Between states photograph

Between States

Use attributes for filter !
Google books books.google.com
Originally published May 26, 1995
Authors Yossi Shain
Date of Reg.
Date of Upd.
ID2913860
Send edit request

About Between States


Between States is the first book that assesses systematically the broad implications of interim governments in the establishment of democratic regimes and on the existence of states. . . .

Why is it so rare to hear about Western cyber-attacks?

Why is it so rare to hear about Western cyber-attacks?
Jun 22,2023 10:21 pm

... " A general education of the public is important, because this is basically where a lot of tensions Between States are going to be playing out in the future...

Why south India outperforms the north

Why south India outperforms the north
Sep 20,2022 9:30 pm

... Earlier this year, there was a tussle Between States and the central government about lowering fuel prices, with the latter demanding that the states do so - and many of the southern states pushing back...

Heatwave: Living at 40C in Abuja, Delhi, Madrid and Sydney

Heatwave: Living at 40C in Abuja, Delhi, Madrid and Sydney
Jul 19,2022 3:30 pm

... Policies vary Between States...

Germany takes Italy to UN court over Nazi-era compensation claims

Germany takes Italy to UN court over Nazi-era compensation claims
May 1,2022 12:30 am

... The ICJ, based in The Hague, the Netherlands, is the principal judicial body of the UN, with one of its primary roles being the resolution of legal disputes Between States...

US Senate confirms Ketanji Brown Jackson to Supreme Court

US Senate confirms Ketanji Brown Jackson to Supreme Court
Apr 7,2022 9:30 pm

... The top court plays a crucial role in American public life and is often the last word on highly contentious laws and disputes Between States and the federal government...

What is a war crime, and could Putin be prosecuted over Ukraine?

What is a war crime, and could Putin be prosecuted over Ukraine?
Mar 10,2022 3:51 pm

... The International Court of JusticeThe ICJ rules on disputes Between States, but cannot prosecute individuals...

Western Australia: Isolated state reopens two years into the pandemic

Western Australia: Isolated state reopens two years into the pandemic
Mar 2,2022 10:24 pm

... But internally, there were also fierce and bitter disputes Between States who d closed their borders to others...

Supreme Court: Biden to nominate first black female judge to top court

Supreme Court: Biden to nominate first black female judge to top court
Feb 25,2022 5:19 pm

... The Supreme Court plays a key role in American life and is often the final word on highly contentious laws, disputes Between States and the federal government, and final appeals to stay executions...

Why is it so rare to hear about Western cyber-attacks?

Jan 26,2022 11:56 pm

By Joe TidyCyber correspondent

A cyber-attack that took over iPhones at a Russian Technology company is being blamed on US government hackers. Could The Attack , and The response from The Russian government, be rewriting The Narrative of who The Good Guys and Bad Guys are in cyber-space?

Camaro Dragon, Fancy Bear , Static Kitten and Stardust Chollima - these aren't The latest Marvel film superheroes But The Names given to some of The Most feared hacking groups in The World .

For years, these elite cyber teams have been tracked from hack to hack, stealing secrets and causing disruption allegedly under orders from their governments.

And cyber-security companies have Even created cartoon images of them.

With dots on a world map, marketeers at these companies regularly warn customers about where these " advanced persistent threats" (APTs) are coming from - usually Russia, China, North Korea and Iran.

But parts of The map remain conspicuously empty.

So why is it so rare to hear about Western hacking teams and cyber-attacks?

A major hack in Russia, unearthed earlier this month, might provide some clues.

Defenders under attack

From his desk overlooking The Moscow Canal , The cyber-security worker watched as strange pings began to register on The Company wi-fi network.

Dozens of staff mobile phones were simultaneously sending information to strange parts of The Internet .

But This Was no ordinary company.

This Was Russia's biggest cyber company Kaspersky, investigating a potential attack on its own employees.

" Obviously our minds turned straight to spyware But we were pretty sceptical at first, " chief security researcher Igor Kuznetsov says.

" Everyone's heard about powerful cyber tools which can turn mobile phones into spying devices But I thought of this as a kind of Urban Legend that happens to Someone Else , Somewhere Else . "

After painstaking analysis of " several dozen" Infected iPhones, Igor realised their hunch had been right - They had indeed unearthed a large sophisticated surveillance-hacking campaign against their own staff.

The Type of attack They had found is The Stuff of nightmares for cyber defenders.

The hackers had invented a way to infect iPhones simply by sending an iMessage that automatically deletes itself once The malicious software is injected into The Device .

" Wham, you're Infected - and you don't Even see it, " Igor says.

'Reconnaissance operation'

The victims' entire phone contents were now being pinged back to The attackers at regular intervals. Messages, emails and pictures were Shared - Even access to cameras and microphones.

Keeping to Kaspersky's long-standing rule of not pointing fingers, Igor says They are not interested in from where this digital espionage attack was launched.

" Bites don't have nationalities - and anytime a cyber-attack is blamed on a certain country, then it's done with an agenda, " he says.

But The Russian government is less concerned About That .

On The same day Kaspersky announced its discovery, Russian security services saying They had " uncovered a reconnaissance operation by American intelligence services carried out using Apple mobile devices".

The Russian cyber-intelligence service made no mention of Kaspersky But claimed " several thousand telephone sets" belonging to both Russians and Foreign Diplomats had been Infected .

The bulletin Even accused Apple of actively helping in The hacking campaign. Apple denies it was involved.

The alleged Culprit - The United States National Security Agency (NSA) - Told Bbc News it had No Comment .

Igor insists Kaspersky did not coordinate with The Russian security services and The government's bulletin took them by surprise.

Some in The cyber-security world will be surprised by this - The Russian government had appeared to be issuing a joint announcement with Kaspersky, for Maximum Impact , The kind of tactic increasingly used by Western countries to expose hacking campaigns and loudly point fingers.

Only last month, The US government issued a joint announcement with Microsoft - Chinese government hackers had been.

And this announcement was swiftly and predictably followed by a chorus of agreement from America's allies in cyber-space - The UK, Australia, Canada and New Zealand - known as The Five Eyes.

China's response was a rapid denial saying The Story was all part of a " collective disinformation campaign" from The Five Eyes countries.

Chinese Foreign Ministry Official Mao Ning added China's regular response: " The fact is The United States is The empire of hacking. "

'Targeting China'

But now, like Russia, China seems to be adopting a more aggressive approach to calling out Western hacking.

State-run news outlet China Daily has warned foreign-government-backed hackers are.

And that warning came with a statistic from Chinese company 360 Security Technology - it had discovered "51 hacker organisations targeting China".

The Company did not respond to requests for comment.

Last September, China also accused The US of hacking a government-funded university responsible for aeronautics and space research programmes.

'Fair Play '

" China and Russia have slowly figured out The Western model for cyber exposure is incredibly effective and I think We Are seeing a shift, " Rubrik Zero Labs head and former cyber intelligence worker Steve Stone says.

" I'll also say I think that's a good thing. I have zero issue with other countries revealing what Western countries are doing. I think it's Fair Play and I think it's appropriate. "

Many brush off The Chinese charge of The US being The empire of hacking as hyperbole - But there is some truth in it.

According to The International Institute for Strategic Studies (IISS), The US is The only tier-one cyber power in The World , based on attack, defence and influence.

Tier two is made up of:

The National Cyber Power Index, compiled by researchers at The Belfer Centre for Science and International Affairs, also deems.

The annual paper's lead researcher, Julia Voo, has also noticed a shift.

" Espionage is routine for governments and now it's so often in The form of cyber-attacks - But there's a battle of narrative going on and governments are asking who is behaving responsibly and irresponsibly in cyber-space, " she says.

And compiling a list of APT hacking groups and pretending there are no Western ones is not a truthful depiction of reality, she says.

" Reading The same reports about hacking attacks from only one side adds to a general ignorance, " Mrs Voo says.

" A General Education of The Public is important, because this is basically where a lot of tensions Between States are going to be playing out in The Future . "

And Mrs Voo praises The UK government for into National Cyber Force operations.

" It's not super-detailed But More Than other countries, " she says.

'Data bias'

But The lack of transparency could also stem from cyber-security companies themselves.

Mr Stone calls it a " data bias" - Western cyber-security companies fail to see Western hacks, because They have no customers in rival countries.

But there could also be a conscious decision to put less effort into some investigations.

" I don't doubt that there's likely some companies that may pull The Punch and hide what They may know about a Western attack, " Mr Stone says.

But he has never been part of a team that deliberately held back.

Lucrative contracts from governments such as The UK or US are a major revenue stream for many cyber-security companies too.

As One Middle Eastern cyber-security researcher says: " The cyber-security intelligence sector is heavily represented by Western vendors and greatly influenced by their customers' interests and needs. "

The Expert , who asked to remain anonymous, is one of More Than a dozen volunteers regularly contributing to The APT Google Sheet - a tracking all known instances of threat-actor activities, irrespective of their origins.

It has a tab for " Nato" APTs, with monikers such as Longhorn, Snowglobe and Gossip Girl , But The Expert admits it is pretty empty compared with tabs for other regions and countries.

'Less noise'

He says another reason for The lack of information on Western cyber-attacks could be because They are often stealthier and cause less Collateral Damage .

" Western nations tend to conduct their cyber operations in a more precise and strategic manner, contrasting with The more aggressive and broad attacks associated with nations like Iran and Russia, " The Expert says.

" As a result, Western cyber operations often yield less noise. "

The Other aspect to a lack of reporting could be trust.

It is easy to brush off Russian or Chinese hacking allegations because They often lack evidence.

But Western governments, when They loudly and regularly point The Finger , rarely, if ever, provide any evidence either.

Related Topics

Source of news: bbc.com

Related Persons

Next Profile ❯