Experts Attempt to Map the Battlefields of Cyber Warfare

It's harder to trace a smoking gun online than it is in real life. Yet with cyber warfare expected to grow in the coming decades, companies and countries alike are attempting to make sense forward strides in identifying the perpetrators of cyber attacks.

When attempting to make sense of a physical warzone, there are many clues to help you identify the combatants. These include uniforms, accents, flags, battle strategies, types of weaponry, etc. For example, most people with an elementary understanding of World War II could identify a German regiment from an American one simply by looking at their helmets.

The present and future of cyberwarfare offers little in comparison. As explained by The Economist, anti-virus firms and other computer experts often have to rely on educated guesses and conjecture to track the origin of malicious software designed to spy on other nation-states. 

"One of the most famous bits of nation-state malware, Stuxnet, was used to sabotage centrifuges used by Iran's nuclear programme. Suspicion naturally fell on Israel, which is the region's most technologically advanced nation, and which has long feared that Iran is working on a nuclear bomb (there have been rumours that Israel has mulled air strikes against Iranian factories). America, as Israel's chief ally and one of Iran's chief opponents, fell under suspicion as well. Neither country has ever admitted to working on Stuxnet. But American officials have never denied it, either."

More recent pieces of malware include Regin, which has been found in computers in Saudi Arabia and Russia, and DarkHotel, which targets corporate executives staying in Asian hotels. Due to their advanced nature and espionage-like purpose, experts believe these malicious pieces of software can be traced to nation-states. Regin has been linked to the British. DarkHotel to South Korea. The reason for these assertions is two-fold. First, the code within each piece of malware includes lexiconical clues: Korean characters in DarkHotel, cricket terminology in Regin. Also, the target of an attack can usually clue observers in on who is likely to have initiated it.

Of course, nothing is certain:

"But all this is tentative. The spies presumably know that their opponents (as well as civilian security researchers) will try to reverse-engineer any computerised bugs they stumble across. So either the clues that do remain were included accidentally, or they are deliberately designed to deceive."

If the future of warfare is to include fewer arms and more malware, it's to be expected that nations will boost their efforts in deciphering code and tracing the trail of smoke from the virtual gun barrel. 

Read more at The Economist

Photo credit: Scott L. Williams / Shutterstock

LinkedIn meets Tinder in this mindful networking app

Swipe right to make the connections that could change your career.

Getty Images
Swipe right. Match. Meet over coffee or set up a call.

No, we aren't talking about Tinder. Introducing Shapr, a free app that helps people with synergistic professional goals and skill sets easily meet and collaborate.

Keep reading Show less

4 reasons Martin Luther King, Jr. fought for universal basic income

In his final years, Martin Luther King, Jr. become increasingly focused on the problem of poverty in America.

(Photo by J. Wilds/Keystone/Getty Images)
Politics & Current Affairs
  • Despite being widely known for his leadership role in the American civil rights movement, Martin Luther King, Jr. also played a central role in organizing the Poor People's Campaign of 1968.
  • The campaign was one of the first to demand a guaranteed income for all poor families in America.
  • Today, the idea of a universal basic income is increasingly popular, and King's arguments in support of the policy still make a good case some 50 years later.
Keep reading Show less

Why avoiding logical fallacies is an everyday superpower

10 of the most sandbagging, red-herring, and effective logical fallacies.

Photo credit: Miguel Henriques on Unsplash
Personal Growth
  • Many an otherwise-worthwhile argument has been derailed by logical fallacies.
  • Sometimes these fallacies are deliberate tricks, and sometimes just bad reasoning.
  • Avoiding these traps makes disgreeing so much better.
Keep reading Show less

Why I wear my life on my skin

For Damien Echols, tattoos are part of his existential armor.

  • In prison Damien Echols was known by his number SK931, not his name, and had his hair sheared off. Stripped of his identity, the only thing he had left was his skin.
  • This is why he began tattooing things that are meaningful to him — to carry a "suit of armor" made up the images of the people and objects that have significance to him, from his friends to talismans.
  • Echols believes that all places are imbued with divinity: "If you interact with New York City as if there's an intelligence behind... then it will behave towards you the same way."
Keep reading Show less