Russia, China & U.S. Engage in Cyber War

red-dragon-rising-understanding-the-chinese-cyber-scenarios-02-march-2014-21-638.jpg?cb=1393770105

Chinese Govermnet Policy Adopted in response to U.S Cyber Command 2010 Strategy Document 

As tension between the United States, Russia and China continues to escalate, reports of cyber warfare between the nations has become increasingly prominent. Modern warfare can be waged in numerous ways, and it seems that this virtual form of conflict will be an increasing theme as the 21st century develops.

The perception of which of the countries is most likely to be in the wrong certainly differs greatly depending on your geographical location. Naturally, in the United States it is frequently reported that both China and Russia pose a significant threat to American security. But reporting in the two Eastern nations can be significantly different, and fairly recently Russian publications suggested that indeed the United States had already unleashed a form of cyber warfare against both Russia and China.

US cyber attacks in Russia
But this assertion was not entirely baseless, according to the sources that have been acquired to support it. The former White House official, Dr. Philippa Malmgren, a former presidential adviser and member of the US President's Working Group on Financial Markets, supported this notion when quoted by the Russian publication Pravda.
Malmgren suggested that she had been present at a meeting with senior individuals from the defense community, and that there is already a consensus of opinion that a major confrontation with China and Russia is already taking place. The difference to warfare of the past is that this is being conducted surreptitiously through cyberspace, rather than through traditional and conventional forms of weaponry.

With the United States looking to deploy cyber warfare against targets such as the Iranian nuclear program, it has also been acknowledged by Scott Borg, CEO of the US Cyber Consequences Unit, that this is a valid tactic for the United States in the future. Cyber attacks could already have been launched against Russia and China, and concerns about the conduct of the United States has been expressed by such critics of US foreign policy as Ron Paul and Paul Craig Roberts.
However, one certainly shouldn't labour under the misapprehension that this is a one-way street. Both Russia and China have already been accused of similar cyber attacks, as the heated rhetoric between the Anglo-American old world order and this new coupling of power located in the Eastern region ramps up.

Russia cyber attacks on the Unites States
It is already suspected that Russian hackers were able to penetrate a Pentagon e-mail system that is commonly used by employees of the Joint Chiefs of Staff. US military officials have indeed stated this accusation publicly, and the latest cyber attack from Russia follows a larger series of infiltrations into sensitive US government computer networks. Many of these attacks have been penetrated by both Russian and Chinese hackers, as the issue of computing privacy and cyber warfare becomes an increasingly prominent hot potato.
US military officials stated that Russian hackers in particular targeted computers related to the unclassified Pentagon e-mail system. This cyber attack emanated just last month, and reportedly affected in the region of 4,000 military and civilian personnel, many of which are involved in the coordination and operation of US Armed Forces overseas.
This is not the first time that a particularly prominent computer system in the United States was laid bare by Russian hackers. Back in the fall of 2014, a similar cyber attack penetrated unclassified e-mail systems at both the White House and State Department. It is suggested that as a result of this particular cyber attack that it was possible for individuals to read the unclassified e-mail of the United States President Barack Obama. When United States officials investigate the origin of this particular hacking incident, it apparently led back to the Russian government.

China cyber attacks on the United States
And China has also been involved in similar cyber attacks. It has been reported previously that a group of hackers linked with the East Asian economic powerhouse managed to penetrate the databases of numerous American health insurers. This sort of attack is common among the so-called ‘black hat’ community, and is often carried out by rogue individuals with the intention of achieving monetary gain. This can be hugely successful, with some black hat individuals claiming to acquire income in excess of $1 million per year.
But it can also be carried out by state-backed entities, and in this case it is suspected that the Chinese government may have been involved in this cyber attack. Chinese hackers have been linked with stealing personal records of the United States military and intelligence agencies, striking the very heart of the US air-traffic system, along with several other unsolicited cyber attacks.
Sabre Corp., which processes reservations for hundreds of airlines and thousands of hotels, confirmed that its systems have been breached by hackers, while the U.S. government’s personnel office was also targeted. And according to the intelligence community, the source of this hacking was linked to the hugely powerful entity that is the Chinese government.
Security experts assert that Chinese hackers are in fact able to carry out such attacks in large numbers. One particular expert described the Chinese as the “bullies of cyberspace”, with state actors tasked with gathering intelligence on other nations covertly on a regular basis. This has been emphatically denied by the Chinese authorities, as well as by the Chinese embassy spokespersons in the United States. But it is clear that each of the three major world superpowers is ramping up its attempts to attack one another in cyberspace.

The cyber warfare between the United States, Russia and China is part of an overall epoch-defining conflict between the three nations. This is largely based on economic disagreement and rivalry, but has also spilled over into military and territorial disputes as well. Although this war has remained physically peaceful thus far, the potential for future conflict between the three nations remains significant. And with the likes of Edward Snowden revealing the extent of government snooping, we can expect more reports of governmental cyber attacks in the future.
Ein News:http://http://bit.ly/1INjUV3

 

« The NSA Playset: 5 Better Tools To Defend Systems
Malaysia: Umno members told to go on ‘cyber war’ »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cybertrust Japan

Cybertrust Japan

Cybertrust Japan provides a comprehensive security certification and digital authentication service, enabling customers to build and manage highly secure IT infrastructures.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

42Gears

42Gears

42Gears is a leading Unified Endpoint Management provider. Secure, monitor and manage tablets, phones, desktops and wearables.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Cyber7

Cyber7

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.