Hail Region municipality engages residents in city planning    Riyadh to host Saudi-UK expo "GREAT FUTURES" in May    Ukraine war: US secretly sends long-range missiles to help Kyiv    Searching for missing loved ones in Gaza's mass graves    Saudi Arabia welcomes panel's report on UNRWA's performance    IMF opens first regional office in Riyadh Al-Ibrahim: Saudi Arabia confirms commitment to diversifying its economy    Deputy tourism minister: Government fees in hospitality sector down 22% in 2024    EU raids offices of Chinese security equipment maker in subsidy probe    Saudi Shoura Council assistant speaker meets US Congress advisors    Abuthnain: Saudi Arabia achieves 77% reconciliation in labor disputes    King Salman undergoes routine medical checkup in Jeddah    Columbia's anti-war protesters dig in despite mass arrests and disciplinary action    Belgian man whose body produces alcohol in rare condition acquitted of drunk driving    Al Hilal's comeback effort falls short in AFC Champions League semi-finals    Australian police launch manhunt for Home and Away star Orpheus Pledger    Spice Girls reunite at Posh's 50th birthday    Swedish rider Eckermann wins 2024 Show Jumping World Cup in Riyadh    Aspiring fencer Josh Brayden aims for Olympic glory    Revenues touch SR3.7 billion in Saudi cinema sector since 2018    Beijing half marathon: Top three stripped of medals after investigation    JK Rowling in 'arrest me' challenge over hate crime law    Trump's Bible endorsement raises concern in Christian religious circles    Hollywood icon Will Smith shares his profound admiration for Holy Qur'an    We have celebrated Founding Day for three years - but it has been with us for 300    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



As cyber warfare turns 10, the West risks falling behind
Published in The Saudi Gazette on 07 - 05 - 2017

When Estonia became the first nation on the receiving end of an overwhelming cyber attack 10 years ago last week, government and other critical websites and systems such as banking collapsed in one of the most internet-connected countries of the time. Widely blamed on Russia, the assault prompted Western nations - including the United States - to plow billions into improving their own cyber defenses.
If something similar happened today, it could be even more disruptive and dangerous - and also more complex. Western states, militaries and companies have made strides in building the technical ability to guard against cyber attacks. But as often with new technologies, developing the doctrine and expertise to know how to use them inevitably lags behind.
That points to a broader problem. A decade after the Estonia attack, the West's potential enemies still have a better sense of what they want to achieve in cyberspace than the United States or its allies.
For the West, "cyber" remains a tightly defined concept, a matter of protecting nationally vital systems, keeping secrets or finding them out from potential enemies. For countries like Russia and China, however, it has become something much broader.
In the 2016 US presidential election, Russia is believed to have used a combination of hacking and the dissemination of real and false news to striking effect; the same has been true in political campaigns across Europe. Many Western experts believe stealing defense and other US commercial secrets has been at the heart of China's military and economic modernization.
When it comes to technical capability, specialists at the National Security Agency and Britain's GCHQ are as good as anyone in the world, at least as sophisticated as any hackers Moscow, Beijing, Pyongyang or Tehran might field. The same is increasingly true of military personnel in the growing number of units such as the US military's Cyber Command and designated units within the US Army, Air Force and Marines.
Smaller nations are also forging ahead, particularly those in Eastern and Northern Europe that must contend with Russia. Estonia in particular has toughened its defenses, and is now seen as one of the world's hardest countries to attack.
Both Russia and China doubtless also have talented government and military hackers. But Moscow in particular is seen as going much further, sometimes delegating attacks to criminals and others outside government. That strategy, Western experts say, allows such individuals and groups to operate with immunity providing they do not attack targets within their own nations - for example, through credit card theft - and are willing to help the state out with deniable attacks on foreign enemies when asked.
Potential targets often struggle to formulate a response to cyber attacks because identifying the source of the attacks is so difficult. US
authorities are engaged in a global crackdown on Russian hackers in particular, but that alone may not be enough to deter others. Preventing attacks in cyberspace is now considered almost as important as deterring physical attacks - and it's an area where the thinking is just beginning. There have been some diplomatic victories. After the United States complained loudly and publicly about Chinese information theft, the practice appeared to fall off sharply, according to internet security firms.
These problems aren't new, although they are getting more complex. The 2007 Estonia incident was part of a wider campaign sparked by Estonia's decision to move a Russian war memorial from the center of its capital. Moscow, which controlled Estonia when it was part of the USSR before independence in 1991, reacted angrily - and Estonian officials also accused it of provoking riots amongst ethnic Russians within Estonia at the same time.
Moscow denied government involvement in both the riots and cyber attacks, suggesting the latter were carried out by "patriotic" Russian hackers.
Russia's 2014 annexation of Crimea and the war in eastern Ukraine that followed have also involved cyber attacks and other electronic warfare, rendering US-manufactured drones supplied to the Ukrainian military almost useless. Russia has integrated cyber capabilities into its broader hybrid and conventional warfare playbook in ways the West has yet to match, although US and other militaries are working hard to do so.
Western states have taken their own steps. The United States and Israel are believed to have used the Stuxnet computer worm to reprogram Iran's nuclear centrifuges so that they tore themselves apart.
That action, however, opened the door to new, potentially lethal forms of warfare.
Computer security experts report a rising number of attacks against industrial control systems, the sophisticated computer programs that operate power stations, water and fuel supplies and other similar infrastructure.
Attacks causing physical damage of any kind have been rare, but at least one has been reported - a 2014 incident at a German industrial smelter. At the end of 2015, suspected Russian hackers shut down part of Ukraine's power grid, although the government swiftly restored electricity. A similar attack at the end of last year was suspected to have been behind widespread power outages in Kiev.
In theory, such techniques could be used to blow up fuel stations, crash airliners and a host of other lethal actions.
Clarifying the internationally understood rules around such attacks has long been a priority for the United States and other major states. Since at least 2011, the United States has maintained that it would retaliate for any cyber attack that caused physical damage or death in the same way it would a physical assault, potentially considering it an act of war.
Partly as a result, the West's foes have turned to softer targets. Iran is believed to have responded to US sanctions and interference in its nuclear programs by attacking the US banking system, at one point causing considerable if temporary disruption to a number of major institutions.
US officials believe North Korea's response to an unflattering portrayal in a 2014 American comedy film was to hack media giant Sony, causing considerable embarrassment to its senior management. Pyongyang denied the charges, and some computer security experts suggest other explanations for the release of information, including internal rivalries at Sony.
Because his presidential campaign benefited from alleged Russian hacking of the Democratic National Committee, Donald Trump and his administration are in an awkward place when it comes to formulating new approaches to such uncertain situations. But they don't have much choice. As it approaches its teenage years, cyber warfare will only get more troublesome. — Reuters
— Peter Apps is Reuters global affairs columnist, writing on international affairs, globalization, conflict and other issues.


Clic here to read the story from its source.