ieee.es

Search in this website

Publication

05/01/2015

Opinion document: Changing patterns of confrontation in Cyberspace

It has been a long time, since John T. Draper, also known as Captain Crunch, broke into AT&T landlines in the early 70s by means of a handcrafted whistle1, until the last events, discovered in May, related to cyberattacks and developed for years by the Chinese government to U.S. companies, linked to industrial espionage, or the NSA listening to Chancellor Angela Merkel's cellphone. Cyberattacks have overcome a variety of stages, from purely romantic reasons, to the recent ones with a level of sophistication and technical complexity, involving governments attacking other governments or international organizations, e.g. NATO. The high number and magnitude of those attacks made the organizations under attack to react in a proportional way in order to gain control and minimize the effects, creating specialized police forces, or even specialized squads in the military and the intelligence agencies. The latest trend in cyber defense not only involving counter-measures to defend and react against an attack, but also active warlike actions in order to gain initiative and control in the network. This rise in the cyber activity creates a perfect enviroment for attack and defense development frameworks with a promising future in the short and medium term. The final evolution of this scene could be only limited by speculation. And maybe, pure imagination?.

Author: José Luis Aznar Lahoz

THIS DOCUMENT IS ONLY AVAILABLE IN SPANISH LANGUAGE

Useful documents

Changing patterns of confrontation in Cyberspace
  • Pdf   1.46 MB
© Copyright 2010 Spanish Institute for Strategic Studies