scispace - formally typeset
Search or ask a question

Which telecom company has accused the US of launching cyber attacks to infiltrate its internal information systems? 

Answers from top 10 papers

More filters
Papers (10)Insight
Open accessJournal ArticleDOI
98 Citations
This would form the foundation for greater international cooperation on information sharing, evidence collection, and criminal prosecution of those involved in cyber-attacks — in short, for a new international law of cyber-attack.
The current rise in the number of attempts at launching a cyber attack may represent a new generation of “terrorists” and their discontent with governments, private companies, or with other non-governmental groups.
The astonishing achievements of cyber crime and cyber espionage – to which law enforcement and counterintelligence have found little answer – hint that more serious cyber attacks on critical infrastructures are only a matter of time.
The decision to rely on voluntary action for cyber security reflects influential trends in security policies, deregulation, and the government's relation to the Internet that continue to shape US policy even after the attacks of September 11.
Our finding—that cyber attacks are not (yet) effective as tools of coercion in war—has potentially significant implications for other armed conflicts with a digital front.
Our findings therefore cast doubt on the credibility of policy maker assertions that cyber attacks will be treated “like any other attack” and more broadly the logic of cyber deterrence that rests on the U. S. having the political resolve to retaliate for a cyber attack.
Using the market reactions to withheld and disclosed attacks, we estimate that managers disclose information on cyber-attacks when investors already suspect a high likelihood (40%) of an attack.
Recent reports indicate that cyber-attacks are increasingly likely for the critical infrastructures, e. g., control centers, nuclear power plants, and substations.
Second, this Article argues that it will be difficult to achieve international agreement on legal interpretation and to enforce it with respect to cyber-attacks.
Open accessJournal ArticleDOI
98 Citations
This Article concludes that a new, comprehensive legal framework at both the domestic and international levels is needed to more effectively address cyber-attacks.

Related Questions

How terrorist groups, private companies, and other non-state actors engage in information warfare?5 answersTerrorist groups, private companies, and other non-state actors engage in information warfare through various means, exploiting the power of information to manipulate perceptions and influence outcomes. They utilize unconventional methods that often disregard international conventions and laws, aiming to create psychological effects on target audiences. This form of warfare has evolved into a global, non-contact strategy that can significantly impact public opinion and societal stability. The blurred boundaries between state and non-state actors in cyber operations pose challenges for legal frameworks, making it difficult to regulate and prosecute cybercrimes effectively. Understanding the diverse tactics and strategies employed in information warfare is crucial for countering its effects and safeguarding both individuals and nations.
Why did the United States attack Iran with Stuxnet?5 answersThe United States attacked Iran with Stuxnet as a covert cyber operation to disrupt Iran's nuclear enrichment program. Stuxnet, a sophisticated worm, targeted specific models of Siemens Programmable Logic Controllers (PLCs) connected to Iran's nuclear equipment, altering their programming to cause malfunctions and potentially sabotage the nuclear facilities. This attack marked a significant development in cyber warfare, demonstrating the potential for physical damage across international boundaries. Offensive cyber operations, like Stuxnet, have become a key component of foreign policies, especially for major powers like the US. The use of Stuxnet highlights the intersection of geopolitics and technology, showcasing how cyberspace is utilized to achieve international security objectives through covert means.
What are the different types of insider threats?4 answersInsider threats can be categorized into different types based on three insider traits: predictability, susceptibility, and awareness. The proposed framework identifies eight insider threat types and provides insights into how to gauge these traits and their relation to the different types of threats. Traditional rule-based approaches for detecting insider threats are not flexible or robust, so user behavior modeling and anomaly detection algorithms are proposed as detection methods. These methods utilize user log data and apply anomaly detection algorithms to detect malicious activities. Insider threat programs often focus on technical indicators and miss the human side of the problem, but recent studies aim to integrate behavioral indicators of insider threat risk. A privilege-oriented perspective is suggested for defining insiders and insider threats, focusing on the insider's intention to misuse privileged access or knowledge. Insiders, due to their intimate knowledge of an organization, pose a threat to information security by violating security policies or obtaining unauthorized access.
What is Cybersecurity and Insider Threats?3 answersCybersecurity refers to the measures and practices taken to protect computer systems and networks from unauthorized access, data breaches, and other malicious activities. It involves safeguarding information and technology assets from cyber threats, such as hacking, malware, and phishing attacks. Insider threats, on the other hand, are a specific type of cybersecurity risk that arise from individuals within an organization who have authorized access to its resources. These insiders, whether employees, partners, or customers, can intentionally or unintentionally misuse their access to cause harm to the organization's mission, resources, personnel, or systems. Insider threats are a significant concern in various fields, including biomedical sciences, synthetic biology, artificial intelligence, and food production engineering. Understanding the motivations, behaviors, and methods of insiders is crucial for detecting, mitigating, and reducing the risk of insider threats.
How can I complain in cyber cell?7 answers
How to join cyber cell up?5 answers

See what other people are reading

Why can the technological interventions fail in fighting farm theft?
10 answers
Technological interventions in combating farm theft, while innovative and promising, can encounter several challenges that may lead to their failure. One primary reason is the complexity and high maintenance costs associated with some anti-theft systems, which can be burdensome for farmers to manage and sustain over time. Additionally, the effectiveness of these technologies can be significantly hindered by the lack of internet access and the knowledge on how to use these technologies, especially in rural areas of African countries where 3G/4G network coverage is sparse. Moreover, the practicality of implementing high-tech solutions like DNA technology for livestock identification in South Africa has been elusive for many potential livestock farmers, indicating a gap between the availability of technology and its accessibility or usability by the target population. Similarly, the reliance on surveillance systems and sensor networks for monitoring farm perimeters can be compromised by limitations such as the inability to distinguish between humans and animals or the resolution of images, which may not be sufficient to identify intruders accurately. The effectiveness of technological interventions is also affected by the farmers' attitudes and the police's perspectives towards farm crime prevention. While there is a general acknowledgment of the potential of technology in preventing farm crimes, concerns about the limited police resources and the efficacy of these methods have been raised. Furthermore, the situational crime prevention strategies, although developed for urban environments, suggest that increasing effort, risk, and reducing rewards for offenders through capable guardianship on farms can be challenging to achieve in rural settings. In essence, the failure of technological interventions in fighting farm theft can be attributed to a combination of factors including high costs, technological limitations, accessibility issues, and the broader socio-economic and resource constraints faced by farmers and law enforcement agencies.
Mental health questionnaire on VR or XR devices?
4 answers
Virtual Reality (VR) and Extended Reality (XR) technologies offer innovative ways to administer mental health questionnaires. VR can enhance assessment by providing immersive environments for questionnaire administration. XR, including VR, can revolutionize mental health treatment by offering safe spaces for therapy and self-exploration. Studies have shown that VR can improve decision-making in healthcare and aid in diagnosing mental disorders. Additionally, research indicates that questionnaires administered by virtual humans in VR scenarios are practically equivalent to self-administered ones, suggesting the feasibility of using VR for questionnaire delivery. Therefore, utilizing mental health questionnaires on VR or XR devices can offer personalized, engaging, and effective assessment tools for individuals seeking mental health support.
Is there any cosmetical peptide with more than 20 amino acids?
5 answers
Yes, there are cosmetic peptides with more than 20 amino acids. However, shorter peptides (<20 amino acids) lacking disulfide bonds are preferred for their antimicrobial activity, ease of synthesis, and compatibility with large-scale production. For instance, a peptide with 3 to 10 amino acids, such as Pal-K(Ac)GH or Pal-K(Ac)HG, is used in cosmetic treatments like anti-aging and skin firming. Additionally, peptide type composition cosmetics contain various peptides like yeast peptide, oligopeptide-1, and oligopeptide-3, which contribute to repairing skin damage, reducing fine lines, and promoting skin growth. While longer peptides exist, the focus in cosmetics often leans towards shorter peptides for their specific benefits and ease of formulation.
What is the historical context of the phrase "as almas do povo negro Du Bois"?
5 answers
The historical context of the phrase "as almas do povo negro Du Bois" is deeply rooted in the cultural and social dynamics of Afro-Brazilian communities, particularly in relation to the carnival traditions of Rio de Janeiro in the early 20th century. This phrase reflects a complex interplay between the legitimation and restriction of Afro-Brazilian cultural elements within broader societal discourses. Furthermore, the term "caboclo identity" emerged along the Negro river in Brazil as a result of interactions between Brazilian society and indigenous groups, shaping the cultural landscape of the region. Additionally, W. E. B. Du Bois's evolving engagement with African history marked a shift towards appreciating non-European civilizations, challenging notions of racial inferiority and emphasizing the importance of diverse cultural heritages.
What is the starting point of Generation Alpha?
5 answers
The starting point of Generation Alpha is a topic of discussion that lacks concrete scientific evidence, as highlighted in a study focusing on generational logic and knowledge. This study emphasizes that while Generation X, Y, and Z have been described, the concept of Generation Alpha is still in the process of being established, with no scientific proof of its existence. Despite this, there are insights into the characteristics and needs of this potential generation, aiding child servants, teachers, and parents in educating and nurturing them. Additionally, the dental profession is considering the needs of Generation Alpha in providing optimal care for children, indicating a growing awareness of this emerging generation. Moreover, the integration of technology and play, particularly through gamification, is being explored to enhance early years education for Generation Alpha.
What is the role of occupational therapists in promoting parental engagement among parents of children with DCD?
5 answers
Occupational therapists play a crucial role in promoting parental engagement among parents of children with Developmental Coordination Disorder (DCD). By utilizing family-centered approaches like parent-mediated occupational therapy, therapists aim to enhance child participation and social interactions within the home and community. Additionally, strategies such as Occupational Performance Coaching (OPC) focus on coaching parents to facilitate children's participation in various life situations, including community activities, thus improving their overall quality of life. The integration of best practice principles, such as the Phoenix Theory of Parent Attendance and Adlerian Play Therapy, further emphasizes the importance of family engagement during therapy sessions, highlighting the need for a systematic approach to involve families in the intervention process. Through these methods, occupational therapists can empower parents, strengthen therapeutic skills, and enhance the relationship between the child and their caregivers.
How does the concept of fitrah manasiah relate to the principles of the community in QS Al-Hujuraat?
4 answers
The concept of fitrah manasiah, which refers to the innate disposition and conscience of individuals, is closely related to the principles of the community outlined in QS Al-Hujuraat. According to various studies, including those by Srifariyati et al. and Surahman, the concept of fitrah emphasizes the importance of trust, fairness, and justice in leadership. This aligns with the principles of the community in QS Al-Hujuraat, which emphasize respect, cooperation, and justice among community members. The fitrah manasiah concept underscores the idea that individuals should uphold moral values and fulfill their responsibilities within the community, reflecting the principles advocated in QS Al-Hujuraat for harmonious communal living.
How can the design of a survey instrument affect the motivation of young people in a gym setting?
5 answers
The design of a survey instrument can significantly impact the motivation of young people in a gym setting. By understanding the cognitive processes involved in survey response, such as comprehension, retrieval, judgment, and response, survey developers can anticipate and mitigate respondents' tendencies to satisfice, where they settle for suboptimal answers due to low motivation. Additionally, incorporating autonomy support in survey design can enhance student motivation, as seen in educational settings. Furthermore, in the context of physical activities like sports, technology can play a crucial role in motivating young adults by helping them track progress towards specific goals, which are key motivational factors for their participation. Therefore, a well-designed survey instrument that considers cognitive processes, autonomy support, and technological support can enhance the motivation of young individuals in a gym setting.
How does ECG interpretation contribute to accurate diagnosis and treatment planning in various medical conditions?
5 answers
ECG interpretation plays a vital role in accurate diagnosis and treatment planning across various medical conditions. It allows for the assessment of cardiac rate, identification of conduction blocks, detection of myocardial ischemia, diagnosis of life-threatening arrhythmias, and evaluation of drug effects. Advanced signal processing algorithms help in removing noise from ECG signals, enhancing diagnostic value, and streamlining the interpretation process, leading to more efficient and confident diagnoses. Clinical context and prior exposure to ECG diagnoses significantly impact diagnostic accuracy, emphasizing the importance of integrating ECG interpretation with clinical knowledge for improved diagnostic outcomes. Additionally, the application of artificial intelligence-augmented ECG algorithms shows promise in risk stratification, diagnosis, and interpretation, further enhancing patient care and clinical workflow.
How immigration impacts the national economy negatively?
5 answers
Immigration can negatively impact a national economy in various ways. Firstly, brain-drain due to migration of highly skilled individuals can lead to a loss of human resources, affecting economic growth. Additionally, the negative economic effects of migration can be seen through the stimulation of price increases on goods and services, greater economic dependence on emigration, and reduced governmental investments in the donor country. Furthermore, immigration can result in the transfer of diseases and the erosion of cultural heritage, contributing to negative impacts on the economy. Overall, these factors highlight how immigration can have adverse effects on a national economy by depleting skilled labor, reducing investments, and causing social and cultural disruptions.
What factors contribute to the categorization of accidents in the transportation sector?
5 answers
Factors contributing to the categorization of accidents in the transportation sector include human behavior, road infrastructure, safety perceptions, vehicle systems, and risk assessment models. Human factors, such as driving habits and safety awareness, play a significant role in accident occurrence. Additionally, road safety facilities and transportation company practices influence accident rates. Safety perceptions and the integration of safety systems within vehicles are crucial for accident prevention and response. Moreover, risk assessment models consider various parameters like collision probabilities, environmental impacts, and operational losses to predict and prevent accidents effectively. By addressing these diverse factors, transportation authorities can categorize accidents more accurately and implement targeted safety measures.