On the Brink of Cyber War…

On Thursday last week, senior cybersecurity officials from the US and Russia began two-day meetings in Geneva.

Years ago the Stuxnet virus showed the possibility of anonymous “kinetic” attacks in the cyber arena, leading many military and defense analysts to worry that World War III may be carried out with a keyboard.

On Thursday last week, senior cybersecurity officials from the US and Russia began two-day meetings in Geneva. The US says that the two countries are renewing efforts to prevent rushing into a cyber war “by mistake,” but many wonder what defines a "cyber war," and whether it actually poses a credible risk.

In recent years, America has pushed the boundaries of cyberwarfare while Western media focused on imagined threats from Russian and Chinese hackers. Beginning in 2010, with Operation Olympic Games, the US and their Israeli counterparts released the Stuxnet virus, crippling Iran’s Natanz nuclear facility and demonstrating the potential of "kinetic effects" as a result of cyberwarfare.

Further, in 2014, the NSA was implicated in surveilling the president of Brazil and the country’s state-owned oil giant Petrobras. Documents released from that NSA surveillance triggered the "car wash" investigation, leading to a vote to impeach Brazilian President Dilma Rousseff.

Recently, a series of cyberattacks by Iran demonstrated that turnabout is fair play. A federal indictment was issued against several Iranian officials for hackers engaging not only in market manipulation but also attempting to  cripple a dam in New York state that, if it had been successful, could have resulted in substantial loss of life and long-term agricultural damage.
With the purported specter of cyber war moving from the realm of science fiction to a leading national security distraction, Sputnik’s Brian Becker sat down on Friday with journalists Dmitry Babich and Declan McCullagh to discuss the cooperative meetings between US and Russian officials and whether the so-called new Cold War has already migrated online.

"There is a really bad relationship between the US and Russian government," Babich told Loud & Clear, "and there are constant accusations in the US press against Russia about Russian hackers on the payroll of the government trying to ruin the economy and military systems of countries like Estonia."

"I think the real picture is more complicated," suggested Babich. "There are some companies in Russia, big companies, which are dealing with cybersecurity and are part of international business. A [Russian] company like Kaspersky is an integral part of the global cybersecurity system."

Babich believes Russian cybersecurity companies and specialists are not engaged in cyber war against the United States or elsewhere, that they "don’t want to quarrel with the US and the EU," and are frustrated that the West takes such an aggressive posture towards them.

The journalist believes that the meeting between the two military superpowers will help to clear misconceptions, often advanced by Western media, that Russian hackers are "trying to attack the innocent West" when, in reality, Russia is both a competitor and a cooperative partner, engaged in activities that mirror US efforts.

Declan McCullagh agreed, likening US-Russian relations on cyber warfare to competition between tech giants Google and Apple. "Google competes with Apple, but it also releases maps and mail for the iOS Chrome browser – there is both cooperation and competition there," said McCullagh. "Similarly, the US and Russia are interested in the other party’s computer vulnerabilities, data, and obtaining military and defense intelligence, but they also cooperate regularly on cybersecurity."

McCullagh provided the example of a 2013 cyber crime extradition working group, and more recently a cyberwar hotline established for countries to quickly ask counterparts whether they are responsible for a cyberattack in order to rapidly deescalate situations and avoid misunderstandings.

What challenges stand in the way of cooperation in the cyber arena?

"Attribution," said McCullagh. "The real difference in cyber is the issue of attribution, because if a missile is fired you know who fired the missile, or if a spy is caught you can track down who the spy is, but if you are hacked by somebody and it is sent through five different routers in five different countries then attribution is impossible, you won’t know who did it."

The two guests raised the issue that law and policy have yet to catch up to cyber realities, creating the possibility for false-flag attacks, misunderstandings and overreaches that could become military conflicts. 
Ein News: http://bit.ly/1MSBKM8

« Self-Defence In A Connected World
Cybercrime Increases As Crooks Get AI Smarter »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Fortinet

Fortinet

Fortinet is a provider of network security systems. Our products provide protection against dynamic security threats while simplifying the IT security infrastructure.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

Advanced Systems International SAC

Advanced Systems International SAC

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

Secure Recruitment

Secure Recruitment

Secure Recruitment is a specialist Executive Search business that focuses its efforts on attracting specific exceptional talent in Cyber Security.

Cyber Security Authority (CSA) - Ghana

Cyber Security Authority (CSA) - Ghana

The Cyber Security Authority has been established to regulate cybersecurity activities in Ghana.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

PhishProtection

PhishProtection

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.