http://economictimes.indiatimes.com/tech/internet/Threats-of-cyber-war-as-vi ruses-get-smarter/articleshow/6905883.cms
11 Nov, 2010, 10.41AM IST,IANS Threats of cyber-war, as viruses get smarter <http://netspiderads2.indiatimes.com/ads.dll/clickthrough?slotid=37105> Advertisement BERLIN: The debate over Iran's nuclear programme heated up over the summer, with advocates for a military strike against Tehran at loggerheads with analysts calling for a diplomatic resolution. Unknown to many of them at the time, a computer virus, likely written by a government, was moving quickly around the globe, infecting specific computer systems at nuclear plants. "An electronic war has been launched against Iran," Mahmoud Liaii, a top official in Tehran, was quoted as saying in September, after the country confirmed the worm infected its systems. By the time he reacted, a technology firm in Bulgaria had already exposed the existence of what became known as the Stuxnet virus and Siemens <http://economictimes.indiatimes.com/siemens/stocks/companyid-13102.cms> , the German company which made the targeted systems, was working on a fix. Experts believe the virus was likely around since 2009, sliding under firewalls undetected. Stuxnet alerted the world yet again to a recurring problem which was brought to the international forefront in 2000, when a virus with the enticing message, "I love you", caused billions of dollars in damage around the world. Two Philippine students, using equipment worth less than $1,000, were behind that attack and were later set free after authorities realised they had violated no law. Since then, viruses have become subtler, faster, more aggressive and harder to trace, while the nascent rulebook is still weak. "We are not looking at threats in a traditional sense. It is not business as usual," said Alex Ntoko, who heads up the International Telecommunications Union's (ITU) Corporate Strategy Division. "Any individual who can write code is a potential superpower." Consultants suggest that even the technological heavyweights have been lax in the cyber world. Israel only recently began to limit its soldiers' access to the web when they were on military computers - years after the first top-secret documents accidentally entered public online domain. Earlier this year, Noah Shachtman, writing for the Progressive Policy Institute, noted that the Pentagon was looking to ban access from its computers to social media sites, seeing no other way to ensure confidentiality, even as it kept secret data flowing through unencrypted networks. The US and Israel are the prime suspects in the Stuxnet virus. But they are not the only countries believed to be engaging in dirty programming wars. China ran afoul of the US and its private sector behemoths, including Google, on various occasions in the last eight years, accused of numerous hacks. North Korea has been charged with trying to overload or disrupt Western networks. And the Georgian parliament's website was embarrassingly hacked in 2008, during the country's brief and disastrous war with Russia. "In Georgia, we saw a case that might have been an example of cyber war, but only because it occurred at time of declared war. But Georgia never followed it up as such," said Eneken Tikk, the legal adviser to the CCD COE, a cyber research unit accredited to NATO . For now, though, cyber war and its legalities remain theoretical. In 1863, modern warfare established its first rules. Over the years, new technologies were used on the battlefields and the agreements morphed into the generally accepted laws of war laid out in the Geneva Convention. The International Committee of the Red Cross (ICRC) believes the rules were created by open-minded people. "International humanitarian law applies to any new technology. It doesn't matter that the technology was not dreamed of by the founders," says Robin Geiss with the ICRC's legal team. Geiss recently attended the Bruges Colloquium in Belgium, where military specialists, lawyers and tech gurus gathered to discuss legislation on cyber-warfare, the military use of outer space, drones and automated weapons systems. "We traditionally dealt with kinetic violence, meaning that we saw the damage right away. With cyber, it is more clandestine and may not be immediately visible," he explained. But the rules of attack still apply. Which means the launcher of a virus must differentiate between civilian and military targets. Failure to do so could be tantamount to a war crime. A cyber attack "is not just about inflicting harm on a computer but harm on critical infrastructure", said Ntoko at the ITU. Power grids, water networks, railway tracks are all online in some form. Last month, in the first ever public appearance by a head of the British secret services, Sir John Sawyer laid out his outlook. "It's more than obvious that the dangers of terrorism, nuclear proliferation and cyber attack are not much impressed by international borders," Sawyer said. Ntoko believes this borderless threat requires a UN brokered treaty to regulate the networks. However, extreme differences still remain between major powers. For example, officials in Washington have seen Moscow's proposals for an international treaty as efforts to ensure control rests in the hands of governments, placing restraints on the internet. "The discipline is too immature to push for international consensus," said Tikki, the lawyer. In the meantime, rights groups in the West are worried about privacy. US officials have admitted that the top-secret National Security Agency was "over-collecting" information on citizens. The balance for security, liberty and humanitarian checkpoints in the cyber world is not easily reached, experts warn. The people at the Red Cross hope at least safeguards can be put in place before hostilities rage, to ensure protection for the weakest: civilians who suffer first and harshest in any war. [Non-text portions of this message have been removed] ------------------------------------ -------------------------- Want to discuss this topic? Head on over to our discussion list, discuss-os...@yahoogroups.com. -------------------------- Brooks Isoldi, editor biso...@intellnet.org http://www.intellnet.org Post message: osint@yahoogroups.com Subscribe: osint-subscr...@yahoogroups.com Unsubscribe: osint-unsubscr...@yahoogroups.com *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/osint/join (Yahoo! ID required) <*> To change settings via email: osint-dig...@yahoogroups.com osint-fullfeatu...@yahoogroups.com <*> To unsubscribe from this group, send an email to: osint-unsubscr...@yahoogroups.com <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/