Cyberwar Right Here, Right Now...

 

U.S. Perspective on the  International Cyber Environment:- It's a wild west right now. The rule of the strongest. No legal framework. Espionage vs. sabotage

US officials have apparently said that Russia initiated a “sophisticated cyberattack” on the Pentagon’s Joint Staff unclassified email system, a system which then was taken down for a period of weeks.
This “sophisticated cyber intrusion” happened in late July and impacted approximately 4,000 personnel employed by the Joint Chiefs of Staff. On the one hand, officials reportedly have said that it is not plain whether, in fact the attack was supported by Russia’s government, but on the other hand, officials reportedly have stated that the attack “clearly was the work of a state actor.” These officials emphasize that classified information supposedly was not seized, and that only unclassified accounts were compromised, hopefully, that indeed is the case.

Meanwhile, a month earlier, the Office of Personnel Management told the public that a database housing personal information relating to roughly 4 million current and former employees had been hacked. United States officials reportedly stated in private that this was the work of the Chinese government, even though the administration did not directly accuse China with respect to this attack. China has denied any suggestion of involvement.

It is true that even if Russia and China were behind these hacks, they did not perpetrate true military assaults, there was no physical harm caused to anyone that we know of at this point. However, if Russia and China so easily might be able to obtain sensitive information of US government employees, this might not bode well. It is a depressing thought that Russia and China might develop the capability over the Internet to access, disrupt, or gain control of US mission critical military systems and other systems that address the functions of nuclear power plants, air traffic control, the electrical grid, or water supply and distribution.

As Stuxnet demonstrated, we now live in a world where cyber attacks are real and cyber wars could cause immeasurable damage. These attacks could become greater in terms of potential harm, and thus the Internet will be a place where defensive efforts are put in place, even when defense goes on the offensive. Are these acts of war? Not in the traditional sense, but the protection of humans lives can be at stake.

by Eric Sinrod. Duane Morrix LLP: http://ow.ly/SVF4R

Techlaw: http://bit.ly/1JA3oVo

 

« Zeus Arrests and SpyEye Group is Taken Down
AT&T helped NSA Spy on Domestic Citizens »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Certes

Certes

Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM).

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

At-Bay

At-Bay

At-Bay is the world’s first InsurSec provider designed from the ground up to help businesses tackle cyber risk head on.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.

Graphiant

Graphiant

Graphiant’s Data Assurance service gives businesses end-to-end control and visibility into how data travels throughout the entire business network.

Cyber Security Centre for the Isle of Man (CSC)

Cyber Security Centre for the Isle of Man (CSC)

The Cyber Security Centre for the Isle of Man is responsible for the delivery of the Isle of Man National Cyber Security Strategy.