Cyberarmies attack ("Publico.es", Spain)

Six laboratories are engaged in the development of technological weapons
According to the great military theorist, Prussian general Karl von Clausewitz (Karl von Clausewitz, 1780-1831), who is still considered a prominent expert in the art of war, “the soldier is called, dressed, armed, trained, he sleeps, eats, drinks and marches only to fight at the proper time and place. ” A few months ago, in France, as well as in the USA, China, Israel, Great Britain and Russia, initialization began, loading up the memory and preparing the soldier to penetrate the enemy’s computers and throw a logical bomb only so that he could fight in the so-called “information war” , Which is already openly conducted between the major world powers.
The French army recently crossed the line at which the line of defense ends and an active offensive begins as part of a virtual war. Six laboratories and at least one of the French Air Force units were ordered to begin developing “digital weapons” that can be used to conduct “offensive operations” in the event of a coordinated attack by the enemy on government websites, internal public administration networks and the most important country information systems.
The development of viruses, trojans and spyware is being conducted legally.
This information became publicly available at the Eurosatori-2010, the world's largest armament for ground forces, held from 14 to 18 in Paris in June, and was also announced by the Secretary General of the Presidential Chancellery, Claude Gueant, at the Congress of the Supreme Council of the New Center for Military Strategic Studies, established by Nicolas Sarkozy.
The French military apparatus began developing viruses, trojans and spyware that penetrate users' computers so that they do not know about it. All this is necessary in order to be able to “neutralize the enemy’s centers from within”, “attack the enemy directly in the zone of aggression with the help of offensive operations”, and also “pursue and destroy aggressors”. Such tasks were set in the development of a strategic concept in the new White Paper on Defense (French doctrine on defense and national security), released in 2008 year.
Six private laboratories CESTI (CESTI), under state control, received an order for the development of "digital weapons". According to the laws of France, an attempt to penetrate into someone else's information system or its destruction is considered a criminal offense. Nevertheless, the General Secretariat of the National Defense of France found a loophole in the law: the CELL laboratories, as part of work on systems to protect against hacker attacks, have the right to develop "tests for penetration into the information system." And in order to conduct such experiments in practice, they can create and maintain a “digital offensive weapon”.
France's foreign intelligence service hires around 100 professionals annually
On the other hand, according to available data, the development of digital offensive weapons is being carried out by at least one of the specialized units of the French Air Force at 110 airbase at Creil, north of Paris. The General Directorate of External Security of France (DGSE) has received an order to hire about 100 engineers a year to develop algorithms to penetrate third-party servers. First of all, specialists in the field of downgrading (capable of unnoticeably replacing a protected protocol with a less secure one), “reverse thinking” (analyzing and restoring enemy encryption algorithms), and searching for vulnerabilities of protected access systems are in demand. Only applications submitted by regular mail are considered.
Thales (Thales) is negotiating with NATO to create a "cyber bunker"
We can only guess what is really going on in the world under the heading "top secret". However, some information still leaks. For example, the French high-tech giant Thales does not hide the fact that it is negotiating with the French and NATO governments about the possibility of deploying cyber-bunkers Cybels and Nexium in the military sphere. “It will cost France several hundred million euros,” said the French Navy Colonel Stanislas de Maupeou, responsible for cyber defense in Thales and a former employee of the General Secretariat of National Defense of France.
What the Secretary General of the Elysée Palace, Claude Gueant, characterizes as "mental acuity" and "the ability to analyze and correctly interpret," helps in realizing what the armies of the United States, China, Britain, France, Russia and Israel are working on. imperceptible signals sent by our invisible and many-sided enemies. ”
The destruction that cyber attacks can cause is quite comparable in scale to the catastrophic effects of real bombardments.
Different scenarios
The main minds of the general staffs are developing three main scenarios for the conduct of cyberwar.
The first and most dangerous is the attack on the so-called SCADA (SCADA), that is, information management systems of the most important public facilities: the nuclear industry, railways and airports. The military departments reasonably assume that the destruction to which such attacks “in the next fifteen years” could lead, in accordance with the French White Paper on Defense, is quite comparable in scale to the disastrous consequences of real bombardments.
The second scenario involves an attack on key Internet resources: websites and internal networks of government agencies (presidential administration, police, tax authorities and hospitals). Hacking these systems will inevitably lead to chaos and a decline in the country's prestige in the eyes of fellow citizens and foreign countries.
The third scenario envisages the use of some cyber attack methods to enhance the effectiveness of traditional military operations.
To date, many large civil corporations have used cyber-bunkers of the Sibel and Nexium type in their information structures. These are systems that analyze all incoming and outgoing information flows in real time and are able to automatically detect up to 75 millions of “events”. Based on these “events”, hundreds of millions of processes are scanned to determine if they can be qualified as an attack attempt. As a result, 85 “hypothetical attacks” are selected daily, which are analyzed more thoroughly. Of these, from “4 to 10“ events ”are daily sent for additional testing, which is carried out by 400 engineers, located, for example, in Thales“ cyber-bunkers ”.
For private enterprises, such a system provides a real opportunity to defend against hacker attacks. For military structures, digital warfare centers provide a strong rear, capable of real-time deterrence of attacks from armored servers, identify a chain of zombie computers remotely controlled from a single point, identify the attacker and counterattack.
According to Stanislas de Maupeou, “cyberspace has become a battlefield, one might even say, the main battlefield, because today the actions of the government or the army on the real battlefield are completely dependent on digital networks.”
According to a number of media outlets attending the annual information security conference (SSTIC), which took place on June 9 in Rennes (France), Bernard Barbier, technical director of the French Directorate General for External Security (DGSE), said that France lags behind China by 10 years, and confirmed the government’s intention to do everything possible to narrow the gap. It really is. And since most of the offensive operations are prohibited by law, they will be conducted veiled and, if possible, from the territory of other countries.
The most famous cyber attacks
2003 g. "Titanium rain"
In 2003, US government and military sites experienced a series of cyber attacks, called the Titanium Rain. Then suffered the sites of NASA and the Corporation Lockheed Martin. China was suspected of attacking.
2007 Russia v. Estonia
In May 2007, unprecedented attacks were experienced by the websites of Estonian ministries, banks and media. Presumably, the squall of attacks was Russia's response to the movement of the monument to Soviet soldiers in Tallinn. Cyber attacks on Estonian websites led to the need to create a system of global cyber defense, which began to be implemented by US and NATO military experts.
2008 Russia v Georgia
During the Russian peacekeeping operation in Georgia, many Georgian government sites were hacked using the Trojan version, BlackEnergy. Russia, which was suspected of organizing this attack, managed, in particular, to take control of the website of the President of Georgia, on the main page of which a photo collage appeared, consisting of photographs of Mikhail Saakashvili and Adolf Hitler.
2009 Iraq
US soldiers in Iraq captured a militant from a Shiite radical group and found a series of photographs taken by flying spy robots on his computer. According to experts, pirates took control of the information system for transmitting images.
Information