Raphael Kahan
“We are heading toward an era in which wars will begin and end in the digital sphere,” Karadi warned. He introduced the term “digital siege,” a nightmare scenario in which power stations are shut down, traffic lights stop working, communications systems collapse and water sources are contaminated, all with the push of a remote button. “This is not some imaginary future scenario, but a very real direction of development,” he said.
MAKE ynetGlobal MY TRUSTED SOURCE
The idea of a digital siege, Karadi stressed, is not just a catchy phrase. It marks the end point of a 15-year evolution. In the past, state cyber warfare was seen mainly as quiet espionage or a “surgical” tool aimed only at military facilities. In recent years, the gloves have come off. The new enemy is not only trying to steal secrets, but to disrupt the daily lives of civilians.
The widely accepted starting point of physical cyber warfare is the exposure of Stuxnet in 2010. The sophisticated worm, attributed in foreign reports to Israel and the United States, hit centrifuges at Iran’s Natanz nuclear facility. Stuxnet’s defining feature was its precision. The malware was carefully designed to strike only specific industrial controllers, while broadly avoiding civilian computers or unrelated infrastructure. It was a sniper’s weapon, quiet, targeted and without collateral damage.
No comments:
Post a Comment