{"id":206399,"date":"2017-07-19T03:53:58","date_gmt":"2017-07-19T07:53:58","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/spying-or-cyber-war-how-to-tell-the-difference-fortune\/"},"modified":"2017-07-19T03:53:58","modified_gmt":"2017-07-19T07:53:58","slug":"spying-or-cyber-war-how-to-tell-the-difference-fortune","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/spying-or-cyber-war-how-to-tell-the-difference-fortune\/","title":{"rendered":"Spying or Cyber War? How to Tell the Difference &#8211; Fortune"},"content":{"rendered":"<p><p>    The idea of a hostile country hijacking    computers deep inside the United States sounds frightening. But    is it really so different from what countriesincluding the    U.S.have always done in the name of espionage?      <\/p>\n<p>    That was a question posed to Gen. Keith    Alexander, a former director of the NSA, at     Fortune's      Brainstorm Tech conference on Tuesday    in Aspen, Colo.  <\/p>\n<p>    Alexander responded by saying there's a    clear distinction between countries using computers to spy and    to attack.  <\/p>\n<p>    \"Its intent. Cyber war is to inflict    damage while spying is to learn secrets,\" he said, adding that    every nation engages in cyber-spying.   <\/p>\n<p>    As a examples of computer activity that    rises to the level of cyber war, Alexander pointed to the    alleged attack on Sony by North Korea, and to attacks in    Ukraine aimed at the company's economy and infrastructure.      <\/p>\n<p>    Get Data Sheet     , Fortunes    technology newsletter.  <\/p>\n<p>    The distinction between spying and    cyber war is important since the latter has the potential to    trigger military retaliation, or invoke responses under    treaties like NATO, while espionage is considered less serious.      <\/p>\n<p>    Nations are going to test us in cyber    space,\" said Alexander without elaborating as to whether recent    hacking activities directed at the U.S. approach the level of    war.  <\/p>\n<p>    Alexander and others on the panel also    discussed what the United States should do to protect itself    against cyber attacks. According to Oren Falkowitz, the CEO of    an anti-phishing service called Area 1 security, a lot of this    responsibility should fall to the private sector.       <\/p>\n<p>    Its just not the role of the    government to protect everyone in this country, he said,    explaining that businesses should be responsible for securing    their own networks unless critical infrastructure is involved.       <\/p>\n<p>    Falkowitz also downplayed the cyber    threat posed by new technologies like artificial intelligence,    stating that 95% of all hacks begin with phishing, so there is    no reason for hackers to pursue more exotic AI-based tactics.      <\/p>\n<p>    Gen. Alexander, who now heads a company    called IronNet Cybersecurity, was less sanguine about the AI    threat.  <\/p>\n<p>    As countries look to cyber as an    element of national power, theyll turn to AI and other new    tech,\" he warned.  <\/p>\n<p>    Meanwhile, another U.S. company is    having considerable success in using an unorthodox    techniquepaying hackersto protect companies from cyber    attacks. The company, HackerOne, runs programs called \"bug    bounties\" that involve inviting a large network of friendly    hackers to attempt to break into a company's network, and then    rewarding them if they are successful.  <\/p>\n<p>    The bug bounty programs have proved so    successful that even the U.S. military is using them. Last    year, the military paid HackerOne to run a program called \"Hack    the Pentagon\" that flushed out numerous computer    vulnerabilities.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/fortune.com\/2017\/07\/18\/spying-vs-cyberwar\/\" title=\"Spying or Cyber War? How to Tell the Difference - Fortune\">Spying or Cyber War? How to Tell the Difference - Fortune<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The idea of a hostile country hijacking computers deep inside the United States sounds frightening. But is it really so different from what countriesincluding the U.S.have always done in the name of espionage? That was a question posed to Gen <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/spying-or-cyber-war-how-to-tell-the-difference-fortune\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-206399","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/206399"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=206399"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/206399\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=206399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=206399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=206399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}