قتال الإنترنت
حرب الإنترنت Cyberwarfare، هو مصطلح يشير إلى استخدام الحواسيب والإنترنت في مهاجمة الأعداء ويدعون بالهاكرز. Cyberwarfare is the use of technology to attack a nation, causing comparable harm to actual warfare.[1] There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists.[2] One view is that the term ‘cyberwarfare’ is a misnomer, since no offensive cyber actions to date could be described as ‘war’.[3] Offensive cyber actions, such as those in Estonia in 2007, Georgia in 2008, Iran in 2010, North Korea[4] have occurred in the context of international relations, only resulting in condemnation and denial by sides.[3] An alternative view is that 'cyberwarfare' is a suitable label for cyber attacks which cause physical damage to people and objects in the real world.[5]
While there is debate over how to define and use 'cyberwarfare' as a term, many states including the United States, United Kingdom, Russia, India, China, Israel, Iran, and North Korea[6][7][8] have active cyber operations for offensive and defensive operations. As states explore the use of cyber operations and combine capabilities the likelihood of physical confrontation and violence playing out as a result of, or part of, a cyber operation is increased. However, meeting the scale and protracted nature of war is unlikely, thus ambiguity remains.[3]
The first instance of kinetic military action used in response to a cyber-attack resulting in the loss of human life was observed on May 5, 2019, when the Israel Defense Forces targeted and destroyed a building associated with an on-going cyber-attack.[9][10]
الحرب |
---|
التاريخ العسكري |
العصور |
قبل التاريخ • القديمة • الوسيطة |
مجالات المعارك |
أسلحة |
مدرعات • مدفعية • بيولوجية • سلاح الفرسان |
تكتيكات |
استراتيجية |
التنظيم |
الإمداد |
القوائم |
المعارك • القادة • العمليات |
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
أنوع الهجمات
هناك العديد من أنواع الهجوم في حرب الإنترنت، القائمة التالية مرتبة من الأقل خطراً إلى الأشد خطورة:
- تخريب المواقع: الهجمات التي تشوهصفحات على الانترنت، أو denial-of-service attacks. هذا النوع من الهجمات عادة ما يـُرّد بسرعة وضرره محدود.
- پروپاگندا: رسائل سياسية يمكن نشرها لأي شخص يرى الانترنت.
- جمع بيانات. المعلومات السرية غير المحفوظة بأمان يمكن اعتراضها وإلتقاطها بل وتعديلها, مما يجعل التآمر ممكناً حتى من الجانب الآخر من العالم. انظر Titan Rain وMoonlight Maze.
- Distributed Denial-of-Service Attacks: أعداد كبيرة من الحواسب في بلد واحد تشن DoS attack ضد أنظمة في بلد آخر.
- تعطيل المعدات: الأنشطة العسكرية التي تستعمل الحواسب والسواتل للتنسيق هي في خطر من هذا النوع من الهجمات. الأوامر والاتصالات يمكن اعتراضها أو استبدالها مما يعرض حياة الجنود للخطر.
- مهاجمة البنى التحتية الحساسة: شبكات الكهرباء والماء والوقود والاتصالات والمواصلات كلهم معرضون لهجمات هجمات الإنترنت.
التجسس واختراقات الأمن الوطني
التخريب
شبكة الطاقة الإلكترونية
الدوافع
عسكرية
مدنية
القطاع الخاص
حرب الإنترنت حسب البلد
الولايات المتحدة
American "Kill switch bill"
حرب الإنترنت في الصين
مكافحة التجسس على الإنترنت
المناوارات الأمريكية الصينية 2012
في 18 أبريل 2012 كشفت صحيفة ذه گارديان عن أن الولايات المتحدة والصين منخرطتان في مناورات سرية على حرب الإنترنت، وسط تصاعد الغضب في واشنطن، بشأن تزايد الهجمات الإلكترونية المنسقة التي تشنها بكين على الحكومات الغربية والشركات الكبرى. وأفادت الصحيفة بأن مسؤولين من وزارتي الخارجية والدفاع الأميركيتين، انخرطوا مع نظرائهم الصينيين في مناورتين إلكترونيتين العام الماضي، بهدف منع وقوع تصعيد عسكري مفاجئ بين الجانبين، إذا ما شعر كل واحد منهما بأنه مستهدف، ويخططان لإجراء مناورة مشتركة أخرى في هذا المجال الشهر المقبل. وأوضحت أن المناورات نظمها مركز الدراسات الإستراتيجية والدولية في واشنطن ومعهد الصين للعلاقات الدولية المعاصرة في بيجينغ، وسمحت للمسؤولين الحكوميين الأميركيين ووكالات الاستخبارات الأميركية، بإجراء اتصالات مع نظرائهم الصينيين في بيئة أقل رسمية.[11]
نقد على المصطلحات
هجمات معروفة
- الولايات المتحدة تعرضت لهجوم من دول بينها الصين وروسيا. انظر Titan Rain وMoonlight Maze.[12]
- في 17 مايو، 2007، أعلن أن إستونيا تعرضت لهجمة إنترنت من روسيا. واستهدف البرلمان الإستوني، الوزارات، المصارف، والإعلام.[13]
- في أول أسبوع من سبتمبر 2007، هوجمت حواسب الپنتاگون ومختلف الهيئات الحكومية الفرنسية والألمانية والبريطانية هوجمت بواسطة هاكرز Chinese origin. The صينيين، أنكرت الحكومة الصينية تورط الصين في ذلك الهجوم.
- قيرغيزستان هوجمت من قِبل هاكرز إستونيينأثناء انعقاد انتخاباتها المركزية.[14]
- وفي 23 يناير 2008 لم يُسمح للعديد من المستخدمين زيارة المواقع الإلكترونية الرئيسية للساينتولوجي. اُكتـُشـِف أن مجموعة هاكر معروفة باسم anymous (ANON) ادعت المسئولية عن الهجوم.[15]
- In 2012, in a startling volley of allegations, India has been accused of hacking a U.S commission's e-mail communications, which primarily dealt with the economic and security relations between U.S and China. Reports confirm that hackers from an Indian government spy unit managed to post on the Internet, what is being understood be an Indian military intelligence document on cyber-spying. The document, reportedly discussed at length on ways to target the U.S - China commission aided with the expertise lent by western mobile phone manufacturers. The document, reportedly, also included transcripts of the emails exchanged between members of the commission.[16]
- On November 21, 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois.[17] However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence Center.[18]
- On October 6, 2011, it was announced that Creech AFB's drone and Predator fleet's command and control data stream has been keylogged, resisting all attempts to reverse the exploit, for the past two weeks.[19] The Air Force issued a statement that the virus had "posed no threat to our operational mission".[20]
- In July 2011, the South Korean company SK Communications was hacked, resulting in the theft of the personal details (including names, phone numbers, home and email addresses and resident registration numbers) of up to 35 million people. A trojaned software update was used to gain access to the SK Communications network. Links exist between this hack and other malicious activity and it is believed to be part of a broader, concerted hacking effort.[21]
- Operation Shady RAT is an ongoing series of cyber attacks starting mid-2006, reported by Internet security company McAfee in August 2011. The attacks have hit at least 72 organizations including governments and defense contractors.[22]
- On December 4 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the Central Bureau of Investigation (CBI). The National Informatics Center (NIC) has begun an inquiry.[23]
- On November 26 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a revenge for the Mumbai terrorist attacks, which had confirmed the involvement of Pakistani terrorists.[24]
- In October 2010, Iain Lobban, the director of the Government Communications Headquarters (GCHQ), said Britain faces a "real and credible" threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 times each month, such attacks threatened Britain’s economic future, and some countries were already using cyber assaults to put pressure on other nations.[25]
- In September 2010, Iran was attacked by the Stuxnet worm, thought to specifically target its Natanz nuclear enrichment facility. The worm is said to be the most advanced piece of malware ever discovered and significantly increases the profile of cyberwarfare.[26][27]
- In May 2010, In response to Indian Cyber Army defacing Pakistani websites, 1000+ الهندn websites were defaced by PakHaxors, TeaMp0isoN, UrduHack & ZCompany Hacking Crew, among those were the Indian CID website, local government of Kerala, Box Office of Indian, Brahmos missile website, Indian HP helpdesk, Indian Institute of Science, and The Indian Directorate General of Shipping.[بحاجة لمصدر]
- In July 2009, there were a series of coordinated denial of service attacks against major government, news media, and financial websites in South Korea and الولايات المتحدة.[28] While many thought the attack was directed by North Korea, one researcher traced the attacks to the United Kingdom.[29]
- Russian, South Ossetian, Georgian and Azerbaijani sites were attacked by hackers during the 2008 South Ossetia War.[30]
- In 2007 the website of the Kyrgyz Central Election Commission was defaced during its election. The message left on the website read "This site has been hacked by Dream of Estonian organization". During the election campaigns and riots preceding the election, there were cases of Denial-of-service attacks against the Kyrgyz ISPs.[31]
- In September 2007, Israel carried out an airstrike on Syria dubbed Operation Orchard. U.S. industry and military sources speculated that the Israelis may have used cyberwarfare to allow their planes to pass undetected by radar into Syria.[32][33]
- In April 2007, Estonia came under cyber attack in the wake of relocation of the Bronze Soldier of Tallinn.[34] The largest part of the attacks were coming from Russia and from official servers of the authorities of Russia.[35] In the attack, ministries, banks, and media were targeted.[36][37]
- In the 2006 war against Hezbollah, Israel alleges that cyber-warfare was part of the conflict, where the Israel Defense Force (IDF) intelligence estimates several countries in the Middle East used Russian hackers and scientists to operate on their behalf. As a result, Israel attached growing importance to cyber-tactics, and became, along with the U.S., France and a couple of other nations, involved in cyber-war planning. Many international high-tech companies are now locating research and development operations in Israel, where local hires are often veterans of the IDF's elite computer units.[38] Richard A. Clarke adds that "our Israeli friends have learned a thing or two from the programs we have been working on for more than two decades."[39]
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
جهود المكافحة
منظمة تعاون شانغهاي (من أعضائها روسيا والصين) defines cyberwar to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other states". In contrast, the United States' approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech. This difference of opinion has led to reluctance in the West to pursue global cyber arms control agreements.[40] However, American General Keith B. Alexander did endorse talks with Russia over a proposal to limit military attacks in cyberspace.[41]
A Ukrainian professor of International Law, Alexander Merezhko, has developed a project called the International Convention on Prohibition of Cyberwar in Internet. According to this project, cyberwar is defined as the use of Internet and related technological means by one state against political, economic, technological and information sovereignty and independence of any other state. Professor Merezhko's project suggests that the Internet ought to remain free from warfare tactics and be treated as an international landmark. He states that the Internet (cyberspace) is a "common heritage of mankind."[42]
انظر أيضاً
- Air Force Cyber Command (Provisional)
- Chinese intelligence operations in the United States
- Computer insecurity
- Cyber Operations
- Cyber ShockWave
- Cyber spying
- Cyberterrorism
- Cyberwarfare in Russia
- Denial-of-service attack
- Electronic warfare
- Espionage
- Hacker (computer security)
- Industrial espionage
- Information warfare
- IT risk
- iWar
- List of cyber attack threat trends
- Penetration test
- Proactive Cyber Defence
- Signals intelligence
- Stuxnet
- U.S. Cyber Command
قراءات إضافية
- Andress, Jason. Winterfeld, Steve. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress. ISBN 1-59749-637-5
- Brenner, S. (2009). Cyber Threats: The Emerging Fault Lines of the Nation State. Oxford University Press. ISBN 0-19-538501-2
- Carr, Jeffrey. (2010). Inside Cyber Warfare: Mapping the Cyber Underworld. O'Reilly. ISBN 978-0-596-80215-8
- Cordesman, Anthony H., Cordesman, Justin G. Cyber-threats, Information Warfare, and Critical Infrastructure Protection, Greenwood Publ. (2002)
- Janczewski, Lech; Colarik, Andrew M. Cyber Warfare and Cyber Terrorism IGI Global (2008)
- Rid, Thomas (2011) "Cyber War Will Not Take Place," Journal of Strategic Studies, DOI:10.1080/01402390.2011.608939
- Ventre, D. (2007). La guerre de l'information. Hermes-Lavoisier. 300 pages
- Ventre, D. (2009). Information Warfare. Wiley – ISTE. ISBN 978-1-84821-094-3
- Ventre, D. (Edit.) (2010). Cyberguerre et guerre de l'information. Stratégies, règles, enjeux. Hermes-Lavoisier. ISBN 978-2-7462-3004-0
- Ventre, D. (2011). Cyberespace et acteurs du cyberconflit. Hermes-Lavoisier. 288 pages
- Ventre, D. (Edit.) (2011). Cyberwar and Information Warfare. Wiley. 460 pages
- Ventre, D. (2011). Cyberattaque et Cyberdéfense. Hermes-Lavoisier. 336 pages
- Woltag, Johann-Christoph: 'Cyber Warfare' in Rüdiger Wolfrum (Ed.) Max Planck Encyclopedia of Public International Law (Oxford University Press 2012).
المصادر
- ^ Singer, P. W. (Peter Warren). Cybersecurity and cyberwar : what everyone needs to know. Friedman, Allan. Oxford. ISBN 9780199918096. OCLC 802324804.
- ^ "Cyberwar - does it exist?". NATO. 2019. Retrieved 05/10/2019.
{{cite web}}
: Check date values in:|access-date=
(help) - ^ أ ب ت Cyber warfare : a multidisciplinary analysis. Green, James A., 1981-. London. 7 November 2016. ISBN 9780415787079. OCLC 980939904.
{{cite book}}
: CS1 maint: location missing publisher (link) CS1 maint: others (link) - ^ Lockie, Alex. "North Korea's embarrassing missile failure may have been due to US cyber sabotage". Business Insider. Retrieved 2019-05-10.
- ^ Lucas, George. Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare. Oxford. p. 6. ISBN 9780190276522.
- ^ "Advanced Persistent Threat Groups". FireEye (in الإنجليزية). Retrieved 2019-05-10.
- ^ "APT trends report Q1 2019". securelist.com. Retrieved 2019-05-10.
- ^ "GCHQ". www.gchq.gov.uk. Retrieved 2019-05-10.
- ^ Newman, Lily Hay (2019-05-06). "What Israel's Strike on Hamas Hackers Means For Cyberwar". Wired. ISSN 1059-1028. Retrieved 2019-05-10.
- ^ Liptak, Andrew (2019-05-05). "Israel launched an airstrike in response to a Hamas cyberattack". The Verge. Retrieved 2019-05-10.
- ^ "مناورات سرية أميركية صينية على حرب الإنترنت". البيان البحرينية. 2012-04-18. Retrieved 2012-04-19.
- ^ Jim Wolf, "U.S. Air Force prepares to fight in cyberspace", رويترز, 3 نوفمبر, 2006
- ^ Ian Traynor, 'Russia accused of unleashing cyberwar to disable Estonia", جريدة گارديان، 17 مايو، 2007
- ^ Website of Kyrgyz Central Election Commission hacked by Estonian hackers, Regnum, 14 December, 2007
- ^ [1]; A إعلان حرب was posted on youtube.[2]
- ^ [3] accessdate=10 Jan, 2012
- ^ Mathew J. Schwartz (November 21, 2011). "Hacker Apparently Triggers Illinois Water Pump Burnout". Information Week.
- ^ Kim Zetter (November 30, 2011). "Exclusive: Comedy of Errors Led to False 'Water-Pump Hack' Report". Wired.com.
- ^ U.S. drone and predator fleet is being keylogged accessdate=2011-10-06
- ^ Hennigan, W.J. "Air Force says drone computer virus poses 'no threat'." LA Times, 13 October 2011.
- ^ "SK Hack by an Advanced Persistent Threat" (PDF). Command Five Pty Ltd. Retrieved 2011-09-24.
- ^ Jim Finkle (2011-08-03). "State actor seen in "enormous" range of cyber attacks". Reuters. Retrieved 2011-08-03.
- ^ Hacked by 'Pakistan cyber army', CBI website still not restored. Ndtv.com (2010-12-04). Retrieved on 2011-11-08.
- ^ 36 government sites hacked by ‘Indian Cyber Army’ – The Express Tribune. Tribune.com.pk. Retrieved on 2011-11-08.
- ^ Britain faces serious cyber threat, spy agency head warns. The Globe and Mail (2010-10-13). Retrieved on 2011-11-08.
- ^ AFP: Stuxnet worm brings cyber warfare out of virtual world. Google.com (2010-10-01). Retrieved on 2011-11-08.
- ^ Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon | Video on. Ted.com. Retrieved on 2011-11-08.
- ^ Sudworth, John. (2009-07-09) New cyberattacks hit South Korea. BBC News. Retrieved on 2011-11-08.
- ^ Williams, Martin. UK, Not North Korea, Source of DDOS Attacks, Researcher Says. PC World.
- ^ Danchev, Dancho (2008-08-11). "Coordinated Russia vs Georgia cyberattack". ZDnet. Retrieved 2008-11-25.
{{cite news}}
: Cite has empty unknown parameter:|coauthors=
(help) - ^ Website of Kyrgyz Central Election Commission hacked by Estonian hackers, Regnum, 14 December 2007
- ^ Fulghum, David A. "Why Syria's Air Defenses Failed to Detect Israelis", Aviation Week & Space Technology, 2007-10-03. Retrieved on 2007-10-03.
- ^ Fulghum, David A. "Israel used electronic attack in air strike against Syrian mystery target", Aviation Week & Space Technology, 2007-10-08. Retrieved on 2007-10-08.
- ^ "War in the fifth domain. Are the mouse and keyboard the new weapons of conflict?". The Economist. July 1, 2010. Retrieved 2010-07-02.
Important thinking about the tactical and legal concepts of cyber-warfare is taking place in a former Soviet barracks in Estonia, now home to NATO's "centre of excellence" for cyber-defence. It was established in response to what has become known as "Web War 1", a concerted denial-of-service attack on Estonian government, media and bank web servers that was precipitated by the decision to move a Soviet-era war memorial in central Tallinn in 2007.
{{cite news}}
: Cite has empty unknown parameter:|coauthors=
(help) - ^ Estonia accuses Russia of 'cyber attack'. Csmonitor.com (2007-05-17). Retrieved on 2011-11-08.
- ^ Ian Traynor, 'Russia accused of unleashing cyberwar to disable Estonia", The Guardian, May 17, 2007
- ^ Boyd, Clark. (2010-06-17) BBC: Cyber-war a growing threat warn experts. BBC News. Retrieved on 2011-11-08.
- ^ "Israel Adds Cyber-Attack to IDF", Military.com, Feb. 10, 2010
- ^ خطأ استشهاد: وسم
<ref>
غير صحيح؛ لا نص تم توفيره للمراجع المسماةClarke
- ^ Tom Gjelten (September 23, 2010). "Seeing The Internet As An 'Information Weapon'". National Public Radio. Retrieved September 23, 2010.
- ^ Gorman, Siobhan. (2010-06-04) WSJ: U.S. Backs Talks on Cyber Warfare. Online.wsj.com. Retrieved on 2011-11-08.
- ^ Український центр політичного менеджменту – Зміст публікації – Конвенция о запрещении использования кибервойны. Politik.org.ua. Retrieved on 2011-11-08.
وصلات خارجية
؛ كتب
؛ تسجيلات
- "Sabotaging the System" video, "60 Minutes", Nov. 8, 2009, CBS News, 15 minutes [site not found]
- "Cyber ShockWave" (simulation of a cyber attack), Feb. 16, 2010, video from the Bipartisan Policy Center, 8 minutes
- مقالات
- ABC: Former White House security advisor warns of cyber war
- Wall Street Journal: Fighting Wars in Cyberspace
- Will There Be An Electronic Pearl Harbor, PC World by Ira Winkler, Dec 1 2009
- How to Spot a Corporate Spy, Computer World, Feb 6 2009
- US China Security and Review Commission, 2009 annual report Chapter 2 on China's activities impacting US security interests
- Senate panel: 80 percent of cyberattacks preventable, Wired, Nov 17 2009
- Consumer Reports Online Security Guide
- Fox News: Updated Cybersecurity information
- Cyberwarfare reference materials
- Infowar Monitor
- Cyber, War and Law
- Information Warfare
- Information about cybercrime and Warfare
- GCHQ: Britain's Most Secret Intelligence Agency
- Duncan Gardham, 26 June 2009, Hackers recruited to fight 'new cold war', Telegraph UK
- Stefano Mele, 30 September 2010, Cyberwarfare and its damaging effects on citizens