The Stuxnet digital assault on the Iranian Nuclear facilities at Natanz is seen by a lot of people as the first genuine digital weapon. This makes Stuxnet's super vitality as an issue unparalleled in present day digital world and particularly worth a debate. Lessons gained from the Stuxnet digital assault empower brainpower and the internet experts, as digital chiefs, to better work inside the area. Programmers around the world appear to be constantly programming security programs, for which states pay billions of dollars. Though the vulnerability of intrusion has leapt into the world cyberspace with Stuxnet and has left nothing secured.
1. Why is the Stuxnet event considered to be historic?
Stuxnet has a taken the modern warfare into a
…show more content…
There is no international treaties or laws confining the utilization of cyber weapons, which can do anything from controlling an individual or an entity in upsetting or trying to dismantle a nation's discriminating information or confidential working space. (Glenny, M., 2012).
Stuxnet was initially sent with the particular point of disrupting the Natanz uranium improvement office in Iran. This needed to sneak in a memory stick into the plant to acquaint the infection with its private and secure "offline" system through a double agent. However notwithstanding Natanz's detachment, Stuxnet by one means or another got away into the cyber space wild, in the end influencing a huge number of frameworks around the world. (Markoff, J., Sanger, D. E., & Broad, W. J., 2011)
This is one of the terrifying dangers of an uncontrolled weapons contest in the internet, once discharged, infection designers by and large lose control of their developments, which will inexorably search out and assault any system. All nations that have a hostile digital capacity will be enticed to utilize it now that the first shot has been discharged.
3. Why are people (agents) needed “on the ground” in order for the Stuxnet virus to work?
Interestingly, numerous dialogs of cyber warfare and digital conflicts concentrate chiefly on the specialized parts of machines, frameworks, and data but they forget to incorporate the damage that can be done by
Since the onset of the first packet switching event that many believe to be beginning of the internet, no other technology besides the printing press has ever transformed the ability to deliver information. Although the internet is used by a large percentage of the civilized world, few Americans realize how vital cyberspace is to our national infrastructure. Today, we are faced with even more threats although it has been a recognized problem since 2009, when President Barrack Obama said “The cyber threat is one of the most serious economic and national security challenges we face as a nation. It’s also clear that we’re not as prepared as we should be, as a government or as a country (Obama, 2009).” Every industry that operates in the United States is dependent on the internet for some aspect of their business. Commerce, transportation, financial institutions, military, as well as industrial control systems are all interconnected. This interconnectedness has created vulnerabilities within their infrastructure that have increasingly become targets of terrorists, script kiddies, foreign governments and hackers of all types.
The Stuxnet attack was not executed to steal or erase information. It was carried out to physically destroy a military target; Iran’s Natanz nuclear facility. The attack was aimed at industrial SCADA controllers and was a stand-alone attack. It was not an attack that required access to the Internet. The attackers relied on local networks and USB drives to carry out the attack.
Following the US and Israeli Stuxnet attack on Iran’s Nuclear program in 2010, enemy states have been targeting some critical infrastructures and federal government agencies. As the US interest in securing its borders against all threats both domestic and abroad continue to grow, several new threats and vulnerabilities colossus in its cyberspace. In a recent report by Bhattacharyya (2016), “Russian hackers attacked the State Department email system and the Office of Personnel Management reported that 5.6 million Americans’ fingerprints were stolen as
An article published by TheWeek.com titled Inside America’s Hacking Epidemic states that cyberattacks initiated by hackers is a growing threat that could lead to a number of serious problems. Some of these problems include the shutting down of the electrical grid and water supply. The author writes, “These cybercriminals can potentially target every aspect of our lives that involves an internet connection. They could suddenly apply the brakes on smart cars or take over a passenger jet’s avionics system.” In this passage, the author is trying to convey that there are many things that hackers can do to cause chaos. Some countries, such as Russia and China, sponsor hacking groups. Hacking groups such as Cozy Bear and Guccifer 2.0 are some examples of hacking groups sponsored by Russia. In conclusion, the author believes that cyberattacks are becoming more threatening and can be catastrophic to all aspects of society.
Today however, a new type of warfare has emerged and occurs when outside entities conduct an attack on a power grid, network, or both with the intent of causing damage. This type of warfare is called cyber warfare. In the United States computers control everything. It is no secret that hostile countries and terrorist organizations are cognizant and they know our economy, security, and infrastructure can be crippled by a successful cyber-attack. Examples of potential targets for cyber terrorists include military bases, water systems, banking facilities, air traffic control centers and power plants. Even the Commander in Chief, President Obama has stated the threat of a cyber war is real and we must prepare for it and increase our security measures. First, this paper will discuss cyberterrorism and cyber-attacks as they pose a direct threat to national security and the economy. Then, we will review cyber-attacks against the U.S. from China, Iran, and Russia along with the impact and possible ramifications from those attacks. Finally, this paper discusses U.S. strategies to minimize the impact of cyber-attacks.
Guns, knives, and conventional explosives have so far remained the weapons of choice for most terrorists; however, recently terrorist have gone to the tactics of using vehicles as well, since such weapons can cause many casualties and are relatively easy to acquire and use. But some terrorist groups now show interest in acquiring the capability to use chemical, biological, radiological, or nuclear (CBRN) materials [Federal Emergency Management Agency, (July 2002)]. It is difficult to predict the likelihood of a CBRN attack, but most experts agree that today's terrorists are seeking the ability to use such agents in order to cause mass casualties [Federal Emergency Management Agency, (July 2002)]. Cyber-attacks are often considered in the same context with CBRN. Respectable experts have published sobering scenarios about the potential impact of a successful cyber-attack on the United States. Already, hackers and criminals have exploited some of our vulnerabilities [National Research Council. (2007)]. Terrorists are making extensive use of the new information technologies, and a conventional terrorist attack along with a coordinated cyber-attack could exponentially compound the damage [National Research Council. (2007)]. This changing nature of the terrorist threat raises the stakes in getting American counterterrorist policies and practices
Stuxnet, is considered the world’s first cyber weapon. Stuxnet may have not run its full course as initially planned as there are 3 main parts and a couple of encrypted files within the code that have not yet been cracked and may never be cracked, but it succeeded in becoming the first cyber weapon. What was the desired end result for Stuxnet? It is hard to imagine that Stuxnet was written only to destroy some centrifuges and slow the pace of Iran’s ability to build a nuclear weapons.
“Terrorist groups are increasingly computer savvy, and some probably are acquiring the ability to use cyber attacks to inflict isolated and brief disruptions of US infrastructure. Due to the prevalence of publicly available hacker tools, many of these groups probably already have the capability to launch denial-of-service and other nuisance attacks against Internet-connected systems” (Mavropalias, 2011). This issue is seen within articles published through many al Qaeda websites. ‘As terrorists become more computer savvy, their attack options will only increase” (War on Terrorism, 2003). In a speech by Napolitano on May 30, 2012 to business leaders and government officials, said that besides "al Qaeda and al Qaeda-related groups," cybercrime is, "the greatest threat and actual activity that we have seen aimed at the west and at the United States. Unfortunately, it is a growth arena.” Napolitano cited a study by Symantec's Norton that estimated the cost of cybercrime worldwide at $388 billion -- more than the global market for heroin, cocaine and marijuana combined (Kalberer, 2012). This is an issue that has been a constant battle since 2012 when the Stuxnet worm was publicized. The internet can be a very reliable resource or a cyberweapon if put in the wrong hands. Al qaeda’s use of information technology have been deemed harmful to potential and established
Adam Segal’s “The Hacked World Order” reveals many prevalent issues in today’s technologically centered society. Starting at Year Zero, June 2012 to June 2013, the battle over cyberspace witnessed world-changing cyberattacks. This was accomplished due to the fact that nearly 75% of the world’s population has easy access to a mobile phone, and the Internet connects nearly 40% of the total human population, which is nearly 2.7 billion people. With that being said, cyberattacks are becoming a more realistic form of terror.
I first heard of Stuxnet while watching a show called Rise of the Hackers from Nova. It went on to describe how the world’s first cyber weapon was used on a perceived threat to the United States’ interests. The program was not developed by a small time hacker in their basement or at a public library. The people that wrote this program obviously knew what they were doing and how to do it. They based it on what is called a zero day event.
For thousands of years warfare remained relatively unchanged. While the tactics and weapons have changed as new methods of combat evolved, men and women or their weapons still had to meet at the same time and place in order to attack, defend, surrender or conquer. However, the advent of the of the internet has created a new realm of combat in which armies can remotely conduct surveillance, reconnaissance, espionage, and attacks from an ambiguous and space-less digital environment. Both state and non-state actors have already embraced this new realm and utilized both legal and illegal means to further facilitate their interests. What complicates cyber security further is as states attempt to protect themselves from cyber-warfare, private
Most nations today fear terror attacks that include bombing use of reinforcements like machines guns and other firearms. This is because terror attacks most of the times leave many people dead and others disabled while others are left without families. However, there is another attack today in many nations that can be destructive like a terror attack and this is the cyber-attack and threats. Cyber-attacks can be responsible for large mass destructions by making all systems connected to cyber networks fail to work (Rhodes 20). An example is the Morris worm that affected the world cyber infrastructures and caused them to slow down to a position of being impractical. Therefore, as a result of these cyber-attacks resources are being established and designed to help counter the attacks.
Kim Zetter an investigative reporter with Wired Magazine online calls Stuxnet, “a piece of software that would ultimately make history as the world’s first real cyberweapon.” (Zetter, 2011, sec. 1)
A lot of opinions and meanings has been given to the word “Cyberterrorism”. Some of these meanings and definitions varies. In this light, Gordon and Ford (2003) are concerned that when 10 people define cyberterrorism and nine of the given answers are different, and these 10 people represent different government agencies tasked with safeguarding national assets and infrastructure, then it becomes a critical issue.
Cyber warfare is a battle without causalities, a war waged only by written words, fought digitally by those who are bent at disrupting the infrastructure of a nation built on sweat, labor and concrete. Digital battles that are being fought not for money, not for a simple website defacement proclaiming you are the most ‘l33t hax0r on the interwebs’. One of the most major, yet under reported example of this; a lowly worm named Stuxnet. A worm, by the most mundane of definitions, is a self-replicating program, usually malicious, and whose