{"id":91891,"date":"2017-12-02T10:43:00","date_gmt":"2017-12-02T10:43:00","guid":{"rendered":""},"modified":"2023-01-06T20:53:07","modified_gmt":"2023-01-06T20:53:07","slug":"shadow-war","status":"publish","type":"post","link":"https:\/\/cvnextjob.com\/index.php\/2017\/12\/02\/shadow-war\/","title":{"rendered":"Shadow War"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><h3 class=\"post-title entry-title\" itemprop=\"name\"><\/h3>\n<div class=\"post-header\"> <\/div>\n<p>The world&#8217;s military powers are spending billions on information warfare  (IW), but&#8211;for obvious reasons&#8211;they don&#8217;t publicize their  capabilities. As a result, we only get occasional glimpses of the  growing battle in cyberspace, as illustrated by <a href=\"http:\/\/www.informationweek.com\/news\/internet\/showArticle.jhtml?articleID=199701774\">Russian attacks against Estonian computer networks in 2007<\/a>, and more recently, against Georgian systems during the run-up to this summer&#8217;s war with the Tbilisi government.<\/p>\n<p>American  capabilities in IW remain equally guarded, but there are occasional  displays that make their way into the public arena. Earlier this year, <a href=\"http:\/\/xrdarabia.org\/2008\/10\/22\/whos-behind-attacks-on-al-qaeda-websites\/\">at least three of Al Qaida&#8217;s most important propaganda websites were shut down for over a month<\/a>,  after a series of cyber-attacks. While the culprits were never  officially identified, western intelligence agencies were at the top of  the list. The U.S. National Security Agency (NSA) has been following  terrorist communications for years and has robust&#8211;though  little-publicized&#8211;capabilities in cyber-attack.<\/p>\n<p>Israel has also been busy in recent months, as detailed in a couple of items<a href=\"http:\/\/www.strategypage.com\/htmw\/htiw\/articles\/20081203.aspx\"> posted at Strategy Page<\/a>.  First, Israeli spooks hacked into the Syrian phone network and sent  thousands of voice and text messages, offering a $10 million reward for  information on missing Israeli soldiers. Syrian intelligence viewed the  intrusion differently, speculating that the Israelis were actually  trying to recruit spies.<\/p>\n<p>The Israelis have also been active in  Lebanon, inserting messages into Hizballah radio and TV broadcasts for  the past two years. The Israeli messages point out errors in terrorist  claims, or simply ridicule the organization. Israeli intelligence has  also mounted a spam campaign against the insurgent&#8217;s cell phone network,  disseminating anti-Hizballah messages via voice and text.<\/p>\n<p>These  campaigns have an obvious propaganda value, but they also send a clear  message to Israel&#8217;s foes. The same tools used to &#8220;hack&#8221; terrorist  communications networks can also be used to take them down. And so far,  the insurgents seem (almost) powerless to stop it.<\/p>\n<p>Information  operations will be an essential part of all future conflicts, including  those in the Middle East. Based on what little we&#8217;ve seen, the Israelis  seem well-prepared to exploit the cyber realm in future campaigns  against their foes.<\/p>\n<p>Lest we forget, Syria&#8217;s air defense network  (reportedly) went dark before last year&#8217;s IAF attack on that nuclear  facility. As a result, Israeli jets flew unscathed across hundreds of  miles of hostile territory, and returned without a scratch. That  suggests a highly successful, targeted network attack that paralyzed  Syrian air defenses and their supporting C2 network. It&#8217;s the same  technique that could be applied to Iran, as part of a strike against  their nuclear facilities.<\/p>\n<p>***<br \/>ADDENDUM:  Speaking of Iran, it  seems that the Israelis are already at work on that IW target.  The  Tehran government has admitted that a recently-executed spy allowed  Israeli technicians to install monitoring devices on computer equipment  bought by Iran.  Apparently, some of the IT gear was delivered to  facilites supporting Tehran&#8217;s weapons program.  More than likely, that  intelligence coup provided valuable insights into Iran&#8217;s nuclear  development effort&#8211;and, quite possibly, the ability to &#8220;crash&#8221; those  computer networks at a later date.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The world&#8217;s military powers are spending billions on information warfare (IW), but&#8211;for obvious reasons&#8211;they don&#8217;t publicize their capabilities. As a result, we only get occasional glimpses of the growing battle in cyberspace, as illustrated by Russian attacks against Estonian computer networks in 2007, and more recently, against Georgian systems during the run-up to this summer&#8217;s [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/91891"}],"collection":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/comments?post=91891"}],"version-history":[{"count":0,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/posts\/91891\/revisions"}],"wp:attachment":[{"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/media?parent=91891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/categories?post=91891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cvnextjob.com\/index.php\/wp-json\/wp\/v2\/tags?post=91891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}