Cyberwar Right Here, Right Now...

 

U.S. Perspective on the  International Cyber Environment:- It's a wild west right now. The rule of the strongest. No legal framework. Espionage vs. sabotage

US officials have apparently said that Russia initiated a “sophisticated cyberattack” on the Pentagon’s Joint Staff unclassified email system, a system which then was taken down for a period of weeks.
This “sophisticated cyber intrusion” happened in late July and impacted approximately 4,000 personnel employed by the Joint Chiefs of Staff. On the one hand, officials reportedly have said that it is not plain whether, in fact the attack was supported by Russia’s government, but on the other hand, officials reportedly have stated that the attack “clearly was the work of a state actor.” These officials emphasize that classified information supposedly was not seized, and that only unclassified accounts were compromised, hopefully, that indeed is the case.

Meanwhile, a month earlier, the Office of Personnel Management told the public that a database housing personal information relating to roughly 4 million current and former employees had been hacked. United States officials reportedly stated in private that this was the work of the Chinese government, even though the administration did not directly accuse China with respect to this attack. China has denied any suggestion of involvement.

It is true that even if Russia and China were behind these hacks, they did not perpetrate true military assaults, there was no physical harm caused to anyone that we know of at this point. However, if Russia and China so easily might be able to obtain sensitive information of US government employees, this might not bode well. It is a depressing thought that Russia and China might develop the capability over the Internet to access, disrupt, or gain control of US mission critical military systems and other systems that address the functions of nuclear power plants, air traffic control, the electrical grid, or water supply and distribution.

As Stuxnet demonstrated, we now live in a world where cyber attacks are real and cyber wars could cause immeasurable damage. These attacks could become greater in terms of potential harm, and thus the Internet will be a place where defensive efforts are put in place, even when defense goes on the offensive. Are these acts of war? Not in the traditional sense, but the protection of humans lives can be at stake.

by Eric Sinrod. Duane Morrix LLP: http://ow.ly/SVF4R

Techlaw: http://bit.ly/1JA3oVo

 

« Zeus Arrests and SpyEye Group is Taken Down
AT&T helped NSA Spy on Domestic Citizens »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Jobsora

Jobsora

Jobsora is an innovative job search platform in the UK and more than 35 other countries around the world. Sectors covered include IT and cybersecurity.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

INE

INE

INE is a premier provider of Technical Training for the IT industry.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.

Waterleaf International

Waterleaf International

Waterleaf provide advanced network and cybersecurity solutions - informed by data sciences. Transforming Connectivity, Security and Information for Municipalities, Government & Enterprise.