TRENDING NEWS

POPULAR NEWS

Is Intel Effected By Cyber Espionage

Cyber warfare against the United States by a foreign entity (Russia) would qualify as "war against them." The POTUS is denying the US Intel. Doesn't this meet the legal definition of treason?

Absolutely not! Not even close.Treason is an attempt to change the head of state (formerly the king) by force), or to overthrow the ruling government writ large. The President himself is immune from criminal charges EXCEPT if levied by the House of Representatives. By definition, the President cannot be trying to overthrow himself. And ANYONE - even a President - has a right to an opinion - which is NEVER treason. See the First Amendment. It even applies to Donald Trump!Why don’t you look up the definition of words before you ask questions that betray you have no idea what they mean?

What is it like conducting cyber warfare?

It is a SHIT SHOW. Not figuratively, But literally. I will tell you what was explained to me in a class.What is a cyber war?Cyberwarfare is the use or targeting in a battlespace or warfare context of computers, online control systems and networks. It involves both offensive and defensive operations pertaining to the threat of cyberattacks, espionage and sabotage.But it certainly depends upon the number of countries participating and the resources they possess.This scene is not a real life example of how teams are set up but it is still close.A cyber war is similar to a normal war. There are two teams, defense and offense/ (Red/Blue) (Sometimes purple a mixture of both) on both sides.As the name suggest, one is for attacking targets, other is for defending assets. There is a hierarchy in this war too, just like an actual war. The person in command tell hackers to attack significant assets and take them down. The assets can be really anything, power grids, water supplies, dams, nuclear power plants etc.But this all is just one part in cyber attacks. You need really skilled professionals who know their shit, quantity does matter but quality is more important over here. Then there are amount of resources which are needed to cause the attack, can be anything from CPU/Hardware resource to hit, botnets etc.If a country has lots of resources but no skilled professionals to use them, then it's basically useless.Cyber wars can cause way much more damage than normal wars do.Countries like USA, China, Russia, Israel and UK have the top best cyber warfare teams on the globe right now.

What is a Cyber War?!?!?!?

Cyberwarfare is computer technology based warfare. Typically it would be referred to as hacking military technology and either disabling it or utilizing it for your own benefit, however cyberwarfare as a whole covers aspects such as sabotage and espionage.

Sabotage would involve shutting down a nation's power supply, gas mains, phone lines, etc as well as initiating 'DoS' and 'DDoS' - Denial of Service and Distributed Denial of Service respectively. Essentially this involves creating a situation where a system for the enemy is now longer active for them to use, at base level this would include banks, major servers, etc. At high level (and this would be practically impossible anyway) shut down of nuclear weapon and energy systems/safety features as well as potentially activating them for your own use.

Espionage obviously covers intelligence gathering and intel retrieval. Hacking into military files, records, etc.

All this could, theoretically, be done with computers and that's the advent of cyberwarfare. However, some argue it can also include the use of computer-based military technology, such as drone warfare and orbit-to-ground weaponry/surveillance systems.

Cyber warfare and social engineering is one of the biggest threats to national security. Who is investing in these areas?

Cyber warfare and social engineering are hardly a new concept. Mildly sophisticated hacking and an average understanding of social media can have outsized impacts on some of the world’s biggest corporations. As we become more reliant on the internet, mobile devices, and the cloud, the need for better cyber security grows exponentially. Unfortunately, the hackers and cyber criminals have everyone on the defensive at this point.Most of the political parties and corporate organizations do invest in such areas to protect their own assets from exposure as well as to protect their interest in respective fields. It may include involving professional corporate espionage working for such organizations, to the extend of utilizing team of such professionals.

At what point does good, proactive business intelligence morph into commercial espionage and the theft of intellectual property?

Business intelligence is using analytics, typically sales data and other internal data from your own business, to help strategize, adjust plans, and make decisions. The I.T. area of Business Intelligence is sometimes also called Decision Support Systems.The moment you begin conducting competitive intelligence, you’re entering a different area. You can still be gathering information to conduct analytics, but it’s rarely data-driven, and more fact / narrative driven. You might find out that a competitor is changing their pricing, or is stocking a different set of widgets, or whathaveyou.It’s still a pretty long way off to espionage and theft of intellectual property. That’s when you send someone into their organization or cultivate someone from their organization and induce them to share information with you that would either help serve your interests, provide your company with a competitive edge, or possibly hurt the other company if you knew about it.

TRENDING NEWS