{"id":4027,"date":"2024-12-13T08:32:32","date_gmt":"2024-12-13T13:32:32","guid":{"rendered":"https:\/\/cirics.uqo.ca\/cybersecurity-towards-mutually-assured-disruption\/"},"modified":"2025-02-07T10:03:19","modified_gmt":"2025-02-07T15:03:19","slug":"cybersecurity-towards-mutually-assured-disruption","status":"publish","type":"post","link":"https:\/\/cirics.uqo.ca\/en\/cybersecurity-towards-mutually-assured-disruption\/","title":{"rendered":"Cybersecurity &#8211; Towards &#8220;mutually assured disruption&#8221;?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4027\" class=\"elementor elementor-4027 elementor-3848\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aeeb390 e-flex e-con-boxed e-con e-parent\" data-id=\"aeeb390\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c88a007 elementor-widget elementor-widget-text-editor\" data-id=\"c88a007\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"chapo\">\n<h4>As a particularly tragic hurricane season draws to a close, storms of a very different kind continue to agitate cyberspace. &#8220;Volt Typhoon&#8221; and &#8220;Salt Typhoon&#8221;, the nicknames given to two groups of hackers linked to the Chinese government, have been giving computer security experts cold sweats for months. <\/h4>\n<p class=\"paragraph textModule textModule--type-paragraph \">Between February and November 2024, they reportedly penetrated a wide range of telecommunications, electricity and water treatment suppliers in the USA, Australia and Southeast Asia.<\/p>\n<p class=\"paragraph textModule textModule--type-paragraph \">Salt Typhoon, which made headlines last month when it managed to infiltrate the systems of telecoms firms AT &amp; T, Verizon and Lumen, currently appears to be focused on the massive detour of data for espionage purposes. Volt Typhoon, however, appears to serve more nefarious ends: the group (suspected of working for Chinese intelligence) is said to have the mission of pre-positioning malicious code in various critical infrastructures in countries deemed hostile to China. The idea is essentially to be able to suddenly launch large-scale cybersabotage operations the day a conflict erupts between Beijing and its rivals &#8211; usually over Taiwan.  <\/p>\n<h2 class=\"textModule--type-subhead \">A booming strategy<\/h2>\n<p class=\"paragraph textModule textModule--type-paragraph \">Increasingly common, this strategy of pre-positioning responds to a very simple imperative: unlike an air strike or missile launch, an offensive cyber operation requires a long design period and must be tailored to the systems it is intended to damage.<\/p>\n<p class=\"epigraph textModule textModule--type-epigraph \">A state wishing to launch an offensive cyberoperation therefore has no choice but to prepare it discreetly well in advance, by concealing digital &#8220;time bombs&#8221; in the depths of adversary countries&#8217; infrastructures.<\/p>\n<p class=\"paragraph textModule textModule--type-paragraph \">Russia has been seen snooping around American (and Canadian) power grids as far back as 2019, and it&#8217;s almost certain that the US is doing the same to its competitors.<span style=\"font-size: 14px; color: var( --e-global-color-text );\">. <\/span>. <span style=\"font-size: 14px; color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.lapresse.ca\/dialogue\/opinions\/2024-12-12\/cybersecurite\/vers-la-disruption-mutuelle-assuree.php?utm_campaign=internal+share&amp;utm_content=ulink&amp;utm_medium=referral&amp;utm_source=lpp&amp;redirectedFrom=https%253A%252F%252Fplus.lapresse.ca%252Fscreens%252Fb5d6eecd-6db6-4bba-90bc-91eb1217df87__7C___0.html%253Futm_campaign%253Dinternal%252520share%2526utm_content%253Dulink%2526utm_medium%253Dreferral%2526utm_source%253Dlpp\">Source<\/a><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-558b986 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"558b986\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.lapresse.ca\/dialogue\/opinions\/2024-12-12\/cybersecurite\/vers-la-disruption-mutuelle-assuree.php?utm_campaign=internal+share&#038;utm_content=ulink&#038;utm_medium=referral&#038;utm_source=lpp&#038;redirectedFrom=https%253A%252F%252Fplus.lapresse.ca%252Fscreens%252Fb5d6eecd-6db6-4bba-90bc-91eb1217df87__7C___0.html%253Futm_campaign%253Dinternal%252520share%2526utm_content%253Dulink%2526utm_medium%253Dreferral%2526utm_source%253Dlpp\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As a particularly tragic hurricane season draws to a close, storms of a very different kind continue to agitate cyberspace. &#8220;Volt Typhoon&#8221; and &#8220;Salt Typhoon&#8221;, the nicknames given to two groups of hackers linked to the Chinese government, have been giving computer security experts cold sweats for months. Between February and November 2024, they reportedly [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-4027","post","type-post","status-publish","format-standard","hentry","category-non-classifiee","entry"],"_links":{"self":[{"href":"https:\/\/cirics.uqo.ca\/en\/wp-json\/wp\/v2\/posts\/4027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cirics.uqo.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cirics.uqo.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cirics.uqo.ca\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cirics.uqo.ca\/en\/wp-json\/wp\/v2\/comments?post=4027"}],"version-history":[{"count":1,"href":"https:\/\/cirics.uqo.ca\/en\/wp-json\/wp\/v2\/posts\/4027\/revisions"}],"predecessor-version":[{"id":4030,"href":"https:\/\/cirics.uqo.ca\/en\/wp-json\/wp\/v2\/posts\/4027\/revisions\/4030"}],"wp:attachment":[{"href":"https:\/\/cirics.uqo.ca\/en\/wp-json\/wp\/v2\/media?parent=4027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cirics.uqo.ca\/en\/wp-json\/wp\/v2\/categories?post=4027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cirics.uqo.ca\/en\/wp-json\/wp\/v2\/tags?post=4027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}