What is “hybrid” warfare
Today the general public is witnessing for the first time a so-called war ibridlethat is, which combines the typical aspects of a conventional confrontation with those of one cyber. If the former have been well known for millennia, the latter are unknown to most.
Those who defend themselves are at a disadvantage
In the first place, the battlefield does not allow for a well-defined front, there are no physical coordinates that allow you to identify enemy lines. It appears infinite, thanks to the interconnection of systems on the Net, e defense, unlike conventional warfare, is always at a disadvantage. Fighting in this environment means forgetting any kind of reference such as “above”, “below”, “in front”, “behind” and so on. In this completely open field, the attacker has the option of picking up an infinite front where and when to unleash the offensive. Its arsenal will not suffer from the out-of-stock problem. The logistical problems to support the attack will not exist. Its operators may be dispersed in thousands of different physical and virtual locations.
The precedent: cyberattack on Ukraine in 2017
The ways in which groups of militants or criminals act, such as Accounts And Anonymous, who have self-invited to the confrontation prove it. Their presence on the battlefield highlights one of the most serious dangers to which we are exposed. A few years ago in one of my books I wrote that in a conflict cyber a rather small group of people, highly motivated, with a not superlative technical preparation and equipped with some weapons readily and free of charge, or almost, on the Net, could attack a state and have a good chance of inflicting massive damage if not bringing him to his knees. Until “specialists” i collateral damages of the conflict can be contained, because they have gained experience in the field. In 2017 the group Sandwormclose to Kremlinwas suspected of having unleashed with Ukraine a malware known as NotPetya. At the time I wrote that most likely it was military maneuvers to analyze the effectiveness and effects of a cyber attack. In fact it was possible to evaluate the response times of the various organizations and researchers (not less than 24 hours), the pervasiveness of the offensive (it was discovered that the infection of the shipowner Maersk had caused a domino effect by slowing down the shipping system all over the world), the reactions of governments (The English minister Fallon stated that the UK was ready to respond with conventional attacks) and not least the side effects (the Russian Rosneft And Gazprom were damaged).
Because the technological clash can get out of hand
Shortly before the start of the ongoing military offensive, some Ukrainian systems were hit by a number of malware which produced damage no different from NotPetya but, unlike their predecessor, they did not have the characteristic of spreading on the Net autonomously and automatically. The exercises had shown that the risk of “Friendly fire” it was concrete. As a result they were manually installed on systems, after having been hacked. What would happen if some “enthusiast”, who has the feeling of participating in a hyper-realistic video game, decided to use a cyber weapon and then lose control of it? It would be extravagant if the First Cybernetic World War were unleashed from the living room of a private citizen. However, we know well that history does not lack a sense of irony.
Who is Alessandro Curioni, cybersecurity expert
Alessandro Curioni
Alessandro Curioni, born in 1967, after 15 years of journalistic activity, at the end of the nineties, he began to deal with new technologies and in 2001 he dedicated himself full time to IT security issues. In 2003, after two years of study, he published the volume “Hacker @ tack – Guide to computer security” for Jackson Libri. From this experience, in collaboration with the I.Net Groups (later British Telecom), a program of training courses dedicated to those issues was born.
Alongside his activity as a trainer he works as a consultant for the clients of the I.Net group, an activity that lasted until 2008, the year in which he founded DI.GI. Academy, a company specializing in training and consulting in the field of information security, of which he is the shareholder and president. In the last fifteen years he has been a consultant for leading national and multinational companies including Edison SpA, Cardif Assicurazioni of the BNP Paribas Group, Vittoria Assicurazioni, Pepsico Italia, an activity that alternates with that of a trainer (ENI, Poste Italiane, A2A, etc.) and lecturer.
In 2015 he resumed his advertising activity for various print publications – including “Il Sole 24 ore” (including the attachments on the subject) – and online and in 2016 he published, with the university publishing house Mimesis, the book “Come Pesci nella rete – Guide to not being the sardines of the Internet “dedicated to problems of personal computer security, followed by several other successful pamphlets (” Privacy will save your life “,” This house is not a hashtag “,” CyberWar “etc) while with Chiarelettere in 2021 he published his first detective story entitled “Il Giorno del Bianconiglio”. Since 2018 Curioni has also been contract lecturer in the information security course for the Cattolica in Milan.
Read also:
Government, Draghi ready to resign. Elections in June or September
Government, only Putin’s military invasion avoids the crisis
Ukrainian War, Picierno (Pd): “The EU needs a voice and a single army”
“Rai, inappropriate attacks on Innaro. Does it still make sense to connect with Moscow?”
Ukraine, the collection of goods starts. The points with trucks and volunteers in Milan
Russia-Ukraine war, even Generali leaves Moscow. Stop of Toyota and VW
Fabrizio Corona is ready to fight in Ukraine and “die in glory”
Third World War: Giulietto Chiesa had foreseen everything two years ago
Cryptosmart, here are two services to use bitcoins in real life
BPER Banca, in support of Cattolica students
FS Italiane Group: Trenitalia presents “Blues”, its first hybrid train
#World #War #hybrid #conflict #ground #cyber