Ethical Hacking: Kali Linux Penetration testing Computer security Social Engineering ...
Ethical Hacking:
Kali LinuxPenetration testing
Computer security
Social Engineering
Information warfare
War itself is probably as old as human race, but time by time its deadly methodologies and strategic deceiving modalities changed dramatically each and every half decade. The earliest wars took place were involved man-on-horse with spears and then Trencherman took over until the dawn of mechanized man. In the World War I, aircraft started to play a role and, by the 1940s, air forces had become the new way to project superior power. At sea; the submarines in the deep ocean armed with intercontinental missiles that could hit almost any point on Earth within a half-hour. The battleships that played a big role in eastern Pacific seas have replaced by modern warship carriers that launch off fighter planes. Air superiority traditionally became war games of the westerners for capitulating a quick and sharp attacks. Nowadays, the war of manned craft is already moved into space with unmanned vehicles,surveillance radars,drones,satellites giving unheard-of knowledge required to annihilate and jamming enemy's radar array system to overshadowing enemies' ballistic missile-launching pads.Whenever war has expanded into a new sphere,intrinsically it drove new technology at flay, different tactics and usually new force structures.This is the reason why we have Navies, air forces that just beginning with the Armies of Arrow-man to the squadron of F-17. But now, again war is moving rapidly into the information sphere, Professor Jarno Limnéll, a cyber security expert at Aalto University retaliated that, "the world is moving toward a greater strategic defensive and offensive of cyber capabilities to persuade or intimidate adversaries,”
Ron Deibert explain the role of Cyber warfare
Counter Cyber Warfare
It very worth for the nations to develop measures that ensure secured defensive cyber programs to protect the national security and safeguarding command-lines and domestic communication systems. Foreign military forces and civilian institutions alike will utilize information and technology to launch cyber attacks that can both harass and degrade national interest or subdue fighting will-power. It is equivocally, necessary for military projects to be aligned synchronically with civil organizations in order to create a secure and robust data network, since internet has connects almost every aspect of our lives. Everyone from governments to banking facilities and private companies use the internet for electronic communications and aid daily administrations. Cyberspace has swallowed large parts of our daily interactions include Mobile Telecommunications,Multimedia and civic networks which are literally, the backbone of our society. If the internet stops working, for instance all kinds of other things will stop working too. This is very dangerous for unprepared nations, cyber attacks launched through the internet can cause immense damage,imparting moral humiliation or swaying citizenry trustworthiness toward the service provided by the government or organization.
When cyber attack occurred in the country is not only the military or targeted organizations will be affected, all wired people and entire nations that depend on daily internet usage for civic administrations, business purposes and hospitality services will suffer as consequence. Some people's career too which are online oriented will be negatively harmed by such simple attack. However, cyber operations often remain classified and as a result it leaves most people in the dark and confused about what is really happening on networks or what is going on. A cyber attacks with destructive viruses or malware that jam,shut down or create a blackout to the electronic system such as computers,satellites, google engine, communication and commanding networks responsible for battlefield effectiveness can render huge problem to the entire force,in its operational tasks of executing combat missions.
The Chinese, for example, have embark on cyber espionage campaigns to infiltrate all military institutions and civil alike on the planet. The Chinese they repeatedly, trying to gain access into U.S.A defense and commercial components with the aim to steal military technologies and other classified industrial information. The Chinese military have a specialized researching unit, called 'Unit 61398,' based on the outskirts of Shanghai, patriotically devoted to the industrial cybernetic espionage. According to Joe McReynolds a security analyst, says "China has three types of operational military units: And mostly those professional hackers are officiated to fight against foreign's networks, many of them are in military and some remnant in civilian units tasked to carry out a synchronicity defensive and offensive network attacks. The units comprise of members and specialists from various governmental organizations including the Ministry of State Security , and the Ministry of Public Security who are authorized to conduct military networking spying on domestic activities and foreign institutions.
Cyber threat is not only posed by the Chinese alone who are making an effort in the manner of trying to steal technology and piggy-back on the findings. United States and Israel too also doing the same as according the revelation of Edward Snowden and Wikileaks, the two countries are heavily using the 5th generation digital weapon, which infamous called Stuxnet worm to sabotage Iran’s nuclear program and delay the nuclear weapon development. Stuxnet worm targets industrial control systems that are used to monitor and control large scale industrial facilities like power plants, dams, production systems and other giant industrial platforms. It allows the attackers to take control of these systems without the operators knowing its intrusion. This digital weapon allow the attacker or hackers to manipulate real-world equipment, which then in reality it's very dangerous.
NSA with Cyber penetration
Cyber units most manned by people who are hired experts work like electronic mercenaries running electronic researches and analyses under the cover of non-government entities, that can be ordered, organized and mobilized any time needed for specific infos warfare. Israel is actively engaging into electronic espionage system and development at a low profile. Despite its small size, Israel is a main leader in communication technology particular in military domain, chasing the group of Singapore,South Korea, Japan,Estonia and others digitalized nations that topping the chart of the most advanced countries with technological and computational infrastructures in the whole world. Israel is so fortunate for forging a technical partnership with the U.S.A some firms like Microsoft and Amazon have invested heavily in the Israeli defense sectors and these commercial companies are constantly seeking cyber security protection, they announced that they were interested in buying Israeli cyber security companies. The primacy of security investment is to seek a communication safe haven, which is becomingly extremely very difficult to maintain as we move towards 4th Generation of super technologies where there would be simultaneous intrusion by outsiders from different directions.
The international cyber security is not the trivial, but a serious global security concern that prey on everyone's emails,personal computers, Tweet's counts or Facebook pages,the most popular social media platforms. Institutions in Africa,Latin America and Asia are not exclusion. It's a sobering pity to the Third World nations include African nations that are being exploited without defensive strategical counter measure thereto ping who is reeling into their civic systems, either daring to figure out domestic long term goals. I am encouraging developing nations to steal opportunity initiating some pre-preemptive information-hunt (military-industrial technologies from those developed nations who already have them) in order to develop local infrastructures and improve domestic components.This's not a call for "demon", but a necessities because it seems everyone is hacking another.
South Africa an El-dorado of cyber espionage
Many countries in world are hacking one another, Cyber warfare has become a legitimate a game of "Troy" recently for every security institutions and business organizations are creeping at each other every time and then, to cast an eye at plans,designs and trade secrets of their rivalries or business competitors. Russian has been suspected of carrying out cyber attack on Turkey following the downing of a Russian fighter jet late last year. For around about 20 hours the entire country (Turkey) was without internet,due to cybernetic interruption. Another similar cyber attack was done on the power plants in Ukraine were the malware shut down the electronic system at Kiev international airport which followed the place to be temporally closed for several days due to system failure. Cyber defense and training are more important as the only way military's endeavor that projecting and aiming to stay at least one step ahead of the adversary's cyber sleuths and maintain the constant strategic advantages with high techs in this era that predominantly by electronic warfare, in order to affords the protection of its nations and grantee safety of national security from any attack.
Foot note:
It is advisable for any nation to protect its own people,secure domestic communications and military command networks away from external penetration. Cyber counter measure is a crucial aspects of modern defensive doctrines and package of 12th century for any intelligence unit, gone the days when much of information acquisition was depend of Human Intelligence and case operative officer on foot, however this is another era of digital evolution, where human agents his trade-craft substituted by a computer and software. Most nations are actively seeking a means to protect their own cyber systems while at the same time trying to create a method of monitoring and interfering into foreign systems of other nations. Most cyber attacks today are not for hostility purposes, but more performed to steal brains of another nation.