While such wars are not of the scale of temper, but at the moment we can see the pockets of their displays. One of the most important episodes of the immediate future, many experts have recognized the operation against the NPP in Bushehr. According to experts, the reactor could be damaged as a result of a computer virus attack Stuxnet, which caused severe damage to nuclear power plant control system and computer network station. Our homeland and a number of Gulf states, fearing a repeat of the Chernobyl disaster, putting pressure on Tehran to achieve permission for the inspection of the reactor nuclear power plant. And it insists on Russian Ambassador to NATO Dmitry Rogozin, which stands for a joint inspection of the NATO-Russia in order to determine the real state of the nuclear facility.
The virus has hit the nuclear facility under construction a few months back got to the station outside. Computer system Management at the Bushehr nuclear plant was not connected to the web, but it did not help. The virus has brought to the station one of the employees or foreign workers and launched the network, as a result of Iran's nuclear programm was paralyzed. Many are inclined to believe that the Stuxnet virus could be written by a hidden cyber divisions of Israel or the United States who are very concerned about the implementation of nuclear programs from within the Middle Eastern country.
The second more significant act of cyberwar last time was the publication of many hidden materials on the website Wikileaks. In this case, the victim of hackers have become the United States itself. Property of millions of people around the world are initially hidden documents relating to warfare waged in Afghanistan and Iraq, and then the publication of the correspondence of American diplomats. The publication of these materials not only posed a danger the lives of many people working with the intelligence agencies and the U.S. government, and caused significant damage to American diplomacy and style of the country as a whole.
That is a huge amount of hidden documents in the hands of the interested parties in this leads to the conclusion that the United States vulnerable to attacks of this kind, and is not able to provide the level of protection to pay tribute to the transfer of such data.
Proof of this was the training and simulation of cyber warfare, which was first held in 2010 a non-profit organization Bipartisan Policy Center. The aim of the operation was to determine what would happen to the U.S. if the country was used against massed hacking attack. Experience under the title "Shock kibervolna" demonstrated that country having a large arsenal of conventional and nuclear weapons was not fully prepared for cyber warfare. In the case of a massive hacker attack the wireless infrastructure and mobile wireless telephone services, as well system power supply are very vulnerable and can suddenly fail, causing disruption of the normal economy of the whole country.
The simulation was carried out cyber war with the introduction of computers 230 participants experience. All participants were employees of the defense agencies, private companies working in the field of safety, security agencies and public obedineniy.Uchastnikam experience could easily disrupt the power grid and telephone network in the country. During the attack the harmful mobile software programs from starting to send virus to other phones, which are also heavily infested with each other. As a result, began to drop out whole clusters, which can not withstand the load on the network. Simulation of cyberwar has shown that competent attack able to throw 40 million U.S. residents living in the east of the country without electricity after only half an hour after it started. An hour later, 60 million cellular subscribers with surprise will find that their cell phones turned into ordinary plastic trinkets. And after a couple of hours paralysis and gets money from the center of the world — Wall Street.
The scheme conducted cyber attacks, according to the views Bipartisan Policy Center, is that the attack is not directly from abroad, and Intermediary. At first in the country, the attacked, infected computers everyday users — law-abiding people, and only then with these computers are attacked by the desired server, for example, such as the Pentagon.
Speaking after the conduct of the experiments, U.S. Secretary of State Security Secretary Michael Chertoff acknowledged that country not protected from similar threats of the modern world, and that the government will take lately measures to strengthen their security. Bureaucrat stressed that for the near future the number of attacks from abroad grows constantly, almost all due to China and countries of the Muslim world who are offended external policies of States.
In reality, a cyber attack can be a significant risk only when a massive collective impact on the individual critical points of the system, which was previously chosen as a victim. Such dangers are very rarely can only come from one anti-social personality. The greatest danger and the true scale of cyber war they perceive only in this case will be made by individual corporations or governments that are able to attract significant technical and human resources for the application aimed kiberudarov. But even with all this, a significant factor in this situation is — human, and confirmed that the case in Iran. In the end, seems to be unique and progressive was not written by harmful programm to open or close it access to the system can often only a man.
Cyberwar evenly occupy more military brains all over the world. The head of the Australian defense department — Admiral Chris Barrie called on politicians and the fighter is to cyber warfare as seriously as a missile threat. Cyberwar — it's quite a cheap and effective method of disabling civilian and defense facilities. The drama in this case is that more advanced from a technical standpoint countries are more vulnerable to kibervtorzheniya. At the current time, the Government, public utilities, private companies and many other organizations are shifting their management within the Web or public data network. And where there is a possibility of accessing the web, and there is always the possibility of unwanted penetration outside.