Connect with us

Technology

Technological change and new challenges in war

Published

on

The notion of war has been changing for a long time due to technological advances. This subsequently has caused new arms races. Since the first military revolution in infantry and artillery during the Hundred Years’ War, many things have been indeed reshaped. New technologies consistently redefined the way wars are conducted and altered the notion of risk (both for combatants and civilians).

For a long time land and sea were the main domains for a war. As the technology further developed and a flight capability was introduced, air has become a new domain.  That posed new risks and challenges that one could not overlook. To keep balancing on the battlefield one needed to adjust accordingly and develop its own air capability. Having only land troops and naval ships were suddenly not enough to prevail in these new circumstances. The military planning and strategy changed with it, shifting from the trench warfare during the World War I to a blitzkrieg and air raids during the World War II.

In the middle of 20th century nuclear weapons were invented which greatly impacted the warfare and the balance of international relations. The bombings of Hiroshima and Nagasaki showed more than just a massive destructive power that could obliterate millions in a blink of the eye. Years later demonstrated a real impact of a nuclear bomb and its long-lasting consequences as well as how poorly prepared were the infrastructures for a nuclear attack.

The advent of internet and its rapid development brought another military revolution, introducing computer-assisted battlefield and precision-guided munitions (PGM). More sophisticated weapons like missiles increased the distance between enemies, hence changing the risks involved and recalculating political strategy and tactics. Increased dependency on information technology resulted in new threats and opened new vulnerabilities of national security (Ohlin, Govern and Finkelstein, 2015, x-xiii).

Meanwhile, the amount of cyber threats and vulnerabilities are rapidly increasing. At the moment there are several tendencies for cyberattacks. First, it takes less time to launch a cyberattack as its speed of transmission is very high. Second, such attacks are becoming more frequent and have more serious impact on systems. Third, there are now different types of actors, capable of launching a cyberattack.

Estonia was the first to experience the effects of growing technological dependency in the history. In 2007 its government infrastructure, financial sector and media were targeted and attacked entirely in cyberspace[1]. The country proved to be highly vulnerable and unable to give a timely response, yet after these attacks Estonia started a public discussion on the issues of cyber defense in security and pushed other countries to take these issues into consideration. In a way, it was a stimulus to raise awareness on increased vulnerabilities and cyber threats (See also Aaviksoo, 2010).

This new space has clearly its threats as any other physical domain. As online interconnectivity increases, cyber threats are increasing with them. All digital technologies that receive, transmit, and manage digital data can be potentially interfered through a cyberattack (Lewis and Unal, 2017). Cyber security expert Rod Beckstrom, who is a former Chief Executive Officer of ICANN, said[2]: “Everything networked can be hacked. Everything is being networked, so everything is vulnerable”.

That was further proven by the Black Hat Briefings, the biggest computer security conferences in the world. These vulnerabilities can be easily exploited. Cyberattacks vary from data theft and financial fraud to data manipulation and manipulation of machine instructions. Furthermore, they can interfere with enemy sensors, communications, command-control systems, and weapon systems. In this sense, defending electronic infrastructure grows consistently as our dependence on information system grows.

Similarly to the development of nuclear weapons back to the 20th century, it is well-known that many countries are currently developing cyber capabilities and boosting research and investment in this area. This means that the arms race in cyberspace has already started. In 2007 there were 120 countries, already developed ways to use the internet to target different sectors (Ohlin, Govern, and Finkelstein, 2015, xii).

As much as the debate in regards to offensive cyber capacities is increasing its pace, two distinct patters are emerged in the way it is discussed. Some say that cyber can lower the threshold in war; others worry about its use in taking down critical infrastructures.

In the first optimistic case, military and states regard these capabilities capable of occupying a new niche in diplomatic tools. In 2014 Eric Rosenbach, an Assistant Secretary of Defense for Homeland Defense and Global Security at that time, has indeed referred[3] cyber operations as helpful in reaching national goals.  Specifically, he mentioned “the space between” diplomacy, economic sanctions and military action, meaning using cyber space to accomplish national interest. Cyberattacks can be used as an addition to military strikes or can become an alternative to direct kinetic confrontation, complimenting other tools used in politics. Thus, they can further lower the threshold of the use of force in a war.

In other case, however, it can possess as much destructive power as nuclear weapons, for example if it is targeted on power grids or critical infrastructures. Increased connectivity from consumer goods to critical infrastructure control systems poses great risks and vulnerabilities across the world (Weber, 2010). These vulnerabilities can be used as leverage or they can be used exploited instead of launching a missile, following a similar ultimate goal of taking down an adversary.

Traditionally, national and international security has been seen through a physical lens. Normally there is always a state that secures its land borders, sea boundaries, and protects airspace. In contrast, there is no equivalent to city police or a state army that protects its citizens in cyberspace. As professor of National Security Affairs Reveron summarizes[4], unlike other domains, the government does not have a natural role in cyberspace to promote security. In its turn cyber challenges the traditional framework of security.

Today people willingly share, transmit or store all sort of data through the internet. It is not surprising that a new strategy evolves by planting software into an electronic device to manipulate this data. For instance, by manipulating e-mails of nuclear power plant employees it is possible to acquire sensitive information and use it as a leverage tool. This shift in the notion of warfare merged military and corporate espionage functions. Militarization of cyberspace subsequently blurred legal and moral definitions of privacy rights. In the 21st century any individual may be targeted in the virtual world, depending on the information niche s/he is occupying. In result, the line between military and civil sectors is fading away.

All in all, cyber capabilities have indeed brought a new technological change and now re-shifting security, definitions and rules of war. International law, at the same time, has been slow in adjusting to a new evolving order and establishing an appropriate legal regime for cyberattacks.  Moreover, this technological advance has coined a new term for the notion of war – a cyberwar. Ohlin, Govern, and Finkelstein suggest that this change brings not only new weapons to be employed, but transforms the entire notion of war (2015, xiii).

References

Lewis, P. and Unal, B. (2017). Cyber Threats and Nuclear Weapons System. In: Borrie, J., Caughley, T., and Wan, W., (Eds.), Understanding Nuclear Weapons Risks, 1st ed. Geneva: UNIDIR, pp.  61-72.

Ohlin, J.D., Govern, K. and Finkelstein, C., eds. (2015). Cyberwar Law and Ethics for Virtual Conlicts. New York: Oxford University Press.

Sulek, D. and Moran, N. (2009).What Analogies Can Tell Us About the Future of Cybersecurity. Cryptology and Information Security Series, 3, pp. 118-131.

Weber, R. (2010). Internet of Things: New Security and Privacy Challenges. Computer Law & Security Review, 26 (1), pp. 23-30.

[1] Davis, J. (2007). Hackers Take Down the Most Wired Country in Europe. Wired, [online] Available at: https://www.wired.com/2007/08/ff-estonia/ Accessed on [19.12.2017].

[2] Flanagan, B. (2016). Hacked Asteroids Destroying Earth and Other Cybergeddon Scenarios. Knowledge Hub, [online] Available at: https://www.worldgovernmentsummit.org/knowledge-hub/hacked-asteroids-destroying-earth-and-other-cybergeddon-scenarios [Accessed 20.12.2017].

[3] Cyber Leaders: A Discussion with the Honorable Eric Rosenbach. (2014). Centre for Strategic & International Studies,

Available at: https://www.csis.org/events/cyber-leaders-discussion-honorable-eric-rosenbach [Accessed on 20.12.2017].

[4] Reveron, D. (2017). How Cyberspace is Transforming International Security. Faculty insight at Harvard Extension School, [online] Available at: https://www.extension.harvard.edu/inside-extension/how-cyberspace-transforming-international-security [Accessed 28/12/2017].

Specialist in global security and nuclear disarmament. Excited about international relations, curious about cognitive, psycho- & neuro-linguistics. A complete traveller.

Continue Reading
Comments

Technology

What are spamtraps and how to get them off your mailing list for good?

Published

on

There is a silent enemy that many companies face and that focuses directly on the contact list. It is spamtraps. These are emails that are meant to catch spammers, but negatively influence mass mailings. Today we are going to find out why, and we are going to assess some actions that are easy to do to get them out of the way.

Mailing lists are generally formed by people who are interested in using a product or service of a company and who subscribe voluntarily. However, it can happen that an email appears normal-looking, but it is a spammer detector. When an email is sent to these addresses, they block it, causing a negative impact on the reputation of the brand that sent it.

Spamtraps are traps for emails, in short. They do not belong to any real person, and their only function is to block the sender of the email and mark him or her as a spammer. In this way, the brand is affected, even if the content sent has nothing to do with spam. These exist on all existing email platforms, such as Gmail or Yahoo.

Characteristics of spam traps

Although there is no simple way to find out which of the emails on your list are spamtraps, you can assess some characteristics that lead to the most frequent spamtraps. Here we can see elements such as:

  • No direct relation to a person: people generally put their names when creating their emails. Although this does not happen in 100% of cases, it could be an important factor to consider if you see some emails made up of meaningless letters and numbers, for example.
  • Emails with generic names: Generic names are not a good sign, even though many companies use them as a means of communication. To separate those that are real from those that are not, it is possible to check the domain of which the emails are part. For example, there may be emails in a list that start with the word [email protected] What completes the part of the X’s will tell us what the chances are that it is a spamtrap. In any case, be aware that it is very unlikely that a company will subscribe to a newsletter using this type of email.
  • Abandoned emails: Technology has come a long way in recent times, and this has led to the use of new ways of communicating. Nowadays, it is very unlikely that there are people who subscribe to a list with a Hotmail email address. It is therefore essential to check, if you have one, that it is not an abandoned email that can be used with ISPs because they are no longer in use.
  • Misspelled emails: This is a very common situation that occurs, especially when double confirmation is not used. In this case, it is possible that a person enters the mailing list with a misspelled entry and then the result is an email that ends, for example, in @gml.com. You have to be very careful with these. The recommendation is to always run the confirmation to ensure that it is a real and operational address.

Actions to take to verify spamtraps on the mailing list

Now that we have an idea of what we can look for in the list and target what looks the most suspicious, we can define a series of actions to take in order to detect whether the list is clean or whether there are any harmful elements present.

The first thing to do is to review your entire contact list. This can be a tedious task when you have a large number of subscribers, but it is worth the effort. If in this first step you got several suspicious emails, you should flag them to check their behaviour in the following points.

Then, it will be time to evaluate the results of the email marketing campaigns sent previously. In these campaigns, you will get a history of very interesting data that will tell you how many people generally open the emails, those who do not, etc. The important thing here is to assess whether the values shown in the history are more or less constant or have suffered a significant decrease in recent days. If this is the case, it could be due to spamtraps.

It is common for these problems to become apparent when a number of new users join the list. It is possible that among them there is an email that works as a spam trap. The simplest solution to recognize if this is the problem is to perform a segmentation and send an email to the members of this new list and verify the results.

Finally, you will need to check if the domain you are using is on the block list. This is an essential step to know if you really have a problem or not. Doing this on a regular basis is key to avoiding problems.

Segmentation as a working strategy

Working with email marketing software that allows the segmentation of the mailing list is a benefit that will remove problems later and, of course, spamtrap detection is one of them. Thanks to segmentation, it will be possible to create groups of users to whom certain campaigns are sent and evaluate the response they have.

Mailrelay is the best option in this regard because it offers the possibility to segment and also to validate the statistics. With the statistics you can measure the percentage of clicks that were made and that can give us an important guide, since this is an action that can only be performed by real people.

Nowadays, there are already robots capable of opening emails that arrive at your server, so the open rate is no longer a valuable statistic in this regard.

After you are clear about which contact segments are performing well, you can continue to work with them as normal and separate those that are not performing well to validate them later. It is better to keep fewer subscribers than to risk having your domain blocked and losing your entire list.

Continue Reading

Business

9 Ways to Keep Technology from Slowing Down Your Business

Published

on

There’s no doubt that technology has made our lives easier. We can now do things we never thought possible, like communicating with people all over the world in an instant or order items from the comfort of our own homes. However, with great power comes great responsibility- and for business owners, this means making sure that technology doesn’t slow you down. Here are nine ways to keep your business running at full speed.

Make a Plan

Technology can be unpredictable, so it’s important to have a plan in place in case of any malfunctions. This includes having backups of your data and creating disaster recovery plans in case of emergencies.

Stay Updated

Keep your software up-to-date, as well as your operating system and hardware. Outdated software can cause compatibility issues and make your devices run slower.

Use the Right Tools

Using the right tools for the job is essential when it comes to technology. If you’re using an outdated program or device, chances are there’s a better, faster option out there that will suit your needs. Even shortcuts are important tools, like automatic cache cleaner for Mac users in your company. 

Create Standards

Creating standards for how employees use technology can help keep things running smoothly. This means establishing guidelines on passwords, data storage, backups, and any other procedures related to technology usage at work. 

Get Help

If you don’t have the resources internally then, it’s crucial to get help from someone who knows what they’re doing. This can be a tech-savvy friend or coworker, an IT professional if your budget allows for it, or even just reading articles online about how best to use specific devices/software programs.

Invest in New Equipment

Upgrading equipment regularly will help keep things running smoothly and make sure that there aren’t any compatibility issues with new software releases. It also ensures employees always know what tools are available when needed without having them search through piles of old files looking for something specific like an outdated version of Microsoft Word or Excel that won’t work with the latest operating system they’re trying to install on their computer.

Create a Backup Plan

Having multiple backups of your data makes it easy to recover files after an emergency situation like a power outage, hard drive crash, or (heaven forbid) a hacking, so you can get back up and running as soon as possible without losing any valuable information.

Train Employees

It’s vital for employees who use technology regularly at work, such as those in IT departments, customer service positions, etcetera – to have training sessions on how best to utilize whatever type of device/software program they’ll be using daily. This will help them avoid making mistakes which could lead to major problems down the line if left unchecked by management personnel. Allowing users time off from duties during these training sessions will also ensure they’re not distracted while learning new skills that may be required on some projects within their company.

Keep Your Data Secure

 Keeping your data secure is essential to any business, and this means more than just backing it up regularly or installing antivirus software. For example, it’s important for companies who deal with sensitive information about clients/customers, etcetera – take steps such as encrypting emails containing personal details before sending them out across networks which can sometimes have vulnerabilities (e.g., open Wi-Fi). You should also train employees on how best to utilize whatever type of device/software program they’ll be using daily so there will never again be confusion over what needs doing when dealing with confidential files work.

Continue Reading

Technology

7 Practical Ways To Keep Your Kids Safe Online

Published

on

The internet has many advantages to offer kids. Used well, it can be an infinite source of knowledge and an excellent communication tool for kids. 

However, the internet can also be a dark and scary place. It has its fair share of bullies and cybercriminals out to take advantage of innocent children. Add to that a plethora of inappropriate content, and it is understandable why many parents would rather not allow their kids to use the internet.

But in this day and age, forbidding your children from accessing the internet is simply impractical. 

So, what is a concerned parent to do about keeping their kids safe in the jungle that is the internet? Here are seven valuable tips to help you in your quest.

Educate Yourself

It may surprise you how far behind most parents are when it comes to tech matters. First, however, the vigilant parent must learn how the internet works to guide their children safely through its murky waters. This requires you to:

  • Know how different social media platforms work
  • Be able to operate the programs your kids use 
  • Have a good grasp of the content your kid’s favorite websites

If you come across as tech-savvy, your kids will view you as an authority on internet matters. This makes them more receptive to any advice you offer regarding safe internet use. 

Consequently, they’re less likely to engage in inappropriate internet conduct.

Preach Accountability

As a parent, the best way to keep your kids safe in any environment is to teach them how to make good decisions. This is the same approach you should take with the internet as well.

Start by making your kids aware of the dangers that lurk online. Discourage them from sharing sensitive information on the internet, and explain the impact of leaving undesirable digital footprints. Help them see that they should use the internet cautiously.

Additionally, it would be best to tell your kids how you expect them to behave online. Set ground rules around internet and tech devices, like limiting their screen time and asking that they don’t use their devices in the bedroom. 

Another clever way to stay informed about what your kids are doing on the internet is to join their social circles. Follow them on Instagram, befriend them on FaceBook, and watch their TikTok videos. 

Granted, they may not be very keen on being your friend on social media sites. But this does not mean that you should give up. If they are resistant at first, make it a precondition to accessing their devices. They will likely comply.

Use Parental Controls

An excellent way to put your mind at ease is to use parental control software on your children’s devices. These include filters that restrict your kids’ access to potentially inappropriate content. 

You could also use software that limits how much time kids can spend on their phones and tablets. If you think that your children are engaging in risky online behavior, you can install the best spying app for iphone on their devices. 

This allows you discreet yet unfettered access to their every activity, enabling you to act promptly on suspicious activity. 

In addition, spyware is highly effective with older kids who know how to erase their search history.

Put Devices in a Public Place

One of the best ways to ensure that you are always aware of your kids using their devices is to have them in a public place. Place the monitor such that you can quickly glance over it and get a general idea of what your children are viewing. 

You can also have a rule prohibiting screens in the bedroom where it is difficult to supervise your kids. 

However, this is not to say that you should be a helicopter parent. You don’t want your kids to view you as overbearing and controlling. Instead, you want them to know that you can see what they are generally doing but are happy to allow their independent internet exploration.

Use Tech With Your Kids

As a parent, embracing technology can open communication channels, you never imagined. Kids are generally more comfortable texting than speaking face to face. So take advantage of this fact and get to learn more about your kids.

Text them often to find out how they are doing. Send your kids images and videos that you find funny. If they consider you their friend, they will be forthcoming and will trust your guidance more.

Teach Your Kids What Not To Share

Be sure to teach your children never to share sensitive information online. This includes details of your home address, the school they attend, and your workplace. 

Sharing this information can seriously compromise your family’s security, and this is a risk your kids should know. 

Additionally, enlighten your children about the danger of sharing overly revealing photos online. If they are unsure about a specific picture, have them run the problem by you or an older sibling. 

This will prevent young kids from falling into the trap of shady internet users. 

Lead by Example

Finally, it would be best if you practiced what you preach. If you require your kids to adhere to any screen time guidelines, be sure to limit your use of screens as well. If you want them to be cautious in their online interactions, show them that you are careful as well. 

Parents who don’t lead by example find it much harder to get their kids to comply with their safe internet use guidelines. If you are irresponsible online, you won’t motivate your children to practice responsible online behavior. 

What’s worse, they might copy your actions and potentially expose themselves to danger.  

Keeping kids safe online requires a lot of parental involvement. You can start by befriending your kids, asking them to communicate often with you, and regularly checking to see that they are using the internet responsibly. 

Additionally, you can use parental control software to ensure that your kids are safe online. If you follow these tips, you will find it much easier to protect your kids from the dangers of the internet.

Continue Reading

Trending