Published
on
By
According to the sources, CIA members have gone to Switzerland to lead the security of the WEF meeting due to a possible attack. While the meeting of the World Economic Forum or WEF begins on January 16 in Davos, the Swiss Army has started security preparations under the leadership of CIA in the field for the annual meeting of the World Economic Forum (WEF) in Davos. For the WEF meeting in Davos, the Parliament has approved the preparation of 5000 soldiers, and now about 500 soldiers have been deployed to guard the meeting place, led by members of the United States’ Central Intelligence Network. The identities of the CIA Ops are not clear, because if the anti-western countries talk about the WEF meeting, that the security responsibility of the WEF meeting has been handed over to the CIA and only the soldiers will be from Switzerland, then it will increase the challenges to the WEF meeting. Intelligence experts and analysts of intelligence reports believe that this time, the war between Russia and Ukraine in Eastern Europe has led to the possible targeting of the WEF meeting in Switzerland, because in this international economic meeting, a number of economic topics will be also discussed against of Russia and its allies.
What is purpose of the Annual meeting of WEF?
This annual meeting, which is hosted by the Swiss country of Europe, is very important because the international economic companies and political bonds are led through the annual meeting of the World Economic Forum, and for years to come, this World Economic Forum engages leading political, business, cultural and other community leaders to shape global, regional and industry agendas. On the other hand, this annual meeting faces a number of possible risks and challenges, such as the religious war between Muslims and non-Muslims, which affects the economic forum, and the sabotage of the WEF annual meeting by terrorist and intelligence groups.
In addition, after the terrorist attacks in France in November 2015, the biggest challenge to the security of international meetings in Europe, and the current sensitive situation in Europe, the flames of war have started. The impact of the Russia-Ukraine conflict is being felt at the annual meeting of the World Economic Forum in Davos, and European and American business organizations and political processes may use tough measures against Russia. The political and business leaders of the world are worried about the economic future of Europe, because, the series of power division in Eastern Europe is going on rapidly, along with religious extremist non-militant and armed groups are also increasing in Europe, which can easily increase violence in Europe under the pretense of freedom of expression and religion. A clear example of which is the expansion of the Muslim Brotherhood and Hizb-ul-Tahrir groups in Britain, France and Germany. On the other hand, the economic and industrial promptness in Europe is increasing day by day, and at the same time, due to the war between Russia and Ukraine, the lack of energy and the trend of economic stagnation have created a sense of depression among many business leaders.
Other investment destinations also seem uncertain, but India has emerged as a region of both economic dynamism and political stability under the support of the United States, which is currently trying to include India in the P-5+1. Eager to capitalize on this current mood as an economic marketer, India is drawing the attention of world leaders to its reform decisions, and to the rapid pace at which a new unicorn is being created in the country.
Because the West is also trying to weaken the economic side of the European Union, And transfer the European economic and trade zone from Europe to South Asia and open a new economic zone by connecting Iran’s Chabahar port and Gwadar port in the future country of Baluchistan.
In turn, China is reaching the Caspian Sea through Northern Afghanistan to expand its trade with the Middle East by using the Caspian, until to leave and forget of Pakistan’s Gwadar. And the United States is preparing to give a large share in the new economic zone to its close allies from the continent of Europe, such as France, Germany, England and a number of other countries, And before that, with the support of the United States, the UAE signed an agreement with France in the field of energy. In this way, the European allies of the United States will be included in the economic contracting countries of the new economic zone, in order to reach this point; there are now efforts to disrupt the economic agreements under the umbrella and leadership of the European Union.
The current World Economic Forum is looking at a different world than it did in the past, and this is a reason for India to find itself in the sweet spot and take advantage of Europe’s current external status to emerge as a new economic leader. Chain’s future role in the WEF and what will be its alternative approach against India. Before this, Chinese President Xi Jinping focused on the Davos summit; And Xi Jinping again presented China as a champion of free trade, while the United States under the leadership of Donald Trump was seen on the other side of the fence. However, with the end of Trump’s reign, the relations between the China and the West led by the United States have become more complicated, and the challenges to China’s economic development have increased.
Because of that, China is not present as a leading trader in the current Davos summit and is standing behind, and the main reason is China’s tough stance against Taiwan, So the focus of WEF next annual meeting has shifted to India, and India is enjoying potential benefits as an alternative investment destination. In bringing India to this position, the United States has lost its closest ally in the Middle East, Saudi Arabia, and the main reason was the United States allowing India to emerge as the star of EVs in the global economic competition against China until 2030.
Apart from this, another important topic for India is the renewable energy of green hydrogen. Green hydrogen is hydrogen made with renewable energy, India’s plan aims to replace fossil fuels with hydrogen in the production of fertilizer and steel, mix it into city gas supplies and promote its use in transportation. While India’s current production of green hydrogen is low and comes from a few pilot projects, But the country wants to produce 5 million tons of green hydrogen by the end of this decade. The Narendra Modi-led government has recently approved the National Green Hydrogen Mission, which is expected to open up new opportunities towards net-zero goals in the next five decades, which will further reduce the role of China’s green hydrogen market in the international trade market. And India’s economy is estimated to grow by $20-30 trillion over the next three to five decades, which is in line with India’s net-zero commitment. Companies that want to promote India’s green hydrogen policy include Adani New Industries Ltd, Reliance Industries Ltd, Indian Oil Corporation Ltd, ONGC, GAIL India Ltd, Bharat Petroleum Corporation Ltd, NTPC Ltd, Larsen & Turbo, and Hindustan Petroleum Corporation Ltd, Started investing in green hydrogen innovations. These are the economic developments that can introduce India’s presence at the next WEF meeting.
What will be the position of the economic embargo of the United States against Venezuela and Iran at the 2023 World Economic Forum meeting?
After 2022, there is still a big question whether the United States will ease the sanctions on Venezuela and Iran in order to get oil alternative for the economic sanctions imposed on Russia due to the Russian invasion of Ukraine. Earlier, US Secretary of State Anthony Blinken said on March 6, 2022 that the US and its European allies might impose a ban on Russian oil imports in response to the war in Ukraine.
The administration under the leadership of US President Biden was ready to improve relations with Venezuela and ease sanctions after the 2022 WEF meeting because the United States needed Venezuela’s energy reserves. However, currently the question is the relationship between Iran and Venezuela, the negative effects of which can once again make the relationship between the United States and Venezuela difficult, meanwhile, the President of Venezuela, Nicolas Maduro, has recently expressed his willingness to close relations with the United States. However, Iran’s President Ibrahim Raisi, on Sunday, January 8, 2023, in a meeting with the new Venezuelan ambassador in Tehran, warned Venezuela to avoid closer relations with the United States. In addition, the tension in relations with Venezuela will complicate the security situation in Latin America, and these all were the most important factors to the security of the WEF annual meeting, which is currently receiving increased attention.
Heathrow nuclear shipment?
Ajmal Sohail is a graduate in terrorism and extremism studies from both Leiden University in the Netherlands and Maryland University in the United States; he works in the meantime as an intelligence analyst and Counter-terrorism expert. He does remain well connected with the political players in his country, both those physically in Afghanistan and those working from outside, allowing him to gain insights into the extremely complex geopolitical situation in Afghanistan and in the South Asia region. He is the co-founder and co-president of the Counter Narco-Terrorism Alliance Germany, directing its intelligence and counter-terrorism portfolios. His analysis is regularly featured in various international news outlets, print and television and he even runs his own sources to get the most classified Intel. His analysis and other content can be accessed at his personal website: http://www.ajmalsohail.com
Political Scientist: Japan and India will deepen ties because of China Rise
Nuclear decommissioning in South Asia
Global Recession Likely In 2023, But Pressures On Food, Energy and Inflation May Be Peaking
The U.S. National Debt Limit: Economic Implications of an Expected Congressional Standoff
Turkey’s Upcoming Critical Elections and Its Possible Impacts on Tense Relations with the EU and US
Heathrow nuclear shipment?
Published
on
By
Last month, during routine scanning of cargo at the Heathrow Airport, the British police came across a “very small quantity of uranium “package. The undeclared material was discovered on a passenger flight on December 29, 2022. The Indian news agencies and Daily Mail Online reported “it was destined for an Iranian business with premises in the UK (David Barret, Home Affairs Editor for the Daily Mail and Brittany Chain for Mail Online, Published January 10, 2023). Being “not of weapon grade” the uranium was incapable of being used for improvising a “dirty bomb” (a radiation dispersal device). However, some news agencies and uncanny experts tried to whip up “dirty bomb” scare out of the incident. Hamish De Bretton-Gordon, former commander of the UK’s nuclear defence regiment lent credence to the unfounded scare. He said: ‘Uranium can give off very high levels of poisonous radiation. It could be used in a dirty bomb. Indian news agencies and the Daily Mail Online, in their reports, magnified “a very small quantity” into “several kilograms” of uranium. It was claimed that the package “originated” in Pakistan though it was headed for an Iranian business in Britain.
British Police Commander, Richard Smith clarified: ‘I want to reassure the public that the amount of contaminated material was extremely small and has been assessed by experts as posing no threat to the public. ‘Although our investigation remains ongoing, from our inquiries so far, it does not appear to be linked to any direct threat.
‘As the public would expect, however, we will continue to follow up on all available lines of enquiry to ensure this is definitely the case.
‘However, it does highlight the excellent capability we and our partners have in place to monitor our ports and borders in order to keep the public safe from any potential threats to their safety and security that might be coming into the UK.’ ‘The material has been identified as being contaminated with uranium.’
Distortion
It is unfortunate that India in cahoots with some foreign media is always in the forefront to exploit such incidents and portray Pakistan as a nuclear rogue. For instance, Time magazine, in its article ‘Merchant of Menace’, reported some uranium hexa-flouride cylinders were missing from the Kahuta Research Laboratories (February 15, 2005). Pakistan’ information minister and foreign-office spokesman both refuted the allegation. The information minister told Geo TV channel, “We have checked all the records and no cylinder is missing from the KRL”. Masood Khan (foreign office) told reporters, “The story is a rehash of several past stories”. May read N-Terror Threat the News International, August 27, 2009
India’s own record is dismal. Let us reminisce a few incidents It is not understood why loss of radioactive material from Indian labs is always out of the magazine’s focus _ According to international media reports (February 25, 2004),
India itself reported 25 cases of “missing” or “stolen” radio-active material from its labs to the International Atomic Energy Agency (IAEA). Fifty-two per cent of the cases were attributed to “theft” and 48% to “missing mystery”. India claimed to have recovered lost material in twelve of total 25 cases. She however admitted that 13 remaining cases remained mysterious.
Pot calling kettle black:India’s radio-active bazaar
India has a sprawling civil and military nuclear programme that spreads over several states. In an article in The Diplomat, Sitara Noor highlighted shortcomings in safety and security of India’s nuclear facilities (India’s radio-active bazaar: Recurring incidents involving theft and sale of nuclear materials demonstrate why India must develop an independent nuclear regulatory body.)
<thediplomat.com/2022/03/India’s radio-active bazaar> [Accessed 14 January 2023].
She says: ‘While global markets are taking a dip due to economic recession, India’s illicit uranium market seems to be flourishing. In February, eight people including two Indian officials were apprehended in Nepal for illegally possessing and attempting to sell“uranium like substance”. The material was reportedly smuggled from India. This was not just one-off incident _ theft and sale of nuclear and radioactive material in India is a recurring phenomenon. Earlier in May 2021, reports of the seizure of 7 kilograms of highly radio-active uranium worth 210 million Indian rupees from a scrap dealer raised serious concern about India’s nuclear security capabilities. Over the past two decades over 200 kilograms of nuclear and radio-active materials has reportedly disappeared from Indian facilities. Frequent incidents of loss and theft of nuclear and radio-active materials in India indicate the failure of the nuclear security systems at multiple levels. First there seems to be a gap in the material accounting and control systems to ensure that not even an iota of material is left unaccounted. Second, the nature of incidents in India hints at the involvement of insiders_ someone working at the nuclear facilities or mining sites working independently or colluding with an outsider. This indicates the serious risk of insider threat and a failure of the personnel reliability program. Third, the recurrence of nuclear security lapses with such impunity indicates serious issues with nuclear security culture in India…’
Is Dirty bomb a hoax?
Opinion about the effects of a dirty bomb is divided.
A report by Henry Stimson Center, Washington (followed by several other reports) laments “…Nuclear and radiological terrorism remains a frightening possibility in India and Pakistan, and the source material for nuclear terrorism could come from illicit transactions of poorly protected materials originating outside the region, as well as material from within the region used for military or civilian purposes”.
This report was provided to the US Senate Foreign Relations Committee to facilitate the Cooperative Threat Reduction Program on nuclear proliferation in South Asia.
The report concludes that “although India and Pakistan have established regulatory bodies to deal with the safety and security of their nuclear materials,’ these may not be sufficient to protect against every potential threat”.
Another report, authored by Kishore Kuchibhotla, Ph.D (Biophysics) from Harvard, and Matthew McKinzie, a nuclear physicist serving as a staff scientist with USA’s Nuclear Program at the Natural Resources Defense Council, argues that “…three other types of events could prompt unintended escalation in South Asia: a terrorist use of RDDs (radiological dispersal devices); a terrorist detonation of a nuclear weapon; and the accidental explosion of nuclear arms — for example at military bases in either India or Pakistan… The report points out that while nuclear weapons themselves are closely guarded, all sorts of radioactive material could be found in research laboratories and hospitals that could provide the basic materials for the making of a dirty bomb…. Nearly 10,000 radioactive sources are used throughout India of which about 400 are particularly worrisome…” The report predicts that “…dirty bomb detonation in Karachi, New Delhi, Mumbai and Islamabad” could result in “casualties that at the very minimum would number in the tens of thousands”. It is eerie to note that The Time (Pentagon) correspondent Mark Thompson asserts in his article what is a ‘Dirty Bomb, “It’s unlikely to kill 10,000 people”.)
It appears that the concern about the “dirty bombs” is overblown. History of terrorism reflects that “terrorists” are interested in symbolic targets (which could yield widespread publicity), not in mass killing (vide Verindre Grover’s Encyclopaedia of International Terrorism).
A “dirty bomb” is not known to have been tested by any country or detonated by any “terrorist” anywhere in the world. So, its composition and scope of its destructive power is shrouded in mystery. However, it is generally believed to “consist of a bomb made of conventional explosives such as TNT, salted with radioactive material”.
Contrary to the “dirty bombs”, fall-out of the tested A-bombs is well recorded. The major powers declared moratoriums on nuclear-bombs testing only in 1992. The pre-1992-period test scoreboard of the USA, former Soviet Union, France, and Britain is an explosion every 18 days, 21 days, 61 days, and 331 days (R Venkataraman Nuclear Explosion and its Aftermath).
CBW
It is much easier and cheaper to make a chemical or biological bomb than a “dirty bomb” (It is believed that the chemical bombs used by Saddam’s Iraq against Iran were made with Indian know-how). Though a “dirty bomb” has never been used by any “terrorist”, a bio/chemical bomb was actually used by Japan’s former doomsday-cult Guru Shoko Asahara. The Guru stands sentenced to death “for masterminding the deadly 1995 nerve/chemical gas (sarin) attack on the Tokyo subway and a string of other crimes that killed 27 people”.
The cult’s quest for biological weapons was overshadowed by its chemical attack capability. The cult members were trying to develop botulinum toxin by utilising toxin of green Mamba snake and poisonous mushroom spores,
Regarding use of chemical/biological weapons by “terrorists”, Professor Ramesh Chandra points out in his Global Terrorism (volume 1, page 27), “The US government indicates that these weapons are well within the reach of terrorists. According to the Central Intelligence Agency, ‘Terrorist interest in chemical and biological weapons is not surprising, given the relative ease with which some of these weapons can be produced in simple laboratories… Although popular fiction and national attention have focused on terrorist use of nuclear weapons, chemical and biological weapons are more likely choices for such groups’”.
Not only sarin, but also several other chemical agents like mustard, tabun, soman and VX are capable of dual use as pesticides and as a chemical weapon. Chandra (op. cit., page 30) points out, “chemical warfare agents ‘can quite literally be manufactured in a kitchen or basement in quantities sufficient for mass-casualty attacks”. Experts agree that it is more difficult to manufacture Sarin gas, used by the “terrorists” in Japan, than mustard, tabun, soman, et al. To some experts, an effective bio-terrorism facility could be built at $ 200,000 to 2 million.
Biological weapons, too, are easier to manufacture than “dirty bombs”. Viruses could cause smallpox, Venezuelan equine encephalitis and hemorrhagic fevers like Ebola. The threat of biological weapons is obvious from the fact that: (1) The charges for anthrax, Q fever (Coxiella burnetti) and Venezuelian equine encephalomyeletus cultures from a leading US culture collection are about $ 45, $ 80, and $81 respectively. Besides, nature abounds with microscopic killers. Bacillus anthracis resides in hides and carcasses of wild or domesticated animals and plagues in prairie dogs, chipmunks, black rats, deer mouse and coyotes. Chandra (op cit) states that “The cost estimates for a bio-terrorism facility vary quite widely from $ 200,000 to $ 2 million…Instructions for how to mass produce, purify, and concentrate microbes can be found in textbooks and scientific journals”.
Concluding reflections
The Heathrow nuclear material is now seen as ‘deadly’ but the UK-based media agency reported that the uranium was ‘not weapons-grade’ – and so could not be used to manufacture a thermo-nuclear weapon, as per sources.
It appears that disproportionate emphasis on mythical “dirty bombs” vis-à-vis chemical / bio- bombs is meant to press and exploit non-major or nuclear-threshold states. “Dirty” or clean bomb attacks by “terrorists” need to be understood and explained within the broader frame of “terrorism”.
The US authorities have recorded over 175 cases worldwide of nuclear materials (not bombs) being smuggled out of former Soviet Union territories and other countries. The Federation of American Scientists, nevertheless, admits that “radiological attacks could result in some deaths but not hundreds of thousands of casualties that could be caused by a crude nuclear weapon” .
The US scientist concluded, “Significant quantities of radioactive material have been lost or stolen from US facilities during the past few years. Radiological materials are stored in thousands of facilities around the US, many of which may not be adequately protected against theft by determined terrorists’ ‘. Materials like Iridium-192, Cobalt 60 (Gamma emitter), Cesium-137 (Gamma emitter), Americium (Alpha emitter) and even plutonium could still be stolen from over 21,000 laboratories, food irradiation plants, oil drilling facilities and medical centres in the USA. But, it is not an easy job to make an effective “dirty bomb”.
It appears that “dirty bomb” is a hoax to exploit nouveau-nuclear or nuclear-threshold nations. It could be a weapon of mass disruption, but not a weapon of mass destruction. Real threat emanates from chemical or bio-weapons.
Published
on
By
in 2007, after the Russian Cyber-attacks, the Estonian government realizes the need for a proper cybersecurity policy and It launched its first cybersecurity policy in 2008. These policy rules were implemented in two different phases. The first phase was from 2009- 2011 and the second was from 2011-2013. A renewed strategy is adopted for the year 2019-2022. Estonia is among the few countries, that have incorporated cybersecurity in its national security domain. Government institutions had taken different measures to produce an active cyber force over the year. Estonia has unified Government agencies, private institutions, and even civil society to develop vigorous cybersecurity arrangements. Many Government and non-government institutions are grouped because it considers cybersecurity a great threat to national security. Estonia has a very efficient cyber command and control structure. The Ministry of Economic affairs and communication was given the main task to overlook all the issues related to cybersecurity. It is supervised by the government’s security committee and supported by different ministries.
What distinguishes Estonia from other countries is the fact that the public is playing a very effective role in making robust cybersecurity arrangements. The cyber defense league is a part of the defense league that works under the ministry of defense. Defense League is a volunteer organization of Estonian people that works closely with the ministry of defense to counter any kind of threat to the national security of Estonia. Cyber Defense League is a league of experts working under the supervision of MoD. Its main task is to prevent Estonia from high-level cyber-attacks. Its activities are divided into two broad categories. The first is to increase the capacity of the local population and government institutions against cyber-attacks. The second is to carry out different operations in the field of cyberspace.
Estonia is considered among the smaller states in the world. It does not have a huge population and area. Furthermore, its small military forces and resource are less prominent than major powers. But in the field of Information and communication technology, Estonia has transformed itself into a major power and now acting as a role model for many in the world. Estonia is collaborating very effectively with other states and international organizations. This collaboration not only increased Estonian cyber capabilities, but it is also useful for other parties to learn from the experience of Estonia. The most important partnership of Estonia is with NATO member states. The NATO Cooperative Cyber Defense Centre of Excellence a premier institution to deal with cybersecurity threats is situated in Tallinn. This department has the tasks of capacity building, policy coordination, and forming a joint effective force to deal with the threat of cyber-attacks. An important agency of the European Union is also located in Tallinn. Its name is EU-LISA. Its main role is handling Information technology systems.
In comparison with major international actors, smaller states are always considered vulnerable to attack. But cyberspace gives a huge advantage to smaller states in case of conflict with major powers thus they can deal with conventional asymmetry by using cyber force. Estonia is among the very first countries that have developed a proper cybersecurity policy. It showed the world how a tiny state can play a leading role in the field of cybersecurity. Estonia is playing a leading role in the North Atlantic Treaty Organization for strengthening cybersecurity infrastructure.
In the word of Thomas Waite, “we’ve gone from the Cold War to the Code War”. Pakistan as a member of the international community and with its own interest in International Politics could not Isolate itself from the effects of “code war”. Therefore, it is high time for Pakistan to learn from the states like Estonia to draft a proper mechanism to deal with the threat of Cyberwar.
Published
on
By
With the rise of technology, the nature of crime has also transformed. Crime becomes more lethal and untraceable. Cyber security expert warns about the new nature and domain of cybercrime in 2023.
Cyber Attack on Hospital
Cyber-attacks on hospital systems can have serious consequences, as they can disrupt the delivery of healthcare and potentially put patients’ lives at risk. Hospitals are often targeted by cybercriminals because they may have valuable personal and financial information about patients and because the consequences of a successful attack can be severe.
In a cyber-attack on a hospital system, the attacker may try to gain unauthorized access to the hospital’s computer systems and steal or manipulate data, disrupt the operation of medical devices, or disrupt the delivery of healthcare. The attack may also involve ransomware, where the attacker holds the hospital’s data hostage and demands a ransom to restore access.
It is important for hospitals to have strong cybersecurity measures in place to protect against cyber-attacks. This may include measures such as firewalls, antivirus software, and secure passwords, as well as ongoing training for staff on how to recognize and prevent cyber-attacks.
Scanning QR Code
Scanning a QR code has the potential to compromise your personal data if the QR code is linked to a malicious website or if it is used to steal your personal information. It’s important to be cautious when scanning QR codes, especially if they are from unfamiliar sources.
It’s also a good practice to check the URL of the website that the QR code leads to, to make sure it is a legitimate website and not a phishing site or other type of scam.
It’s also a good idea to use a QR code scanner app that checks for safety and has some sort of building security checks, also updating your device and QR scanner app on regular basis will make sure you have the latest security patches.
It’s a good practice to avoid scanning QR codes from untrusted sources and only scan QR codes from sources that you know and trust.
Cyber-attack on Supply Line
A cyber-attack on a supply chain can have significant consequences for the affected organizations and their customers. These types of attacks can disrupt the flow of goods and services, leading to delays, lost revenue, and potentially even damage to a company’s reputation.
In a supply chain cyber-attack, attackers typically target the systems and networks that companies use to manage and track their inventory, orders, and shipments. For example, an attacker might target a company’s enterprise resource planning (ERP) system, which is used to manage inventory and production, or a transportation management system (TMS), which is used to track shipments and deliveries.
The attacker can gain access to these systems through a variety of methods, such as exploiting vulnerabilities in software, phishing scams, or other forms of social engineering. Once they have access, they can steal sensitive information such as customer data, financial data, and intellectual property, or disrupt the normal operation of these systems. This can lead to delays in deliveries, stakeouts, and unplanned downtime in production.
It’s important for organizations to take steps to protect their supply chains from cyber-attacks, by implementing measures such as security awareness training for employees, regular security audits and penetration testing, and the use of advanced security technologies such as firewalls, intrusion detection, and prevention systems, and security information and event management (SIEM) tools.
In addition, organizations should also be proactive in monitoring for signs of an attack and be ready with incident response plans, which can help minimize the damage of a successful attack and help with a faster recovery.
Cyber-attack on electric cars/vehicle
A cyber-attack on an electric vehicle (EV) can have serious consequences, potentially compromising the safety and privacy of the vehicle’s occupants, as well as the integrity of the EV’s systems and networks.
One way that attackers may target an EV is by exploiting vulnerabilities in the vehicle’s electronic control units (ECUs), which are the computer systems that control various aspects of the vehicle, such as the powertrain, brakes, and steering. Attackers could potentially take control of these systems and manipulate the vehicle’s behavior, potentially causing accidents or other dangerous situations.
Another way attackers may target an EV is by exploiting vulnerabilities in the vehicle’s communication systems, such as the onboard diagnostics (OBD) port, or wireless connectivity systems, such as Bluetooth or cellular networks. This can allow attackers to gain access to the vehicle’s systems and data and potentially steal sensitive information such as location data, driving history, and personal information of the occupants.
To mitigate the risk of cyber-attacks on EVs, it’s important for manufacturers to design and build vehicles with security in mind. This includes the use of secure coding practices, regular software updates to address known vulnerabilities, and the use of robust security protocols to protect the vehicle’s communication systems.
It’s also important for EV owners to be aware of the risks and take steps to protect their vehicles. This can include keeping their vehicles’ software up to date, being cautious about connecting their vehicles to unfamiliar networks or devices, and not leaving sensitive information such as personal data in the vehicle.
As the trend of Electric cars is getting more popular and advancement in technology is increasing, Cybersecurity in Electric cars will be a crucial area to ensure the safety and security of both vehicles and their occupants.
Cyber-attack on Electric Grid
A cyber-attack on an electric grid can have serious consequences, potentially causing widespread power outages and disruptions to the electricity supply. Electric grids are complex systems that rely on many interconnected components, including power generators, transmission and distribution systems, and control systems.
One way that attackers may target an electric grid is by exploiting vulnerabilities in the control systems, such as supervisory control and data acquisition (SCADA) systems and other industrial control systems (ICS) that are used to monitor and control the grid. Attackers can use malware, phishing scams, or other techniques to gain access to these systems and manipulate the grid’s behavior, potentially causing power outages or other disruptions to the electricity supply.
Another way that attackers may target an electric grid is by exploiting vulnerabilities in the communications systems that are used to transmit data and control signals between different parts of the grid. This could include exploiting vulnerabilities in the networks that connect power plants, substations, and other grid components, or by targeting the systems used to manage the grid’s transmission and distribution systems.
To mitigate the risks of cyber-attacks on electric grids, it’s important for utilities and grid operators to take a proactive approach to cybersecurity. This includes implementing robust security measures such as firewalls, intrusion detection and prevention systems, and security information and event management (SIEM) tools. Additionally, regular security audits, penetration testing, and employee training on cybersecurity are important.
It’s also important for government agencies, utilities, and grid operators to work together to share threat intelligence and coordinate incident response efforts. Furthermore, Industry Standards and regulations such as NIST-CIP, IEC62443, and others provide guidelines for protecting industrial control systems like those used in the electric grid.
Given the critical importance of electric grids to our daily lives, ensuring their cybersecurity is a vital step towards protecting our communities and infrastructure from potential cyber threats.
If real estate is anything to go by, Dubai is snubbing its nose at Saudi efforts to replace it as…
According to the sources, CIA members have gone to Switzerland to lead the security of the WEF meeting due to…
Last Saturday 7th of January, two of Mexico City’s underground trains collided between two stations killing one person so far,…
China is known to entrap weaker economies through its debt trap, but the bigger threat, not so much talked about,…
The China factor has steadied the two nations’ strategic partnership, despite their differences of opinion on some world affairs matters….
The nuclear decommissioning is coming to South Asia as their old nuclear reactors are reaching its overextended operational limit. The…
A dramatic rise in the frequency and severity of wildfires is undermining efforts to reduce carbon dioxide (CO2) emissions in…
Chinese Naval Doctrine and Its Implications
A Rift Getting Deeper: TTP and IEA parting their ways?
18 Manufacturing Lighthouses Show How to Boost Productivity and Sustainability
Ukraine can be the next Denmark: Zelensky Peace Formula and new territorial realities
Upgrading Bretton Woods: A Case for “Currency Baskets”
Beck Robertson: “It is time to hold a referendum on the monarchy in Britain”
Robots and the Future
The Evolving Global Landscape and Challenges for Foreign Policy of Pakistan
Copyright © 2021 Modern Diplomacy