Budapest Post

Cum Deo pro Patria et Libertate
Budapest, Europe and world news

The age of cyber warfare is a threat to us all

The age of cyber warfare is a threat to us all

In his recent State of the Nation address, Vladimir Putin said that if challenged by another state, Russia’s response would be swift, harsh and ‘asymmetrical’. An unusual word, but anyone who has been paying attention to the developments in cyber warfare will know what he means.
Despite Russia pulling back more than 100,000 soldiers positioned on the Ukrainian border, British troops will shortly join Ukrainian counterparts to prepare for any misadventures from the Kremlin. And if a conflict were to escalate, the action may not be limited to faraway battlefields. It might involve cyberattacks, which would hit us at home. This, too, is a threat the Ministry of Defence seeks to prevent.

For years, the MoD has treated cyber warfare as a dangerous possibility, but in the next conflict — wherever it might be — British officials expect cyberattacks to be the new reality. ‘The threats of today are different from those we are used to,’ said the government’s Defence Command paper, which was published last month. ‘Our adversaries no longer only seek to challenge us in open, large-scale warfare, but instead seek to use activities below the threshold of open war… new technologies have created more potential ways for our enemies to do us harm.’

The risks are particularly acute for Britain: we are the second-most targeted country in the world for hacks after America. In the past four months, more than 100 British schools have been attacked by unidentified hackers using ransomware, which works by encrypting all the files on computers and then demanding a ransom to be paid in untraceable cryptocurrency. Schools in London, South Gloucestershire, Cambridgeshire, Coventry and Peterborough were infiltrated by gangs who demanded payment to return the use of their computer networks.

The Woodland Trust was also targeted in December by ransomware hackers. The attack meant that the charity was un-able to accept new memberships and many people complained of being unable to contact the organisation during January and February. In March, high-street clothes chain FatFace paid a £1.45 million ransom to hackers. The malware locked the firm out of its systems and harvested 200GB of its data, including employees’ bank details, national insurance numbers and the personal details of customers.

The NHS is an obvious target for -hackers. A state-sponsored North Korean cyber gang was blamed for wreaking havoc four years ago with its WannaCry virus: 19,000 appointments were cancelled following the attack, costing £92 million. There were no deaths, but medical facilities from intensive care to heart monitoring and the operation of insulin pumps are all, in theory, hackable. In September, the digital infrastructure of Düsseldorf University Hospital was severely hit during a ransomware attack, including the ambulance computer system. One woman died when her ambulance was redirected to another hospital 30 miles away.

APT41, a Chinese state-sponsored group, has been blamed for more than 100 cyber-attacks up to last year. In September, the FBI issued a poster featuring the faces of five APT41 members they wanted to question over ransomware raids in America, Britain, Australia and Taiwan. APT41 has also targeted UK government networks. Recently it was revealed that spies at GCHQ have warned the chairman of the foreign affairs select committee, Tom Tugendhat, that the parliamentary email system is not secure, following Chinese cyberattacks on him and other British politicians.

But it isn’t only large-scale state attacks that pose a risk: gadgets connected to the internet in our homes are vulnerable. Known as the ‘Internet of Things’, or IoT, these devices (there are an estimated 75 million worldwide) include smart watches, home thermostats, smart meters, wifi doorbells, baby monitors and smart home controllers such as Alexa or Google Home. The majority are run on cheap, generic computer chips that are easily hacked.

IoT hackers can do more than damage homes and steal data. Smart household devices can be turned into internet bots (which run automated tasks online) and harnessed to form large, powerful ‘botnets’ that make devices work in sync to hack data. Three years ago, in an attack known as Dyn, malware infected hundreds of -thousands of computers and made them continually search the internet for vulnerable IoT devices.

Because people often do not change the usernames or passwords that come with their gadgets, the default settings allow them to be easily hacked. The resulting wide-reaching viruses can blast targeted -computers with so much information that they crash. The Dyn attack took down large portions of the internet including Twitter, Netflix, the Guardian, CNN and Reddit.

More worryingly, cyberattacks can result in direct physical destruction: dams, industrial plants and critical infrastructure are all at risk. ‘Warfare is changing at breakneck speed and the arsenal of weapons available to our enemies and adversaries is changing with it,’ one senior defence source says. ‘A cyberattack on our institutions or critical national infrastructure could cause major disruption to our economy and our public services, and threaten our national security.’

In February, for example, there was a botched attempt to poison the water supply of the city of Oldsmar in Florida. An unidentified hacker attempted to raise the levels of sodium hydroxide in the water from 100 parts per million to a fatal 11,100 parts per million. A plant manager intervened and returned the system to normal. If the hack had gone unnoticed, it would have taken between 24 and 36 hours for the poisonous water to reach people’s homes.

It is also possible to take down a country’s entire physical infrastructure by sabotaging the massive undersea cables that carry more than 90 per cent of the world’s communications. The MoD expressed concerns that this poses an existential threat to the UK after intelligence services noted that Russian submarines are ‘aggressively operating’ near Atlantic cables. The recent defence review, in fact, is set to order a new Royal Navy surveillance ship with under-water drones to monitor the situation.

Then there is the issue of power grids. Russian hackers wiped out the electricity supply in Ukraine in 2015, leaving hundreds of thousands of civilians without power. A US report revealed that the control centres were still not fully operational two months later. Another more complicated cyberattack on the power grid followed in late 2016. The evidence pointed to Russia’s secret service.

Even geostationary satellites are vulnerable to attack either by jamming or by direct assault. Russia, China and the US have all demonstrated capability to bring down satellites with missile strikes — a ‘Pearl Harbor’ in space is not such a far-fetched notion.

Another issue is the development of artificial intelligence warfare. The defence review proposed the use of AI in the development of unmanned autonomous weapons systems, including swarms of drones. While this is in line with developments in Russia, China and the US, it nevertheless rings alarm bells. Such weapons operate on their own to select and attack targets. Imagine the destructive potential they could have in the hands of hackers.

If we were to experience a large cyber-attack that targeted civilians, it’s hard to know how we could respond under current warfare guidelines. The International Committee of the Red Cross is responsible for maintaining the laws of war, such as the Geneva Conventions. Together with the International Court of Justice, it shares the view that laws of war should limit cyber operations during armed conflict just as they limit other weapons and means of warfare in such situations. But it’s less clear how the laws stand when cyber warfare occurs outside armed conflict.

Will laws protect us any more than they protected civilians during the Blitz? It seems unlikely. In 2018, the Secretary--General of the UN, António Guterres, called for global rules to minimise the impact of electronic warfare on civilians. But nothing has happened since. During the Blitz, it was clear who was responsible for the bombers flying over Britain. But when it comes to cyber-attacks, attribution is difficult, or impossible. Attacks can be conducted through a network of thousands of machines located in many countries. Accusations are generally based on circumstantial evidence and signature patterns of behaviour. ‘The lines denoting acts of war have been blurred,’ the senior defence source says. ‘This is a new threat to our way of life, the security we take for granted and the freedoms we hold dear.’

Given the devastating consequences of cyber warfare, there appears to be little in the way of contingency planning. In the coming years, we could face devastating consequences as a result of our dependency on the internet. Indeed, it’s not unthinkable that, in the event of war today, cyberattacks could leave a nation under conditions similar to a medieval siege. Some believe the answer is to create impenetrable security systems — but there’s an old saying in computer science circles that ‘the only secure machines are ones that haven’t been hacked yet’.
#ANT 
AI Disclaimer: An advanced artificial intelligence (AI) system generated the content of this page on its own. This innovative technology conducts extensive research from a variety of reliable sources, performs rigorous fact-checking and verification, cleans up and balances biased or manipulated content, and presents a minimal factual summary that is just enough yet essential for you to function as an informed and educated citizen. Please keep in mind, however, that this system is an evolving technology, and as a result, the article may contain accidental inaccuracies or errors. We urge you to help us improve our site by reporting any inaccuracies you find using the "Contact Us" link at the bottom of this page. Your helpful feedback helps us improve our system and deliver more precise content. When you find an article of interest here, please look for the full and extensive coverage of this topic in traditional news sources, as they are written by professional journalists that we try to support, not replace. We appreciate your understanding and assistance.
Newsletter

Related Articles

0:00
0:00
Close
Emails Leaked: How Passenger Luggage Became a Side Income for Airport Workers
Polish MEP: “Dear Leftists - China is laughing at you, Russia is laughing, India is laughing”
Western Europe Records Hottest June on Record
BRICS Expands Membership with Indonesia and Ten New Partner Countries
Elon Musk Founds a Party Following a Poll on X: "You Wanted It – You Got It!"
China’s Central Bank Consults European Peers on Low-Rate Strategies
France Requests Airlines to Cut Flights at Paris Airports Amid Planned Air Traffic Controller Strike
Poland Implements Border Checks Amid Growing Migration Tensions
Emirates Airline Expands Market Share with New $20 Million Campaign
Amazon Reaches Milestone with Deployment of One Millionth Robot
Yulia Putintseva Calls for Spectator Ejection at Wimbledon Over Safety Concerns
House Oversight Committee Subpoenas Former Jill Biden Aide Amid Investigation into Alleged Concealment of President Biden's Cognitive Health
Amazon Reaches Major Automation Milestone with Over One Million Robots
Extreme Heat Wave Sweeps Across Europe, Hitting Record Temperatures
Meta Announces Formation of Ambitious AI Unit, Meta Superintelligence Labs
Robots Compete in Football Tournament in China Amid Injuries
China Unveils Miniature Insect-Like Surveillance Drone
Marc Marquez Claims Victory at Dutch Grand Prix Amidst Family Misfortune
Germany Votes to Suspend Family Reunification for Asylum Seekers
Budapest Pride Parade Draws 200,000 Participants Amid Government Ban
Southern Europe Experiences Extreme Heat
Xiaomi's YU7 SUV Launch Garners Record Pre-Orders Amid Market Challenges
Jeff Bezos and Lauren Sanchez's Lavish Wedding in Venice
Russia Launches Largest Air Assault on Ukraine Since Invasion
Massive Anti-Government Protests Erupt in Belgrade
Iran Executes Alleged Israeli Spies and Arrests Hundreds Amid Post-War Crackdown
Hungary's Prime Minister Criticizes NATO's Role in Ukraine
EU TO HUNGARY: LET THEM PRIDE OR PREP FOR SHADE. ORBÁN TO EU: STAY IN YOUR LANE AND FIX YOUR OWN MESS.
Hungarian Scientist to Conduct 30 Research Experiments on the International Space Station
NATO Members Agree to 5% Defense Spending Target by 2035
NATO Leaders Endorse Plan for Increased Defence Spending
U.S. Crude Oil Prices Drop Below $65 Amid Market Volatility
International Astronaut Team Launched to Space Station
Macron and Merz: Europe must arm itself in an unstable world
Germany and Italy Under Pressure to Repatriate $245bn of Gold from US Vaults
Iran Intensifies Crackdown on Alleged Mossad Operatives After Sabotage Claims
Trump Praises Iran’s ‘Very Weak’ Response After U.S. Strikes and Presses Israel to Pursue Peace
Oil Prices Set to Surge After US Strikes Iran
BA and Singapore Airlines Cancel Dubai Flights Amid Middle East Tensions
Trump Faces Backlash from MAGA Base Over Iran Strikes
Meta Bets $14 B on Alexandr Wang to Drive AI Ambitions
FedEx Founder Fred Smith, ‘Heart and Soul’ of the Company, Dies at 80
Chinese Factories Shift Away from U.S. Amid Trump‑Era Tariffs
Pimco Seizes Opportunity in Japan’s Dislocated Bond Market
Labubu Doll Drives Pop Mart to Status as China’s Most Valuable Toy Maker
Global Coal Demand Defies Paris Accord Goals
United States Conducts Precision Strikes on Iran’s Nuclear Sites
US strikes Iran nuclear sites, Trump says
Telegram Founder: I Will Leave My Fortune to Over 100 of My Children
16 Billion Login Credentials Leaked in Unprecedented Cybersecurity Breach
×