Concerns over Russia’s meddling in the US election have made it abundantly clear that state-sponsored cyberattacks have advanced to a new level. Any one of us, by virtue of our personal or professional associations, can become a target of a hostile country’s online skullduggery. Though we all bear some responsibility for securing our digital lives, the bulk of our online self-defense lies outside our control, in the hands of the companies controlling our data. Protections for civilians caught in the crosshairs now need to evolve, as well.
Cyberwarfare refers to the use of digital attacks -- like computer viruses and hacking -- by one country to disrupt the vital computer systems of another, with the aim of creating damage, death, and destruction. Future wars will see hackers using computer code to attack an enemy's infrastructure, fighting alongside troops using conventional weapons like guns and missiles.
A shadowy world that is still filled with spies, hackers, and top-secret digital weapons projects, cyberwarfare is an increasingly common -- and dangerous -- feature of international conflicts. But right now the combination of an ongoing cyberwarfare arms race and a lack of clear rules governing online conflict means there is a real risk that incidents could rapidly escalate out of control.
Ransomware, which has been a constant source of trouble for businesses and consumers, may also have been used not just to raise money but also to cause chaos. Perhaps one of the most unexpected twists recently has been the use of weaponized ransomware to destroy data.
When North Korea attacked Sony Pictures in 2014, it was seen as nothing less than a foreign power’s assault on freedom of expression. “We cannot have a society in which some dictator someplace can start imposing censorship here in the United States,” said President Barack Obama at the time. In retaliation, the US imposed new financial sanctions and may have caused a blackout of North Korea’s internet. That was just an early hint of what was to come.
Since then, a purported hacking collective known as Fancy Bear, which several security firms believe receives support from the Russian government, has racked up an impressive record of high-profile attacks. Beyond hacking the Democratic National Convention and the German government, Fancy Bear also appears to have gone after private companies and individuals. It has compromised the French TV station TV5Monde; several people associated with Bellingcat, the citizen-journalist group that investigated the downing of a Malaysian plane over Ukraine; and, in late October, many Microsoft customers.
So perhaps it’s no surprise that Microsoft is feeling sensitive to the actions of state-sponsored hackers.
Under Smith’s plan, a Digital Geneva Convention would “commit governments to avoid cyberattacks that target the private sector or critical infrastructure or the use of hacking to steal intellectual property.” He argues that governments need to step up because global tech companies have been drafted as “first responders” to the assaults of digital spies and saboteurs. In his post, he cites a 2016 case in which Microsoft identified a nation-state-sponsored group that was conducting attacks using internet domains with names that spoofed the trademarks of companies. (Though he chose not to name the group, the example bears a striking resemblance to the Fancy Bear incident mentioned above. Microsoft declined to comment.) Smith says that Microsoft has worked with a federal court to take down 60 domains associated with nation-state attacks in 49 countries.
But tech companies cannot fight this war alone. That is why Smith’s plea has already generated some buzz. Eugene Kaspersky, a prominent Russian cybersecurity expert and head of Kaspersky Lab, hailed it as a “historic” call to action. US cybersecurity experts also praised Smith for calling attention to the need for protection against nation-state cyberattacks, but almost in the same breath noted that a Digital Geneva Convention would be hard to execute.
“He wants governments to agree to lay off the internet,” says Bruce Schneier, a security technologist and author of the blog Schneier on Security. “I think it’s a great idea because I do think we need norms for what is off-limits. But the devil is in the details, and there are a lot of details.”
For example, Smith calls for an independent organization to hold countries accountable for cyberattacks. No existing body even attempts that, says Herbert Lin, a senior research scholar for Cyber Policy and Security at Stanford’s Center for International Security and Cooperation. The next best thing might be a pledge that Obama and China’s President Xi Jinping made in 2015, promising that “neither country’s government would conduct or support cyber-enabled theft of intellectual property.” Two months later, that agreement led the Group of Twenty to affirm the same principle.
A cynical “Game of Thrones” saying comes to mind here: “Words are wind.” But if you don’t ever say the words, you can’t start shaping behavior.
“There’s general consensus that the Obama-Xi agreement has achieved some desired outcomes — such as acceptance of the norm of no direct or indirect government support of cyber-enabled theft of IP or economic data,” says Amy Chang, a cybersecurity researcher at the Harvard Kennedy School. “That alone is a benefit of agreements like this one.”
Leading tech companies don’t actually need governments in order to take a stand themselves. Their independence has the effect of moderating government actions to some degree, says Scott Borg, director of the US Cyber Consequences Unit, a nonprofit research institute. “Major tech companies are supplying the world, not just one country,” Borg says. “So it’s very important that they be as neutral as they can and maintain as high a level of trust as possible. They need to do that as a service to the world and, of course, to protect their business.”
In the end, a “Digital Switzerland” might be the smartest way for tech businesses to claim the moral high ground. But even Switzerland, while neutral, has never renounced its arms. Tech companies may soon find themselves embracing a similarly armed neutrality.
Personal Anti Espionage Communication Systems for
CEOs, VIPs, Celebs & Business Oligarchs.
The "Encrygma"
€ 18,000
SuperEncrypted Phone
The Most Advanced Quantum Encrypted Communication System in the World.
Disruptive Offline Communication Tech
(No Internet or Cellular Connection)
Without any Servers involvement
Based on the Secret Tech "White Fog"
No data ever registered on the device or elsewhere.
Immune to:
Interception
Cyber Espionage
Remote Hacking
Spyware Infection
Malware Infection
Forensic Data Extraction
Ransomware attacks
Electronic Surveillance
You have two options , either you can buy the “Encrygma “ SuperEncrypted Phone , full details : www.Encrygma.com, at € 18,000 Euros per device or create your own encryption device by installing our SuperEncryption systems on regular Android and Windows devices at € 5000 Euros per license.
DigitalBank Vault advantages Vs. SKY ECC, BlackBerry, Phantom Secure, Encrochat
and other 'secure communication devices'
1. One-lifetime fee of € 5000 Euro.
No annual subscription fees.
2. Encryption Keys generated by the user only.
Encryption Keys never stored in the device used or anywhere else.
Encryption Keys never exchanged with the communicating parties.
3. No SIM Card needed.
4. Unlimited text messaging, audio and video messaging,
audio calls, file transfers, file storage.
5. "Air-Gapped" Offline Encryption System not connected to the Internet.
6. No Servers involved at any given time, completely autonomous system.
No third parties involved.
7. No registration of any kind - 100% anonymous without username/password.
No online Platform or Interfaces.
8. Unique, Personal, Dedicated Set of
Encryption Algorithms for each individual client.
Totally Private Encryption System.
9. Air Gap Defense Technology:
The Only Offline Communication System in the World.
10. Working cross-platform on Android Smartphones ( No SIM Cards Needed)
and Windows PC ( for office work)
Contact us
for additional information at agents@digitalbankvault.com
Telegram: @timothyweiss WhatsApp: +37257347873 You can buy any Android device and Windows laptops and transform them into a powerful encryption device by installing our set of software. The process is simple , you buy your own phones and laptops devices , choose your most trusted company ( we always advise Samsung phones and Asus laptops , then you buy from us the DigitalBank Vault SuperEncryption System and install it on the devices you bought. If you need the encryption system just for storing and transferring classified files and data, you may need just one license ( it will work for four on both Windows and Androids). If you need to communicate between two people, you will of course need to buy two licenses. If your network of people you need to communicate with is larger , you will have to buy more licenses of course. Each client is receiving a dedicated set of encrypted algorithms that means that each company (client) has a different encryption system, therefore creating a closed private internal network. Each license costs € 5000 Euros. No recurring payments are required. It’s a one-time fee. No monthly payments. Remember that our mission is to help companies achieve total, absolute secrecy over their sensitive data storage, critical file transfers and securing their confidential communications. Feel free to contact us. For more in depth information we can have a voice call or video meeting. Our SuperEncryption systems are needed in case you really need the highest level of secrecy. Our technology is above Governments level , it’s the highest level of anti interception/ anti espionage tech available to the private sector. We sell only and exclusively to reputable companies and individuals that pass our due diligence and KYC procedures. Try for 30 days ( free of charge) the DigitalBank Vault SuperEncryption System. Transform any Android device or Windows Laptop into an Unbreakable Encryption Machine
More information? Visit our website at www.DigitalBankVault.com or email us at info@digitalbankvault.com. We will be happy to assist you in achieving total secrecy over your communications.
How to buy a DigitalBank Vault SuperEncryption system? https://www.digitalbankvault.com/order-the-digitalbank-vault
More details?
Why the DBV SuperEncryption system is safer than any other solution available in the market?
How does the DigitalBank Vault SuperEncryption technology work?
Comments