Amazines Free Article Archive
www.amazines.com - Monday, November 11, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133574)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73858)
 Automotive (145717)
 Blogs (75618)
 Boating (9851)
 Books (17224)
 Buddhism (4130)
 Business (1330825)
 Business News (426453)
 Business Opportunities (366519)
 Camping (10973)
 Career (72796)
 Christianity (15851)
 Collecting (11638)
 Communication (115089)
 Computers (241958)
 Construction (38964)
 Consumer (49954)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20321)
 Dating (45910)
 EBooks (19703)
 E-Commerce (48270)
 Education (185529)
 Electronics (83525)
 Email (6438)
 Entertainment (159860)
 Environment (28990)
 Ezine (3040)
 Ezine Publishing (5454)
 Ezine Sites (1551)
 Family & Parenting (111009)
 Fashion & Cosmetics (196613)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310616)
 Fitness (106490)
 Food & Beverages (63056)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630161)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91733)
 Home Improvement (251231)
 Home Repair (46252)
 Humor (4726)
 Import - Export (5459)
 Insurance (45104)
 Interior Design (29618)
 International Property (3488)
 Internet (191026)
 Internet Marketing (146689)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80500)
 Link Popularity (4596)
 Manufacturing (20923)
 Marketing (99322)
 MLM (14140)
 Motivation (18236)
 Music (27000)
 New to the Internet (9498)
 Non-Profit Organizations (4048)
 Online Shopping (129740)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12691)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126809)
 Recreation & Leisure (95495)
 Relationships (87676)
 Research (16182)
 Sales (80356)
 Science & Technology (110298)
 Search Engines (23516)
 Self Improvement (153316)
 Seniors (6222)
 Sexuality (36012)
 Small Business (49323)
 Software (83053)
 Spiritual (23519)
 Sports (116155)
 Tax (7664)
 Telecommuting (34070)
 Travel & Tourism (308278)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11793)
 Website Design (56935)
 Website Promotion (36665)
 World News (1000+)
 Writing (35843)
Author Spotlight
SHOEB SIDDIQUE

From the time of study, i had a keen interest in acquiring knowledge by surfing on the Internet. Mea...more
RODRIGO DARZI

Pai da Júlia e do Pedro. Especialista em Marketing Digital, com MBA em e-Business pela FGV. Formado ...more
DAVID PAYNE

Technology without a doubt has made things easier for us. However, that being said, it has also comp...more
K HO

Affiliate marketer - I enjoy the challenge of what the internet has to offer. It has given me the o...more
DESIGNPLUZ PTY LTD

Designpluz has steadily matured from a passionate graphics design start-up, into a full service digi...more


Cyberwar History and Ukraine by Steve Burgess





Cyberwar History and Ukraine by
Article Posted: 04/04/2022
Article Views: 903
Articles Written: 44
Word Count: 1268
Article Votes: 0
AddThis Social Bookmark Button

Cyberwar History and Ukraine


 
Current Affairs,Computers
Cyberwar History and Ukraine, by Steve Burgess, 2022

People are much more drawn to images of blown-up building, fires, mushroom clouds, refugees in dire circumstances, color pictures of pain that are better in black and white than they are to explanations of code or even fallout from code if it’s not resulting in something blown-up, fiery, or pictures of people in pain that are better in black and white.

That is to say, while we see plenty of stories of ransomware, temporary business disruptions, and credit card & ID fraud, it’s not visceral. It goes by quickly on the page and in our minds.

So, whatever happened to the stories we saw before the cyberattack age? When the US Cybercommand was just a twinkle in some geeky eyes? What happened to the discussion that cyberattacks would engender kinetic responses? Bombs not electrons.

Perhaps it was a sense of proportion. Perhaps it was a recognition that we consider that an increasing cyberwar, if responded to with bullets, might just result in use seeing those images of things that would be better in black and white on our own doorstep?

Did we back off, or did sanity take hold in the minds of the planners?

Let’s look at a little history.

Back in 2003, a cyberattack originating from China - and christened, “Titan Rain,” by the US - managed to get access to loads of sensitive government information by compromising the systems of US government contractors and of government systems themselves. Only unclassified information was stolen, but the world woke up to this kind of attack.

In 2004, the Joint Chiefs of Staff declared cyberspace an important domain of conflict alongside the air, land, sea, and space domains. No doubt, this was prompted by the reality of Titan Rain. As a culture, we were just starting to think about these things on a national level.

In 2007, Estonia experienced a broad cyberattack that included their parliament, banks, and media. It was believed to have originated from Russia, or from Russian actors. NATO’s response was to create the NATO Cooperative Cyber Defence Center of Excellence (CCDCOE) in 2007. Now, continents were beginning to wake to the threat and the need to do something about it.

The Tailinn Manual

The CCDCOE began to develop an extensive study and code about what how international law applies to cyber conflicts and cyberwarfare; these previous acts were beginning to be recognized as acts of war. Calling on legal scholars and legal practitioners that were experienced in cyber issues, the CCDCOE produced Tailinn Manual on the International Law Applicable to Cyber Warfare in 2012.

The Tailinn Manual declared that killing hackers in response to certain cyberattacks was justifiable.

Killing hackers?!

Meanwhile, other state-sponsored cyberattacks marched their way into the public consciousness. The Stuxnet Worm was developed to sabotage Iran’s nuclear development efforts – in particular, the centrifuges used to enrich uranium gas. It is believed to be the first malware designed to and succeeding in visiting physical destruction on physical equipment. Wired Magazine called it the first digital weapon.

It's widely considered that the US and Israel collaborated over a period of 5 years to develop this malware. In 2009, Secretary of Defense, Robert Gates, recognizing how important AND vulnerable important computers and networks were (are), directed the creation of USCYBERCOM. It is the unified command for the cyberspace domain in the US and the world.

In 2016, the organization described the 2016 espionage ops against the Democratic National Committee while in the midst of a national election “serious business . . . [that] may destroy democracy.”

Administration officials at the time considered that cyber weapons were so potentially destructive that they should be unleashed only on the direct orders of the Commander in Chief, like nuclear weapons. I do not know if there is an equivalent “Cyber Football.”

Article 51 of the UN Charter allows individual countries to defend themselves and to band together to defend each other. It also allows the same if an armed attack is anticipated and recognizes the right to use force in such a situation. It allows cyberattacks to be considered an armed attack.

In 2019, Israel did just this, by conducing airstrikes on a building that they said had Hamas members inside that were planning to launch a cyberattack on Israel.

In 2021 the topic was up for noticeable public discussion again. NATO heads of state and government met at NATO’s North Atlantic Council meeting in Brussels and issued a communiqué that ultimately equates cyberattacks with kinetic attacks and leaves the possibility of military action against hackers on the table.

Still, what we generally see is that cyberattacks - or anticipated cyberattacks - by states are dealt with by preemptive and after-the-fact punishing cyberattacks. Tit for tat, as it were, and even before the tat.

Cyberwar in Action

What we have seen in practice in Georgia in 2008, Crimea in 2014 and in Ukraine in 2021 is the “softening up” cyberattack. The attack used to diminish and disable defensive and living systems before a kinetic attack, rather than a kinetic attack in response to a cyberattack.

Many said that the 2014-2015 cyberattacks were on a an entirely different – and grander – level than had been seen previously. Several Ukrainian banks and government agencies became inaccessible and malware – using a tool called “HermeticWiper” - was wiping data from hundreds of PCs and servers.

But we’ve gotten used to common DDOS attacks, data-wiping and ransomware in recent years on the civilian level. It’s kind of taken for granted that these things are ongoing and all over.

The use of cyberwar and kinetic war together has been labeled “hybrid warfare.”

And yet, the world seems surprised that Russian cyberattacks on Ukraine in 2021 and 2022have been substantially less severe than anticipated. To be sure, they were and are ongoingly widespread. Hackers caused the Viasat satellites to become inoperative. But that may have affected Russian soldiers and commanders to lose connectivity as well. And said attack has been mitigated somewhat by the Musk’s activation of Starlink Internet satellites over Ukraine.

Additionally, Ukrainian modems were zombie-fied by Russian malware, being used as nodes for targeted DDOD attacks within Ukraine.

But the ruination from malware that was expected has not really seemed to occur. We haven't seen a cyber-Armageddon. Were they more pr? Were the US and/or the EU pumping up Ukraine’s cyber defenses or attacking the offensive cyber capabilities of Russia? The newspapers wonder about this and government sources overtly express surprise and confusion that there isn’t more cyber damage.

I would be willing to wager that they know more about this than they are letting on. But then, isn’t that almost always the case?

The coming days and weeks will tell us more about cyberwar in Ukraine. It’s possible that all-out disruption of Ukraine’s Internet will come to pass. We hope not.

But one thing about this history stands out. We have not seen the kinetic response to cyberattacks on a wide scale that was being discussed a decade ago.

Luck? Cooler heads? Invisible cyber counterattacks? Thoughts of a Cyber version the Mutually Assured Destruction doctrine that has, in theory, kept the world from launching nuclear war? Or is physical destruction on a massive scale enough to satisfy those bent on domination?

These times we’re living in will surely shape the times we will be living in. Let us hope and work for that cyberwar doesn’t exceed the malign effects we have seen to date and that going forward we see fewer dire images because of fewer dire circumstances

Related Articles - Cyberwar, Security, Ukraine, Russia, Malware,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
DONNIE LEWIS

I'm an avid consumer of a smoothie a day living, herbs, vitamins and daily dose of exercise. I'm 60...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
STEVE BURGESS

Steve Burgess is a freelance technology writer, a practicing computer forensics specialist as the pr...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license