TIMES.KY

Cayman Islands, Caribbeanand International News
Tuesday, Apr 23, 2024

The age of cyber warfare is a threat to us all

The age of cyber warfare is a threat to us all

In his recent State of the Nation address, Vladimir Putin said that if challenged by another state, Russia’s response would be swift, harsh and ‘asymmetrical’. An unusual word, but anyone who has been paying attention to the developments in cyber warfare will know what he means.
Despite Russia pulling back more than 100,000 soldiers positioned on the Ukrainian border, British troops will shortly join Ukrainian counterparts to prepare for any misadventures from the Kremlin. And if a conflict were to escalate, the action may not be limited to faraway battlefields. It might involve cyberattacks, which would hit us at home. This, too, is a threat the Ministry of Defence seeks to prevent.

For years, the MoD has treated cyber warfare as a dangerous possibility, but in the next conflict — wherever it might be — British officials expect cyberattacks to be the new reality. ‘The threats of today are different from those we are used to,’ said the government’s Defence Command paper, which was published last month. ‘Our adversaries no longer only seek to challenge us in open, large-scale warfare, but instead seek to use activities below the threshold of open war… new technologies have created more potential ways for our enemies to do us harm.’

The risks are particularly acute for Britain: we are the second-most targeted country in the world for hacks after America. In the past four months, more than 100 British schools have been attacked by unidentified hackers using ransomware, which works by encrypting all the files on computers and then demanding a ransom to be paid in untraceable cryptocurrency. Schools in London, South Gloucestershire, Cambridgeshire, Coventry and Peterborough were infiltrated by gangs who demanded payment to return the use of their computer networks.

The Woodland Trust was also targeted in December by ransomware hackers. The attack meant that the charity was un-able to accept new memberships and many people complained of being unable to contact the organisation during January and February. In March, high-street clothes chain FatFace paid a £1.45 million ransom to hackers. The malware locked the firm out of its systems and harvested 200GB of its data, including employees’ bank details, national insurance numbers and the personal details of customers.

The NHS is an obvious target for -hackers. A state-sponsored North Korean cyber gang was blamed for wreaking havoc four years ago with its WannaCry virus: 19,000 appointments were cancelled following the attack, costing £92 million. There were no deaths, but medical facilities from intensive care to heart monitoring and the operation of insulin pumps are all, in theory, hackable. In September, the digital infrastructure of Düsseldorf University Hospital was severely hit during a ransomware attack, including the ambulance computer system. One woman died when her ambulance was redirected to another hospital 30 miles away.

APT41, a Chinese state-sponsored group, has been blamed for more than 100 cyber-attacks up to last year. In September, the FBI issued a poster featuring the faces of five APT41 members they wanted to question over ransomware raids in America, Britain, Australia and Taiwan. APT41 has also targeted UK government networks. Recently it was revealed that spies at GCHQ have warned the chairman of the foreign affairs select committee, Tom Tugendhat, that the parliamentary email system is not secure, following Chinese cyberattacks on him and other British politicians.

But it isn’t only large-scale state attacks that pose a risk: gadgets connected to the internet in our homes are vulnerable. Known as the ‘Internet of Things’, or IoT, these devices (there are an estimated 75 million worldwide) include smart watches, home thermostats, smart meters, wifi doorbells, baby monitors and smart home controllers such as Alexa or Google Home. The majority are run on cheap, generic computer chips that are easily hacked.

IoT hackers can do more than damage homes and steal data. Smart household devices can be turned into internet bots (which run automated tasks online) and harnessed to form large, powerful ‘botnets’ that make devices work in sync to hack data. Three years ago, in an attack known as Dyn, malware infected hundreds of -thousands of computers and made them continually search the internet for vulnerable IoT devices.

Because people often do not change the usernames or passwords that come with their gadgets, the default settings allow them to be easily hacked. The resulting wide-reaching viruses can blast targeted -computers with so much information that they crash. The Dyn attack took down large portions of the internet including Twitter, Netflix, the Guardian, CNN and Reddit.

More worryingly, cyberattacks can result in direct physical destruction: dams, industrial plants and critical infrastructure are all at risk. ‘Warfare is changing at breakneck speed and the arsenal of weapons available to our enemies and adversaries is changing with it,’ one senior defence source says. ‘A cyberattack on our institutions or critical national infrastructure could cause major disruption to our economy and our public services, and threaten our national security.’

In February, for example, there was a botched attempt to poison the water supply of the city of Oldsmar in Florida. An unidentified hacker attempted to raise the levels of sodium hydroxide in the water from 100 parts per million to a fatal 11,100 parts per million. A plant manager intervened and returned the system to normal. If the hack had gone unnoticed, it would have taken between 24 and 36 hours for the poisonous water to reach people’s homes.

It is also possible to take down a country’s entire physical infrastructure by sabotaging the massive undersea cables that carry more than 90 per cent of the world’s communications. The MoD expressed concerns that this poses an existential threat to the UK after intelligence services noted that Russian submarines are ‘aggressively operating’ near Atlantic cables. The recent defence review, in fact, is set to order a new Royal Navy surveillance ship with under-water drones to monitor the situation.

Then there is the issue of power grids. Russian hackers wiped out the electricity supply in Ukraine in 2015, leaving hundreds of thousands of civilians without power. A US report revealed that the control centres were still not fully operational two months later. Another more complicated cyberattack on the power grid followed in late 2016. The evidence pointed to Russia’s secret service.

Even geostationary satellites are vulnerable to attack either by jamming or by direct assault. Russia, China and the US have all demonstrated capability to bring down satellites with missile strikes — a ‘Pearl Harbor’ in space is not such a far-fetched notion.

Another issue is the development of artificial intelligence warfare. The defence review proposed the use of AI in the development of unmanned autonomous weapons systems, including swarms of drones. While this is in line with developments in Russia, China and the US, it nevertheless rings alarm bells. Such weapons operate on their own to select and attack targets. Imagine the destructive potential they could have in the hands of hackers.

If we were to experience a large cyber-attack that targeted civilians, it’s hard to know how we could respond under current warfare guidelines. The International Committee of the Red Cross is responsible for maintaining the laws of war, such as the Geneva Conventions. Together with the International Court of Justice, it shares the view that laws of war should limit cyber operations during armed conflict just as they limit other weapons and means of warfare in such situations. But it’s less clear how the laws stand when cyber warfare occurs outside armed conflict.

Will laws protect us any more than they protected civilians during the Blitz? It seems unlikely. In 2018, the Secretary--General of the UN, António Guterres, called for global rules to minimise the impact of electronic warfare on civilians. But nothing has happened since. During the Blitz, it was clear who was responsible for the bombers flying over Britain. But when it comes to cyber-attacks, attribution is difficult, or impossible. Attacks can be conducted through a network of thousands of machines located in many countries. Accusations are generally based on circumstantial evidence and signature patterns of behaviour. ‘The lines denoting acts of war have been blurred,’ the senior defence source says. ‘This is a new threat to our way of life, the security we take for granted and the freedoms we hold dear.’

Given the devastating consequences of cyber warfare, there appears to be little in the way of contingency planning. In the coming years, we could face devastating consequences as a result of our dependency on the internet. Indeed, it’s not unthinkable that, in the event of war today, cyberattacks could leave a nation under conditions similar to a medieval siege. Some believe the answer is to create impenetrable security systems — but there’s an old saying in computer science circles that ‘the only secure machines are ones that haven’t been hacked yet’.
#ANT 
Newsletter

Related Articles

TIMES.KY
0:00
0:00
Close
Paper straws found to contain long-lasting and potentially toxic chemicals - study
FTX's Bankman-Fried headed for jail after judge revokes bail
Blackrock gets half a trillion dollar deal to rebuild Ukraine
Israel: Unprecedented Civil Disobedience Looms as IDF Reservists Protest Judiciary Reform
America's First New Nuclear Reactor in Nearly Seven Years Begins Operations
Southeast Asia moves closer to economic unity with new regional payments system
Today Hunter Biden’s best friend and business associate, Devon Archer, testified that Joe Biden met in Georgetown with Russian Moscow Mayor's Wife Yelena Baturina who later paid Hunter Biden $3.5 million in so called “consulting fees”
Singapore Carries Out First Execution of a Woman in Two Decades Amid Capital Punishment Debate
Google testing journalism AI. We are doing it already 2 years, and without Google biased propoganda and manipulated censorship
Unlike illegal imigrants coming by boats - US Citizens Will Need Visa To Travel To Europe in 2024
Musk announces Twitter name and logo change to X.com
The politician and the journalist lost control and started fighting on live broadcast.
The future of sports
Unveiling the Black Hole: The Mysterious Fate of EU's Aid to Ukraine
Farewell to a Music Titan: Tony Bennett, Renowned Jazz and Pop Vocalist, Passes Away at 96
Alarming Behavior Among Florida's Sharks Raises Concerns Over Possible Cocaine Exposure
Transgender Exclusion in Miss Italy Stirs Controversy Amidst Changing Global Beauty Pageant Landscape
Joe Biden admitted, in his own words, that he delivered what he promised in exchange for the $10 million bribe he received from the Ukraine Oil Company.
TikTok Takes On Spotify And Apple, Launches Own Music Service
Global Trend: Using Anti-Fake News Laws as Censorship Tools - A Deep Dive into Tunisia's Scenario
Arresting Putin During South African Visit Would Equate to War Declaration, Asserts President Ramaphosa
Hacktivist Collective Anonymous Launches 'Project Disclosure' to Unearth Information on UFOs and ETIs
Typo sends millions of US military emails to Russian ally Mali
Server Arrested For Theft After Refusing To Pay A Table's $100 Restaurant Bill When They Dined & Dashed
The Changing Face of Europe: How Mass Migration is Reshaping the Political Landscape
China Urges EU to Clarify Strategic Partnership Amid Trade Tensions
Europe is boiling: Extreme Weather Conditions Prevail Across the Continent
The Last Pour: Anchor Brewing, America's Pioneer Craft Brewer, Closes After 127 Years
Democracy not: EU's Digital Commissioner Considers Shutting Down Social Media Platforms Amid Social Unrest
Sarah Silverman and Renowned Authors Lodge Copyright Infringement Case Against OpenAI and Meta
Italian Court's Controversial Ruling on Sexual Harassment Ignites Uproar
Why Do Tech Executives Support Kennedy Jr.?
The New York Times Announces Closure of its Sports Section in Favor of The Athletic
BBC Anchor Huw Edwards Hospitalized Amid Child Sex Abuse Allegations, Family Confirms
Florida Attorney General requests Meta CEO's testimony on company's platforms' alleged facilitation of illicit activities
The Distorted Mirror of actual approval ratings: Examining the True Threat to Democracy Beyond the Persona of Putin
40,000 child slaves in Congo are forced to work in cobalt mines so we can drive electric cars.
BBC Personalities Rebuke Accusations Amidst Scandal Involving Teen Exploitation
A Swift Disappointment: Why Is Taylor Swift Bypassing Canada on Her Global Tour?
Historic Moment: Edgars Rinkevics, EU's First Openly Gay Head of State, Takes Office as Latvia's President
Bye bye democracy, human rights, freedom: French Cops Can Now Secretly Activate Phone Cameras, Microphones And GPS To Spy On Citizens
The Poor Man With Money, Mark Zuckerberg, Unveils Twitter Replica with Heavy-Handed Censorship: A New Low in Innovation?
Unilever Plummets in a $2.5 Billion Free Fall, to begin with: A Reckoning for Misuse of Corporate Power Against National Interest
Beyond the Blame Game: The Need for Nuanced Perspectives on America's Complex Reality
Twitter Targets Meta: A Tangle of Trade Secrets and Copycat Culture
The Double-Edged Sword of AI: AI is linked to layoffs in industry that created it
US Sanctions on China's Chip Industry Backfire, Prompting Self-Inflicted Blowback
Meta Copy Twitter with New App, Threads
The New French Revolution
BlackRock Bitcoin ETF Application Refiled, Naming Coinbase as ‘Surveillance-Sharing’ Partner
×