Wednesday, February 8, 2023
  • About us
    • Write for us
    • Disclaimer
    • Terms of use
    • Privacy Policy
  • RSS Feeds
  • Advertise with us
  • Contact us
DefenceTalk
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
DefenceTalk
No Result
View All Result

Code War replacing Cold War: security experts

by Agence France-Presse
August 4, 2011
in Technology News
3 min read
0
Code War replacing Cold War: security experts
14
VIEWS

A US counterterrorism expert warned that the Cold War has given way to a “Code War” in which cyber weapons can be unleashed with devastating consequences.

Nations will launch online attacks and extremist groups will add cyber attacks to their tactics, according to Cofer Black, who spent 28 years in the Central Intelligence Agency before becoming a private consultant.

“You had the Cold War, the global war on terrorism… now you have the Code War,” Cofer said at a major Black Hat computer security gathering in Las Vegas.

“The natural thing will be for Al-Qaeda to fall back to things that are small and agile,” he continued. “They will enter the cyber world.”

It will fall to computer security specialists such as the 8,500 Black Hat attendees to fortify defenses against such attacks and overcome the challenge of identifying culprits.

Figuring out who is behind cyber attacks is imperative as the United States and other countries weigh the option of real-world military retaliation for virtual incursions, according to Cofer.

“Boy, hold onto your seat,” he told the gathering. “I could see myself in the situation room on the receiving end of a technical attack with physical dimensions saying ‘Who did this and what are we going to do?'”

A sophisticated hacking campaign exposed earlier by computer security firm McAfee was no surprise to Cofer, who saw it as a sign of more to come.

The United States, United Nations, defense contractors and the International Olympic Committee were targets of a massive global cyber spying campaign, McAfee said, with China seen as the likely culprit.

California-based McAfee said in a report that it had identified 72 victims in 14 countries of a hacking effort dubbed “Operation Shady RAT,” which it traced back to at least 2006.

McAfee vice president for threat research Dmitri Alperovitch described it as a “five-year targeted operation by one specific actor” but declined to identify the country responsible.

The “compromised parties” included the governments of Canada, India, South Korea, Taiwan, the United States and Vietnam, McAfee said, as well as a US Department of Energy research laboratory and around a dozen US defense contractors.

Others included computer networks of the United Nations, the Association of Southeast Asian Nations, the International Olympic Committee, Asian and Western national Olympic committees and the Montreal-based World Anti-Doping Agency.

Alperovitch, the lead author of the report, said the intrusions into the systems of defense contractors targeted “sensitive military technologies.”

“We believe based on the targeting and the scale and the impact of these operations, and the fact that they didn’t just have an economic gain in mind but also political and military, that that this is clearly a nation-state but we’re not pointing the finger at anyone,” Alperovitch said.

James Lewis, a cybersecurity expert at the Center for Strategic and International Studies, said the evidence may not be “conclusive in a legal sense,” but suspicion points toward China.

“Validation of threat and attack will come into your world,” Cofer told the Black Hat gathering.

“Chaos and confusion can be inhibitors to clear action,” he continued. “There is a delay to validation, and this is a great problem.”

Attribution is challenging because attackers can obscure trails with tactics such as bouncing off computer servers in various countries or using virus-infected computers without owners knowing.

Collaboration between various players on the Internet could make it harder for hackers to hide, according to Microsoft Security Response Center director Mike Reavey.

“There are ways that the industry can do more to make attribution easier,” Reavey said. “You can apply tools we use to fight crime in the physical world to the cyber world.”

Tags: Cod warcold warcyber attackcyber securityCyber Warnetwork securitysecuritywar
Previous Post

China to Boost Military Development Under New “Strategic Thinking” Model

Next Post

Energy plants at risk of cyber attacks: researcher

Related Posts

If US DoD Wants #ArtificialIntelligence In Its Future, It Must Start Now

AI voice tool ‘misused’ as deepfakes flood web forum

February 1, 2023

A British AI firm said it was rethinking its "safeguards" after its audio tool was used to clone celebrity voices...

Hackers could shut down satellites – or turn them into weapons

Airbus to provide satellite communications for Belgian Armed Forces

January 25, 2023

Airbus has signed a contract with the Belgian Ministry of Defence to provide tactical satellite communications services for a 15...

Next Post
Ex-USSR awash in radioactive ‘dirty bomb’ substances

Energy plants at risk of cyber attacks: researcher

Latest Defense News

Air Defense Systems, Long-Range Fires Capability to be Sent to Ukraine

Air Defense Systems, Long-Range Fires Capability to be Sent to Ukraine

February 4, 2023
Beijing accuses NATO of exaggerating ‘China threat theory’

Majority of Finns want to join NATO before Sweden: poll

February 3, 2023
China, US defence ministers to hold talks in Singapore

Pentagon tracking Chinese spy balloon over US

February 3, 2023
Eurofighter Touts Typhoon Capabilities to Poland At Air Show

UK court examines legality of resuming Saudi arms sales

February 1, 2023
If US DoD Wants #ArtificialIntelligence In Its Future, It Must Start Now

AI voice tool ‘misused’ as deepfakes flood web forum

February 1, 2023
Japan defence ministry seeks $50 billion budget

NATO chief hails Japan plans to expand defence spending

February 1, 2023

Defense Forum Discussions

Loading RSS Feed
DefenceTalk

© 2003-2020 DefenceTalk.com

Navigate Site

  • Defence Forum
  • Military Photos
  • RSS Feeds
  • About us
  • Advertise with us
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports

© 2003-2020 DefenceTalk.com