The power grid hack this summer triggered alarms, and experts from eavesdropping spy service GCHQ were called in to flush out 'sleeper' worms. It is believed the Russian state-sponsored hackers intended to lie dormant inside the energy network after having penetrated it, to then cause significant damage at a later date. Speaking at The Times Tech
Topic: Cyber Warfare
After a series of global cyber attacks disrupted multinational firms, ports and public services on an unprecedented scale this year, governments are seeking to stop hackers from shutting down more critical infrastructure or crippling corporate and government networks.
Cyber-attacks will happen and so developing a means to isolate intrusions at sea and keep moving is imperative, said the Navy's top intelligence officer. Now, once security experts detect a cyber-attack, the typical response is shut down all systems and then scrub them for malicious code or software, said Vice Adm. Jan Tighe, Deputy Chief of Naval
On January 28th, 2011, Egypt disappeared from the global map. In a coordinated shutdown of all major Egyptian internet service providers--an effort by its government to squelch public dissent- -virtually all Egyptian Internet addresses became unreachable worldwide.1 The action was unprecedented in Internet history.2 At the same time, the U.S. Senate
On June 17, 2010 a small antivirus company established in Belarus discovered the Stuxnet worm. Later research would reveal that an earlier variant of the worm existed at least a year earlier. Stuxnet reputedly caused the physical degradation of some 1000 centrifuges at the Natanz facility in Iran, based on data of the International Atomic Energy Agency
Zipping past a Plan B for cyber defense solutions to the end of the alphabet, the U.S. Defense Department's research arm launched Plan X and advanced platforms to conduct and assess cyber warfare like kinetic warfare.
High-speed wireless "underwater internet" of the type that is now pervasive in the world's cities is still just theory. Without a cable, data just doesn't transmit easily through water (even less so when it is salt water).
Members of Congress are grappling with the new era of cyber warfare as the government works to define what acts in cyberspace should warrant a military response.
While government and military leaders have incessantly been asking industry for more automation in cyber network defense tools, some are also warning of the increased threat automation is posing on the offensive side.
On the civilian side, the new report warns that for at least the next five-to-10 years, other nations will have offensive cyber capabilities that "far exceed the United States' ability to defend and adequately strengthen the resilience of its critical infrastructures."