Screenshot from a CCTV footage in a supermarket showing the moment of the explosion of one of the Hezbollah pagers hit by the Israeli attack
Cyberdefence

On Israel's attack on Hezbollah's "busca"

In the last few hours, thousands of Hezbollah members have been injured, many of them seriously, due to the explosion of the pagers they carried and used to communicate within the organization. The action, for which Israel is responsible, although all the details are not clear, points to two basic options: 1) the hacking of the devices, causing an explosion of the batteries or, much more likely; 2) their physical modification at some point between the factory and their subsequent delivery to Hezbollah's logistics managers. Whatever the case, Israel's attack on Hezbollah's pagers would have caused significant damage to this group supported by Iran, temporarily depriving it of its command and control capacity, as well as a good part of its personnel, not to mention the feeling of being totally infiltrated by the secret services. [Keep reading…]

Cybercrime in Spain
Cyberdefence

Cybercrime in Spain

Cybercrime has become an endemic evil, even though the majority of citizens are not aware of its importance and do not even realize when they are victims of one, as occurs in the case of massive data thefts, every time. more common. However, the increase in the cyber capabilities of criminals, together with the high dependence that society as a whole has on information technologies, means that, year after year, the number, frequency and severity of cyber attacks that occur in our country are capable of obtaining greater returns through the exploitation of technical and/or human vulnerabilities. Throughout the following lines we will talk about cybercrime, but from an unusual point of view in our case: that of the consequences that cybercrimes have for those who suffer them. Introduction The fact of [Keep reading…]

Fake Elon Musk video produced by generative AI
Cyberdefence

The potential of generative AI as a deception tool

Artificial Intelligence hides enormous potential when it comes to implementing disinformation operations. This is true both for government agencies and, increasingly, for criminal organizations, insurgent groups, and even ordinary citizens. A problem that has multiplied since Generative Artificial Intelligence (Generative AI), capable of creating images and videos from textual content, allows sharing content that is very difficult to discriminate by those who view it. All of which will force the development of new control tools, including the one that will have to be established over companies in the sector. The 21st century has been burdened since its beginning by a strong component of technological development. Especially, the recent evolution experienced by Generative Artificial Intelligence (Generative AI) clearly shows a change of cycle in terms of the improvement of computing capabilities. The unprecedented leap in automation [Keep reading…]

The cyber derivatives of the Palestinian-Israeli conflict
Cyberdefence

Hamas's war against Israel (VI): the cyber derivatives of the Palestinian-Israeli conflict

The Hamas attack against Israel has been, according to the data that has emerged subsequently, even more complex than initially believed. In addition to involving actions in the land, sea and air domains, as well as having a strong cognitive component, it was accompanied by attacks in the cyber domain, aimed at confusing the Israeli population or denying them important information regarding the Palestinian rocket threat. . What we have seen constitutes one more episode of a conflict that, although it has once again taken the step to the physical, in the form of an Israeli military intervention that seeks to undermine Hamas, has also been taking place for years on the networks. Hamas's war against Israel (I): the Hamas raid Hamas's war against Israel (II): drones and lessons for Spain Hamas's war against Israel (III): the naval war [Keep reading…]

Logo of the IT-Army of Ukraine. Source - Ministry of Digital Transformation of Ukraine.
Cyberdefence

IT-Army of Ukraine: a militia for the cyber domain

The IT-Army of Ukraine is a figure created ad hoc by the Ukrainian government with the aim of fighting in the cyber spectrum against Russia. An actor apparently lacking autonomy with respect to Ukrainian government decisions but acting with a notable degree of operational freedom, like a cyber guerrilla. An organization that has recruited dozens of volunteer cyber operators in recent months and has made it possible to attack the websites, infrastructures and networks of Russian companies and government agencies, scoring important successes. The war in Ukraine has led to important changes in the study of the cyber context of conflicts. From the changes observed in the role that cyber operations should have in situations of open war to the study of the importance of information warfare, the conflict has gradually altered thoughts about the advantages and handicaps that the use of technology [Keep reading…]

Quantum Cryptography
Articles

Quantum cryptography

The leaps and bounds of technological development that human beings have experienced in recent decades at the hands of engineering and computing have represented a major innovation with respect to the societies that have preceded us, allowing the emergence of important processes of social modernization, whose greatest exponent currently seems to lie in the evolution of artificial intelligence. However, despite the immediacy and contemporaneousness that these technological advances represent for a generation of developers and digital natives, they will soon be eclipsed by the future of a new progress with a name and surname: quantum processing. This, in turn, will require the development of quantum cryptography solutions that keep files and data, both public and private, safe. An aspect in which Spain, far from being a backward nation, is located in an enviable position facing the future. The [Keep reading…]

Chat GPT-4, OpenAI's artificial intelligence capable of generating content and interacting with the user, has already experienced significant development in the evolution of syntactic language, emulating human interaction more and more accurately. Source - Aries Workspace.
Cyberdefence

Chat GPT, artificial intelligence as a factor of change

Chat GPT-4, OpenAI's artificial intelligence capable of generating content and interacting with the user, has experienced significant development in the evolution of syntactic language, emulating human interaction more and more accurately. The great advance represented by the development of this type of tools is, in addition to a risk, an opportunity. Ultimately, it is essential that we are aware that the different existing and upcoming artificial intelligences will pose important challenges for security, while at the same time they will be an important support in the implementation of defense. “Zeroth Law: A robot cannot harm humanity or, through inaction, allow humanity to come to harm. First Law: A robot will not harm a human being, nor through inaction will it allow a human being to come to harm. Second Law: A robot must follow the orders given by human beings, except for [Keep reading…]

Cyberchina. Source - Shutterstock.
Articles

The information domain: cyberspace seen from China

The birth of a new cybernetic domain, known in the West as cyberspace and in China as the information domain, capable of interconnecting the physical with the intangible plane of computing and allowing asymmetric action by the different geopolitical powers, has meant new and important challenges for global security. However, not all states have understood in the same way the impact that the use of network technology can have on military strategic plans. China, as a revisionist power, has perfectly understood that achieving information dominance is crucial to its international interests. The course of History allows us to verify that the progressive appearance of new technologies affects the way in which individuals perceive the world, affecting innovations in practically all fields of the individual and state sphere, as they evolve. [Keep reading…]

TacticMedAid app. Source - Supruniuk, 2022.
Cyberdefence

The Ukrainian war and mobile applications

COTS technologies are undoubtedly among the main protagonists of the Ukrainian war. However, although great importance is generally given to elements such as commercial drones or some communications equipment, they are by no means the only commercial products susceptible to militarization. In the last year we have witnessed the constant development and reconversion of mobile applications, web-level tools and bots, by Ukrainian developers and programmers forced to become combatants. In light of the most recent events in the Ukrainian war, the now classic debate on the role of technology as an influential factor in the war and geopolitical scenario arises again. It is logical to think that, given the importance of the Internet and the increasing connectivity of modern societies, the impact of cutting-edge technology is no less, standing out in a war like the current one. [Keep reading…]