Military Review

World Cyber ​​War

World Cyber ​​War

Scientific and technical progress has allowed humanity to move to a new qualitative level of its development. In the world everything is balanced: life and death, yin and yang, cold and hot, peace and war. So, technical progress contributed to the creation of cyberspace, in which bloodless but deadly military operations could take place. Computer confrontation in the space of the world wide web - the Internet, has received the name of cyberwar. The actions involved in this war are aimed at destabilizing the work of computer systems and access to Internet resources of state and non-state institutions, financial and political centers, business entities, etc. Such actions may well cause chaos, unrest and acts of vandalism. Now a group of specialists (or even a loner) can, with the help of technical and informational means, cause irreparable harm to the military, economic, technological, political and information security of any state. Therefore, most of the actions carried out by the parties in cyber war affect intergovernmental relations and can lead to political confrontation. One of the American economic journals says that cyberwar is the same area of ​​war as space, air, sea, or earth. The fact that Washington is serious about computer confrontation is evidenced by the fact that a US military cyber command unit has been created.

Experts have identified the types of Internet cyber attacks:
Vandalism - changing the content of Internet pages with the replacement of the original material to an offensive or propaganda nature;
Propaganda - Using Internet resources, propaganda materials are sent;
Collection of information - hacking of private pages in order to steal information (mostly of a closed nature) or replace it with false one;
Service failure - simultaneous actions from different computers against a site or a specific computer system in order to disrupt its operation;
Intervention in the work of computer equipment - the impact through the Internet on civilian and military equipment, leading to its breakdown;
Attacks on infrastructure computer resources leads to disruption in the operation of equipment that ensures the vital activity of cities, to communication failure, to failure in the operation of housing and utilities systems, transport structure, etc .;
Cyberterrorism - This is when a nuclear facility fails with a network attack, or a massive uncontrolled dumping of a huge mass of water by a dam occurs, or the airport is disrupted, causing airplanes to collide.

All objects of cyber attacks have one common feature - they operate using software that is exposed to malicious programs (viruses). The result may be effects comparable to the effects of weapons.

And although cyberwar has not acquired a large-scale nature, the losses from its management are already obvious.

One of the objects of this war was the Bushehr nuclear power plant. As a result of a cyber attack, the NPP reactor was damaged. The world community, concerned about the threat of a possible nuclear catastrophe, takes maximum effort to learn about the real state of Tehran’s nuclear facility. The virus was intentionally entered into the computer system of the nuclear power plant, and as a result, the Iranian nuclear program was suspended. It is not excluded that the malware was developed and introduced into the network of nuclear power plants with the help of the relevant units of the United States or Israel, which are concerned about the implementation of Iran’s nuclear program.

Another result of cyber war is the public disclosure of classified information on the Wikileaks page. At first, the world public learned secret information about the US military actions against Iraq and Afghanistan, and then a correspondence of diplomats was posted on the site. These publications have caused significant damage to the reputation of the United States.

The surprise of the public access of such sensitive information prompted the United States to conduct a cyber warfare training, which the Bipartisan Policy Center implemented in 2010. Artificially creating a massive hacker attack using 230 computers, the experimenters realized that America’s nuclear arsenal and conventional weapons were defenseless against cyber attacks. Participants in a training attack easily managed to disrupt the country's energy supply and communications, including mobile. It became clear that cyberwar is an effective and cheap way to disable any object in the country. And the more advanced technical means are at the disposal of the state, the more vulnerable it is for outsiders to cyber intrusion.

US military experts believe that only military cyberspace has opponents equal in strength. The first among opponents is China, which constantly carries out cyber attacks on the resources of the US Department of Defense. The second is called Russia, which is suspected by American specialists of cyber attacks on computerized Estonia in 2007 (as a result, the work of Estonian government and commercial structures was paralyzed for several days).

Americans are particularly worried about the activity with which China has been putting constant pressure on the US Internet networks for ten years now. The goal is to gain access to documents, the substitution or theft of them.

Computer systems in the United States are also under attack during military-political crises. For example, a cyber attack on the American network occurred in 1999 year after the Americans bombed the Chinese Embassy in Belgrade. The next cyber attack was organized in 2001 after landing an American reconnaissance aircraft on Chinese territory after a collision with a fighter. A month later, the Celestial hackers, by their actions, turned off the White House website for three hours.

Chinese cyber warriors and the Pentagon system did not go unnoticed. The massive attack on US Department of Defense resources in 2003 even got its code name - Titan Rain. Washington really realizes the strategic threat to the country from the actions of opponents in cyberspace.

China, as always, thoroughly approached the issue of creating warriors for cyberwar. Across the country, searching for talented programmers and hackers. In China, as part of the selection of the necessary personnel, exercises are being conducted on attacks and defenses of computer networks among the country's youth. Not surprisingly, there are strong hacker groups in China that are funded by the military. For example, the Chinese group NCPH has created more 30 programs that use the spaces in the Microsoft Office suite - this allows you to inject virus routines into your system that allow you to remotely control infected computers, copy the necessary documents and send them to the correct address. It is on this group’s account that several thousand important documents are being transferred from the US state networks. And, most likely, China has hundreds of such units operating in the interests of the special services of their country.

It is not a secret for anyone that many military units of different countries plan to conduct not only normal, but also cyber warfare. Moreover, actions of both offensive and defensive plans are mandatory. These Internet attacks can be a type of “denial of service” or secret penetration into military control networks; Trojans can also be used to intercept necessary information and create chaos in enemy networks.

Cyber ​​warfare can take partisan form — an attack is carried out by a small, well-trained group of specialists. The significant effectiveness of the cyber attack is due to the fact that the strikes are carried out unexpectedly and no one knows where.

The US authorities have launched a new project (Plan X), which allows creating tools that will ensure the "dominance" of the country in cyberspace and carry out cyber attacks on the resources of other states.

In turn, the Russian company discovered a new malicious program on the resources of the Middle East, which can be attributed to cyber weapons, since it had spy functionality and was aimed at stealing financial information. New Trojan called Gauss.

And the United States, under the pretext of fighting cyber-terrorism, proposes to combine the efforts of the best hackers on the planet. Presidential Advisor D. Arkilla noted that Russian specialists would be invited first.

Advances in the creation and use of the latest cyber technologies bring great benefits to all mankind. I would like to believe that the human mind will not allow the peoples of the world to be involved in cyber war.

Materials used:

Subscribe to our Telegram channel, regularly additional information about the special operation in Ukraine, a large amount of information, videos, something that does not fall on the site:

Dear reader, to leave comments on the publication, you must sign in.
  1. Sergl
    Sergl 30 August 2012 10: 32
    No internet connection - no problem.

    Why Bushehr NPP access to the World Wide Web, I personally do not understand.
  2. atos_kin
    atos_kin 30 August 2012 11: 13
    An example of China is another science. As for the Bushehr nuclear power plant, it was not connected to the Internet. The virus was brought in by bribed contractors.
    1. Sergl
      Sergl 30 August 2012 11: 34
      Quote: atos_kin
      The virus brought bribed contractors

      Now it’s clear, but it is not clear from the text of the article which method was used.

      And if the malware was not introduced through communication channels, can this be considered a "cyber attack", or is the term "sabotage" more appropriate here?
  3. Skavron
    Skavron 30 August 2012 11: 42
    The article is definitely a plus. Whoever owns the means of transmitting information will win ...
  4. klimpopov
    klimpopov 30 August 2012 14: 14
    One of the objects of this war was the Bushehr nuclear power plant. As a result of a cyber attack, the reactor of a nuclear power plant was damaged. World

    olololo. The author is more careful, what kind of cyber attack is there? And the body of virya f studio. No? so oh too ...

    Another result of cyber war is the public disclosure of classified information on the Wikileaks page

    This is, in general, the greatest duck of the 21 century, Asange is a dark comrade, and where did he get his information from and how much misinformation is there, in general it can be said from him that Jesus is made of him, so that he can then control the minds of the white house. Right now, Asange farts everyone. So that...

    actions of both offensive and defensive plan

    This war is ongoinguser not visible to user

    And the last NEVER the hacker will work for anyone else’s interests except in their own interests, if the hackers can pay the hack and the Pentagon is hacked, but he doesn’t need anyone, collection of information about credit cards is much more interesting IMHO

    Bushehr workers also need to look at the weather and read bashorg, that's why they need an Internet station ..
    1. iSpoiler
      iSpoiler 30 August 2012 18: 06
      The virus is called staxnet ...
      I read it on a computer, damn it really fucking virus ...
      naughty with the cooling system of the reactor .... damn you what you want to do, and not far from the explosion .... since computers have been managing computers for a long time .. then all the ensuing ...
      1. klimpopov
        klimpopov 30 August 2012 18: 44
        Yes, there is a dark story, because the body of the virus was never found, with the source, it was written again explicitly under their system, and how it was dragged there too, it is unclear to say that this is a cyber war, at least it is strange. Their administrators just catch up with the campaign ...
        all the same, now viruses are more targeted at theft. хоть что то
      2. Dimented
        Dimented 30 August 2012 21: 06
        Only the name of the Stuxnet virus, via U.
        Good material on this virus was published in the Foreign Military Review in Nos. 8-9 2011: Analysis of the causal factors of the use of the Stuxnet virus against Iran's nuclear facilities.
        The best Stuxnet material I've ever read, I highly recommend.
        1. klimpopov
          klimpopov 31 August 2012 08: 34
          Oh thanks..