Kiberarmii rush to the attack (, Spain)

France started to develop "digital weapons" that can be used to conduct "offensive operations in the information war." Military superpower, the U.S., Britain, China, Our homeland and Israel are preparing for the defense.

6 laboratories engaged in the development of technological tools

According to the majestic military theorist, the Prussian general Karl von Clausewitz (Karl von Clausewitz, 1780-1831), which to this day is considered an eminent specialist on the art of war, "the soldier calls, dress, arm, uchyat he sleeps, eats, drinks and marches only in order to fight at the time and in the appropriate place. " A few months back, in France as in the U.S., China, Israel, England and Russia started initialization, memory load and prepare a fighter to penetrate into enemy computers and logic bombs thrown at only so that he could fight in the so-called "information war" , which is already open naikrupneyshimi between global powers.

The French army was not so long ago crossed the limit at which completed line of defense and begins actively coming within a virtual war. 6 laboratories and, at least, a unit of the French Air Force received orders to proceed with the development of "digital weapons" that can be used to conduct "offensive operations" in the event of a coordinated enemy attacks on government sites, intranets and the State Administration of critical information systems country.

Development of viruses, Trojans and spyware is legitimately

This information was made public by the world's largest salon weapons for the Army "Eurosatory 2010", held from 14 to 18 June in Paris, has also been voiced by the Secretary General of the presidential office, Claude Gueant (Claude Gueant), the Congress of the Supreme Council of the new Center Military strategic research made Nicolas Sarkozy.

French military apparatus began development of viruses, Trojans and spyware programs that fall into the computers of users so that they are not aware of it. All this is necessary in order to be able to "neutralize enemy centers inside", "attack the enemy specifically in the area of anger with offensive operations", also "pursue and destroy the aggressors." These puzzles have been put in the development of the strategic concept in the modern "white book on defense" (the French doctrine on defense and national security), released in 2008.

6 private laboratories to sit down (CESTI), under municipal control, received an order to develop "digital weapons". According to French law, the attempt of penetration into another information system or its destruction is a criminal crime. Yet, the General Secretariat of National Defence of France had found a loophole in the law: the laboratory to sit down, in the framework of the above systems of protection from hacker attacks, have the right to develop a "penetration tests in the information system." And in order to carry out such experiments, in practice, they can create and maintain the "Digital offensive weapon."

Outside France, exploration contract hires about 100 experts once a year

On the other hand, according to available data, the development of digital tools is offensive, at least one of the specialized units of the French Air Force with 110 air base at Creil, north of Paris. The General Directorate of external security of France (DGSE) has received an order to hire about 100 engineers per year in order to develop algorithms for penetration on foreign servers. First, the demand of spices in the field of daungreydinga (which can inconspicuously change security protocol on the least harmless), "reverse thinking" (analysis and restore encrypted with the enemy), the vulnerability scan systems secure access. Applications will only be considered candidates sent by ordinary mail

Thales (Thales) is in talks with NATO to develop a "kiberbunkera"

About what is really happening in the world classified as "top secret", we can only guess. Yet, some information is all the same through. For example, the French giant in the field of high technology Thales (Thales) does not hide that it is negotiating with the Government of France and NATO's ability to deploy "kiberbunkerov" Sibel (Cybels) and Nexium (Nexium) in the military sphere. "It will cost France a few hundred million euros" — said the colonel of the French Navy, Stanislas de Mopu (Stanislas de Maupeou), responsible for cyber defense in Thales (Thales) and past employee of the General Secretariat of National Defence of France.

To realize over what, in reality, the work of the U.S. Army, China, Britain, France, Russia and Israel, helped by the fact that the Secretary General of the Elysee Palace, Claude Gean (Claude Gueant) characterizes as "the sharpness of mind" and "the ability to review and interpret correctly inconspicuous signals sent by our invisible enemies and diverse. "

Havoc that can cause cyber attacks, fully comparable in scale to the tragic consequences of the actual bombing

Different scenarios

The main brains of general staffs develop three main scenarios for cyber warfare.

First and more terrible is an attack on the so-called SCADA (SCADA), in other words, information systems important municipal entities: the nuclear industry, railways and airports. The military reasonably imply that the havoc that could cause such attacks "in the coming fifteen years", in accordance with the "white book on defense" of France, fully comparable in scale to the tragic consequences of the actual bombing.

Second scenario involves an attack on the main Internet resources: sites and intranets municipal authorities (the presidential administration, police, tax authorities and hospitals). Hacking such systems inevitably lead to chaos and the fall of the country's prestige in the eyes of citizens and foreign countries.

Third scenario foresees the introduction of certain methods of cyber attacks to increase efficiency of conventional warfare.

To this day, many large companies have used civilians in their own information structures "kiberbunkery" type Sibel (Cybels) and Nexium (Nexium). These are the systems that are in real-time analyzes all incoming and outgoing info and can automatically detect up to 75 million "events". On the basis of these "events" is scanning hundreds of millions of processes to determine whether they qualify as an attempt to attack. As a result, once a day chosen 85 "hypothetical attacks", which are analyzed more carefully. Of these, from 4 to 10 of "events" per day are sent to additional checks that engineers spend 400, located, for example, in "kiberbunkerah" Thales.

For private companies, such a system provides a real opportunity to defend against hacker attacks. For the military structures of centers struggle with the digital wars provide a strong base, capable of real-time deter attacks carried out with armored servers, identify the chain of zombie computers controlled remotely from a single point, to identify the attacker and counterattacks.

According to Stanislas de Mopu (Stanislas de Maupeou), «cyberspace has become a battlefield, we can say even a major battlefield, because now the government or the army acts on a real battlefield are completely dependent on digital networks."

According to some media present at the benefit of annual Conference on Information Security (SSTIC), which was accomplished on June 9 in Rennes (France), Bernard Barbier (Bernard Barbier), Technical Director of the General Directorate of Security outside France (DGSE), said that France lags behind China for 10 years, and confirmed t
he government's intention to do everything possible to reduce this gap. It is, indeed, the case. And since most of the offensive operations against the law, they will be veiled and, if possible, with areas of other states.

The most famous cyber attacks

2003 "Titanium rain"

In 2003, the South American municipal and military sites have experienced a series of cyber attacks, which won the title of "Titanium rain." Then hit the websites of NASA and Lockheed Martin. China suspected in the attack.

2007 Our homeland against Estonia

In May 2007, experienced unparalleled attack websites of Estonian ministries, banks and media. Presumably, a flurry of attacks was a response to the Russian Federation to move the monument to Russian soldiers in Tallinn. Cyber attacks on Estonian websites have led to the need for the creation of a global cyber defense, which was embodied in the life of spices U.S. military and NATO.

2008 Our homeland against Georgia

During the Russian peacekeeping operations in Georgia, many Georgian municipal websites were hacked with the introduction of version trojan BlekEnerdzhi (BlackEnergy). Russia, which was suspected of organizing the attack succeeded, namely, to take control of the Web site of the president of Georgia, on the main page which appeared photo-collage made up of photos of Misha Saakashvili and Adolf Hitler.

2009 Iraq

South American fighters in Iraq captured the 1st of the Shiite militant group and constructive found on his computer a number of photos taken with the flying robotic spies. At the conclusion of professionals, the pirates took control of the imaging information system.

Like this post? Please share to your friends: