{"id":902,"date":"2009-11-18T00:00:00","date_gmt":"2009-11-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/11\/18\/cyber-war-is-here-and-to-stay-ask-us-china-russia-israel-and-france\/"},"modified":"2021-12-30T11:38:21","modified_gmt":"2021-12-30T11:38:21","slug":"cyber-war-is-here-and-to-stay-ask-us-china-russia-israel-and-france","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/11\/18\/cyber-war-is-here-and-to-stay-ask-us-china-russia-israel-and-france\/","title":{"rendered":"Cyber-war is here and to stay: ask US, China, Russia, Israel and France"},"content":{"rendered":"<p>Major countries and nation-states are engaged in a &#8220;Cyber Cold War,&#8221; amassing cyber-weapons, conducting espionage, and testing networks in preparation for using the Internet to conduct war, according to a new report released by McAfee.  In particular, countries gearing up for cyber-offensives are the US, Israel, Russia, China, and France, says the report, compiled by former White House Homeland Security adviser Paul Kurtz and based on interviews with more than 20 experts in international relations, national security and Internet security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;We don&#8217;t believe we&#8217;ve seen cases of cyber-warfare,&#8221; said Dmitri Alperovitch, vice president of threat research at McAfee.<\/p>\n<p>There have been unauthorized penetrations into government systems since the early ARPANET days and it has long been known that the US critical infrastructure is vulnerable.<\/p>\n<p>However, experts are putting dots together and seeing patterns that indicate that there is increasing intelligence gathering and building of sophisticated cyber-attack capabilities, according to the report titled &#8220;Virtually Here: The Age of Cyber Warfare.&#8221;  &#8220;While we have not yet seen a &#8216;hot&#8217; cyber-war between major powers, the efforts of nation-states to build increasingly sophisticated cyber-attack capabilities and in some cases demonstrate a willingness to use them, suggest that a &#8216;Cyber Cold War&#8217; may have already begun,&#8221; the report says.<\/p>\n<p>Because pinpointing the source of cyber-attacks is usually difficult if not impossible, the motivations can only be speculated upon, making the whole cyber-war debate an intellectual exercise at this point.  For instance, Alperovitch speculates that the July 4 attacks denial-of-service on Web sites in the US and South Korea could have been a test by an foreign entity to see if flooding South Korean networks and the transcontinental communications between the US and South Korea would disrupt the ability of the US military in South Korea to communicate with military leaders in Washington, DC, and the Pacific Command in Hawaii.<\/p>\n<p>http:\/\/en.mercopress.com\/2009\/11\/18\/cyber-war-is-here-and-to-stay-ask-us-china-russia-israel-and-france<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-902","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=902"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/902\/revisions"}],"predecessor-version":[{"id":3389,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/902\/revisions\/3389"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}