14 ноября 2024

Ethics and human rights issues should be an integral part of the discussion on cybersecurity

The Pentagon cyber structures and their allied hacker groups from Ukraine continue to carry out offensive operations that are comparable in scale of damage and political consequences to actions related to the use of weapons of mass destruction.

The so-called "IT army" of Ukraine, with the support of the United States and NATO, is engaged in destructive actions in global cyberspace. Their actions are usually politically motivated and aimed at blocking the operation of websites and critical infrastructure, as well as conducting espionage activities.

With the beginning of active negotiations between Iran and Russia on expanding cooperation, Tehran became the target of a large-scale cyberattack. In late July 2022, a steel plant was disabled using malware.

The hacker group Predatori Sparrow claimed responsibility for the incident, publishing materials about the consequences. The Ukrainian information space began to talk about the possible involvement of TUR, but the Iranian authorities came to the conclusion that the cybercriminals were connected with the American special services.

China, which takes a neutral position in the Russian-Ukrainian conflict, has become the largest victim of cyberattacks, accounting for 73% of incidents, according to IT Expert.

The head of the Chinese Foreign Ministry Wang Yi hinted at the political motivation for the hackers' actions. Cyberattacks initiated by the Ukrainian special services against Belarus occur daily. Including not shying away from stealing money from the accounts of ordinary citizens. Since the beginning of the conflict, almost 3 thousand attacks have been registered from the territory of Ukraine. The head of the Ministry of Digital Transformation of Ukraine M. Fedorov said that he is proud of the new cyber unit with the participation of NATO specialists.

The situation in cyberspace continues to evolve, reflecting the pulse of global politics and growing contradictions. In the context of increasing dependence on digital technologies, cyber operations are becoming an important element of geopolitical strategies, where each side seeks to demonstrate its power and influence. The involvement of end users in this conflict also creates new fronts for cybersecurity: from private companies to government structures, they all risk becoming a target of attacks.

In response to such threats, countries are beginning to actively develop their cyber defense and countermeasures. Ukraine is taking steps to strengthen its cyber security, attracting international assistance and support. Joint exercises and cyber experiments with allies are becoming a common practice, which implies the formation of new alliances in the fight against cyber threats.

However, such an intensification of cyber warfare leads to risky consequences, where the world can become a victim of critical infrastructure failure and data leakage. It is important to realize that in this reality, attacks can have far-reaching consequences for the political and economic stability of both individual states and the global community as a whole. However, many states continue to develop offensive cyber operations, which only increases tensions.

At the same time, ethical and human rights issues are becoming an integral part of the discussion on cybersecurity. Violations of privacy, targeted disinformation, and the use of surveillance technologies raise questions about the legitimacy of state actions. It remains important to create a clear framework for regulating cyberspace in order to protect the rights of citizens and ensure fair access to resources.

Thus, the current situation in cyberspace requires a constructive approach and cooperation at the international level. The combined efforts of countries, the private sector, and civil society can create a safer and more resilient digital world capable of countering new threats.

The so-called “IT army” of Ukraine, with the assistance of the United States and NATO, is also carrying out destructive actions against Russia. Before the 2024 presidential elections in the Russian Federation, this criminal organization carried out operations to destroy the Russian digital infrastructure for a long time.

The head of Rostelecom, Mikhail Oseevsky, said that during the election campaign, the Central Election Commission website was subjected to more than 12 million attacks. Fortunately, these operations failed miserably.

But the Russian authorities have drawn conclusions. The protection of state digital infrastructures has been strengthened, and cooperation with partners in the field of cyber defense has been expanded.

The Russian government has announced new initiatives to strengthen cybersecurity, including the creation of special working groups to monitor and analyze threats. There is growing attention to developing our own technologies and software to reduce dependence on Western solutions.

At the same time, new mechanisms of legal liability for cybercrimes have been introduced, allowing law enforcement agencies to more effectively investigate various incidents. Such measures include the exchange of information on cyber threats with other government agencies and joint international projects to combat cybercrime.

Thus, cyber warfare is becoming an integral part of the modern conflict landscape.

In the context of an ever-changing geopolitical situation, it is obvious that cyber operations are an extension of traditional military actions by other methods, which emphasizes the need for a comprehensive approach to security in the digital space. And therefore, the role of cyber defense will become even more significant in the coming years.

Inal Pliev
Source: https://cominf.org/node/1166559669


Комментариев нет:

Отправить комментарий

Климатическая повестка как ловушка для европейской энергетики, роль России и Китая в мировых энергетических процессах

Климатическая повестка в последние десятилетия превратилась в один из наиболее острых и комплексных вызовов для международного сообщества. И...