. | . |
Outside View: Cyberspace Trojan horse
Moscow (UPI) Sep 28, 2007 Reports about missile interceptors and potential military confrontation in Iran have eclipsed the emergence of cyberspace as a new military theater. The Internet is turning into a real battlefield. The U.S. Air Force is establishing a temporary special command responsible for combat action in the World Wide Web. In the future, the Pentagon intends to turn it into a fully fledged Cyber Command of the U.S. Air Force. In other words, the world's strongest power's entire system of defense operations will also cover the Internet. Frankly speaking, the Americans are doing the right thing. The Net, which has reached out to all continents, determines the key parameters for the functioning of modern society -- from salary payments to troop control. Not a single aircraft will take off or land, not a single plant will start working, and not a single military unit will begin moving without the matrix. Control over the Net is ultra-important. It is believed cyberspace became a battlefield during the Persian Gulf War in 1991, when international forces ousted the Iraqi occupants from Kuwait. At that time the Americans set up the Desert Special Net, an information network that guaranteed the precise targeting of Patriot missiles to protect Tel Aviv and Jerusalem. The American local military network made it possible to create effective simulators for personnel training. Out of 36 crew members of the Apache fire support helicopters that crossed the Iraqi border on Jan. 17, 1991, only three had experience in firing air-to-surface Hellfire rockets. Others were trained on simulators. Every achievement has a positive and a negative side, especially in the military sphere. It is clear that nowadays the Internet has become part and parcel of everyone's life. But there will always be people who would wish to virtually steal a real million from a bank, wreak havoc in NASA or neutralize a military unit, as it almost happened in 1991. At that time, Dutch hackers managed to break the codes of several computers that were part of the U.S. Army logistic support information system. The fact that these guys preferred military information to tulips was not the worst thing. Military experts believe that because of this Dutch attack the American guys could have found toothbrushes in the zinc ammunition boxes. Russian computer geniuses have mastered the Net some 20 years after their Western colleagues but have left them far behind. It is enough to mention the unprecedented electronic robbery of the City Bank in the mid-1990s. Later on, St. Petersburg software expert Vladimir Levin was charged with this crime, arrested and convicted as a result of a joint operation by Russian and Western security-related services. Nevertheless, he is the only compatriot in the so-called Hacker's Hall of Fame. So far. But today the Americans are expecting the Trojan Horse, a destructive virus disguised as a safe computer program, and they don't think it will come from Russia. According to the U.S. Department of Defense, the military-information strategy of the Chinese armed forces provides for the formation of special cyber units capable of attacking enemy computer systems. It was way back in 2000 that the Pentagon spread the information about China's capability for invading poorly protected American military and civilian networks. Now combat computer training is a compulsory discipline in the Chinese army's military education program. In turn, the Chinese authorities maintain that their domestic official servers are victim to large-scale hacker attacks, which seriously prejudice national security. To sum up, a respite on the new front line is not expected for a long time to come. (Andrei Kislyakov is a political commentator for RIA Novosti. This article is reprinted by permission of RIA Novosti. The opinions expressed in this article are the author's and do not necessarily represent those of RIA Novosti.)
Email This Article Comment On This Article Related Links Cyberwar - Internet Security News - Systems and Policy Issues
Commentary: Blogowar Washington (UPI) Sep 28, 2007 Journalism of verification in the blogosphere has been displaced by a journalism of assertion where rumors become facts and where facts are censored by omission. Hardly surprising then that 200 million Americans, two-thirds of the population, concede they don't understand foreign policy issues. And only one-third say they understand major domestic issues. TV comedian Jay Leno's Jaywalking interviews confirm these figures. With 80 million blogs and more than 1 billion people now online, it becomes increasingly difficult to sort factoid from fact and truth from untruth. |
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2006 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA PortalReports are copyright European Space Agency. All NASA sourced material is public domain. Additionalcopyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement |