Cyberwarfare Chronicles: Taking Down the Internet

As of this 2015 map, there were over 278 undersea Internet cables in-use; Credit: TeleGeography
Credit: The New Stepford

Precision Targeted Attacks Against Specific Internet Service Providers

  1. Strengthen Bandwidth
  2. Detect & Block the attack
  3. Content Delivery Networks (CDN)
  4. Detection & Traffic re-routing at the ISP-level
  5. Paying for DDoS Protection Cloud Services (Akamai, Cloudflare, Google Project Shield, etc.)

Undersea Cables

Credit: Imgur

Border Gateway Protocol Hijacking

Map of Internet Topology; credit Hal Burch& Bill Cheswick of Lumeta
Tweet notification of Dec 28, 2018 China Telecom BGP hijacking U.S. DOE IP address range

“Yeah, But Are these Cyber Threats Really All That Serious?”

The Sleepy Dragon Awakens

Rogue Nations Who Will Not Sign International Cyberspace Treaty

The Future Is Cloudy With A Chance Breaches

--

--

--

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Log4j vulnerability in Tableau — how to fix / workaround[unofficial]

Can anonymous data and/or credit card spending help prevent the worst from the next pandemic?

Florida Data Privacy Bill Fails

InsurAce’s High-grade Risk Management to secure your bucket

Can You Stop the Emergence of Digital Corruption

Certificate Transparency Log Enumeration

The Beginner’s Guide to the Musical Scales of Cyberwar

{UPDATE} Explore Titanic Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

More from Medium

Here’s Why Protonmail Is Better for Your Privacy Than Gmail

23 DIY privacy and security settings for your Windows

Fake job postings are being used to extort money and personal information, according to the FBI

Silent AirTags with no speakers are being used for stalking