Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43440
  • Total Topics: 16532
  • Online today: 3066
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 2
Guests: 3056
Total: 3058









Author Topic: Cyberwarfare Inspires Analysts, Coverage on YouTube, Twitter  (Read 2251 times)

0 Members and 1 Guest are viewing this topic.

Pez

  • SCF VIP Member
  • *****
  • Posts: 776
  • KARMA: 117
  • Gender: Male
  • Pez
Cyberwarfare Inspires Analysts, Coverage on YouTube, Twitter

In 2009, McAfee Labs published the virtual criminology report “The Age of Cyber Warfare.”  At that time we received some surprised comments from incredulous people.

Since then, this area has evolved considerably. Today independent experts are no longer reluctant to predict government-sponsored military and industrial espionage or targeted cyberattacks causing physical damage. Cyberwar and cyberterrorism have become genuine threats.

The experts are now publishing their views. A draft manual outlining how existing international laws can be applied to conflicts in cyberspace was published by Cambridge University Press in September. Prepared by an international group of experts at the invitation of the North Atlantic Treaty Organization Cooperative Cyber Defence Centre of Excellence, the 215-page study “The Tallinn Manual on the International Law Applicable to Cyber Warfare” examines existing international law that allows countries to legally use force against other nations, as well as laws governing the conduct of armed conflict. The rules of conventional warfare are more difficult to apply in cyberspace, making this analysis critical.

In October, the United Nations Office on Drugs and Crime (UNODC) published a report that provides practical guidance to member states for more effective investigation and prosecution of terrorist cases involving the use of the Internet. “The Use of the Internet for Terrorist Purposes” is the first of its kind and was produced in collaboration with the United Nations Counter-Terrorism Implementation Task Force.

Events in the Middle East give us perfect examples of this field: the disclosure of credit card and account details of thousands of Israeli nationals (the UNODC report calls this an act of terrorism), malware targeting a wide range of Israeli government agencies, and a wave of cyberattacks affecting the communication networks on Iranian offshore oil and gas platforms.

On November 14 Internet conflict showed another face: Various media outlets claimed the “first Twitter declaration of war” when the Israeli Defense Forces announced a Gaza operation via a tweet from the @IDFSpokesperson account.


Larger picture

Later, the account confirmed that its first target, Ahmed Al-Jabari of the Ezzidine Al-Qassam Brigades, the Hamas’ military wing, had been killed in the attack. A picture came with the tweet.

[Broken picture link]

More disturbing, another tweet pointed to a YouTube video showing this military operation.


Larger picture

Later, the account confirmed that its first target, Ahmed Al-Jabari of the Ezzidine Al-Qassam Brigades, the Hamas’ military wing, had been killed in the attack. A picture came with the tweet.

Larger picture

More disturbing, another tweet pointed to a YouTube video showing this military operation.


Larger picture

YouTube quickly blocked the video and claimed it violated its terms of service. Nonetheless, the video reappeared yesterday and is now available from a vast number of URLs.


Larger picture

Cyberpropaganda serves not only the Israelis. The Ezzidine Al-Qassam Brigades also have a Twitter account.


Larger picture

They have even directly responded to their attackers, promising revenge.


Larger picture

These recent events demonstrate that Internet is now at the center of many activities, the best and the worst.

And Twitter and YouTube are not the only propaganda vectors. The Israeli army also has a blog, a Flickr account, and a Facebook page.

As for the Ezzedeen Al-Qassam Brigades, their website is now unavailable, perhaps under a DDoS attack.



Orginal article: Friday, November 16, 2012 at 12:02pm by Francois Paget
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing ! http://scforum.info/index.php/topic,8405.msg21475.html#msg21475

Samker's Computer Forum - SCforum.info


 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023