Russia, China & U.S. Engage in Cyber War

red-dragon-rising-understanding-the-chinese-cyber-scenarios-02-march-2014-21-638.jpg?cb=1393770105

Chinese Govermnet Policy Adopted in response to U.S Cyber Command 2010 Strategy Document 

As tension between the United States, Russia and China continues to escalate, reports of cyber warfare between the nations has become increasingly prominent. Modern warfare can be waged in numerous ways, and it seems that this virtual form of conflict will be an increasing theme as the 21st century develops.

The perception of which of the countries is most likely to be in the wrong certainly differs greatly depending on your geographical location. Naturally, in the United States it is frequently reported that both China and Russia pose a significant threat to American security. But reporting in the two Eastern nations can be significantly different, and fairly recently Russian publications suggested that indeed the United States had already unleashed a form of cyber warfare against both Russia and China.

US cyber attacks in Russia
But this assertion was not entirely baseless, according to the sources that have been acquired to support it. The former White House official, Dr. Philippa Malmgren, a former presidential adviser and member of the US President's Working Group on Financial Markets, supported this notion when quoted by the Russian publication Pravda.
Malmgren suggested that she had been present at a meeting with senior individuals from the defense community, and that there is already a consensus of opinion that a major confrontation with China and Russia is already taking place. The difference to warfare of the past is that this is being conducted surreptitiously through cyberspace, rather than through traditional and conventional forms of weaponry.

With the United States looking to deploy cyber warfare against targets such as the Iranian nuclear program, it has also been acknowledged by Scott Borg, CEO of the US Cyber Consequences Unit, that this is a valid tactic for the United States in the future. Cyber attacks could already have been launched against Russia and China, and concerns about the conduct of the United States has been expressed by such critics of US foreign policy as Ron Paul and Paul Craig Roberts.
However, one certainly shouldn't labour under the misapprehension that this is a one-way street. Both Russia and China have already been accused of similar cyber attacks, as the heated rhetoric between the Anglo-American old world order and this new coupling of power located in the Eastern region ramps up.

Russia cyber attacks on the Unites States
It is already suspected that Russian hackers were able to penetrate a Pentagon e-mail system that is commonly used by employees of the Joint Chiefs of Staff. US military officials have indeed stated this accusation publicly, and the latest cyber attack from Russia follows a larger series of infiltrations into sensitive US government computer networks. Many of these attacks have been penetrated by both Russian and Chinese hackers, as the issue of computing privacy and cyber warfare becomes an increasingly prominent hot potato.
US military officials stated that Russian hackers in particular targeted computers related to the unclassified Pentagon e-mail system. This cyber attack emanated just last month, and reportedly affected in the region of 4,000 military and civilian personnel, many of which are involved in the coordination and operation of US Armed Forces overseas.
This is not the first time that a particularly prominent computer system in the United States was laid bare by Russian hackers. Back in the fall of 2014, a similar cyber attack penetrated unclassified e-mail systems at both the White House and State Department. It is suggested that as a result of this particular cyber attack that it was possible for individuals to read the unclassified e-mail of the United States President Barack Obama. When United States officials investigate the origin of this particular hacking incident, it apparently led back to the Russian government.

China cyber attacks on the United States
And China has also been involved in similar cyber attacks. It has been reported previously that a group of hackers linked with the East Asian economic powerhouse managed to penetrate the databases of numerous American health insurers. This sort of attack is common among the so-called ‘black hat’ community, and is often carried out by rogue individuals with the intention of achieving monetary gain. This can be hugely successful, with some black hat individuals claiming to acquire income in excess of $1 million per year.
But it can also be carried out by state-backed entities, and in this case it is suspected that the Chinese government may have been involved in this cyber attack. Chinese hackers have been linked with stealing personal records of the United States military and intelligence agencies, striking the very heart of the US air-traffic system, along with several other unsolicited cyber attacks.
Sabre Corp., which processes reservations for hundreds of airlines and thousands of hotels, confirmed that its systems have been breached by hackers, while the U.S. government’s personnel office was also targeted. And according to the intelligence community, the source of this hacking was linked to the hugely powerful entity that is the Chinese government.
Security experts assert that Chinese hackers are in fact able to carry out such attacks in large numbers. One particular expert described the Chinese as the “bullies of cyberspace”, with state actors tasked with gathering intelligence on other nations covertly on a regular basis. This has been emphatically denied by the Chinese authorities, as well as by the Chinese embassy spokespersons in the United States. But it is clear that each of the three major world superpowers is ramping up its attempts to attack one another in cyberspace.

The cyber warfare between the United States, Russia and China is part of an overall epoch-defining conflict between the three nations. This is largely based on economic disagreement and rivalry, but has also spilled over into military and territorial disputes as well. Although this war has remained physically peaceful thus far, the potential for future conflict between the three nations remains significant. And with the likes of Edward Snowden revealing the extent of government snooping, we can expect more reports of governmental cyber attacks in the future.
Ein News:http://http://bit.ly/1INjUV3

 

« The NSA Playset: 5 Better Tools To Defend Systems
Malaysia: Umno members told to go on ‘cyber war’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Vanguard Integrity Professionals

Vanguard Integrity Professionals

Vanguard Integrity Professionals is an independent provider of enterprise security software solutions that address complex security and regulatory compliance challenges.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

Daon

Daon

Daon offers a universal biometric authentication platform for mobile devices.

Spherical Defense

Spherical Defense

Spherical Defense offers an alternative approach to WAFs and first generation API security tools.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

THEC-Incubator

THEC-Incubator

THEC-Incubator program is designed for international and ambitious tech startups in the Netherlands. Areas of focus include Blockchain and Cyber Security.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

Shearwater Group

Shearwater Group

Shearwater Group is an award-winning organisational resilience group that provides cyber security, advisory and managed security services to help secure businesses in a connected global economy.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

Data Priva

Data Priva

Data Priva is the UK's leading subscription-based data protection, governance, risk and and compliance service.

Difenda

Difenda

Difenda Shield is a fully integrated and modular cybersecurity suite that gives your organization the agility it needs to implement a world-class cybersecurity system.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

Gulf Business Machines (GBM)

Gulf Business Machines (GBM)

GBM is a leading end-to-end digital solutions provider, offering the broadest portfolio, including industry-leading digital infrastructure, digital business solutions, security and services.