Russia, China & U.S. Engage in Cyber War

red-dragon-rising-understanding-the-chinese-cyber-scenarios-02-march-2014-21-638.jpg?cb=1393770105

Chinese Govermnet Policy Adopted in response to U.S Cyber Command 2010 Strategy Document 

As tension between the United States, Russia and China continues to escalate, reports of cyber warfare between the nations has become increasingly prominent. Modern warfare can be waged in numerous ways, and it seems that this virtual form of conflict will be an increasing theme as the 21st century develops.

The perception of which of the countries is most likely to be in the wrong certainly differs greatly depending on your geographical location. Naturally, in the United States it is frequently reported that both China and Russia pose a significant threat to American security. But reporting in the two Eastern nations can be significantly different, and fairly recently Russian publications suggested that indeed the United States had already unleashed a form of cyber warfare against both Russia and China.

US cyber attacks in Russia
But this assertion was not entirely baseless, according to the sources that have been acquired to support it. The former White House official, Dr. Philippa Malmgren, a former presidential adviser and member of the US President's Working Group on Financial Markets, supported this notion when quoted by the Russian publication Pravda.
Malmgren suggested that she had been present at a meeting with senior individuals from the defense community, and that there is already a consensus of opinion that a major confrontation with China and Russia is already taking place. The difference to warfare of the past is that this is being conducted surreptitiously through cyberspace, rather than through traditional and conventional forms of weaponry.

With the United States looking to deploy cyber warfare against targets such as the Iranian nuclear program, it has also been acknowledged by Scott Borg, CEO of the US Cyber Consequences Unit, that this is a valid tactic for the United States in the future. Cyber attacks could already have been launched against Russia and China, and concerns about the conduct of the United States has been expressed by such critics of US foreign policy as Ron Paul and Paul Craig Roberts.
However, one certainly shouldn't labour under the misapprehension that this is a one-way street. Both Russia and China have already been accused of similar cyber attacks, as the heated rhetoric between the Anglo-American old world order and this new coupling of power located in the Eastern region ramps up.

Russia cyber attacks on the Unites States
It is already suspected that Russian hackers were able to penetrate a Pentagon e-mail system that is commonly used by employees of the Joint Chiefs of Staff. US military officials have indeed stated this accusation publicly, and the latest cyber attack from Russia follows a larger series of infiltrations into sensitive US government computer networks. Many of these attacks have been penetrated by both Russian and Chinese hackers, as the issue of computing privacy and cyber warfare becomes an increasingly prominent hot potato.
US military officials stated that Russian hackers in particular targeted computers related to the unclassified Pentagon e-mail system. This cyber attack emanated just last month, and reportedly affected in the region of 4,000 military and civilian personnel, many of which are involved in the coordination and operation of US Armed Forces overseas.
This is not the first time that a particularly prominent computer system in the United States was laid bare by Russian hackers. Back in the fall of 2014, a similar cyber attack penetrated unclassified e-mail systems at both the White House and State Department. It is suggested that as a result of this particular cyber attack that it was possible for individuals to read the unclassified e-mail of the United States President Barack Obama. When United States officials investigate the origin of this particular hacking incident, it apparently led back to the Russian government.

China cyber attacks on the United States
And China has also been involved in similar cyber attacks. It has been reported previously that a group of hackers linked with the East Asian economic powerhouse managed to penetrate the databases of numerous American health insurers. This sort of attack is common among the so-called ‘black hat’ community, and is often carried out by rogue individuals with the intention of achieving monetary gain. This can be hugely successful, with some black hat individuals claiming to acquire income in excess of $1 million per year.
But it can also be carried out by state-backed entities, and in this case it is suspected that the Chinese government may have been involved in this cyber attack. Chinese hackers have been linked with stealing personal records of the United States military and intelligence agencies, striking the very heart of the US air-traffic system, along with several other unsolicited cyber attacks.
Sabre Corp., which processes reservations for hundreds of airlines and thousands of hotels, confirmed that its systems have been breached by hackers, while the U.S. government’s personnel office was also targeted. And according to the intelligence community, the source of this hacking was linked to the hugely powerful entity that is the Chinese government.
Security experts assert that Chinese hackers are in fact able to carry out such attacks in large numbers. One particular expert described the Chinese as the “bullies of cyberspace”, with state actors tasked with gathering intelligence on other nations covertly on a regular basis. This has been emphatically denied by the Chinese authorities, as well as by the Chinese embassy spokespersons in the United States. But it is clear that each of the three major world superpowers is ramping up its attempts to attack one another in cyberspace.

The cyber warfare between the United States, Russia and China is part of an overall epoch-defining conflict between the three nations. This is largely based on economic disagreement and rivalry, but has also spilled over into military and territorial disputes as well. Although this war has remained physically peaceful thus far, the potential for future conflict between the three nations remains significant. And with the likes of Edward Snowden revealing the extent of government snooping, we can expect more reports of governmental cyber attacks in the future.
Ein News:http://http://bit.ly/1INjUV3

 

« The NSA Playset: 5 Better Tools To Defend Systems
Malaysia: Umno members told to go on ‘cyber war’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

Inspired eLearning

Inspired eLearning

Inspired eLearning provide turn-key Security Awareness and Compliance training programs.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Cryptovision

Cryptovision

cv cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

Industrial Internet Consortium (IIC)

Industrial Internet Consortium (IIC)

The Industrial Internet Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

CyberX9

CyberX9

CyberX9 helps you protect against a wide range of cyber attacks whether you are a business or a high-net worth individual under risk.