Tag Archive for: Eurasia

Fortifying Our Digital Realm – OpEd – Eurasia Review


Much like the physical world, there is a virtual/digital world which is also characterized by anarchy. Challenges and threats emanating from the cyber world are as serious and consequential as those of the “real” world of traditional security.

Today, the realm of world security is not only about “bullet vs. bullet,” it is also about “click vs. bullet.” The internet has changed the way we share information, interact, and develop on a global scale. It has had a significant impact, bringing about previously unheard-of breakthroughs in connectedness, equality, and human prosperity. But in addition to these astounding developments, the digital world often portrays more somber truths. It has developed into a haven for disinformation, cyber threats, data theft, and digital authoritarianism that jeopardizes peace and stability. 

In this age of lightning-fast technical development, everyone involved in the problem-solving process needs to share some of the blame. The digital ecosystem, which once offered almost endless possibilities, now necessitates group action to reduce the risks that come with it. It is critical to recognize the interdependence of people and technology and the significant influence they have on one another as we negotiate this challenging landscape. The need to counterbalance accountability in the digital domain is central to this subject matter. This means that the dynamics of the digital ecosystem will fundamentally change such that defenders will now have the upper hand against harmful actors. To strengthen cybersecurity defenses, improve resilience, and prevent sensitive data from being misused, coordinated actions are needed.

The ongoing and intense hegemonic battle between the United States and China can be explained by the conflict over big data hegemony. Thus, gaining a competitive edge in AI technology may come from acquiring more data through connections with more governments. To dominate AI technology, the United States and China plan to create their own exclusive network platform, or value bloc. As such, friendly nations like the United States and China may be compelled to adopt a binary framework. Being on either side of the ROK, a state…

Source…

Critically Analyzing ‘Evolving Cyber Operations’ And Implications For Pakistan – OpEd – Eurasia Review


A recent report by RAND Cooperation titled “Evolving Cyber Operations” provides a comprehensive analysis of cyber operations and capabilities, particularly focusing on the lessons from the Ukraine conflict. It presents a critical look at the evolving nature of cyber warfare, the role of cyber proxies, and the shift from traditional cyber defense strategies to a resilience-focused approach.

It emphasizes cyber resilience over deterrence. The report emphasizes a shift from deterrence to resilience in cyber defense strategies. It argues that democracies cannot rely solely on deterring cyberattacks but must focus on minimizing disruption to critical data and services. The report also highlighted the role of cyber proxies. The conflict in Ukraine highlighted the significant role of cyber proxies. These proxies, whether aligned with Russia or Ukraine, have demonstrated their capacity to influence conflicts beyond direct cyberattacks, particularly in shaping political narratives and international opinions

Political and Social Resilience: Political and social resilience is identified as crucial in cyber defense. The Ukrainian experience shows the importance of maintaining political will and leveraging a diverse range of actors, including civil society and the private sector, in building a robust defense. International Collaboration remains one of the most important: The report underscores the importance of international partnerships in cyber defense. Sharing intelligence, technology, and tactics among allies can significantly enhance a nation’s cyber capabilities The use of proxies in cyber warfare has evolved, with groups like Killnet and the IT Army of Ukraine playing significant roles. These groups have blurred the lines between traditional state-aligned proxies and transnational political actors

Implications for Pakistan’s National Security

Enhancing Cyber Resilience: Pakistan should prioritize building a resilient cyber infrastructure that can withstand and quickly recover from cyberattacks. This involves not just technological solutions but also a comprehensive strategy encompassing political, social, and economic dimensions.

Diverse Cyber Defense Strategy:…

Source…

Security Implications In Context Of Kashmir Region – Eurasia Review


The union territory of Jammu and Kashmir has been subjected to many internet shutdowns in recent years, including the longest ever enforced in a democracy, lasting 145 days due to the repeal of Article 370,i which granted the state special status. However, instead of entirely shutting down the internet, the government frequently slows it down while also restricting the number of sites that an individual may visit.ii 

The government’s main objective has been social media, which has been put to sleep throughout the lockdowns. During this period, the Virtual Private Network (VPN) comes in handy for residents, allowing them to access government-banned websites, notably social media. This has become a major security concern since the government believes that the VPN is mostly used to spread incorrect and fabricated facts, causing societal instability while also providing information to secessionist groups, compromising national security. So, in order to prevent all of this from happening, the state has prohibited the usage of VPN services, and any person discovered engaging in this behaviour will suffer legal consequences.iii

Introduction

VPN (Virtual Private Network) refers to the ability to establish a secure network connection when utilising public networks. VPNs encrypt your internet traffic and conceal your identity online. This makes it more difficult for third parties to follow your internet activities and steal information. The encryption happens in real time. A VPN conceals your IP address by routing it through a specially configured distant server maintained by a VPN host. iv

This implies that if you use a VPN to access the web, the VPN server becomes the source of your data. This means that your ISP and other third parties cannot know which websites you visit or what data you transmit and receive online. A VPN acts as a filter, converting all of your data into “gibberish.v” Even if someone were to obtain your data, it would be worthless. The VPN boom in Kashmir finds its genesis in various lockdowns which puts a haul in normalcy of day-to-day activities. The exponential rise in use of VPN was seen after the abrogation of article 370 of the Indian constitution when…

Source…

Russian Hackers Targeted US Nuclear Scientists – Eurasia Review


(EurActiv) — A Russian hacking team known as Cold River targeted three nuclear research laboratories in the United States this past summer, according to internet records reviewed by Reuters and five cyber security experts.

Between August and September, as President Vladimir Putin indicated Russia would be willing to use nuclear weapons to defend its territory, Cold River targeted the Brookhaven (BNL), Argonne (ANL) and Lawrence Livermore National Laboratories (LLNL), according to internet records that showed the hackers creating fake login pages for each institution and emailing nuclear scientists in a bid to make them reveal their passwords.

Reuters was unable to determine why the labs were targeted or if any attempted intrusion was successful. A BNL spokesperson declined to comment. LLNL did not respond to a request for comment. An ANL spokesperson referred questions to the US Department of Energy, which declined to comment.

Cold River has escalated its hacking campaign against Kyiv’s allies since the invasion of Ukraine, according to cybersecurity researchers and western government officials. The digital blitz against the US labs occurred as U.N. experts entered Russian-controlled Ukrainian territory to inspect Europe’s biggest atomic power plant and assess the risk of what both sides said could be a devastating radiation disaster amid heavy shelling nearby.

Cold River, which first appeared on the radar of intelligence professionals after targeting Britain’s foreign office in 2016, has been involved in dozens of other high-profile hacking incidents in recent years, according to interviews with nine cybersecurity firms. Reuters traced email accounts used in its hacking operations between 2015 and 2020 to an IT worker in the Russian city of Syktyvkar.

“This is one of the most important hacking groups you’ve never heard of,” said Adam Meyers, senior vice president of intelligence at US cybersecurity firm CrowdStrike. “They are involved in directly supporting Kremlin information operations.”

Russia’s Federal Security Service (FSB), the domestic security agency that also conducts espionage campaigns for Moscow, and Russia’s embassy in Washington did not…

Source…