Military Review

Cyber ​​front: the quiet battles of the future

73

Get out of the comfort zone



To begin with, a little modern chronicle of "war" actions in cyberspace. On May 7, 2021, in seventeen states, the American authorities introduced a state of emergency. It's all about 100 GB of critical information from the oil company Colonial Pipeline, which the hackers remotely encrypted and demanded a ransom of $ 5 million in bitcoins. Oil workers have stopped the work of pipelines through which up to 45% of petroleum products are supplied to the east coast of the United States. As it turned out, the security system of the company and government agencies of the United States were not ready for such a turn of events. It was necessary, with the consent of the government, to pay millions to the extortionists, and it was only on May 13 that the work of the oil terminals was restored. In all likelihood, it was the largest in stories cyberattack on the energy sector. The DarkSide hacker group, responsible for the massive disruption of the oil operator, carries out attacks on a critical information structure every two to three days. Of course, not all of them end up with such a fat, but the intensity of the work and the scale are impressive. So only DarkSide ended up with the US oilmen, they stole more than 740 GB of confidential information from the French office of Toshiba in order to ransom. It is worth remembering that a small part of hacker scandals reaches us. Victims of cybercrime are not always ready to share with the press the details of the failures of their own security services. According to blockchain analysis company Elliptic:

"In total, just over $ 90 million in Bitcoin has been paid out to DarkSide alone from 47 different wallets."


What does this story tell you? First of all, about the vulnerability of the modern civil world and the limitless possibilities of cybercriminals. And if someone believes that hackers are only able to take a person out of their comfort zone by turning off water, electricity and heating, then they are deeply mistaken. In February and April of this year, in Pennsylvania and Florida, attackers connected to local water treatment plants in an attempt to poison the water. In Florida, in Pinellas County, an unknown person remotely tried to increase the concentration of alkali in drinking water by 100 times. The operator noticed the cursor wandering around the interface in time (the hacker entered the system through TeamViewer) and returned all the changes to their place. Even in the event of a successful attack, utilities would have time to stop the effects of alkalization of water in time. But the very fact that hackers have access to such important resources makes us think.

We thought about the prospects for global vulnerability and government structures. Potentially, cyberwar can not only lead to massive infrastructure accidents, but also cause the death of people. A couple of years ago, hackers demonstrated hacking the control system of Tesla electric vehicles. Taking over the autopilot functions, the programmers took the car into the oncoming lane. Now imagine what chaos would ensue in the country if hacker groups launch a massive attack on all fronts. A real world war will begin.

Non-military component


As you know, generals are always preparing for the last war. But, nevertheless, they try as best they can to foresee the future. For this, military academies and specialized research institutes have been created. Sometimes military analysts manage to correctly predict the specifics of future wars. One of the key ideas of a whole group of Russian military scientists (recall that there are special academic degrees in Russia - candidate and doctor of military sciences) is a serious transformation of armed conflicts in the present and future. And the most important place in the hypothetical Third World War may be occupied by the cyber front. This opinion is confirmed by a number of foreign experts. Gunther Oettinger, former European Commissioner for Digital Economy and former Prime Minister of the German federal state of Baden-Württemberg, believes that a new all-out war will take place without guns and even without nuclear weapons... Everything will be replaced by silent battles on the fields of cyberspace.

Domestic analysts are not so categorical. According to the authors of the Military Thought magazine, in the 80st century, up to 90-10% of interstate confrontations will take place in the form of a non-military component. In this segment, a large place is given to cyber troops. The remaining 20-90% falls on hypersonic missiles, electronic warfare, drones, laser systems, stealth technology, missile defense and weapons based on new physical principles. Interestingly, in the past century, the ratio of threats was the opposite - up to 10% for "tangible" weapons and about 2021% for the non-military component. In 2030, an article was published in one of the issues of the Military Thought publication, in which the information threat from the West for Russia becomes one of the key for the period 2040-XNUMX. That is, we have a much better chance of becoming a victim of a giant infrastructure collapse caused by a cyber attack than of being killed by nuclear or conventional weapons. And it's all about integration into the information space. Every day we are expanding our presence in the virtual environment, becoming more and more vulnerable.


The story with the American GPS system can be an illustration of this problem. Not the one used by our smartphones and navigators, but a military high-precision one. The Pentagon has so accustomed its fighters and equipment to a convenient and high-speed positioning system that disabling GPS will cause chaos in the battle formations of the Americans. Hence the targeted opposition from Russia and China, aimed at destroying the constellation of GPS satellites and local suppression of navigation signals. The only difference in cyber threats is that Russia, China, and all countries with a developed information structure are in place of the United States.

Identification difficulties


There is still no consensus on the precise definition of cyberwar. In this, the situation is similar to the term "artificial intelligence". Scientists and engineers offer dozens, if not hundreds, of different interpretations of this phenomenon. For example, Alan Turing (the man who hacked the German Enigma) generally believed that

"A machine should be considered intelligent if it can do everything that a person does with his mind."

That is, a simple calculator, according to Turing's theory, can be considered an example of "artificial intelligence".

There are now at least three definitions of the term cyberwar. The version of the National Security Research Department of the RAND Corporation states that it is

"Impact on communication systems, intelligence, automated control, information networks with the aim of destroying them, disrupting and distorting information."

The authors of the book Cyberwar. A New Threat to National Security and Ways to Overcome It "Clark and Kneik:

"The actions of a nation state to infiltrate another country's computers or networks to cause damage or destruction."

And, finally, the Russian Institute for Strategic Studies writes that

"Cyber ​​warfare implies the achievement of superiority over the enemy through the widespread introduction of new technologies in combat command and control systems and, most importantly, improving the organization and command and control of troops."

Such inconsistency in terms unambiguously speaks of a certain confusion of state services in the face of a new threat. After all, if we do not fully understand what to fight with, it is very difficult to find an effective antidote. Despite this, we are gradually slipping into a real cyber war with absolutely unpredictable consequences.

The main threats


The advent of the Internet of Things and 5G networks makes every person on the planet potentially vulnerable. Cyber ​​weapons are becoming real weapons of mass destruction. The ubiquitous connection of everything and everyone to the World Wide Web theoretically allows hackers to influence even the metabolic processes of the body. Now in medicine, pacemakers and insulin pumps with a remote interface are becoming widespread. The possibility of hacking these gadgets and malicious control (shutdown or release of a lethal dose of insulin) was discussed back in 2012 at McAffee. A less bloodthirsty example: smoke detectors and kettles are integrated in the concept of "smart home" into a single network with Internet access. Theoretically, it is possible to remotely reduce the sensitivity of the sensors, turn on the kettle and start a fire.


Source: wikimedia.org

It is not uncommon for hacker groups to spend millions of dollars and months of continuous work on their attacks. Viruses have to be implanted into vulnerable systems and put into hibernation mode for an extended period. Such "sleeping bombs" can now be found in any device connected to the Internet at least once.

Examples of domestic cyberwarfare should not be regarded as the lot of self-taught hackers. In the event of a serious aggravation, a total attack on the civilian population by the "combatant" cyber units of enemy states is quite possible. It is worth recalling the experience of the all-out World War II, where the destruction of civilian infrastructure and civilians by Western countries was seen as an essential condition for victory.

At the strategic level, cyberwarfare is even more unpredictable. First, cyber technology is very difficult to constrain. This is not a nuclear or chemical weapon; after its use, there is almost no evidence left. It is even more difficult to catch an aggressor country in developing a new means of attack. Secondly, the countries of the third world can create competition with the states of the first line. The example of Iran with its effective cyber troops is indicative in this case. Third, in terms of cost-effectiveness, cyberwar is simply beyond competition. Penny state-wide costs can be multiplied by one or two successful cyber operations. And finally, the most important and most dangerous property of a cyber weapon is its ability to cause a completely real war according to the good old rules. It is very difficult to determine for what purpose a conventional air defense system has been hacked - solely for the sake of espionage or destruction of the defense line before an impending invasion? Only the very cold-blooded will be able to restrain themselves from far-reaching conclusions. And then the quiet battles will burst into artillery cannonade.
Author:
73 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. Per se.
    Per se. 31 May 2021 07: 01
    +13
    Interestingly, in the past century, the ratio of threats was the opposite - up to 90% for "tangible" weapons and about 10% for the non-military component.
    The Soviet Union fell, not from "tangible weapons" and not from cyber attacks. We were beaten by political cheats, we were hypnotized by Hollywood, bribed by the advertising gloss of the West. In meanness, duplicity and hypocrisy "gentlemen" have no equal.

    The Anglo-Saxons did not just become the leaders and masters of the world capitalist system. They went to this for a long time, and long ago they mastered that it is quite possible to rake in the heat with someone else's hands, set enemies on rivals, and eliminate leaders. Britain "goat" us, in life, in Central Asia, the Caucasus, the Black Sea and the Far East, always and everywhere. But when necessary, these foxes drew Russia into an alliance against Napoleon, or into the Entente, against "Uncle William". The same Nicholas II got the shame of Tsushima, where Japan was actively used by the Anglo-Saxons, and climbed for them to harness to the Entente. And, the point is not in Nikola Princip, not in Serbia, there was a struggle for the world throne of capitalism, Germany was a contender, the war was inevitable, they found not this other reason.

    To be able to dress up as wolves in the sheep skins of "democracy", to sponsor Hitler, creating an anti-USSR out of defeated Germany, to cash in on the war, this is a talent. Then they create world terrorism, and they themselves, like fighting, launch COVID-19, and again the Chinese are to blame, not they. This is the main threat that the Anglo-Saxons are masters to do. Until we understand this, we will be a toy in their hands, where we will already get a "tangible" or cyber weapon, as a result.

    Without a national idea, without strong agitation and propaganda, without a powerful national security service, we can be defeated without any "hot war", traitors will surrender the country, squeezing out the remnants of Soviet greatness like a lemon, and the rotten morality of consumers and the cult of money will complete the degradation.
    1. Lech from Android.
      Lech from Android. 31 May 2021 07: 05
      +13
      We were beaten by political cheats, we were hypnotized by Hollywood, bribed by the advertising gloss of the West.

      And what did our management do to create their own Hollywood, promote their advertising ... you can of course push all the blame for the collapse of the USSR onto Hollywood and advertisers ... but this is fundamentally not true.
      The leadership of the USSR began to rot, starting with the Politburo ... and then the decomposition went from top to bottom until the gangrene of the entire state began.
      1. Per se.
        Per se. 31 May 2021 07: 19
        +8
        Quote: Lech from Android.
        The leadership of the USSR began to rot, starting with the Politburo ...
        There are also people in the Politburo, the same dear Leonid Ilyich was greedy for gifts, and our party ladies who visited the United States cried after their luxurious shops. Children of diplomats with clothes from the West, farts, double standards, special rations, fucking "Birches", Moscow, where the whole country went "for sausage".
        The Moon deal with the Americans, which gave birth to the fetish of the West, was one of the main reasons for the weakening of Soviet morality.

        They created the Soviet Union with sweat and blood, the main potential was laid under Stalin, after which, in fact, degradation began. Khrushchev began, Gorbachev completed. It was impossible to be an antagonist, a mortal enemy, it was impossible to see it as a "partner", it was impossible to hope for any kind cooperation with the West. Only strength, containment. The consequences of flirting with wolves are well known, especially since the West never needs a strong Russia, even with the tsar, even with the democrats, especially with independent socialism, as a new pole of world power.
        1. Lech from Android.
          Lech from Android. 31 May 2021 07: 23
          +5
          There are also people in the Politburo, the same dear Leonid Ilyich was greedy for gifts, and our party ladies who visited the United States cried after their luxurious shops. Children of diplomats with clothes from the West, farts, double standards, special rations, fucking "Birches", Moscow, where the whole country went "for sausage".

          A systemic problem ... against which no antidote was found ... there was no second comrade Stalin to cleanse the rotten top.
          In the film The Diamond Arm, it was allegorically said about this ... smile
          After returning from there, your husband has become different! The pernicious influence of the West ... These toys are idiotic! And this strange phrase: "A dog is a friend of man." Strange, to say the least ...
          1. knn54
            knn54 31 May 2021 08: 48
            +5
            Eugene-François Vidocq, a former convict with experience, headed the General Directorate of National Security of France. In fact, he is the founder of the world criminal investigation.
            Scrap scrap is a trick. Hackers can and should be involved in ensuring the country's security.
            And as Sergei correctly noted, money and benefits will not be enough. An idea is needed, an ideological stimulus is needed.
            A recent example of a Chinese specialist who "burned out at work", And it was not money that guided his actions.
            It is very scary when love for the Motherland is perceived as an anecdote.
        2. Jacket in stock
          Jacket in stock 31 May 2021 09: 36
          -4
          Quote: Per se.
          They created the Soviet Union with sweat and blood, the main potential was laid under Stalin, after that, in fact, degradation began ...
          You can't be an antagonist, a mortal enemy, it was to be seen as a "partner"

          But you're lying.
          It was Stalin who actively traded with the West, attracted specialists, exported gold and cultural values.
          And it was under Stalin that arbitrariness, arbitrariness, lawlessness, and total lies in the media flourished in the country.
          It was under Stalin that all sorts of Lysenko, Khrushchevs and other figures who were incompetent in anything except apparatus intrigues were promoted to leading posts. They eventually took over the country, bringing it to decline.
          1. Per se.
            Per se. 31 May 2021 10: 32
            +8
            Quote: Jacket in stock
            But you're lying.
            It was Stalin who actively traded with the West
            The way Stalin traded with the West can be characterized by the common phrase attributed to V. I. Lenin - "If you offer a good price, the capitalists will sell the rope itself, on which they will be hung.".
            Under Stalin, they bought a lot from the bourgeoisie, including from the United States, but this was done for the good of the country, the entire Soviet people, it created its own economy, personnel, experience.

            The Soviet Union, the world's first socialist country, with a new social system, much, if not everything, was done from scratch, for the first time, hence the inevitable mistakes and losses. But, in 40 years, a nuclear and space superpower was created, moreover, in a hostile environment, with great potential, which continued to develop.

            Now, for 30 years in our bourgeoisie, only basically the Soviet reserve of strength is being consumed, and, as in that phrase, our home-grown capitalists are already ready to sell not only the "rope", but also their mother, if they are in such "export" pay well.
    2. Doccor18
      Doccor18 31 May 2021 07: 50
      +5
      Quote: Per se.
      Without a national idea, without strong agitation and propaganda, without a powerful national security service, we can be defeated without any "hot war", traitors will surrender the country, squeezing out the remnants of Soviet greatness like a lemon, and the rotten morality of consumers and the cult of money will complete the degradation.

      Bravo hi
      Excellent commentary.

      On my own behalf, I just want to add that despite the technology ball, the question of the quality of personnel again arises as never before. After all, a cyber defense specialist is, at least, an intelligent person, with an analytical mindset and the ability to find non-standard solutions, in close conjunction.
    3. lucul
      lucul 31 May 2021 12: 37
      -2
      We were beaten by political cheats, we were hypnotized by Hollywood, bribed by the advertising gloss of the West. In meanness, duplicity and hypocrisy "gentlemen" have no equal.

      Stupidity.
      The Anglo-Saxons did not just become the leaders and masters of the world capitalist system. They went to this for a long time, and long ago mastered that it is quite possible to rake in the heat with someone else's hands, set enemies on rivals, and eliminate leaders.

      Since 1640, when the usurers came to power there.
      The whole secret of the success of the Anglo-Saxons is in the application of the female behavior matrix (manipulation). As a woman manipulates a man, so the Anglo-Saxons manipulate other countries.
      You tune in and try to predict the train of thought of the man of the enemy, but he is not there, there is a woman's mentality - and you always lose.))))
      1. Per se.
        Per se. 31 May 2021 12: 47
        +5
        Quote: lucul
        As a woman manipulates a man, so the Anglo-Saxons manipulate other countries.
        Manipulation, not a woman's property, and "according to Freud," the concessions of the same Gorbachev to the West cannot be explained. On the contrary, the "Faberge" in this in the West turned out to be stronger than that of the husband of Raisa Maksimovna.
        In addition to manipulation, there was also bribery, blackmail, political assassinations, various sabotage, intervention, direct aggression (for example, from the latter Yugoslavia, Iraq).
        1. lucul
          lucul 31 May 2021 12: 56
          -1
          Manipulation, not a woman's property,

          Precisely what is the property of women))))
          The male mentality is to break and destroy everything that poses at least some kind of danger to the man himself and his family))))
          1. Per se.
            Per se. 31 May 2021 13: 56
            +3
            Quote: lucul
            Male mentality - tear and destroy everything
            Vitaly, you are substituting concepts. England plundered its colonies (why destroy them), the United States is plundering the whole world in one way or another, with the largest national debt.

            Below, respected by me ccsr, expressed the opinion that "the destruction of us with weapons of mass destruction will be the main goal." What for? Maybe the exception is viruses, biological weapons. Russia is a trophy, a coveted trophy and rich booty, first of all, in terms of natural resources (intellectual ones bought or stole them after the collapse of the USSR). In addition, from Russia, and so billions are flowing over the hill, it is a sin for the bourgeoisie to complain about such a Russian "cash cow". Dreams Come True.

            The West got the image of an enemy after the Crimea, again super-profits on this, and our cheeks are puffing up, to raise ratings, after the failed Yeltsin. Everyone is happy.

            No one needs to trash clean fresh water, fertile soil, and other raw materials with radioactive rubbish. We could make the US an exclusion zone, our resources will be enough for us. There will be blackmail, pressure. Here, from the "male mentality", I would not like to get the ending on the song of Pugacheva, - "Oh, what a man was - a real colonel!" ... In this, "who's who (huː'es huː)", time will tell ...
            1. lucul
              lucul 31 May 2021 14: 17
              -1
              Vitaly, you are substituting concepts. England plundered its colonies (why destroy them), the United States is plundering the whole world in one way or another, with the largest national debt.

              This is called parasitism))))
              As a woman, in most cases, parasitizes on a man's neck, pulls resources and money for herself (and ideally there should be symbiosis), so the Naglo-Saxons (Zionists) parasitize and manipulate other peoples.
              Everything is strictly according to the precepts of female manipulation.
  2. Jacket in stock
    Jacket in stock 31 May 2021 09: 27
    0
    Without a national idea, without strong agitation and propaganda

    Is it okay that the national idea is directly prohibited by the Constitution?
    Although no, there is still one. Proclaimed in 1991, was widely supported, and has not changed since then.
    And our powers that be are actively promoting it in life.
    "ENRICH!"
  3. Intruder
    Intruder 31 May 2021 09: 39
    0
    Now in medicine, pacemakers and insulin pumps with a remote interface are becoming widespread.
    I can't judge about a pacemaker, God had mercy ..., over my shoulder three times ... wink But wearable insulin pumps, and even with a wireless interface, would not take .., it is better to immediately bullet in the temple than from hypoglycemia, they suffer slowly losing consciousness ... at the same time !!! Tin ... and nothing more!
    1. depressant
      depressant 31 May 2021 14: 15
      +2
      Good afternoon, colleague Intruder! hi )))
      Is there really such a thing?!?
      I missed it ... That is, you have to kill a person, I just pressed a key somewhere, and here's a corpse for you on order. I agree, tin!
      1. Intruder
        Intruder 31 May 2021 17: 05
        -1
        Is there really such a thing?!?
        I missed it ... That is, you have to kill a person, I just pressed a key somewhere, and here's a corpse for you on order. I agree, tin!
        Greetings madam !!! drinks
        There is and not only, this is generally the entire IoT, it is not very secure, and if all sorts of remote telemetry modules are used even by the manufacturer itself, and someone resisted and sold vulnerabilities on the black market, then yours, a car with a "smart autopilot", or even it is corny with a robotic box, for example - you can imagine switching to parking mode, at a speed of 100 km / h, with the throttle valve turned off or vice versa with other modes of operation, and it has digital control already in many brands and models of cars for 10 years. 12 already in the markets of developed countries and their own controller, the spouse flew a damper on the road, so she barely drove 20 km to the service!
        1. depressant
          depressant 31 May 2021 17: 45
          0
          The only word that comes to mind is the words of Hamlet: "Oh, horror, horror, horror!" If at 100 km / h, then "parking" is like hitting a wall? I sympathize with you in the situation with your spouse. In recent days, I have been increasingly thinking about digitalization. Electronic document flow does not reduce the number of preliminary instances, photocopies are made on each of them, somewhere for this, trees are additionally cut down. And most importantly, your data can easily end up with scammers. It got to the point that the government, not knowing how to deal with personal data leaks, issued a law according to which a person can write a statement according to which he refuses to take out loans for life! Like, if someone tried, then I'm not him wassat
          1. Intruder
            Intruder 31 May 2021 17: 50
            -1
            It got to the point that the government, not knowing how to deal with personal data leaks, issued a law according to which a person can write a statement according to which he refuses to take out loans for life! Like, if someone tried, then I am not he wassat
            Or maybe immediately consent to a life sentence, then ... through a voluntary confession at the first interrogation !? This is savagery and stupidity ... some, to refuse in their right and personally accept such a lifelong obligation - even Roman law did not know this ... in its best years !!! What's going on on this planet, a pandemic of the brain ...
            My wife began to call me on the road, especially sad was the sharp increase in engine speed when the pedal was thrown in traffic, several unforgettable seconds for her and convulsive pressure on the brake ... there were no accidents, and I did not become a widower, although my beard turned a little gray .. ...
            1. depressant
              depressant 31 May 2021 18: 06
              +3
              Yes ... What can I say! Civilization is clearly going somewhere in the wrong direction.
              1. Intruder
                Intruder 31 May 2021 18: 14
                -1
                Yes ... What can I say! Civilization is clearly going somewhere in the wrong direction.
                Or maybe she (this is a civilization) has already reached ... just - not there !? Well, that is, in the run, for the comfort and globalization of everything and everyone, instant access to any information from anywhere in the world, with worldwide tracking for the sake of - marketing and sales of mass-produced products that are little needed in life, with a warranty period of 0,5 or 1 year...???
                1. depressant
                  depressant 31 May 2021 19: 44
                  +1
                  Colleague, yes, in the wrong place, and yes, I got there.
                  See for yourself.
                  A huge number of reminder apps are offered for use on the Internet: a list of friends, birthdays - wherever it goes! But there it is proposed to mark all contacts, for example, with Petya, and against each to mark with color, which are good, which did not work out very well, and the application concludes: it would be necessary to improve, otherwise everything is blue, relations are marked with a cold color. It is not the owner of the phone who thinks, feels that his relationship with Petya is not very good, and it would be necessary to fix it, but the phone tells him! And therefore it is not necessary to remember about Petya - the phone remembers. And this is just one of the many features of this application. As a result, a person turns into a controlled being, devoid of memory and ability to analyze. Take the phone away from him, and he will not know how to live on, because everything is on the phone!
                  1. Intruder
                    Intruder 31 May 2021 20: 05
                    -1
                    But there it is proposed to mark all contacts, for example, with Petya, and against each to mark with color, which are good, which did not work out very well, and the application concludes: it would be necessary to improve, otherwise everything is blue, relations are marked with a cold color. It is not the owner of the phone who thinks, feels that his relationship with Petya is not very good, and it would be necessary to fix it, but the phone tells him!
                    Madam, well, this is ... for the completely lazy and stupid in their personal lives !? I didn't know that such garbage is, honestly ... the idiocy grew stronger ... in 2021! ??? The assistant already prompts and invades the human sphere of communication, such as "smart" primates, of which there are 8 billion on this planet ??? Take me away ... damn it, no words, really ... recourse
                    And therefore it is not necessary to remember about Petya - the phone remembers. And this is just one of the many features of this application. As a result, a person turns into a controlled being, devoid of memory and ability to analyze. Take the phone away from him, and he will not know how to live on, because everything is on the phone!
                    Well, I don't know, a phone, a tablet or a laptop, they can take it from me, and the figs on them ..., except for the knife and the barrel - this is only from my cold hands, honestly ... good the last time, already in the past, in one small but proud country, they tried and after that I say this to everyone - always !!! ... yes
                    1. depressant
                      depressant 31 May 2021 20: 38
                      +1
                      The fact is that such applications began to be made back in the 90s as corporate ones. Indeed, if you have, say, a large company, well, how big - 100 office employees, and each one works with two or three clients, and then, according to the results of the work, in a day marks: refused, but there is a hope that it is possible to persuade, and such results from all employees flock to the owner of the company - this is understandable, such a large and systematized material allows you to quickly, that is ahead of competitors, conduct the final analysis and draw conclusions about how to build the work further. But individual users also reached out to the application. Sensing the opportunity to make money, hundreds of programmers eventually began to develop them, and the number of copies sold varies for each developer from several thousand to tens of millions. And sales are growing! The number of simplifying your life, and actually living your life thoughtlessly, is steadily increasing. A decade will pass, and all the new generation will sit on these applications - the one that "was born with a gadget in hand." And yes, it has already been noted that the civilized part of humanity has obviously become stupid, and the tendency, supported by such "facilitators", will speed up the process.
                      1. Intruder
                        Intruder 31 May 2021 21: 59
                        -1
                        A decade will pass, and all the new generation will sit on these applications - the one that "was born with a gadget in hand." And yes, it has already been noted that the civilized part of humanity has obviously become stupid, and the tendency, supported by such "facilitators", will speed up the process.
                        Madam, you are scaring me today, with the scope of this information, honestly !!! I'm going to repack my worrisome backpack ... just in case !!! Good idea, in light of this topic, and then suddenly this "judgment day" - will come tomorrow ...!? request
                      2. depressant
                        depressant 31 May 2021 22: 02
                        +1
                        Are you kidding me, colleague? It's good! Jokes relieve stress wassat ))))
                      3. Intruder
                        Intruder 31 May 2021 22: 09
                        -1
                        Are you kidding me, colleague?
                        Honestly, I didn't even think ... I always have a ready ... "extreme tourist" for 80 liters, with a homemade suspension system, with elements from one interesting "product", which is no longer with me, but how much we spent together unforgettable moments in life on the brink ... no room for error, eh ... fellow , as a memory of practicing all sorts of not very "safe" sports in a crazy youth, already ... bully
                        Precisely, when I finished with all kinds of alcohol (to remove that very andrenaline waste ...), there was only humor ... and jokes, but sometimes black ones, with a gloomy meaning on my lips !!! yes
                      4. depressant
                        depressant 31 May 2021 22: 46
                        0
                        In general, I am talking to a person who has been to hot spots. Hence your foresight and readiness to move forward in full gear on an acute sign of danger, so that the pre-assembled unloading, the backpack - on yourself, the weapon - on the shoulder, the boot knife - in the shin - like that, right? wassat )))
                      5. Intruder
                        Intruder 31 May 2021 22: 59
                        -1
                        In general, I am talking to a person who has been to hot spots. Hence your foresight and readiness to move forward in full gear on an acute sign of danger, so that the pre-assembled unloading, the backpack - on yourself, the weapon - on the shoulder, the boot knife - in the shin - like that, right? wassat)))
                        Nuuuu, somewhere nearby, the geography of tourism, it is so complex and multifaceted wink , because we communicate in public, madam !? drinks Therefore, all this ... and even past appearances and passwords, we will omit bully so that everyone can sleep peacefully in the future !?
                        Hence, your prudence and readiness to move forward in full gear on an acute sign of danger.
                        Life, isn't it a good teacher !? and she cut the "file", so ... for many years of such a stormy activity, say, in different senses ... recourse
                        Well - no, not on the basis of the "sharp sign" (this is already, all the gophers have arrived, collect money for a wooden birch planks, the last "shelter" laughing ), normal (live) heroes - always go around !!! yes And I always have a knife in a pouch, such as: EDC, or on a belt, ... but this depends on the length of the blade and the model, for different tasks ... and ankle boots, hmm ... I preferred, but with experience I came to amazing personal opinion, and now I wear different light and durable shoes, because there are so many different models and types, for any travel hemisphere and weather conditions / terrain ...
                      6. Intruder
                        Intruder 31 May 2021 23: 04
                        -1
                        move out in full gear, so that the pre-assembled unloading, backpack - on oneself, weapons - on the shoulder
                        It's just that I'm rather a little sly creature who wants to live, a little more than others .., in different unpleasant conditions, that's so self-critical !!! hi
  4. Intruder
    Intruder 31 May 2021 17: 55
    -1
    If at 100 km / h, then "parking" is like hitting a wall?
    at my friend's, on a heavy pickup, the box on a bump switched itself to neutral, then he could not drive for two days, the service did not find anything, and on the third day he just sold this car, and breathed freely, and so .. .if the servo turned into a parking lot, 2,5 tons would have screwed up ... and even hanging on a belt with a chest injury, burying my face in the pillow, is so-so amusement at night, on a country road where there is no cellular connection in that forest area , even for the USA, one northern state on the border with Canada!
  • nobody75
    nobody75 31 May 2021 16: 57
    -1
    Greetings! What's wrong with the pumps? In my opinion, they work via bluetooth from a smartphone ... And it already goes to the network ... What's there to break?
    Sincerely
    1. Intruder
      Intruder 31 May 2021 17: 12
      -1
      What's wrong with the pumps?
      and if there is an option for manual adjustment, depending on the state, glucose load, namely - to increase or decrease a single dose and control via your smartphone or watch, also by bluetooth, which is not very good at all, so a secure protocol actually !!! 25-30 units of short insulin one time, within 30-60 minutes and will already get sick if he did not eat carbohydrates normally or, when playing sports, a bicycle or just a light jog in the park, did not take a bar or soda with sugar and a kirdyk, until someone will call an ambulance and find out that a priest is needed !!!
      1. nobody75
        nobody75 31 May 2021 17: 50
        0
        The current version of bluetooth is well protected, and access to manual settings can be protected by biometrics.
        Sincerely
        1. Intruder
          Intruder 31 May 2021 18: 02
          -1
          The current version of bluetooth is just well protected
          "Not bad", not the right level for trusting your life and health, especially if such a disease as type I diabetes mellitus is insulin-dependent .., and there are a lot of restrictions and the risk is constant at any moment of life, as in "dancing on a barrel of gunpowder with a detonating cord ", I didn't just write about a pacemaker and an insulin pump above ...
          1. nobody75
            nobody75 31 May 2021 18: 15
            0
            Well, someone broke the channel between the pump and the smartphone ... Will he be able to issue commands? Of course not! He has nothing to sign them with!
            Sincerely
            1. Intruder
              Intruder 31 May 2021 18: 25
              -2
              He has nothing to sign them with!
              The first thing that came to mind recently: The vulnerability received the identifier CVE-2020-0022, it is typical for all devices running Android 8 Oreo or Android 9 Pie (possibly on older versions of the operating system). On Android 10, a jailbreak attempt causes Bluetooth to hang. Google has already released the February Android update that fixes the CVE-2020-0022 vulnerability. However, the problem is that most users do not receive the latest security patches, so they remain at risk.
              The worst thing is that the owners of Android smartphones constantly use Bluetooth accessories and may not even be aware of the problem of hacking, an attacker only needs to know the Bluetooth MAC address of the device. ERNW experts advise turning on Bluetooth in public places only when necessary, not making your gadget visible to others and not scanning for nearby Bluetooth accessories.
              1. nobody75
                nobody75 31 May 2021 18: 31
                -1
                CVE-2020-0022
                Yes, this is a reassurance! It will not give you an error that occurs when fragmentation of packages, execute the code with root rights, especially if you did not receive them on purpose! And where will this code be executed? On the pump, on the headphones? With respect
                1. Intruder
                  Intruder 31 May 2021 18: 38
                  -2
                  root rights, especially if you didn't get them on purpose!
                  curve root, in the hands of the boy Vasya, who daddy's smart decided to take to play in PUBG, with all sorts of "left" cheat generators and optimizers !? How simple, the possibility ... of compromising the target system ... by the user himself!
                  1. nobody75
                    nobody75 31 May 2021 18: 42
                    0
                    Diabetic dad will give Vasya his phone to play with? Can the boy Vasya get the root rights on it? And then an evil hacker will turn out to be in the epsilon neighborhood, who will change the mac address and execute the code with root rights on Vasya's phone and load the backdoor. And the built-in antivirus will look melancholy at all this ...
                    Don't you think there are too many coincidences?
                    Sincerely
                    1. Intruder
                      Intruder 31 May 2021 19: 07
                      -1
                      Don't you think there are too many coincidences?
                      more than three - already a pattern !? wink
                      Diabetic dad will give Vasya his phone to play with?
                      He is a politician with a wearable pomp, under 60 years old (for example ... just), but he didn't give his son a phone, the young hacker himself tried to practice on the folder pipe or did the folder's enemies get used to it? up to a heap (inheritance and other sinful things (the usual revenge ... of a fucking child, and the golden youth does not see the banks, ... after all, there are such, in the families of rich and famous, respected people ... yes ) ???
                      And the built-in antivirus will look melancholy at all this ...
                      Casper or Dr.Web !? or maybe NOD32 with McAfee ??? wink They will give a guarantee, for sure, especially if this is a corporate pipe ... with some "things" that other people need so "tasty" ...
                    2. nobody75
                      nobody75 31 May 2021 20: 36
                      0
                      With a probability of 60%, Vasya will turn the phone into a brick when trying to take possession of the phone with the rights of root. McAfee doesn’t sell the secrets of politicians, and what could be important for a 60-year-old politician on a corporate pipe? All correspondence in messengers to other people, if desired, is so available, because it is on the servers. Weight people, if desired, will even establish the calls and the location of the smartphone without access to the device ...
                      Sincerely
                    3. Intruder
                      Intruder 31 May 2021 21: 54
                      -1
                      With a probability of 60%, Vasya will turn the phone into a brick when trying to take possession of the phone with the rights of root.
                      If other "smart comrades" helped him, then with a probability of 90% he will be able to do it overnight and even with the corporate pipe of his folder, under the guidance of "skillful hands", of course !!!
                      McAfee doesn’t sell the secrets of politicians, and what could be important for a 60-year-old politician on a corporate pipe?
                      and who, said what exactly was selling secrets .., there was no such thing! But to trust all the whole "antivirus" products of even well-known brands, so yourself an idea ...!? 100% guarantee, only the Lord God gives and then not to everyone and not always ... winked
                      And what maybe ... I had in the past ... one interesting thing, from a past client (but this is ... so "fantasy" on the topic of our communication ... just ... "fantasy" wink ) so, there in the BlackBerry Passport, on an encrypted section, a lot of very interesting information was discovered, of course I had to delete everything and forget the way to get yes ... with the methods that were used ..., for their own personal security, first of all and for the sake of the principles of professional ethics of working with clients ... And you say that 60-year-old people respect aspects of information security when working with mobile devices of corporate use ... laughing Or do we live in different Universes !? request
                      All correspondence in messengers to other people, if desired, is so available, because it is on the servers. Weight people, if desired, will even establish the calls and the location of the smartphone without access to the device ...

                      Lies, then lies .., but not everything and it is possible, just a person used local storage, without synchronization over the network, just stupid .., like notes with stable cryptography, and then deleted the old information manually .. and changed the device to another, type: fell / burned or stolen in a store, or in a cafe from a pocket of clothes, and again primitive situations, we discuss in public ...
        2. Intruder
          Intruder 31 May 2021 18: 31
          -1
          Of course not! He has nothing to sign them with!
          1. The Bluetooth address can also be retrieved during the connection process, since the address itself is not encrypted, even if the user chooses to encrypt the connection. This is the most important problem with the current Bluetooth specification. Frequency hopping (1600 hops / sec) provides basic protection for BT devices when operating in unencrypted mode. Be that as it may, the frequency hopping used in the VT is pseudo-random, which means that with the necessary equipment, it is possible to synchronize with the hopping model used by the two VTs during a call. In addition, the sequence of hops applies to all devices of the piconet, which can also help an attacker, devices that allow intercepting BT connections and analyzing them are already available on the market (the approximate price of such a device is $ 9500), so far only the price, so the mass acquisition is a little embarrassing devices to most of the "wild" (sorry for the professional slang) and black hats ...

          2. The paring process is implemented in most phones in such a way that it leads to another danger. The list of found BT devices on the mobile phone is displayed only as names, but does not show a valid BT address!
    2. Intruder
      Intruder 31 May 2021 18: 19
      -1
      and access to manual settings can be protected by biometrics.
      And you, on your smartphone, have in the system settings, it is this option - blocking or access to network interfaces (wireless connections by default ..), via ID (finger or face of the authorized user) !? You can model, then the software version of this ... device, in the studio ... plizzz! ??? yes
      1. nobody75
        nobody75 31 May 2021 18: 23
        0
        Android 10 And I myself wrote the lock in Java ... What's the problem there? Is it difficult to add biometrics control to a mobile application? But I did not write about network interfaces, but about pump control. It's easy to add biometrics to it.
        Sincerely
        1. Intruder
          Intruder 31 May 2021 18: 35
          -1
          Is it difficult to add biometrics control to a mobile application?
          It is not difficult, but if the contract developer did not do this from the word at all, or this was not in the final version of the TK, and the production has already left wink !? Toda, as long as there are no first victims and lawsuits, no one will flinch !!!
          1. nobody75
            nobody75 31 May 2021 18: 38
            0
            Do you know the developers who work on the TK? Personally, I rarely read it! Ihmo, I'm smarter than a project manager ... Ok, they'll hack bluetooth, but that's just transport! And commands follow it and they are signed ...
            Sincerely
            1. Intruder
              Intruder 31 May 2021 18: 59
              -1
              Do you know the developers who work on the TK?
              Well, there are some, I also look a little, but sometimes I peep with one eye in complex projects with all sorts of pieces of iron ... it happens! crying
              Ihmo, I'm smarter than a project manager ...
              Well, we carry ours in our arms, while he has been plowing for the second year without jambs, he is a smart guy and grasping, even for his not young age ...
              And commands follow it and they are signed ...
              Eh, apparently you did not meet with a Chinese genius, I once grabbed, almost a stroke, under a fat contract ... they made such a mess so that the price tag of the product could be adjusted, and the product itself had very difficult working conditions in a complex interference-protected mode and compatibility with other products! I can’t write exactly with the parameters yet in public, I hope for reasons understandable to any specialist ...! repeat
              1. nobody75
                nobody75 31 May 2021 20: 39
                0
                there they made such a mess so that the price tag of the product was adjusted

                Interesting ...
                Sincerely
                1. Intruder
                  Intruder 31 May 2021 23: 19
                  -1
                  Interesting ...
                  Well, yes ... "interesting", only it could cost, a lot of money - for different people, it is called: "there are interesting things, but there are interesting possibilities for these things" !!! winked
                2. nobody75
                  nobody75 1 June 2021 08: 30
                  0
                  Don't you think that we have turned the site into a cyberforum? A little more - and will we start exchanging links to git?
                  Sincerely
                3. Intruder
                  Intruder 1 June 2021 10: 46
                  -1
                  Don't you think that we have turned the site into a cyberforum? A little more - and will we start exchanging links to git?
                  Well ... I hope the moderators will understand that we are communicating on the topic of this article ... yes Links to git, but why so fall into a narrow area .., and who will be interested here! ??? wink
                  Mutually... hi
                  With respect! drinks
                4. nobody75
                  nobody75 1 June 2021 11: 26
                  -1
                  Excuse me, but does your developer write for controllers in C ++?
                  Sincerely
                5. Intruder
                  Intruder 1 June 2021 14: 29
                  -1
                  writes under controllers?
                  under what exactly !? C and C ++, depending on what projects and architectures for embedded systems. Maybe also Verilog (e), for FPGA-shki ... wink
                6. nobody75
                  nobody75 1 June 2021 18: 26
                  0
                  I'm talking about controllers ... I had to write for them before, when I was young and curly ...
                  Sincerely
                7. Intruder
                  Intruder 1 June 2021 19: 50
                  0
                  I had to write for them before, when I was young and curly ...
                  Hmm, and under what !? If it `s not a secret... wink
                8. nobody75
                  nobody75 1 June 2021 20: 54
                  0
                  Under avr .... At the beginning of 2000 it was ... Now I play with pi children's robots ...
                  Sincerely
  • Vladimir Mashkov
    Vladimir Mashkov 31 May 2021 10: 07
    +4
    The article is interesting and useful. Many thanks to Eugene for her!

    On the cyber front, all of us who go online are fighters and stand for the light or dark side. Most are privates, and a few are officers. I'm not talking about those funny high ranks that some have on the VO (many of them are simply screwed by friends to each other by acquaintance with the approval of the patron), but about valid the importance of each fighter of the information front. After all, some go out just to get publicity, others - to quarrel, throw out dissatisfaction with their lives, and still others - are fighting "windmills". Of real the right fighters fighting for the truth, unfortunately, not enough. Yes and no, many of them have no free time: they are busy deed.
  • ccsr
    ccsr 31 May 2021 12: 26
    0
    In 2021, an article was published in one of the issues of the Military Thought publication, in which the information threat from the West for Russia becomes one of the key for the period 2030-2040. That is, we have a much better chance of becoming a victim of a giant infrastructure collapse caused by a cyber attack than of being killed by nuclear or conventional weapons.

    The authors of the article apparently did not think that this collapse would be specially caused in order to then destroy our country with nuclear weapons, or at least destroy all centers of government, including our central government, in order to destroy the integrity of the country and its economy ...
    Otherwise, they will not achieve anything, our people may not endure such attacks, and the current sanctions against us have led nowhere. So those who think that the main threat to us will come from cyberattacks are mistaken - on the contrary, the destruction of us with weapons of mass destruction will be the main goal, the achievement of which will be the previous cyberattack.
    Strange, but it was assumed in the last century, the authors of the article are apparently not aware of the military analytics of some structures of the Ministry of Defense.
    1. nobody75
      nobody75 31 May 2021 14: 49
      0
      The authors of the article apparently did not think that this collapse would be specially caused in order to then destroy our country with nuclear weapons, or at least destroy all centers of government, including our central government, in order to destroy the integrity of the country and its economy ...

      Yes, yes .... Today my post on one of the ZAO 1c channels was deleted ... I wrote to them that the encryptor mentioned in the article does not encrypt backups of infobases made through the configurator ... So what about the economy?
      Sincerely
      1. nobody75
        nobody75 31 May 2021 15: 13
        0
        Let me remind you once again - this encryptor hails from the outskirts ... they love file databases there!
        Sincerely
  • Radikal
    Radikal 31 May 2021 14: 46
    0
    Only the very cold-blooded will be able to restrain themselves ...
    Or very cowardly .... sad
    1. nobody75
      nobody75 31 May 2021 14: 59
      +1
      Cowardice and meanness for cyberwar are positive qualities ... As the saying goes "Kill and Leave"
      Sincerely
  • boni592807
    boni592807 31 May 2021 17: 04
    0
    I agree with the author. But... hi . Colleagues, what is the future.?!.. Not even funny! No. I'll try aboutappreciate the "timing" set by the author, through Chernomyrdin's aphorism " "... nebylo, nebylo .. and AGAIN !!! ..." belay Remember! At least a nuclear power plant in Iran (remember WHEN ?!), and how many times have our state sites at least hung - incl. Ministry of Internal Affairs, Adm. The President and .... Perhaps someone knows more .. Why scare you with a "joke" played by "their" hackers in the United States, when the light was turned off in one of the major cities (at least 8 years). Тwe went to pogroms and organizing shops and ... Then there was Moscow, on TV they "praised" the understanding of the Russians. "They (the USA) robbed, and ours (RF) were engaged in demography ...". The process has been going on for a long time, the question is in its mass application. ... But, judging by the development of the situation with Western partners and the "unambiguous" use of hardware and software only from Western partners in all fool , except (hopefully) the FSB and the Ministry of Defense (higher protection and its own) soldier . "Interesting" times await us. hi R.S. It's even inconvenient to remind about the "little things" of the current results of digitalization - see options for fraud, blue whales and options (Kazan) ...
  • Radikal
    Radikal 31 May 2021 17: 47
    0
    Quote: nobody75
    Cowardice and meanness for cyberwar are positive qualities ... As the saying goes "Kill and Leave"
    Sincerely

    I can agree, provided that the blow must be struck first! bully hi
    1. nobody75
      nobody75 31 May 2021 17: 56
      +1
      To do this, you need to systematically deal with software and hardware !!!
      Sincerely
      1. Intruder
        Intruder 31 May 2021 18: 06
        -1
        To do this, you need to systematically deal with software and hardware !!!
        There are always more black hats on the contract than ethical WhiteHats, both of them are systematically engaged in ... both phreaking and savvy !!! hi
        1. nobody75
          nobody75 31 May 2021 18: 11
          0
          Forgive me, but what category do you belong to?
          Sincerely
  • Radikal
    Radikal 31 May 2021 17: 57
    +1
    Quote: nobody75
    To do this, you need to systematically deal with software and hardware !!!
    Sincerely

    Who would argue .... soldier
  • Victor Tsenin
    Victor Tsenin 31 May 2021 21: 52
    +1
    > That is, a simple calculator, according to Turing's theory, can be considered an example of "artificial intelligence".

    There speech is everything that the brain can do, so such a thesis is nevertheless extremely simplified.

    In fact, cyber threats are an important point in that absolutely insufficient attention is paid to security (no updates, banal standard login pairs, etc.). On this occasion, there has long been a wonderful study on 3dnews, where, using the examples of the ocean fleet, the complete carelessness of carriers was shown in terms of a completely simple interception of navigation systems and control of huge ships. I doubt that anything has changed since then, so the case in Suez can be viewed from a new angle)
    What I mean is that in a huge number of cases, hackers come to their own home, without further ado with the introduction, waiting, backdoors and similar moments.
    1. nobody75
      nobody75 1 June 2021 11: 28
      -1
      Turing talked about the fact that it is impossible to guess with whom you are communicating - with a person or with a machine.
      Sincerely
  • Mikhail3
    Mikhail3 2 June 2021 10: 17
    0
    First of all, about the vulnerability of the modern civil world and the limitless possibilities of cybercriminals.
    It is impossible, well, it is simply impossible not to laugh at the situation that has arisen! And what were the creators and, most importantly, the beneficiaries of the "digital world" hoping for ?! What is this "digital economy" anyway? Well, if you do not pay attention to the lies, and especially to the illiteracy and complete inability to think of the singers of this very digitalization, then the picture is as follows.
    First, the "digital economy" is professional begging. People who do not produce anything and do nothing at all, in various ways diligently beg for money from those who work. Little by little. But since there are really still a lot of workers, and they are not fed up with bloggers, streamers, remote makeup artists and virtual sex of varying degrees of abomination, the exhaust is quite decent.
    And secondly. Here the dog is digging with all his might. Basically, the profit was brought by the opportunity to dramatically reduce the number of real specialists employed in the economy. They managed to throw millions and millions of pros out into the street, and the rest of them got their wages low. Victory!
    After all, why keep engineering and technical personnel at the enterprise itself? In many enterprises? It is enough to have one central office, in which one team of specialists will be placed, who will partially control the equipment remotely, and partially give instructions to technicians (who receive dozens of times less) on the spot! The employees in the central office also managed to lower their salaries, on the basis that now "you don't have to get your hands dirty."
    Such a picture is everywhere, around, everywhere. But this management model is critically dependent on communication lines and software availability. At first, hackers tweaked small things. But the further, the more the process takes on scope. Why work for a person, or even more so for a group of people, if they can easily steal as much as they want? And so it began ... The process will grow. The cost of security measures is already approaching the savings achieved through layoffs. But this is just the beginning))