Gentlemachines
5.4K views | +0 today
Follow
Gentlemachines
What's new at the crossroads of culture, technology and science
Curated by Artur Alves
Your new post is loading...
Your new post is loading...
Scooped by Artur Alves
Scoop.it!

China Is a Cyberwar Victim, Too - By Jason Healey

China Is a Cyberwar Victim, Too - By Jason Healey | Gentlemachines | Scoop.it
Artur Alves's insight:

"The Chinese press has reported that the websites of 85 public institutions and companies were "hacked" between September 2012 and March 2013, with 39 of those attacks traced back to the United States. During a similar period, Chinese authorities noted that there had been some 5,800 hacking attempts from U.S. IP addresses and that U.S.-based servers had hosted 73 percent of the phishing attacks against Chinese customers. Of the 6,747 computers controlling nearly 2 million botnets in China -- the ones the Chinese spokesman told FT about -- 2,194 were in the United States, "making it the largest point of origin of cyber attacks against China," according to Xinhua."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

First Strike: US Cyber Warriors Seize the Offensive

First Strike: US Cyber Warriors Seize the Offensive | Gentlemachines | Scoop.it
The US has abandoned its previous dependence on defensive cyber strategies and has shifted into high gear with the aim of developing superior first-strike capacities.
Artur Alves's insight:

Nothing really new, but a good review of how the current status came to be under the more or less technologically realistic strategy experts in the Pentagon. What is at stake now? A new generation of cyberweapons and a new understanding of the potential of digital vulnerabilities.

"Achieving “cyber superiority” in a twenty-first-century battle space is analogous to the establishment of air superiority in a traditional bombing campaign. Before strike missions begin against a set of targets, air commanders want to be sure the enemy’s air defense system has been suppressed. Radar sites, antiaircraft missile batteries, enemy aircraft, and command-and-control facilities need to be destroyed before other targets are hit. Similarly, when an information-dependent combat operation is planned against an opposing military, the operational commanders may first want to attack the enemy’s computer systems to defeat his ability to penetrate and disrupt the US military’s information and communication networks."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Hackers launch assault on Israeli government websites

Hackers launch assault on Israeli government websites | Gentlemachines | Scoop.it

"Israeli officials count 44 million attacks on government sites since bombardment of Gaza began – but only one succeeds...

Cyber-attacks launched following the start of the Israeli offensive knocked some sites offline for a short period of time at the end of last week and resulted in others being defaced with pro-Palestinian messages.

Anonymous said on Saturday that it had taken down or erased the databases of nearly 700 Israeli private and public websites, including that of the Bank of Jerusalem finance house."

more...
No comment yet.
Rescooped by Artur Alves from Technoculture
Scoop.it!

Cyberwar Is Already Upon Us

Cyberwar Is Already Upon Us | Gentlemachines | Scoop.it

Although most information on cyberwar's repercussions -- most notably the 1997 Eligible Receiver exercise -- remains classified, suffice it to say that their effect on U.S. forces would be crippling.


Via Luca Baptista
more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Arming for Virtual Battle: The Dangerous New Rules of Cyberwar - SPIEGEL ONLINE

Arming for Virtual Battle: The Dangerous New Rules of Cyberwar - SPIEGEL ONLINE | Gentlemachines | Scoop.it
Now that wars are also being fought on digital battlefields, experts in international law have established rules for cyberwar. But many questions remain unanswered.
Artur Alves's insight:

"DarkSeoul was one of the most serious digital attacks in the world this year, but cyber defense centers in Western capitals receive alerts almost weekly. The most serious attack to date originated in the United States. In 2010, high-tech warriors, acting on orders from the US president, smuggled the destructive "Stuxnet" computer worm into Iranian nuclear facilities.

The volume of cyber attacks is only likely to grow. Military leaders in the US and its European NATO partners are outfitting new battalions for the impending data war. Meanwhile, international law experts worldwide are arguing with politicians over the nature of the new threat. Is this already war? Or are the attacks acts of sabotage and terrorism? And if a new type of war is indeed brewing, can military means be used to respond to cyber attacks?"

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

US cyber-weapons exempt from "human judgment" requirement

US cyber-weapons exempt from "human judgment" requirement | Gentlemachines | Scoop.it

"As custom government malware becomes an increasingly common international weapon with real-world effects—breaking a centrifuge, shutting down a power grid, scrambling control systems—do we need legal limits on the automated decision-making of worms and rootkits? Do we, that is, need to keep a human in charge of their spread, or of when they attack? According to the US government, no we do not."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Inside one of U.S. Cyber Command's offensive units

Inside one of U.S. Cyber Command's offensive units | Gentlemachines | Scoop.it

«The brigade is a custom-made cyber warfare unit being built up at Fort Meade, Md., and Fort Gordon, Ga., to conduct some of the most sophisticated cyber operations around the world. As the Army's contribution to U.S. Cyber Command, the 780th is responsible for hunting down enemy hackers, figuring out how they operate, and developing cyber weapons to use against a host of online targets.

These soldiers work outside the Pentagon's firewalls to "detect threats against our networks, to characterize where those threats are coming from, and to provide early warning to [Army network] defenders, to provide early warning to [Army] hunters inside the network who will look to cut that threat off."«

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

War of the cyber worm: the most destructive attack on the internet

War of the cyber worm: the most destructive attack on the internet | Gentlemachines | Scoop.it

"An edited extract from Worm: the story of the First Digital World War by Mark Bowden" (from The Guardian)

more...
No comment yet.