Experts Attempt to Map the Battlefields of Cyber Warfare

It's harder to trace a smoking gun online than it is in real life. Yet with cyber warfare expected to grow in the coming decades, companies and countries alike are attempting to make sense forward strides in identifying the perpetrators of cyber attacks.

When attempting to make sense of a physical warzone, there are many clues to help you identify the combatants. These include uniforms, accents, flags, battle strategies, types of weaponry, etc. For example, most people with an elementary understanding of World War II could identify a German regiment from an American one simply by looking at their helmets.

The present and future of cyberwarfare offers little in comparison. As explained by The Economist, anti-virus firms and other computer experts often have to rely on educated guesses and conjecture to track the origin of malicious software designed to spy on other nation-states. 

"One of the most famous bits of nation-state malware, Stuxnet, was used to sabotage centrifuges used by Iran's nuclear programme. Suspicion naturally fell on Israel, which is the region's most technologically advanced nation, and which has long feared that Iran is working on a nuclear bomb (there have been rumours that Israel has mulled air strikes against Iranian factories). America, as Israel's chief ally and one of Iran's chief opponents, fell under suspicion as well. Neither country has ever admitted to working on Stuxnet. But American officials have never denied it, either."

More recent pieces of malware include Regin, which has been found in computers in Saudi Arabia and Russia, and DarkHotel, which targets corporate executives staying in Asian hotels. Due to their advanced nature and espionage-like purpose, experts believe these malicious pieces of software can be traced to nation-states. Regin has been linked to the British. DarkHotel to South Korea. The reason for these assertions is two-fold. First, the code within each piece of malware includes lexiconical clues: Korean characters in DarkHotel, cricket terminology in Regin. Also, the target of an attack can usually clue observers in on who is likely to have initiated it.

Of course, nothing is certain:

"But all this is tentative. The spies presumably know that their opponents (as well as civilian security researchers) will try to reverse-engineer any computerised bugs they stumble across. So either the clues that do remain were included accidentally, or they are deliberately designed to deceive."

If the future of warfare is to include fewer arms and more malware, it's to be expected that nations will boost their efforts in deciphering code and tracing the trail of smoke from the virtual gun barrel. 

Read more at The Economist

Photo credit: Scott L. Williams / Shutterstock

Related Articles

Scientists discover what caused the worst mass extinction ever

How a cataclysm worse than what killed the dinosaurs destroyed 90 percent of all life on Earth.

Credit: Ron Miller
Surprising Science

While the demise of the dinosaurs gets more attention as far as mass extinctions go, an even more disastrous event called "the Great Dying” or the “End-Permian Extinction” happened on Earth prior to that. Now scientists discovered how this cataclysm, which took place about 250 million years ago, managed to kill off more than 90 percent of all life on the planet.

Keep reading Show less

Why we're so self-critical of ourselves after meeting someone new

A new study discovers the “liking gap” — the difference between how we view others we’re meeting for the first time, and the way we think they’re seeing us.

New acquaintances probably like you more than you think. (Photo by Simone Joyner/Getty Images)
Surprising Science

We tend to be defensive socially. When we meet new people, we’re often concerned with how we’re coming off. Our anxiety causes us to be so concerned with the impression we’re creating that we fail to notice that the same is true of the other person as well. A new study led by Erica J. Boothby, published on September 5 in Psychological Science, reveals how people tend to like us more in first encounters than we’d ever suspect.

Keep reading Show less

NASA launches ICESat-2 into orbit to track ice changes in Antarctica and Greenland

Using advanced laser technology, scientists at NASA will track global changes in ice with greater accuracy.

Firing three pairs of laser beams 10,000 times per second, the ICESat-2 satellite will measure how long it takes for faint reflections to bounce back from ground and sea ice, allowing scientists to measure the thickness, elevation and extent of global ice

Leaving from Vandenberg Air Force base in California this coming Saturday, at 8:46 a.m. ET, the Ice, Cloud, and Land Elevation Satellite-2 — or, the "ICESat-2" — is perched atop a United Launch Alliance Delta II rocket, and when it assumes its orbit, it will study ice layers at Earth's poles, using its only payload, the Advance Topographic Laser Altimeter System (ATLAS).

Keep reading Show less