Europe between past and future

Mar 30, 2015

LOGS OF MONDAY, 30-03-2015 / Rival hackers fighting proxy war over Crimea

LOGS OF MONDAY, March 30th 2015
( Times in CET! ) :

Greetings from here...

- RADIO EXPERIENCE (?), 6286kcs, 18.08hrs, SINPO 3-2,423,3-2
  ( Pop music )

- DE ZWARTE BOEKANIER, 1630kcs, 19.00hrs, SINPO 24242
  ( Dutch music )

- RADIO MIRABELLE, 6250kcs, 19.03hrs, SINPO 24242
  ( Oldy )

- RADIO PYTHON, 6305kcs, 19.59hrs, SINPO 2-3,433,2-3
  ( Pop music )

- UNID ON 6290kcs, 20.02hrs, SINPO 4343,3-4
  ( Dutch music )

- MISTI RADIO, 6735kcs, 20.23hrs, SINPO 34333
  ( Oldy, then c/d )

- RADIO QUADZILLA, 6295kcs, 20.27hrs, SINPO 2-3,423,2-3
  ( Pop oldy )

- RADIO 42, 6305kcs, 20.35hrs, SINPO 3423,3-2
  ( Pop oldy )

- RADIO NEMO, 6245kcs, 20.41hrs, SINPO 34333
  ( Pop oldy )

- RADIO CALIMERO, 1638kcs, 21.12hrs, SINPO 34343 ( At 23.29hrs: 4343,4-3)
  ( Dutch music )

- RADIO VALKENSTER, 1650kcs, 22.42hrs, SINPO 2-3,4322
  ( Dutch music )

- LASER HOT HITS, 4026kcs, 22.47hrs, SINPO 34333
  ( Pop oldy )

Rival hackers fighting proxy war over Crimea

Hackers have been busy causing service interruptions, breaching databases, and defacing hundreds of Ukrainian and Russian websites, as the crisis between the two countries plays out in cyberwarfare.
The attacks have similarities to the resistance movement that sprung up among German-occupied countries during World War II, which took many forms including sabotage, espionage, armed confrontation and counter-propaganda.
n addition to that list, today we can add digital or web-based actions including Distributed Denial of Service (DDoS) attacks, which shut down key websites, the defacement of government websites, and breaching government or key industry networks to access sensitive documents and release them to the world.
Services like Twitter and Instagram may be used to capture events in real-time, and YouTube may be used for recruitment, training and propaganda purposes.
The global networks that enable the incredible global communication and information-sharing applications we have all come to enjoy, all use insecure hardware and software. Just like there's no human cell that is immune to every virus, there's no piece of software that is immune from being exploited.
As a result, the most powerful nations in the world today cannot reliably defend their own information and communications infrastructure from targeted attacks, by even a single hacker.
To make matters worse, many of today's best hackers aren't employed by their respective governments.
While the resistance movement of World War II had fewer skills to bring to combat than members of the armed forces, today we see a "super-resistance" composed of elite hackers, for whom cracking a secure network is certainly equal to and in some cases superior to that of a militarized cyberwarfare unit.
Shortly after police cracked down on "Euromaidan" street protesters, who were calling for closer integration with the EU, in Kiev in November last year, Ukrainian security engineers began discussing the necessity of forming an all-volunteer cyberdefense force. By March 1, 2014, cyberattacks on both sides kicked into high gear.
OpRussia, a hacker group formed under the Anonymous umbrella, posted a warning to Russian President Putin that his aggression against Ukraine would not stand on March 1, 2014.
Since then, members of OpRussia have been attacking Russian business and government websites on a daily basis, including the website for the Russian Air Force, the website of the Kamchatka region, Russia's narcotics control service, and even a Russian escort service.
Russian CyberCommand is another group of hackers, some of whom are Russian, who oppose Putin's annexation of Crimea and have been relentless in their attacks against Russian businesses and agencies such as Rosoboronexport -- Russia's sole agency authorized to sell defense and dual-use products and technologies to foreign entities -- and -- a Russian IT security company that provides services to Gazprom, Skolkovo, and other important organizations.

No comments:

Post a Comment