Search
Results
-
Cyber-conflict between the United States of America and Russia
(2017)CSS Cyberdefense Hotspot AnalysesThe US Presidential elections of 2016 were marked by the breaches into the Democratic National Committee’s computer network. This report describes the details and techniques of the hack, their victims and the actors involved, including Russian actors. The research does not focus only on the DNC hack, but also on older and related hacks that were attributed to Russia. The report analyzes the effects of these hacks on US society, US internal ...Report -
Cyber and Information warfare in the Ukrainian conflict
(2017)CSS Cyberdefense Hotspot AnalysesThe Ukrainian conflict started with the invasion of Crimea by Russian troops. As the conflict continued Ukrainian and Russian hackers engaged in tit-for-tat cyberattacks while maintaining them at low intensity. In December 2015 and December 2016, the cyberattacks on the Ukrainian power grid showed that cyber capabilities could be used to escalate the conflict. This report examines the various methods used in the numerous cyberattacks in ...Report -
The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict
(2017)CSS Cyberdefense Hotspot AnalysesThe conflict in Syria developed from civilian protests against the government in 2011 to a civil war. The hostilities were not limited to the physical realm, but also took place in cyberspace. The goal of this report is to understand the mechanisms of the use of cybertools in the context of a civil war. It examines the various actors, tools and targets observed during the conflict. It analyzes the effects of cyber activities on the Syrian ...Report -
Stuxnet
(2017)CSS Cyberdefense Hotspot AnalysesStuxnet was a malware first discovered in 2010 on an Iranian computer. It was designed to specifically to sabotage centrifuges in the Iranian nuclear facility of Natanz. The discovery of Stuxnet raised awareness of cybersecurity issues for critical infrastructures around the world. The goal of this report is to retrospectively analyze the very specific case of Stuxnet to better understand its effects. The Hotspot Analysis examines the ...Report