CYBER WARFARE

rt75oro

Simply put, cyber warfare is the use of hacking to conduct attacks on a target’s strategic or tactical resources for the purposes of sabotage. Nation/State-sponsored hackers attack computers and networks that are involved with sensitive resources within a country (Quora, 2013). They do this like you would hack any other computer or system: you learn as much as you can about the system, you figure out its flaws, and you exploit those flaws to either gain control of that system or destroy it.

You could learn how fast a missile flies and build a plane that can outrun it. You could learn where your target is moving troops and set up an ambush. You could learn about which scientists are important to developing those weapons, or which congressmen were instrumental in getting funding for said systems and personally attack them.

You can also sabotage people if you have control of those systems. What if I snuck a secret program into the source code of that missile that would allow me to remotely detonate it while it was on the ground? What if I could figure how the troops are communicating and gain access to their network so I could confuse them and sneak forces in to destroy them?

I think cyber warfare is scary for two reasons:

  1. Strategic cyber warfare does not distinguish between civilians and military: Just like nuclear weapons in the cold war, cuber weapons are just likely to be targeting civilian resources as they are military ones. While a nuke is obviously way more damaging than a piece of malware is alone, a cyberattack can cause civilian casualties and death.
  2. It’s really hard to figure out who launched cyberattacks, and as such, governments don’t have to be held accountable for their actions.

 

Reference:

Quora. 2013. Forbes. How Does Cyber Warfare Work?. Available from: http://www.forbes.com/sites/quora/2013/07/18/how-does-cyber-warfare-work/#47ff57d133c3 [Accessed: 16 October 2016]

Advertisements

2 thoughts on “CYBER WARFARE

  1. elisemanningg says:

    Both the points you make are great! Another important point would be you don’t need the enemy to connect his network to the Internet. You don’t even need a spy or patsy to download a virus off the Internet onto a thumb drive and then stick the thumb drive into the secure network, as almost certainly happened with the Stuxnet attack on the Iranian nuclear program. You just need the enemy’s radios and radar to receive incoming signals – which they have to do in order to function.

    Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s