Do you want to see something cool? It’s also scary as Hell, but in a cool kind of way.
This is a real-time representative map of current cyberattacks going on around the world. This is not all of the attacks, of course, just ones that have been identified by Norse Corporation. They are heavily involved in cyber-security for corporations and the military-government complex. With its slick graphics and easy to understand layout, the map shows where the attacks originate and where they are aimed at. It is mesmerizing for data junkies, but the truth is all the more frightening.
The map shows just a tiny amount of the number of attacks that are currently going on. If the graphic showed all current cyberattacks, it would overload and freeze your computer. The entire world is involved in a huge cyber war and, many times, it is hard to tell who is on whose side and who our enemies really are. The OPM hack that has caused incalculable damage to the American military and government came from China. The attacks on Wall Street and the White House originated in Russia.
These two players are old opponents of the U.S. and it came as no surprise to find out they had updated and increased their capabilities for hacking into American computer systems. Our government does the same thing to them – perhaps without as much success or at least as much fanfare – and that is expected behavior; but cyber-attacks also come from and are aimed at nominal allies and even friends.
The NSA collecting data on our allies in France and Germany have not only hurt our credibility with these nations, but have also shown that the U.S. is not above spying and hacking on our friends. With that revelation, would it surprise anyone to discover that they have responded in kind?
Cyber warfare has gone mainstream. The old rules concerning friends and allies have been swept aside in the desire to gather as much information as possible and old friends have turned into competitors. It is no longer necessary to keep your friends close and enemies closer, both of them are already rooting around in our computer systems while we are too busy looking through theirs.
Disclaimer: The content in this article is the opinion of the writer and does not necessarily reflect the policies or opinions of US Patriot Tactical.