Cyber Warfare: The Next Frontier
The year: 2015. The information age is well underway and is only gaining more power and force as time progresses. The many vast, intricate networks used for such things as communication, online shopping, business technologies and even online banking, are growing and metamorphosing into tools now utilized by not only the every-day consumer but rather political groups and individuals with extremist and even deadly intentions. Cyber warfare can be defined as politically inspired computer security hacking to achieve sabotage and/or espionage. Cyber warfare looks to seek and exploit weaknesses in a computer system with chaos and destruction ultimately in mind. Cyber warfare is increasingly described as the next battlefront. Conventional warfare (hand-to-hand combat) looks to be a thing of the past. Information systems and technologies are taking over the world and with it, the potential for global-sized destruction and political gain. As the global online community and its information systems are skyrocketing at alarming rates, so are the number of users and even governments looking for an edge over competitors and threats. Using technology the world is only beginning to understand, governments, terrorists, and individual actors are taking advantage of the lack of legislature, the unknown, and international and intrastate cooperation to wage a new kind of war. An emerging dichotomy remains, if it can be made, it can be hacked. Which begs the
In order to properly answer the question posed we must first define what cyber-war and cyber-terrorism are. The Oxford Dictionaries defines cyber-war as “The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of communication systems by another state or organization:” Although there is no dictionary definition of cyber-terrorism, The Center for Strategic and International Studies (CSIS) has defined it as “the use of computer network tools to shut down critical national infrastructures (e.g., energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” The author defines cyber terror as “the intimidation of civilian enterprise through the use of high technology to bring about political, religious, or ideological aims, actions that result in disabling or deleting critical infrastructure data or information.”
Pfleeger, S. Pfleeger, and Margulies (2015) outline possible examples of cyber warfare between Canada and China (p. 844). According to Pfleeger, S. Pfleeger, and Margulies (2015), “the Canadian government revealed that several of its national departments had been victims of a cyber attack…” (p. 844). Eventually, the attack was unofficially traced to a computer in China (p. 844). Cyber warfare can be used negatively and positively. It is evident that China was seeking to gain protected information form Canada. Although a purpose of cyber warfare, it is not a conventional way of obtaining information. Additionally, cyber warfare can be used to collect intelligence on an enemy. Anyone seeking to gather intelligence on another individual or group can launch a cyber attack that gains access to protected files. This could be used to help future militant operations or expose critical information. Lastly, cyber warfare can be used to test systems internally. Acting with no malicious intent, “insiders” can utilizing cyber warfare tactics to attack their own cyber security barriers in order to test the strength of their systems. Seeking to expose the vulnerabilities in a system that contains important assets without actually harming the assets provides the system a diagnosis of what needs to be strengths and fixed. Identifying the problem or threats before an actual attack can ultimately save the protected
Adam Segal’s “The Hacked World Order” reveals many prevalent issues in today’s technologically centered society. Starting at Year Zero, June 2012 to June 2013, the battle over cyberspace witnessed world-changing cyberattacks. This was accomplished due to the fact that nearly 75% of the world’s population has easy access to a mobile phone, and the Internet connects nearly 40% of the total human population, which is nearly 2.7 billion people. With that being said, cyberattacks are becoming a more realistic form of terror.
Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb (National Research Council1). The United States Department of States defined terrorism as: “…premeditated, politically motivated violence perpetrated against non-combatant targets by sub-national groups or clandestine agents.” Terrorism not only occurs on the real life today but also on the internet. As the technology rapidly developed, there is an increase in the usage of internet, the threat comes along the way. Due to the occurrence of internet terrorism-generating fears to the public, the term “Cyberterrorism” was coined by Barry Collin in the 1980’s (Cyberterrorism Defined). The definition of cyberterrorism differs from various legal systems and government
As the internet growsn it will offer terrorists a way to control the spread of their propaganda, They are able to recruit supporters, They can learn how to build improvised explosive devices (IED), and to solicit people for financial contributions to help go towards their cause. One of the most common threats that transnational groups poses is cyber crimes. If they are able to access importannt and high security systems they may be able to control military installations, power plants, rail & air traffic control centers, banks and telecommunication networks. Other targets include police, medical, fire and rescue systems, and water systems.(The white
The drawback of Estonia's information technology framework was that its defensive protocol was not much secure and could be easily hacked. Moreover, the country was much depended on internet.
Guns, knives, and conventional explosives have so far remained the weapons of choice for most terrorists; however, recently terrorist have gone to the tactics of using vehicles as well, since such weapons can cause many casualties and are relatively easy to acquire and use. But some terrorist groups now show interest in acquiring the capability to use chemical, biological, radiological, or nuclear (CBRN) materials [Federal Emergency Management Agency, (July 2002)]. It is difficult to predict the likelihood of a CBRN attack, but most experts agree that today's terrorists are seeking the ability to use such agents in order to cause mass casualties [Federal Emergency Management Agency, (July 2002)]. Cyber-attacks are often considered in the same context with CBRN. Respectable experts have published sobering scenarios about the potential impact of a successful cyber-attack on the United States. Already, hackers and criminals have exploited some of our vulnerabilities [National Research Council. (2007)]. Terrorists are making extensive use of the new information technologies, and a conventional terrorist attack along with a coordinated cyber-attack could exponentially compound the damage [National Research Council. (2007)]. This changing nature of the terrorist threat raises the stakes in getting American counterterrorist policies and practices
Since the onset of the first packet switching event that many believe to be beginning of the internet, no other technology besides the printing press has ever transformed the ability to deliver information. Although the internet is used by a large percentage of the civilized world, few Americans realize how vital cyberspace is to our national infrastructure. Today, we are faced with even more threats although it has been a recognized problem since 2009, when President Barrack Obama said “The cyber threat is one of the most serious economic and national security challenges we face as a nation. It’s also clear that we’re not as prepared as we should be, as a government or as a country (Obama, 2009).” Every industry that operates in the United States is dependent on the internet for some aspect of their business. Commerce, transportation, financial institutions, military, as well as industrial control systems are all interconnected. This interconnectedness has created vulnerabilities within their infrastructure that have increasingly become targets of terrorists, script kiddies, foreign governments and hackers of all types.
Wars have been occurring since the beginning of time. Wars were once fought with sticks but as humans evolved, so did the weapons involved. Today’s warfare includes anything from hand grenades to remote controlled planes that are thousands of miles away from the operator. The rise of technology has become an issue due to the increasing development of these devices. Technology is used worldwide and as wars continue to develop, so does the possibility that the next war could rise into a cyber war. The Cybersecurity Enhancement Act will ensure the United States takes on these new threats with cybercrime by protecting the country’s critical infrastructures and ensuring the people are ready for the future in the cyberworld.
In this modern world, Information Technology forms the integral part of any kind of business. In the 21st century, countries across the globe have come to rely on complex computer networks that form the infrastructural backbone of even the most basic necessities of life, including electric power grids, global finance, food distribution, medical care, clean drinking water, petroleum production, and most types of communication. The protection of such networks, known as cyber security, is among the highest priorities in the civilized world, alongside planning and operations for major contingencies, including antiterrorism and land warfare. (Al-Saud, 2012:75).In Middle East region, the IT industry is dynamically growing along
From the advent of the Internet, there came with it the opportunity for any of its users to have access to any information they seeked right at their fingertips. With this access; entertainment, market opportunities, educational information, productivity, and global communication were able to grow and flourish, however with these gains seen came with it the weakening of the once secure national strength seen in nations. In the last two decades cyberspace has been defined as the 'fifth battleground’ for international relations, with the aspects of cyber war, cyber terrorism, and cybercrime as some of the largest threats to the security of the national and international community. (Popović, 2013) With this ‘fifth battleground’ of the cyberspace thrown into the international battlegrounds of old, its effectiveness and effect on the both the modern state and the international bodies of the world, posing the question of how will this increased accessibility to the cyberspace will affect national security in the coming years?
With the widespread use of technology becoming more prominent, acts of cyber terrorism pose an increased threat to safety. Cyber terrorists exploit the internet and its users to commit acts that can be increasingly detrimental to their targets. Some of the terrorist activities include large scale corruption of computer networks by using tools like computer viruses. Certain individuals even have the ability of creating severe damage to government systems, national security systems and even hospital servers. Most of the technology made today only has intentions of making life easier for people. However, skilled users can manipulate the cyber world for negative intentions. Staying informed when it comes to cyber terrorism and cybercrime is important to do because of the increased reliance on technology in society. Steps to improve cyber security before an attack ensures the safety of sensitive information. The topic of cyber security and cyber warfare are interesting topics to keep up to date with. Understanding these topics can be beneficial to my dream of being in the FBI, ensuring the safety of others by working to prevent acts of cyberterrorism.
The branches of the military, for a couple generations, have always been the Army, Navy, Air force, Marine Corps, and the Coast Guard; however, in an ever evolving digital world, the notion that outer space would be the next military front is being rapidly replaced by the idea that cyber space will be the next arms race. The United States has been defending attacks on their infrastructure day after day, night after night, when one hacker on one side of the world sleeps, another takes their place to attempt to compromise the US government. The motives may range from a political ‘hacktivist’ trying to prove a point, to an economic spy, trying to gain a competitive edge on its more upstart rivals, to an attempt to control the United States
Cyber Terrorism is an attack executed by Cyber Terrorists via information systems to significantly interfere with the political, social or economic functioning of a groups or organizations of a nation or induces physical violence and creates panic. We define hackers as individuals who wish to access, modify data, files and resources without having the necessary authorization to do so, and/or wish to block services to authorized users. Cyber Terrorists are individuals or groups to utilize computer and networking technologies to terrorize. In this paper, we study the behavior of two groups of hackers: Cyber Terrorists and Common Hackers. Cyber Terrorism and Cyber Terrorists is generally considered classified information which cannot be released to the public, we can usually only interfere that Cyber Terrorism and Cyber Terrorists exits. However in 2010 federal bureau of investigation chief, Robert Mueller, told an RSA conference of computer security professionals, “The Cyber Terrorism threat is real and rapidly expanding”. He indicated that terrorists have shown a clear interest in hacking skills and combining real attacks with Cyber-attacks. [8]
Prevalent to the current trend now is the dependency of the society on Information technology and communication systems. Every aspect of human life is one way or the other linked and controlled by information technology tools. The importance of information technology cannot be over emphasized as its unavailability could lead to a form of disaster or the other. Pivotal infrastructures like finance, healthcare, education and security are driven by information technology. However, information technology and its benefits are accompanied by vulnerabilities and risks that can be exploited by people with the necessary technical skills. Individuals like ‘Hackers’ and ‘Cyber Terrorist’ can cause disruption to information systems, commit financial fraud and also attack computers and networks. These attacks and disruptions could result to violence against people and properties. In some cases, death, serious injuries and severe economic loss could occur as a result of these attacks.