tom Daschle, Bob Dole, and George Mitchell, "BPC combines politically-balanced policymaking...

    , 8 minutes

Articles
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK