{"version":"1.0","provider_name":"myBlogd - Free Publishing and Advertising","provider_url":"https:\/\/myblogd.com","author_name":"behind_you","author_url":"https:\/\/myblogd.com\/index.php\/author\/behind_you\/","title":"THE HISTORY OF CYBERWARFARE AND UKRAINE - myBlogd - Free Publishing and Advertising","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"cZNY7uS8j7\"><a href=\"https:\/\/myblogd.com\/index.php\/2024\/12\/25\/the-history-of-cyberwarfare-and-ukraine\/\">THE HISTORY OF CYBERWARFARE AND UKRAINE<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/myblogd.com\/index.php\/2024\/12\/25\/the-history-of-cyberwarfare-and-ukraine\/embed\/#?secret=cZNY7uS8j7\" width=\"600\" height=\"338\" title=\"&#8220;THE HISTORY OF CYBERWARFARE AND UKRAINE&#8221; &#8212; myBlogd - Free Publishing and Advertising\" data-secret=\"cZNY7uS8j7\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/myblogd.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"The history of cyberwarship and Ukraine, thanks to Steve Burgess, 2022 People are much more drawn to pictures of blown-up buildings, fires, mushroom clouds, refugees in dire circumstances, color pictures of pain that are better in black and white than they are to explanations of code or even fallout from code if it is not resulting in something blown-up or fiery, or pictures of people in pain that are better in black and white that are better in black and white. It is not a visceral issue, despite the fact that we hear a lot of tales about ransomware, temporary interruptions to businesses, and fraudulent use of credit cards and identification cards. Both on the paper and in our brains, everything passes before our own eyes. Now, what happened to the tales that we read before the age of cyberattacks were published? when the United States Cyber Command was just a glimmer in the eyes of a few nerds? Where did the conversation go when it was being discussed that cyberattacks might result in kinetic responses? It is bombs, not electrons. Maybe it was a sense of proportion that was at play. It is possible that we have come to the realization that if we reply to an expanding cyberwar with guns, it might merely result in us seeing pictures of things that would be better in black and white right in front of our very own doorway. Did we retreat, or did the planners finally come to their senses and realize what they were doing? Take a peek at some of the past, shall we? Back in 2003, a cyberattack that originated in China and was given the name &#8220;titan rain&#8221; by the United States was successful in gaining access to a large amount of sensitive government information. This was accomplished by compromising the systems of both government contractors in the United States and government systems of the government itself. This type of assault woke up the whole globe, despite the fact that only information that was not secret was taken. In 2004, the Joint Chiefs of Staff proclaimed cyberspace to be a significant domain of war, joining the ranks of the air, land, sea, and space domains in receiving this designation. There is no question that the actuality of the titan rain was the impetus for this. We had only begun to consider these issues on a national basis as a society, and we were just getting started. In 2007, Estonia was the target of a widespread cyberattack that targeted its central government, financial institutions, and media outlets. It was thought to have originated from Russia on the part of Russian performers or from Russia itself. In 2007, the North Atlantic Treaty Organization (NATO) took action by establishing the NATO Cooperative Cyber Defense Center of Excellence (CCDCOE). It was at this point that continents started to become aware of the danger and the need of taking action to address it. the manual of the tailinn These earlier activities were starting to be recognized as acts of war, and the CCDCCOE started working on developing a comprehensive study and code that would explain how international law relates to cyber wars and cyberwarfare. A tailinn handbook on the international law relevant to cyber warfare was prepared by the CCDCOE in 2012. This manual was developed in 2012 and called for the participation of legal experts and legal practitioners who have expertise in cyber concerns. According to the tailinn guideline, it was acceptable to murder hackers in reaction to specific cyberattacks under certain circumstances. Killing hackers, anyone? A number of additional cyberattacks that were sponsored by states made their way into the public eye during this time. In order to undermine Iran&#8217;s attempts to develop nuclear technology, the stuxnet worm was created. More specifically, it was designed to target the centrifuges that are used to enrich uranium gas. It is considered to be the first virus known to have been intended to visit physical devastation on physical equipment and to have been successful in doing so. It was being referred to as the first digital weapon by wired magazine. It is generally accepted that the United States of America and Israel worked together over a period of five years to produce this malicious software. In 2009, Secretary of Defense Robert Gates, who was aware of the significance of computers and networks as well as their vulnerability, was the driving force behind the establishment of the United States Cyber Command (USCybercom). According to the United States and the rest of the world, it is the unified command for the cyberspace domain. In 2016, the group referred to the espionage operations that were carried out against the Democratic National Committee with the intention of destroying democracy as &#8220;serious business.&#8221; These operations took place within the middle of a national election. At the time, authorities inside the government believed that cyber weapons have such a high potential for destruction that they should only be implemented on the direct commands of the commander in chief, similar to the way that nuclear weapons are only used. It is not clear to me if there is a &#8220;cyber football&#8221; that is comparable. According to article 51 of the United Nations Charter, independent nations have the right to protect themselves and the ability to join together to defend one another. Additionally, it acknowledges the right to employ force in the event that an armed assault is expected and permits the same action to be used in such a scenario. It makes it possible to consider cyberattacks to be the same as armed assaults. In the year 2019, Israel carried out airstrikes on a structure that they said had Hamas militants who were going to conduct a cyberattack against Israel. They claimed that these individuals were inside the building. By the year 2021, the subject was once again the subject of notable public debate. During the North Atlantic Council conference that took place in Brussels, chiefs of state"}