Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Has World War C (Cyber) Already Started?

    Written by

    Sean Michael Kerner
    Published October 27, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      For most of recorded human history, wars have included some form of kinetic attack involving the physical world. However, in the modern connected world with nation-states attacking each other electronically, the next world war could well be World War C (Cyber). In fact, according to a former Naval Criminal Investigative Service (NCIS) agent, the war could have already begun.

      Kenneth Geers is a senior global threat analyst at FireEye and had previously worked for the U.S. government at NCIS and the North Atlantic Treaty Organization (NATO). Prior to joining FireEye, Geers was the U.S. representative to the NATO Cooperative Cyber Defence Centre of Excellence in Estonia. Estonia is perhaps the first nation-state victim of a full-scale cyber-attack, which took place back in 2007. Geers was the NCIS cyberdivision chief in 2007 and had a front-row seat to that attack.

      “The Estonian president came to the White House, and The Pentagon was all spun up about whether a cyber-attack was in fact an act of war,” Geers said.

      What happened next is Geers moved to Estonia and built a NATO cyber-center there, which physically opened in 2008. In the years since, multiple incidents have occurred around the world as nation-states have built their cyber-offensive capabilities. At FireEye, Geer has continued his research into the current state of nation-state cyber-attacks and is planning on providing full disclosure about his findings at the Black Hat Brazil event at the end of November.

      “I’m going to try to back up all the stories people see in the news with real data,” Geers said. “At FireEye I’m in a position now to analyze data from thousands of collection points.”

      Geers’ assertion is that governments already have forward deployed assets in preparation for cyber-attacks and a cyber-war. Computer network operations are also likely to play a critical role in terms of land, air and sea components of a potential future conflict.

      “It seems to me that you had better be hacking in peacetime to get ready for war,” Geers said.

      Attacks Today

      FireEye will have a new paper out in the coming weeks that examines recent events in the context of World War C. Geers said that over the first six months of 2013, FireEye’s network sensors deployed around the cloud collected approximately 129 million network security events. Geers is examining approximately 100,000 of those events that have been categorized as advanced persistent threats (APTs). That data also presents a view into the command and control (C2) infrastructure for APTs.

      The data will help Geers answer the question of whether or not the next world war has already begun. The key to any APT is that it is persistent, and it is that persistence that Geers considers to be a smoking gun for nation-state involvement when the target is critical infrastructure such as power plants.

      “A lone hacker could never have the persistence that APTs exhibit,” Geers said.

      Even a hacktivist group like Anonymous is too ad hoc to be able to maintain the type of long-term persistence that FireEye is tracking in modern APTs, he said. In addition, he noted, cyber-crime gangs aren’t likely behind APTs either as the potential to generate easy money isn’t there.

      Geers asserted that the consistent persistence of an APT requires a concerted effort and a team of individuals in order to properly execute. The fact that the attack is persistent also means that there is dedicated staff in place, which is another telltale sign of nation-state participation.

      “If you find consistent and persistence activity against national critical infrastructure, I’m betting it’s a nation-state,” Geers said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×