https://www.gatestoneinstitute.org/17654/cyberwar-part-one
Directly, these attacks [on the U.S.] strike at parts of our electrical grid, our food supply, our energy providers, banks, business computer networks and government systems. Indirectly, they threaten our livelihoods and our sense of security and stability.
[Cyberwar is] an undisguised assault against military and civilian infrastructure meant to cripple the targeted country, destroy or damage its communications and command systems, and create immediate and total chaos among its people.
Russian President Vladimir Putin’s regime has denied its involvement, as it always does. No one believes them.
[Former U.S. National Security Adviser John] Bolton warns that to protect the American people, the defense establishment needs to focus much more attention on early threat-recognition.
Moreover, it is clear the U.S. government must be more assertive in pointing the finger at Vladimir Putin when a Russian attack is unmasked.
Cybercrime often merges with cyberwarfare. The techniques of both are similar, even if their intentions are not. Yet, unlike their “real-world” counterparts, we cannot afford to treat the former as merely a law enforcement problem and the latter as a military problem. Today’s gnat is tomorrow’s nuclear-tipped missile.
In a recent article, former U.S. National Security Adviser John Bolton highlighted the cyberwarfare being waged on the West every day by Russia, China, Iran and North Korea. The assault is an accelerating proxy war, a coordinated terrorism campaign conducted by both hired criminals and military intelligence agencies, capable of great economic and societal damage. At the same time, even at lower intensity, it is a subtler attack on Western morale.
Directly, these attacks strike at parts of our electrical grid, our food supply, our energy providers, banks, business computer networks and government systems. Indirectly, they threaten our livelihoods and our sense of security and stability. That is, at least for the present, the most important thing about them.
The SolarWinds hack of 2020 compromised a top-tier provider of IT management services by injecting malware into the company’s routine software update to its 33,000 customers. Those victimized customers included hundreds of large companies, as well as the federal departments of Treasury, Commerce, and even Homeland Security. The hack was extremely sophisticated and operated for months before it was discovered. Cybersecurity analysts in and out of the government say conclusively it was the work of a hacking group they call “Nobelium,” operating with the support, if not the direct control, of the Russian government. Russian President Vladimir Putin’s regime has denied its involvement, as it always does. No one believes them.