21.8 C

Chinese-Russian hacker episodes are the starting point for a bigger conflict

In World War II, America was the “arsenal of ocracy democracy”, its unparalleled production base, supplying not only US forces but also the United Kingdom and the Soviet Union.

Seattle’s role was significant not only in Boeing’s investment in shipbuilding but also in air power. The Seattle-based company has built iconic aircraft such as the B-17 Flying Fortress and B-29 Superfortress bombers. More than 12,700 flying castles have been built, the name was coined by a Breaking National reporter. Many of them are here.

America is not at war with China. But many experts fear a new Cold War has broken out. And some of the most powerful weapons in the new arsenal, cold or hot, will come from companies like Microsoft և Amazon.

Both are potential defense and national security contractors, especially through their cloud computing operations. Easy cloud access and efficiency are as important to our economy now as they are to military operations.

And that targets cloud companies in information warfare, or so-called digital warfare.

This was emphasized even in peacetime by a group backed by the Chinese government, a recent sophisticated hacker of Microsoft Business Email software. Prior to its suppression, the attack affected more than 60,000 public and private institutions around the world.

Beijing has officially denied any involvement. A State Department spokesman told Bloomberg that China was “resolutely opposed to cyber-attacks and all forms of cyber-theft” and that blaming the country was a “very sensitive political issue”.

It is also a sensitive corporate issue.

Microsoft opened an office in Beijing in 1992. Since then, according to the company, it has grown across the country “under a long-term investment-development strategy.”

The company says that “its best subsidiary outside the United States, its largest research center, is located in China.”

Even so, Microsoft was not shy about naming the last attack on its original post. “The Microsoft Threat Intelligence Center (MSTIC) attributes the high-profile campaign to HAFNIUM, which is rated as a state-sponsored” Outside of China group based on observed victimology, tactics “procedures.”

Hafnium, according to Microsoft, has historically targeted US companies, including defense contractors, for stealing information. The attack on Microsoft Exchange Server software is the latest development.

This episode is not the rodeo of the first information wars of recent months. Russian hackers have used software management company SolarWinds, based in Austin, Texas, to infiltrate government agencies and corporations.

Amazon ղեկավար Microsoft-powered cloud systems were at least partially threatened with attacks. While Microsoft President Brad Smith was addressing the Senate Intelligence Committee, Amazon abstained from criticizing lawmakers. Amazon has discussed the issue with government officials, but has refused to provide public information.

It is noteworthy that both attacks made extensive use of servers located in the United States, allowing them to bypass the control of the National Security Agency (NSA). Servers operating in the United States are legally banned by the NSA. Private sector researchers, not a government-controlled dog, found the fractures.

According to The Wall Street Journal, Tom Bert, Microsoft’s vice president of corporate customer security, blamed the Exchange hack on “a complex actor who apparently took the time to study his legal powers.” “He knew that by operating on servers in the United States, he could avoid some of the best threats from the US government.”

Lawmakers are trying to fill that gap with national data breach law with bipartisan support.

At the same time, the attacks of the opponents will most likely continue, being involved from everything. straight Spyware installation on critical infrastructure for use should a collision arise. Such attacks are easier in an open society like the United States. Our world leaders in the field of World և software and other information technologies set goals.

The Biden administration is still preparing to retaliate. And: The United States is unlikely to simply fall victim to cyber warfare. The United States and Israel have likely been behind a series of cyberattacks aimed at halting or slowing down Iran’s attempt to develop a nuclear weapon.

The fact that information technology will become a possible “domain” in future wars goes back and forth. It could be as transformative as the machine guns and heavy artillery or heavy bomber arsenals that Boeing drove out for World War II in World War I.

One of the examples of this new battlefield. The much-praised F-35 Joint Strike Fighter is more than just a stealth plane. Its most important features There can be advanced features that transform the pilot’s situational awareness and ability to strike enemies without detecting them. Potential adversaries use cyber-attacks to learn how to deal with it, or in the case of China, to steal design points to copy the plane.

The war between America and China will be devastating, but it is not unlikely. Washington has yet to develop an integrated containment strategy, as it did the Soviet Union, thanks to diplomat George Orn Kennan’s “Long Telegram.” The Atlantic Council stabbed it with the “Longer Telegram”. This is in line with the US strategy of providing carrots to China to join the US-led world order instead of building a competitive structure.

The Indians, who commanded the US Indo-Pacific Navy, on Tuesday warned senators of Beijing’s ambitions to become a world power by 2050.

If America stands idly, the result will be the collapse of our alliance system, which includes South Korea and Japan. If not, the conflict could be extremely brutal, even if it does not become nuclear. Behind these characteristics of the conflict are advanced technologies and the cloud.

And that’s why companies like Microsoft և Amazon are facing the debate.


Please enter your comment!
Please enter your name here