Cyberwar Right Here, Right Now...

 

U.S. Perspective on the  International Cyber Environment:- It's a wild west right now. The rule of the strongest. No legal framework. Espionage vs. sabotage

US officials have apparently said that Russia initiated a “sophisticated cyberattack” on the Pentagon’s Joint Staff unclassified email system, a system which then was taken down for a period of weeks.
This “sophisticated cyber intrusion” happened in late July and impacted approximately 4,000 personnel employed by the Joint Chiefs of Staff. On the one hand, officials reportedly have said that it is not plain whether, in fact the attack was supported by Russia’s government, but on the other hand, officials reportedly have stated that the attack “clearly was the work of a state actor.” These officials emphasize that classified information supposedly was not seized, and that only unclassified accounts were compromised, hopefully, that indeed is the case.

Meanwhile, a month earlier, the Office of Personnel Management told the public that a database housing personal information relating to roughly 4 million current and former employees had been hacked. United States officials reportedly stated in private that this was the work of the Chinese government, even though the administration did not directly accuse China with respect to this attack. China has denied any suggestion of involvement.

It is true that even if Russia and China were behind these hacks, they did not perpetrate true military assaults, there was no physical harm caused to anyone that we know of at this point. However, if Russia and China so easily might be able to obtain sensitive information of US government employees, this might not bode well. It is a depressing thought that Russia and China might develop the capability over the Internet to access, disrupt, or gain control of US mission critical military systems and other systems that address the functions of nuclear power plants, air traffic control, the electrical grid, or water supply and distribution.

As Stuxnet demonstrated, we now live in a world where cyber attacks are real and cyber wars could cause immeasurable damage. These attacks could become greater in terms of potential harm, and thus the Internet will be a place where defensive efforts are put in place, even when defense goes on the offensive. Are these acts of war? Not in the traditional sense, but the protection of humans lives can be at stake.

by Eric Sinrod. Duane Morrix LLP: http://ow.ly/SVF4R

Techlaw: http://bit.ly/1JA3oVo

 

« Zeus Arrests and SpyEye Group is Taken Down
AT&T helped NSA Spy on Domestic Citizens »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

Foregenix

Foregenix

Foregenix are global specialists in Digital Forensics and information security including Penetration testing and Website Security.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

Optra Security

Optra Security

Optra Security specializes in information security with a focus on Application Security.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

Morpheus Enterprises

Morpheus Enterprises

Morpheus Enterprises offer managed security solutions designed to keep your web applications secure and your business running smoothly.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.