Hacking Summit Names Nations With Cyberwarfare Capabilities

By on

In 2009, I read with great interest a paper published in the Journal of International Security Affairs titled The Art of (Cyber) War. In this paper, Brian M. Mazanec explained the People’s Republic of China was interested in cyberwarfare and had improved its capabilities to conduct military operations in the cyberspace.

The paper contained a table summarizing the nation states with cyberwarfare capabilities at the end of 2004.

FP_BLOG_130927_1

Also in 2009, McAfee published its Virtual Criminology Report with the subtitle Virtually Here: The Age of Cyber Warfare. Inside, we included a map of the world showing the countries developing advanced offensive cybercapabilities. The map’s caption read: “Cyber war is not occurring right now, but nation-states are definitely in competition.”

FP_BLOG_130927_2

That was four years ago. Last week a colleague asked me for a list of nations with cyberdefense capabilities or developing offensive capabilities, but I was unable to do so. Now I have found one. Raoul Chiesa–President, Founder, Security Brokers and Independent Senior Advisor on Cybercrime at the United Nations Interregional Crime & Justice Research Institute–published a document at the Hackito Ergo Sum 2013 conference.

The following chart summarizes the data. The information is provided “as is” and is merged into one table. It came from the “Cyber World” working group from the Italian Ministry of Defense and is dated 2012. In red are the nation states considered to have offensive capabilities; the others have only defensive capabilities.

FP_BLOG_130927_3

Leave a Comment

Similar articles

Rockstar Games’ Red Dead Redemption 2 has struck a popular chord with many online gamers. Unfortunately, the Western-themed action-adventure game has also become a popular vessel for malicious activity among cybercriminals as well. Scammers are tricking gamers into giving up their personal information with phony “free” downloads of the online game, while simultaneously making a ...
Read Blog
At the end of last year, a survey revealed that the most popular password was still “123456,” followed by “password.” These highly hackable choices are despite years of education around the importance of password security. So, what does this say about people who pick simple passwords? Most likely, they are shooting for a password that is ...
Read Blog
If you’re a gamer, you know how important virtual currency is. It allows you to purchase new costumes and weapons to personalize your avatar. But how does one go about gaining virtual currency? Players complete in-game challenges and are rewarded with coins to spend in their virtual world. These challenges can be pretty difficult and ...
Read Blog