Page 53 - Cyber Defense eMagazine for September 2020
P. 53

(disinformation).  It  is  carried  out  by:  sending  emails;  organizing  news  groups;  creating  sites  for  the
            exchange of opinions; posting information on individual pages or in electronic versions of periodicals and
            network broadcasting (broadcasts of radio and TV stations). An example of this is a series of civil protests
            in the USA in 2011  (web.archive.org, 2013). Its organizing force was the social network Facebook and
            the micro blog Twitter. It was from there that anti-government slogans and calls for civil disobedience
            were heard.

            The most common way to use cyberspace in the interests of the conflicts is to replace the information
            content of sites, which consists in replacing pages or their individual elements as a result of hacking.
            Such actions are taken mainly to draw attention to the attacking side, demonstrate their capabilities, or
            are a way of expressing a certain political position. In addition to direct page substitution, it is widely used
            to register sites of opposite content in search engines using the same keywords, as well as redirecting
            (replacing)  links  to  another  address,  which  leads  to  the  opening  of  specially  prepared  pages  by  the
            opposing party.

            We should highlight the so-called semantic attacks, which consist in hacking pages and then carefully
            (without noticeable traces of hacking) placing deliberately false information on them. Such attacks are
            usually carried out on the most frequently visited information pages, the content of which users fully trust.

            Another  way  to  use  the  Internet  in  the  interests  of  information  warfare  is  to  disable  or  reduce  the
            effectiveness of the functioning of the structural elements of the network. The most commonly used ways
            to reduce the effectiveness of its individual elements are DOS attack and the introduction of computer
            viruses. So, the military Department of Taiwan has created about 1 thousand such viruses, which in the
            event  of  a  crisis  can  disable  the  computer  systems  of  the  PRC.  Their  ability  to  break  through  the
            telecommunications network of the "enemy" was tested during the exercise.

            As well as in physical world, in virtual domain of our surrounding, people, channels, articles, and websites
            shape our mentality. Reasonable people understand that a company of neo-Nazi on the street will not do
            any good but continue sitting on the extremist channels. Conscious citizens realize that believing tabloids
            with  poor  evidence  and  getting  free  money  on  the  street  is  non-credible  but  go  on  reading
            recommendation  articles  and click  on  strange  ads  called  "SEND  US  YOUR  DATA  AND GET FREE
            MONEY". We are extremely vulnerable right now because we do not have skills required to correctly
            identify information needed to perform a specific task or solve a problem. As a result, we are exposed to
            technical and informational attacks and, therefore, our values can be shaped and data can be stolen. It
            leads to social disintegration, and national security suffers.

            Post-digital time is transforming modern civilization, and new technologies require a change in mentality.
            Currently, the world community is undergoing a transformation, correlated with the change of epochs and
            cultures.  Today  goods,  services,  and  even  the  environment  of  people  are  individually  configured.
            Companies and states focus on each person in every aspect of their lives, shaping the reality in which
            they live. We are living in post-digital time when mobility and portability, simple user interfaces, and easy
            accessibility to the Internet, including the use of cloud services and open web standards, as well as
            mobile applications with the ability to seamlessly synchronize information between different devices take
            place. At such critical moments, the issue of security as a basic need is always acute – the new replaces
            the established old and at the stage of its origin brings with it something uncontrolled and unmanageable,
            since the mechanisms for controlling and managing this new have not yet been formed. That is why




            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         53
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   48   49   50   51   52   53   54   55   56   57   58