Elektronische Kriegsführung und Cyberwarfare
Cyberangriffe syrischer (regimetreuer) Hacker auf westliche bzw. US-Nachrichtenagenturen und Netzdienstleister, allerdings noch nicht in großem Umfang. Offenkundig scheint man zu wissen, dass der medientechnische Propagandakrieg für Assad nicht mehr richtig greift und teils verloren geht bzw. gegangen ist, deswegen greift man nun eben westliche Medien direkt an...
Zitat:Syrische Elektronische Armee

Wie syrische Hacker im Netz für Assad kämpfen

Sie hackten sich in Twitter und legten die Webseite der "New York Times" lahm: Die syrische Hackergruppe SEA kämpft im Internet für das Regime in Damaskus. Wegen des drohenden Militärschlags gegen Assad warnt das FBI vor verstärkten Angriffen syrischer Hacker. Jetzt hat "Anonymous" der SEA den Krieg erklärt. [...] Wegen eines womöglich bevorstehenden Angriffs der USA auf Syrien könnten sich die Attacken nun sogar verschärfen. [...] Zu ihren Methoden gehören demnach gezieltes Phishing nach Daten (spearphishing), Veränderungen an Webseiten (defacement) und die feindliche Übernahme fremder Webseiten. Das FBI ruft Unternehmen dazu auf, der Sicherheit des eigenen Datenverkehrs vermehrt Aufmerksamkeit zu schenken. Firmen, die Angriffe registrieren, sollten sich an die Behörde wenden. Eine Warnung, dass Infrastuktureinrichtungen der USA gefährdet seien, sprach das FBI allerdings nicht aus.

Wie die Internetseite Russia Today berichtet, hat das FBI die SEA inzwischen auf die Wanted-Liste für gesuchte Kriminelle gesetzt. [...] In den vergangenen Monaten hatten es die syrischen Hacker vor allem auf US-Medien abgesehen: Ende April war es ihnen gelungen, das Twitter-Konto der Nachrichtenagentur Associated Press (AP) zu übernehmen. Damals verbreiteten die Angreifer über den Twitterkanal von AP die Falschmeldung, dass es zwei Explosionen im Weißen Haus gegeben habe und Präsident Obama verletzt sei. [...] Neben der Times waren auch der Kurznachrichten-Dienst Twitter sowie das Online-Medium Huffington Post betroffen. [...]

Doch über ihre Identität weiß man bislang wenig. Nun allerdings könnten ihnen andere Hacker gefährlich werden: Das Hackerkollektiv "Anonymous" droht damit, die SEA anzugreifen und die Identität von vier Personen öffentlich zu machen, die sie für ihre Anführer halten. In einem Interview mit TechWeek Europe behauptet ein Hacker, er habe mit weiteren "Anonymous"-Mitgliedern im April die Website der SEA gehackt und dabei Zugriff auf E-Mail- und Social-Media-Konten der vier SEA-Chefs gehabt. Insgesamt habe "Anonymous" 8 GByte Daten erbeutet.
<!-- m --><a class="postlink" href="http://www.sueddeutsche.de/digital/syrische-elektronische-armee-wie-syrische-hacker-im-internet-fuer-assad-kaempfen-1.1764980">http://www.sueddeutsche.de/digital/syri ... -1.1764980</a><!-- m -->

Schneemann.
Zitieren
<!-- m --><a class="postlink" href="http://www.sueddeutsche.de/politik/ueberwachung-usa-klagen-chinesische-militaers-wegen-internetspionage-an-1.1969634">http://www.sueddeutsche.de/politik/uebe ... -1.1969634</a><!-- m -->
Zitat:19. Mai 2014 18:01

Überwachung
USA klagen chinesische Militärs wegen Internetspionage an

Amerika sieht in China den "bedrohlichsten Akteur im Cyberspace".
Nun werden fünf Hacker angeklagt, weil sie mehrere Großkonzerne ausspioniert haben sollen - doch zu einer Verhandlung wird es vermutlich gar nicht kommen.
...
Zitieren
<!-- m --><a class="postlink" href="http://www.faz.net/aktuell/politik/ausland/asien/amerika-gegen-china-die-cyberkrieger-von-schanghai-12948852.html">http://www.faz.net/aktuell/politik/ausl ... 48852.html</a><!-- m -->
Zitat:Amerika gegen China
Die Cyberkrieger von Schanghai

Amerika gibt Spionage zum Zweck der Sicherheit zu, leugnet aber Wirtschaftsspionage - wie es sie China vorwirft. Peking verweist auf Snowden und bezichtigt Washington der Heuchelei. Die Beziehungen sind auf einem Tiefpunkt.

20.05.2014, ...
Zitieren
<!-- m --><a class="postlink" href="http://www.faz.net/aktuell/politik/ausland/amerika/usa-gegen-china-hacker-in-der-hintertuer-12950581.html">http://www.faz.net/aktuell/politik/ausl ... 50581.html</a><!-- m -->
Zitat:Amerika gegen China
Hacker in der Hintertür

Die Anklage chinesischer Spione ist auch ein Signal Obamas an Europa: Spionage zum Schutz der Nation ist statthaft - der profitgeleitete Diebstahl von Firmengeheimnissen aber ein Verbrechen.

....
Zitieren
<!-- m --><a class="postlink" href="http://www.sueddeutsche.de/politik/nsa-untersuchungsausschuss-juristen-werfen-bnd-verfassungsbruch-vor-1.1972477">http://www.sueddeutsche.de/politik/nsa- ... -1.1972477</a><!-- m -->
Zitat:22. Mai 2014 17:03

NSA-Untersuchungsausschuss
Juristen werfen BND Verfassungsbruch vor

Ohrfeige für die Bundesregierung: Drei hochrangige Juristen - darunter zwei ehemalige Verfassungsrichter - werfen dem Bundesnachrichtendienst vor, gegen das Grundgesetz zu verstoßen. Neue Gesetze müssten her. Und der Bau einer NSA-Abhörzentrale verhindert werden.

...
Zitieren
<!-- m --><a class="postlink" href="http://www.sueddeutsche.de/digital/auslandsgeheimdienst-bnd-will-soziale-netzwerke-live-ausforschen-1.1979677">http://www.sueddeutsche.de/digital/ausl ... -1.1979677</a><!-- m -->
Zitat:30. Mai 2014 18:28

Auslandsgeheimdienst
BND will soziale Netzwerke live ausforschen

Der Bundesnachrichtendienst will künftig soziale Netzwerke wie Twitter und Facebook ausforschen können, noch während die Nutzer aktiv sind. Bei der Begründung seiner Pläne macht sich der BND nach Informationen von SZ, NDR und WDR die Argumente der US-Geheimdienste zu eigen.

...
Zitieren
Es ist einfach krank wie Cyberwarfare immer mehr zum Krieg gegen die eigene Bevölkerung mutiert.
Zitieren
Ich packs mal hierher - denn elektronische Ausspionierung ist eine Teil von Cyberwarfare, und dann ist die Frage der Reaktion nicht uninteressant:
<!-- m --><a class="postlink" href="http://www.sueddeutsche.de/politik/unbefugte-datenweitergabe-nsa-spionage-koennte-ein-fall-fuers-bundesverfassungsgericht-sein-1.2018581">http://www.sueddeutsche.de/politik/unbe ... -1.2018581</a><!-- m -->
Zitat:26. Juni 2014 18:43


Unbefugte Datenweitergabe
NSA-Spionage könnte ein Fall fürs Bundesverfassungsgericht sein


Landet die NSA-Affäre vorm Bundesverfassungsgericht? Bürger, die glauben, ausgespäht worden zu sein, können nach Ansicht des Deutschen Anwaltvereins in bestimmten Fällen Klage einreichen. Auch strafrechliche Ermittlungen sind denkbar.
...
Zitieren
<!-- m --><a class="postlink" href="http://www.sueddeutsche.de/digital/nsa-affaere-usa-duerfen-fast-jedes-land-der-welt-ausspionieren-1.2025411">http://www.sueddeutsche.de/digital/nsa- ... -1.2025411</a><!-- m -->
Zitat:1. Juli 2014 08:35

US-Überwachungsaffäre
NSA darf wichtige Institutionen ausspähen

Kaum ein Land der Welt, kaum eine Institution ist vor der NSA sicher. Das zeigen neue Snowden-Dokumente. Demnach hat ein Geheimgericht der NSA die Erlaubnis erteilt, 193 Länder auszuspähen. Auch EU, EZB und IWF stehen auf der Liste.
...
Zitieren
<!-- m --><a class="postlink" href="http://www.gmx.net/themen/nachrichten/ausland/nsa/52bdcug-nsa-ausschuss-bespitzelt#.hero.NSA-Ausschuss%20bespitzelt?.677.565">http://www.gmx.net/themen/nachrichten/a ... t?.677.565</a><!-- m -->
Zitat:04.07.2014, 12:02 Uhr

BND-Mitarbeiter soll NSA-Untersuchungsausschuss bespitzelt haben

Offenbar wurde der NSA-Untersuchungsausschuss von einem Mitarbeiter des Bundesnachrichtendienstes (BND) für die USA bespitzelt.
Das berichten der NDR, WDR und die "Süddeutsche Zeitung". Demnach wurde ein 31-jähriger Deutscher am Mittwoch wegen des Verdachts der geheimdienstlichen Tätigkeit festgenommen.
....
Zitieren
ich setzt das mal hierher:
<!-- m --><a class="postlink" href="http://www.faz.net/aktuell/wirtschaft/unternehmen/der-schaden-durch-hackerangriffe-wird-immer-groesser-13331689.html">http://www.faz.net/aktuell/wirtschaft/u ... 31689.html</a><!-- m -->
Zitat:Schaden durch Hacker wird immer größer

Der Hackerangriff auf Sony führt der Welt wieder vor, wie anfällig große Computernetze für Attacken sind. Kürzlich konnte auch ein Hochofen nach einem Angriff nicht mehr richtig gesteuert werden. Versicherer entdecken das Risiko als künftiges Geschäftsfeld.

20.12.2014, von Philipp Krohn ...
und dann <!-- m --><a class="postlink" href="http://www.faz.net/aktuell/politik/ausland/hackerangriff-auf-sony-amerikaner-bitten-china-um-hilfe-13333790.html">http://www.faz.net/aktuell/politik/ausl ... 33790.html</a><!-- m -->
Zitat:Amerikaner bitten China um Hilfe

Nach dem Hacker-Angriff auf Sony sucht die amerikanische Regierung Chinas Hilfe, um Nordkorea im Netz zu blockieren. Noch haben die Chinesen nicht geantwortet.

20.12.2014 ...
Zitieren
Das folgende ist bisher ganz an mir vorbei gegangen. Zum ersten Mal haben "Hacker" die Stromversorgung einer ganzen Region gekappt.

<!-- m --><a class="postlink" href="https://www.washingtonpost.com/news/the-switch/wp/2016/01/05/hackers-caused-a-blackout-for-the-first-time-researchers-say/">https://www.washingtonpost.com/news/the ... chers-say/</a><!-- m -->

Zitat:Hackers caused a power outage in Ukraine during holiday season, researchers say, signalling a potentially troubling new escalation in digital attacks.

"This is the first incident we know of where an attack caused a blackout," said John Hultquist, head of iSIGHT Partner's cyberespionage intelligence practice. "It's always been the scenario we've been worried about for years because it has ramifications across broad sectors."

Half of the homes in Ukraine's Ivano-Frankivsk region were left without power

Man muss erst mal realisieren was kein Strom in Deutschland bedeutet: keine Heizung. Keine Treibstoffversorgung. Kein Trinkwasser. Keine Möglichkeit Waren einzukaufen. Und Dank des Just in Time Prinzips in Kürze keinerlei Lebensmittel mehr. usw usf
Zitieren
<!-- m --><a class="postlink" href="http://www.defensenews.com/story/defense/policy-budget/warfare/2015/08/02/us-army-ukraine-russia-electronic-warfare/30913397/">http://www.defensenews.com/story/defens ... /30913397/</a><!-- m -->

Zitat:Electronic Warfare: What US Army Can Learn From Ukraine

Zitat:The US military has for weeks been training Ukrainian forces in US tactics, but the commander of US Army Europe says Ukrainian forces, who are fighting Russian-backed separatists, have much to teach their US trainers.

Ukrainian forces have grappled with formidable Russian electronic warfare capabilities that analysts say would prove withering even to the US ground forces. The US Army has also jammed insurgent communications from the air and ground on a limited basis, and it is developing a powerful arsenal of jamming systems, but these are not expected until 2023.

"Our soldiers are doing the training with the Ukrainians and we've learned a lot from the Ukrainians," said Lt. Gen. Ben Hodges. "A third of the [Ukrainian] soldiers have served in the ... combat zone, and no Americans have been under Russian artillery or rocket fire, or significant Russian electronic warfare, jamming or collecting — and these Ukrainians have. It's interesting to hear what they have learned."

Hodges acknowledged that US troops are learning from Ukrainians about Russia's jamming capability, its ranges, types and the ways it has been employed. He has previously described the quality and sophistication of Russian electronic warfare as "eye-watering."

Russia maintains an ability to destroy command-and-control networks by jamming radio communications, radars and GPS signals, according to Laurie Buckhout, former chief of the US Army's electronic warfare division, now CEO of the Corvus Group. In contrast with the US, Russia has large units dedicated to electronic warfare, known as EW, which it dedicates to ground electronic attack, jamming communications, radar and command-and-control nets.

DEFENSE NEWS

Ukraine Military Seeks to Modernize Past Soviet Era

Though Ukrainian troops lack the materiel to protect themselves from this form of attack, the Ukrainian military's institutional knowledge as a former Soviet republic will help it understand how Russia fights, and its troops will have trained to operate while being jammed, Buckhout said. That's something US ground forces can learn.

"Our biggest problem is we have not fought in a comms-degraded environment for decades, so we don't know how to do it," Buckhout said. "We lack not only tactics, techniques and procedures but the training to fight in a comms-degraded environment."

It's not hard to see why EW is an attractive option for Russia while the eyes of the world are on it. Not only is it highly effective, but as a non-kinetic form of attack, it is harder to trace and less likely to be viewed as overt aggression, and as such, less likely to incite the ire of the international community, Buckhout said.

In a fight, Russia's forces can hinder a target's ability to respond to, say, an artillery attack, allowing them to fire on an enemy with impunity. Ukrainian forces would be unable to coordinate a defense against incoming rockets and missiles, or release counter battery fire.

"If your radars don't see incoming fire, you can't coordinate counterfire," Buckhout said.

The US, Buckhout said, lacks a significant electronic attack capability.

"We have great signals intelligence, and we can listen all day long, but we can't shut them down one-tenth to the degree they can us," she said. "We are very unprotected from their attacks on our network."

Multifunctional EW

Col. Jeffrey Church, the Army's electronic warfare division chief, acknowledged that since the Cold War, adversaries have continued to modernize their EW capabilities, while the Army began reinvesting its capabilities for Iraq and Afghanistan. Church called the fielding of Army electronic warfare equipment the "No. 1 priority" of his job.

"The Army must have electronic warfare capabilities that could be used to dominate key terrain on the electromagnetic spectrum against any adversary," Church said.

A developing Army program, Multifunctional Electronic Warfare (MFEW), is intended to provide an offensive electronic attack capability, able to jam cell phone, satellite and GPS signals, said Lt. Col. Gregory Griffin, chief of the Electronic Warfare Division's programs and requirements branch. However, the focus had been until recent years on "defensive electronic attack," namely counter-radio-controlled-IED devices that create bubbles of protective jamming around vehicles and people, and signals collection for intelligence purposes.

The Army has demonstrated some ability to counter enemy communications, not under formal acquisitions programs but as quick-reaction capabilities. In Afghanistan, the Army used a handful of C-12 aircraft equipped with Communications, Electronic Attack, Surveillance and Reconnaissance (CEASAR) jamming pods to jam insurgent push-to-talk radios, and two fixed-site systems — Ground Auto Targeting Observation/Reactive (GATOR) jammer and Duke V2 EA — to jam radios and repeater towers.

On an ad hoc basis, troops in Afghanistan used GATOR — conceived to protect forward operating bases — to suppress repeater towers while on patrol or training Afghan forces, providing themselves the freedom to maneuver while denying communications to potential enemies, Griffin said.

"It was unlimited capability, limited by the number of systems," Griffin said. "Honestly, we just did not have enough to support the demand that was in the Army."

The Army's electronic warfare cadre, which totals 813 officers, warrant officers and noncommissioned officers, has wielded more theory than hardware, except when deployed. In garrison, it was common for these troops to be assigned other jobs, leading to the joke that EW stands for "extra worker" — though this is changing as the Army ramps up its electronic warfare materiel strategy, Griffin said.

MFEW, due to reach initial operating capability in 2023 and full operating capability in 2027, is intended to offer a suite of powerful, sophisticated sensors and jammers for in the air, on ground vehicles and in fixed locations. The Army is due to consider a capability design document for the "air large" capability, akin to Caesar, potentially for a C-12 or a MQ-8 Fire Scout drone. Last year it tested the Networked Electronic Warfare Remotely Operated (NERO), a jamming pod attached to the Gray Eagle drone.

The Defense Department in March set up a panel to address its electronic warfare shortfalls, which, Griffin said, has generated discussion about accelerating the timeline for MFEW.

'Future of War Is in the Ukraine'

Forces with US Army Europe have for the last 10 weeks been training three battalions of Ukraine Ministry of the Interior troops, known as Ukraine's national guard. The second cycle of that training was paused so that troops could participate in a combined multinational exercise, underway through early August, and it will resume and conclude with the third battalion in August.

The Ukrainian military — which is in the midst of a reform and modernization effort even as it wars with Russia — has shown interest in creating a noncommissioned officer corps modeled after that of the US, Hodges said. Ukrainian military officials charged with reform efforts visited Washington in recent weeks and, in a press conference, acknowledged the challenges of corruption and shoddy soldier equipment, which they sought to correct.

But Konstiantyn Liesnik, an adviser to the Defense Ministry's reform office and head of its working group for logistics and procurement, noted the US military's experience in recent years has concerned insurgents in Iraq and Afghanistan, not a powerful, organized and well-equipped adversary like Russia.

"The future of war is in the Ukraine, and I think in this case our experience is very important to US personnel how war should be in this century and next century," Liesnik said.

Beyond electronic warfare, Russian anti-aircraft rockets have prevented Ukrainian forces from using their airplanes, and it has had to consider personal armor that can protect against artillery.

Ukrainian forces interacting with US soldiers have spoken frankly about their difficulties, something Hodges said he saw firsthand when the chief of the Ukrainian Army, at an event attended by senior leaders from other countries, discussed with a group of officers his force's battlefield experiences and shortcomings.

"I have been very impressed with the earnestness of the Ukrainian military to fix their shortcomings and improve their capabilities," Hodges said. "It was one of the most professional things I have ever seen of any army, and they were very candid: We were not prepared to do this, and here's how we adapted."

Ukrainian troops have not only had to adapt to Russian electronic warfare, but its artillery and unmanned aerial systems. The Ukrainian Army official, Hodges said, also detailed how unprepared Ukrainian troops have been for the number of casualties and their treatment.

The US provided Ukraine with lightweight counter-mortar radars in November 2014, which Hodges said its troops have "used in ways we have not used it ourselves, and made it more effective than we thought was possible." These troops, he said, would be savvy enough to operate a more advanced radar with a wider range — which the Pentagon is reportedly in talks to send.

An official at the US State Department said the administration believes there is no military resolution to this crisis, but Ukraine has the right to defend itself. To that end, it announced a $75 million Defense Department aid package in March that includes 30 armored Humvees, 200 other Humvees, radios and unarmed surveillance drones, night-vision devices and medical supplies.

The 173rd Airborne Brigade Combat Team, based in Vicenza, Italy, had been training Ukrainian troops in western Ukraine, in battlefield medicine, casualty evacuation, and tactical tasks such as anti-roadside bomb techniques and basic battlefield movement.

Saber Guardian, a command post exercise which rotates between Ukraine, Romania and Bulgaria, this year was linked to Rapid Trident, an annual field training exercise held in Ukraine, according to the US Army. The combined exercise, which includes roughly 1,800 soldiers from 18 different nations, is meant to focus on defensive operations to ensure a safe and secure environment within the operating environment.

This year's scenario consists of a host nation that comes under attack. The nation is able to defend itself at great cost. A multinational force is sent to assist the host nation and the challenge is to bring together and train a multinational brigade, which would then be sent to assist the host nation in its defense.
Zitieren
<!-- m --><a class="postlink" href="http://www.tagesschau.de/inland/bundeswehr-cybersicherheit-101.html">http://www.tagesschau.de/inland/bundesw ... t-101.html</a><!-- m -->

Zitat:"Deutschland hinkt da sehr hinterher"

In Deutschland fristete das Thema Cyberangriffe und die Verteidigung dagegen lange ein Nischendasein. Dabei nähmen die Aktivitäten vor allem von ausländischen Geheimdiensten in diesem Bereich deutlich zu, mahnt Thomas Rid vom King's College in London: "Wir müssen von weiterer Eskalation im nachrichtendienstlichen Bereich ausgehen. Deutschland hinkt da sehr hinterher", so Rid.
Zitieren
<!-- m --><a class="postlink" href="http://www.theguardian.com/world/2016/feb/29/pentagon-admits-cyber-attacks-against-isis">http://www.theguardian.com/world/2016/f ... ainst-isis</a><!-- m -->

Zitat: Pentagon admits it is 'looking to accelerate' cyber-attacks against Isis

US military acknowledges for the first time – during an active war – that it’s using its storehouse of new digital weapons to disrupt communications networks
Zitieren


Gehe zu: