Cyberwar Right Here, Right Now...

 

U.S. Perspective on the  International Cyber Environment:- It's a wild west right now. The rule of the strongest. No legal framework. Espionage vs. sabotage

US officials have apparently said that Russia initiated a “sophisticated cyberattack” on the Pentagon’s Joint Staff unclassified email system, a system which then was taken down for a period of weeks.
This “sophisticated cyber intrusion” happened in late July and impacted approximately 4,000 personnel employed by the Joint Chiefs of Staff. On the one hand, officials reportedly have said that it is not plain whether, in fact the attack was supported by Russia’s government, but on the other hand, officials reportedly have stated that the attack “clearly was the work of a state actor.” These officials emphasize that classified information supposedly was not seized, and that only unclassified accounts were compromised, hopefully, that indeed is the case.

Meanwhile, a month earlier, the Office of Personnel Management told the public that a database housing personal information relating to roughly 4 million current and former employees had been hacked. United States officials reportedly stated in private that this was the work of the Chinese government, even though the administration did not directly accuse China with respect to this attack. China has denied any suggestion of involvement.

It is true that even if Russia and China were behind these hacks, they did not perpetrate true military assaults, there was no physical harm caused to anyone that we know of at this point. However, if Russia and China so easily might be able to obtain sensitive information of US government employees, this might not bode well. It is a depressing thought that Russia and China might develop the capability over the Internet to access, disrupt, or gain control of US mission critical military systems and other systems that address the functions of nuclear power plants, air traffic control, the electrical grid, or water supply and distribution.

As Stuxnet demonstrated, we now live in a world where cyber attacks are real and cyber wars could cause immeasurable damage. These attacks could become greater in terms of potential harm, and thus the Internet will be a place where defensive efforts are put in place, even when defense goes on the offensive. Are these acts of war? Not in the traditional sense, but the protection of humans lives can be at stake.

by Eric Sinrod. Duane Morrix LLP: http://ow.ly/SVF4R

Techlaw: http://bit.ly/1JA3oVo

 

« Zeus Arrests and SpyEye Group is Taken Down
AT&T helped NSA Spy on Domestic Citizens »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Superscript

Superscript

Superscript (formerly Digital Risks) is an insurance broker for small businesses, sole-traders, landlords and high-growth tech firms. Our services include Cyber Liability insurance.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

CipherStash

CipherStash

CipherStash is a complete data governance and breach prevention platform.

Convergence Networks

Convergence Networks

Convergence Networks is one of North America's leading Managed Services & Security Providers.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.

CyberAI Group

CyberAI Group

CyberAI's mission is to pioneer the evolution of the cybersecurity landscape globally, by strategically acquiring and elevating IT consulting firms into leaders of cybersecurity innovation.

Prventi

Prventi

Prventi provide phishing simulation and cybersecurity awareness training for companies. Empower your employees to become your strongest defense against cyber threats.