Cyber War — the virtual fights in reality

13-16 November this year, NATO is conducting exercises under the title Cyber Coalition, during which the participating States will block the interaction of work in the event of cyber-warfare. By the way, planning cyber attacks occupied many countries. But in these cyber attacks, there is one very severe problem — in advance to anticipate the consequences of their unrealistic. In addition, to control the production of cyberwar is also unrealistic.

According to the scenario, the two member countries of the military unit will undergo a hacker attack, carried out by one of the African countries. "The victims' countries are Estonia and Hungary. One of military transport aircraft of NATO, which is disabled by a massive computer virus falls into one of the Hungarian cities. At this time held and ground attack on the infrastructure of another country — Estonia. Union itself determines to which the state owns the enemy and fights back, not only in the real world and in cyberspace.

It should be noted that the choice of possible victims of hackers is very little puzzling, because, Hungary and Estonia are quite far away from Russia. That's why many of the professionals they say that under the African state is supposed specifically Russia. This assumption seems to be fully applicable, the more so that the representatives of the block is called in the number of possible enemies own more specifically Russia, Iran and China.

It should be noted that the participants in the unit especially serious about cyber security dilemmas. So, namely, the German armed forces since the end of 2011 is in a state of full combat readiness to conduct cyber warfare. Unit, which is practiced on cyberwarfare, stationed near Bonn. Creating division was started in 2006, and its base were professionals, computer scientists, who were responsible for protecting computer systems from the German Defense Ministry attack burglars. Note that the level of training the German kiberboytsy actually equaled the forces with South American and Israeli spices.

England also not idle. On the basis of DeMonfortovskogo Institute, located in Leicester, was launched professional training programm programming services for internal and external intelligence, MI5 and MI6. In October of this year, the head of the Ministry of Foreign Affairs of England William Hague was made a statement that in the program are recruited young people who are intensely addicted to computer games. According to him, specifically, they will be able in the future to ensure the safety of the country.

Means of cyber warfare — is a virtual instrument that over time can transform into real weapons of mass destruction. Because experts predict kibervooruzheny start of the race between the leading countries of the world. Confirmation that the virtual and the real is closely intertwined among themselves, according to the action next time — "Arab Spring", keeping the censorship in China, carrying out cyber attacks in Iran, hacker attacks on security services, disclosure of the hidden disk imaging resource WikiLeaks. All this gives rise to professionals talk about the fact that cyber war is unfolding in the world. But so far, the participants practiced, causing sharp blows, but even these micro indicate that cyber weapons can be a severe hazard.

On the threat to use kibersredstv evidence, namely, the multiple failures in the system of registration of passengers at airports, it was eventually torn down a huge number of flights. Scandals related to WikiLeaks, have become a prerequisite of hacker attacks on network resources is a large global banks and ministries in the world, is also on the New York Stock Exchange. But that's all, so to speak, domestic implementation of cyber weapons. As for global use it is a question of undermining the work of the military system, mobile communication, transportation and power plants.

As a striking example of the implementation of the military cyber technologies, usually induced a story that happened first of the new century with the scandalous eavesdropping US-British system "Echelon". In addition, there were hackers in the South American government servers, public blame or North Korean or Chinese programmers hackers. The most resonant case of our time — is the introduction against Iranian nuclear systems of the virus Stuxnet. Iranian spice managed to stop, but there was another threat — a viral programm titled Flame, which is very similar to the preceding.

According to a professional at a very competitive intelligence Eugene Yushchuk specifically, these cases show, in what direction the development of computer tools.

Participation in the creation of computer viruses refute both Washington and the Israeli side, but fully understood that this is only a political game. The conviction of many professionals, to fight with the help of cyber weapons against Iran ineffective. There will only help a small and quick victorious war. But malehankih war with Iran will fail, and most will not be victorious …

Apart from the U.S. and NATO member countries, is very well learn the potential ability of the wars in cyberspace, Japan, China, our motherland and even North Korea. According to the professionals at the present time more than 20 countries in the world has the potential for cyber warfare. More precisely find the number of such countries is very difficult, as this sphere, as all development associated with it, are the information enclosed.

The most active among all the name-giving countries recognized China which distanced himself from the rest of the world "The Great Wall" and through it filters incoming and outgoing information. Chinese hackers are listed as one of strongest of computer professionals in the world. Moreover, questions about the cyber technologies are under control of the country's top political control

As for the Russian Federation, the military establishment perfectly acquainted about the potential of young people in the field of computer science and computer systems. Because in October announced a tender to conduct research in the field of information security. Moreover, according to some media reports, in the power structures are increasingly began to take on specific "advanced" hackers.

In the field of technical data protection Russians also hold some good principles of the western states. Thus, namely at sites of the nuclear industry there system Ethernet, on which all information is transmitted and also manages the apparatus. One of the Ethernet integrated into the Web, and the other is completely isolated. Something similar occurs in the computer system and power department. Nor one computer which contains sensitive information that is not connected to the web. Moreover, all the computers that come in the municipal departments, special services tested for the presence of spy equipment, and military are generally devoid of foreign programs.

If we talk about the consequences that may result from the cybernetic attack, carried out intentionally or event and focused on hydroelectric power, sewer or other infrastructure, it is unrealistic to find them. This can only guess. However, according to experts at already in the not to distant future, computer viruses are spread at a rate of bio. With all of this to control their spread is unrealistic.

According to military analyst Alexander Goltz, at the current time civilization is very vulnerable. This is explained by the fact that at least some complicated process, including water supply systems, regulation of traffic, infrastructure — all controlled with the help of information technology. And even the smallest irregularities in the work of these technologies can serve a
s a prerequisite for severe problems. He also notes that, at this moment we are only starting work on the creation of cybernetic tools. Despite this, in America there is even a special unit of the whole. A similar unit, by the way, exists in the Russian Defense Ministry. In addition, Goltz sure that in the field of development of cyber weapons Russians left far behind the world.

And the views of the founder of Kaspersky Lab Eugene Kaspersky, you need to adopt an international agreement that will prohibit the defense structures and lead the development of viruses and also helps to reduce the estimated risk on a global scale. But in fact it is not that of an ordinary task. In practice, negotiation of international agreements on cyber security will restrict the free use of the "world wide web", since there can be found a potentially unsafe design.

Each government has its own concept of security and freedom, because at the present time there is no chance to come to a common agreement, which would have hampered the development of computer virus software. So Makarov, it appears that the population of the earth was simply a hostage of the cybernetic space that neither predict nor even less to control unrealistic.

Applied Materials:
http://rus.ruvr.ru/2012_11_12/Kibervojna-pole-bitvi-Zemlja/
http://rus.ruvr.ru/2012_10_01/Ot-jadernogo-k-kompjuternomu-gonka-kibervooruzhenij/
http://rus.ruvr.ru/2012_10_18/NATO-gotovitsja-k-kibervojne-s-Rossiej/

Like this post? Please share to your friends: