This site collects anonymous statistical data on navigation through cookies installed by authorized third parties, respecting privacy of your personal data and in accordance with standards established by law. By continuing to browse this site, clicking on links in it or simply shaking the page down, you agree to the service and the same cookie.

A+ A A-
12-01-2015

The United States will recognize vulnerable

Rate this item
(6 votes)

The US fear a Cyber Pearl Harbor. Gen. Martin Dempsey current Chief of the US Joint Forces declares that although the United States is considered a military superpower, that statement can not be extended to the field cyber. An attack that may be off the critical infrastructures, would be disruptive enough to cripple the country.

Of these hours the news of hacking accounts official twitter and youtube of CentCom, the US Central Command military. Graphics replaced profile pictures and cover with those of CyberCaliphate. Among the tweets, messages like "the ISIS is already here, we are in your PC, in every military base" with the image of a webcam attached to the barracks. Hackers claim to have a lot of information including the private addresses of several officers. Not a game then. And if there was a connection between the events in Paris and the attacks on the network? The ISIS is at the forefront with new technology, already in enlistments made use of the network, remember when we were talking ISIS web strategy ?. The hacking of Sony Pictures Entertainment at the launch of staggering film "The interview", "pointed out the asymmetry of power relations and stressed the opportunity to rise to the dominant roles also open to unpredictable actors so far not protagonists" writes the general Umberto Rapetto in his article "Geopolitics of cyberwar" where we talk about how to change the global picture and digital sides of the war after this episode. Dormant cells also in this case, could be among us, with the difference that they do not handle weapons or explosives but a simple device connected to the network.

© All rights reserved

Claudio Sciarma

Degree in Investigation and Security Sciences cum laude. He developed a thesis in collaboration with Ra.C.I.S. of Rome and the company Leica Geosystems on the reconstruction of the crime scene using the laser scanner. 

Master degree in Social Research for Internal and External Security developing a thesis called "investigate with search engine - Google as mean of business intelligence"

Postgraduate master degree in Security Languages.

Certificate of arab language and culture at the Foreign Languages School of the Italian Army.

Intelligence analyst.

Webmaster, webdesigner and expert SEO. Specialized in telecommunication fraud detection, he worked with the GAO of the Italian Finance Police. Expert in P.P.A. (advanced personal protection), terrorist attacks analysis, international security, transport security, events planning, personal protection devices analysis. Volunteer in the Italian Army (2010-2012), assigned to the Foreign Languages School of the Italian Army. 

Founding member of the Italian Association of Investigation and Security Sciences.

Codirector of the monthly magazine on line "ConVincere".

 

Website: claudio.sciarma.it

Geoeconomia

Eversione e Terrorismo

Geopolitica

Risorse Energetiche

Cyber Warfare

Copyright CEOS 2012 - 2015. All rights reserved.