Premium Essay

Authority on Cyber Warfare

In:

Submitted By jflutz
Words 6507
Pages 27
Authority on cyber warfare As we approach a new generation of warfare, we face new problems. Each generation before us has shown that there are continued advancements in warfare technology and with new technology there are different guidelines and terms of use in concordance with international law. The art of war has not changed since the beginning of time. Yes, there are new weapons, but the content for the most part is the same. Defeat your enemy, rendering them unable to strike back, or attack them where it hurts so that they do not want to proceed in the war. Through the evolution of war, the United States has conquered and been defeated. We may not always be law abiding, but we do what we deem necessary to defend the nation. In the process of defending, we learned that technological advancements are not always a positive thing, and technology can become too powerful for any one nation alone. The creation of the nuclear bomb was just that. Now that there is this terrifying new advancement in warfare technology, how do we stop it from getting into the hands of the wrong people?

Executive summary,
In this paper, I will discuss how the Stuxnet virus was used to stop the use and development of nuclear weaponry in Iran. The laws on proper use will also be discussed, exploring whether it was lawful to deploy the virus, with relation to the use of Traditional Military Activities and presidential findings. In addition, I will include documentation that reflects the right to use force, armed attacks and self-defense to help determine a reasonable conclusion of the cyber operation.

Similar Documents

Premium Essay

Evaluation of the Global Impact of the Estonia Cyber Event

...IA1 – EVALUATION OF THE GLOBAL IMPACT OF THE ESTONIA CYBER EVENT Sherquita Tucker CSEC655 Section 9041 Table of Contents 1. Introduction 3 2. Background and Global Impact 4 3. Vulnerabilities in Cybersecurity Policy and Practices 5 4. Advantages of Reducing Vulnerabilities for Future Attacks 8 5. Disadvantages of Reducing Vulnerabilities for Future Attacks 8 6. Advantages of Improving Security Practices or Policies 9 7. Disadvantages of Improving Security Practices or Policies 10 8. Summary and Conclusion 12 References 14 IA1 – Evaluation of the Global Impact of the Estonia Cyber Event 1. Introduction What if suddenly the safety systems of nuclear power plants unexpectedly malfunctioned, or suddenly floods of water was released atop a neighboring community due to a malfunctioning of the control systems of a major dam, or air traffic control systems of major airports was to suddenly render inoperable, or business transactions of stock exchanges or major banks stopped or vanished ? Even worse, what if it all occurred instantaneously? Would this be an idea behind a new movie thriller, or the realism of cyber war in the twenty-first century? The notation of the using computing and networking systems as an alternative method to the traditional terrorist attacks has always been a major concern. In the early 1990s, since the public debut of the Internet, not all consumers have used cyberspace with peaceful intent. This is particularly...

Words: 3346 - Pages: 14

Premium Essay

Governance (Cyber Ethics Scope)

...Internet has grown to be a medium where, individuals utilize it as a platform to conduct criminal activities. Some criminal activities account for: fraud, cyber warfare, financial misconduct, and cyber-bullying. This has grown to be an incredible concern as human safety has been established as the main topic of conversation. With regards too the governance geography of criminal activities, “criminal organizations [as well as, individuals] cloak their power in the mantle of state authority” (Williams). However, “this [does not] suggest that the criminal interaction will determine all aspects of state behavior” (Williams). Furthermore, criminal organizations continue to “entrench themselves in weak states in the former Soviet Union, Africa, Latin America and parts of Asia, [due to] differing degrees of vulnerability” (Williams). Imperviousness to solve these limitations is an approach that must be taken. Instead of acknowledging the ideology of compromising human security, economic and social concerns, there should be some sort of regulation rules implemented. However, there is, “a possible consequence of global divide caused by competing ideologies [over a] struggle for power” (Williams). It is most likely that, states that advocate, “law and order [are the same ones] that are dominated by criminal interests and criminal authorities” (Williams). The constitution of Canada allocates legislative and prosecutorial powers between federal and provincial government” (Government of...

Words: 845 - Pages: 4

Premium Essay

Presidential Powers

...PRESIDENTIAL POWER/LEADERSHIP AND RULES OF WARFARE Student’s Name International Relations Date Presidential Power and Leadership US president has a lot of power, but constrained by many checks and balances imposed by the constitution. The president will have to be put into a bill which must be passed by Congress. One of the bills in the Congress debate timeline is Cyber security bill. In my opinion, the Congress should pass the President's Cyber security proposal. The bill protects American citizens in various ways. It proposes to centralize reporting of breach data nationally (Burns 2012). This is a win-win game between clients and investors. This is because the proposal compels entities to show information to consumers incase their personal information is accessed illegally. Thus, businesses are incentives to incorporate better cyber security. Also, it helps consumers to be vigilant on their identity theft. The proposal also puts cyber crime in the realm of other types of crimes and spell penalties to the culprits. This will help law enforcers in fighting organized cyber crime which is prevalent in the current computer world (Thomas 2013). Thus, the American people are protected from cyber fraudsters who siphon their huge possessions. The...

Words: 979 - Pages: 4

Premium Essay

Brief for the New Cso, Which Will Provide Her with the Basics of Cyber Security, Acquaints Her with the Current Threats Facing Your Organization's Data Infrastructure, and the Legal Issues Related to Protecting the Enterprise.

...The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability Paul K. Kerr Analyst in Nonproliferation John Rollins Specialist in Terrorism and National Security Catherine A. Theohary Analyst in National Security Policy and Information Operations December 9, 2010 Congressional Research Service 7-5700 www.crs.gov R41524 CRS Report for Congress Prepared for Members and Committees of Congress The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability Summary In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. Through the use of thumb drives in computers that were not connected to the Internet, a malicious software program known as Stuxnet infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. Although early reports focused on the impact on facilities in Iran, researchers discovered that the program had spread throughout multiple countries worldwide. From the perspective of many national security and technology observers, the emergence of the Stuxnet worm is the type of risk that threatens to cause harm to many activities deemed critical to the basic functioning of modern society. The Stuxnet worm covertly attempts to identify and exploit equipment that controls a nation’s critical infrastructure. A successful...

Words: 5499 - Pages: 22

Premium Essay

Information Security

...as illegal insiders (Rainer Jr & Cegielski, 2009)The software and information engineers have the required expertise to safeguard the systems thus evading and countering the attacks. The US government has faced myriads of attacks, especially the security information. It is imperative to assert that the notable attacks arise from the terrorists who target the government and other critical points within US. Records show that cyber attacks on federal computer networks increased 40 percent last year, and that figure is likely low as it reflects only the reported attacks. Based on data provided to USA Today by US-CERT, unauthorized access to government computers and installations of hostile programs rose from a combined 3,928 incidents in 2007 to 5,488 in 2008. (Government, 2008) According to Brad Curran, Frost & Sullivan senior aerospace & defense industry analyst. The culprits seem to be after military secrets, they want to steal technology, or a new strategy, called asymmetric warfare. (Masters, 2009) Ravi Sandhu of The Institute for Cyber Security at The University of Texas at San Antonio said the attackers seem in no hurry to achieve an ultimate prize. “The stealthy and sophisticated nature of some...

Words: 540 - Pages: 3

Free Essay

Cyber Security: Cyber Terrorism

...Introduction Cyber security refers to the practices and processes that are used in technologies such as networks, computers, information and programs from damages by unwarranted entities (Ahmad, Yunos & Sahib, 2012). There are different attacks towards technology which may distort information or be used to create tension in an organization. Information stored in computers has some level of privacy and this depends on the level of sensitivity that such information may have towards that organization. Business strategies, political discussions and government documents are some of the documents that require a higher degree of privacy. However, there are individuals who cause deliberate attacks on the information systems of organizations and governments in order to unlawfully access information or distort the meaning of such data. The intention of cyber attacks has led to the classification of these attacks into particular classes. For example, we have cyber bullying and cyber terrorism. Under cyber bullying, the attackers use technology to abuse and intimidate their targets. Cyber bullying has been common through the presence of the social media where an individual will use pseudo-accounts to publish half truths about others with a bid to embarrass them. On the other hand, cyber terrorism involves the use of technology to access vital government sites in order to cause harm and fear in the society through terrorism activities. Brunst (2010) indicates that cyber terrorist activities...

Words: 1810 - Pages: 8

Free Essay

Operation Receiver

...The National Security Agency was playing as the Red Team. Civilian providers that are critical to the government’s power and communication were also participants. The exercise took place in 1997 and the was a no-notice Joint Staff exercise designed to test DoD planning and crisis action capabilities when faced with attacks on DoD information infrastructures ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). The Red Team was played by the National Security Agency which used hacker techniques and software programs that were freely available on net ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). All of the software or programs they used to hack were available to the public. The National Security Agency had no inside information to work with but they were very diligent in extensive electronic reconnaissance of the participants. They were able to conflict much damage to the National Command Authority, Intelligence Agencies, and the military commands involved. Many of the vulnerabilities that were exploited were common among the participants ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). The National...

Words: 607 - Pages: 3

Free Essay

Timbuk2 Success in the Bag

...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...

Words: 2869 - Pages: 12

Premium Essay

Csec

...Government Intervening To Protect Our Cyberspace University of Maryland University College Table of Contents Introduction page…………………………………………………………………..3 Justification to Regulate Private Industry Cybersecurity………………………3-4 Real World Threat…………………………………………………………………4-5 Methods for Government Intervention:…………………………………….……5 Government’s Intervention Impacts on National Security………………….….5-6 Real World National Security Breaches…………………………………………6 Arguments of the Private Sector to Take Responsibility.................................6-7 Failure to Take Responsible Action................................................................7 Conclusion…………………………………………………………………………7-8 References.....................................................................................................8-9 Introduction In 1969, the first ever network was born into existence (ARPANET) also called advanced research projects agency network. The Government Defense Department worked diligently on this break through in order to link some of the United States most prominent research universities with a couple of purposes in mind:...

Words: 1747 - Pages: 7

Premium Essay

Network Security

...FLORIDA INSTITUTE OF TECHNOLOGY CYBER SECURITY WITHOUT CYBER WAR U.S. Military vs. International Law Perspective A SHORT PAPER ASSIGNMENT TWO SUBMITTED TO: IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR CYB 5275: ENTERPRISE INFORMATION SECURITY BY CRAIG CANNON MELBOURNE, FLORIDA JANUARY 25TH 2013 In her article “Cyber Security without Cyber War”, Mary Ellen O’Connell does a brilliant job in giving the reader an overall view of the debate concerning which government should have primary responsibility of the internet when it comes to the legal authority of cyberspace. She begins the article by citing two major players in this debate: the U.S. Military with its rules and legislation vs. NATO and its international law. According to O’Connell, the USA feels that the military should have primary responsibility over the internet since it has the largest number of technical experts and legal authorities with respect to cyberspace than anyone else in the world. Many in the international community would disagree with allowing the US military to police the internet. They raise the question: What legal rules would be used to guide the military in its supervision of the internet. They believe that using international law is the best way to govern cyberspace usage. (Johnson, 1996) Still others favor the US military’s Cold War strategy of deterrence as a way of patrolling the internet. These that favor...

Words: 1872 - Pages: 8

Premium Essay

Internet Regulation, Legal and Ethical Issues Concerning

...INTERNET REGULATION Legal and Ethical Issues Concerning Internet Regulation Calvin White Park University Outline 1. Intro a. Regulating the Internet: Delicate, difficult, presents challenges 2. Body b. Past i. History of Internet Regulation 1. Early role of regulation a. Mediate connectivity between researchers, government 2. Milestones and events that shaped regulation b. 70s and before - Lab experiments c. 80s - Early commercialization d. 90s - Widespread adoption i. Early malicious activity ii. Educational organizations e. 2000 to present iii. The need to curb crime iv. The need to protect consumers and businesses v. The defense of our nation’s assets 3. Leaders in Internet regulation f. Efforts at home g. Efforts abroad 4. The challenges of regulation ii. Why broad regulation has proven difficult 5. Technology meant for other purposes 6. Grew too quickly c. Present iii. Structure 7. Present-day regulations h. How ongoing Internet regulation works 8. Who controls the Internet? i. Who enforces regulation? 9. How infractions are punished iv. Problem...

Words: 3196 - Pages: 13

Free Essay

The Terrorist New-Battlefield

...Cyber: The Terrorist New-Battlefield Sparkle Grayson American Military University “American military superiority on the conventional battlefield pushes its adversaries toward unconventional alternatives.” - Carter, Ashton B., John Deutch, and Philip Zelikow Terrorism is not a new phenomenon. The use of terror tactics as a means of coercion, dates back to the 1st and 14th centuries AD. The first documented instance of terrorism that most resembled modern day terrorist tactics is attributed to the Zealots of Judea. This “terrorist” group showed many if not all the characteristics of modern day terrorists; being politically/religiously motivated, the organization of their group, and ultimately their goal, which was to strike fear into not only the current leaders or governing authority but into anyone who they felt agreed with the current state of politics. In short, though, their endeavor was ultimately unsuccessful, “the fact that they are remembered hundreds of years later, demonstrates the deep psychological impact they caused” (terrorism-research, 2013, n.p). Though terrorism is often associated with physical acts of violence, the ever increasing globalization of the world, and the increasing dependency on technology has given way to a new tactic that can be destructive to property, finances, and media. Cyber-terrorism is a new occurrence but is highly effective, and until recently the United States had no formal “cyber-protection” in the private sector...

Words: 1227 - Pages: 5

Free Essay

Cyberattack

...become easier to establish relationships with people from different backgrounds, culture and location. People can sit at home, and learn about another country, their religion, language, way of living, etc without ever visiting the place. Internet proves to be the most helpful tool for all fields. Students use the internet almost always, to study and conduct research for their courses. Doctors and medical students use the web to publish their research papers, findings, different technologies, and cures for various diseases. Cyber attack is a crime that most people do not report When we talk about national security, we talk about the security of over one billion people and sovereignty of a country that is culturally rich, politically stable, socially compact and economically emerging. The worst victim of terrorism and naxalism India and its national security has been threatened recently by cyber crime. They concept of cyber crime is not radically different from the...

Words: 1220 - Pages: 5

Premium Essay

Crypto Malicious

...Stopping Malicious Behavior What is the problem? Can the field of fraud detection (and cyber security in general) be improved by new technology and approaches? If companies develop a program that searches for unusual activity by looking at risk factors then they could improve how they detect fraud. Since a lot of fraud detection is rule based, they have to develop a system that addresses the gray areas of their rules. For instance if a bank is looking for someone who transfers over $10,000 for one transaction in a day as an alert, then what happens if they separate the $10,000 into smaller payments? What happens if the malicious person makes sure to deposit just under $10,000 to avoid having alerts for their illegal actions? Addressing different patterns of new gray flavors of activity can help address management issues, overlapping issues and detection issues. Also developing better anomaly, link and predictive analysis can help guide fraud detection into greater improvements. Anomaly analysis consists of being able to identify risk using certain behaviors when someone doesn’t do things the normal way. The main issue with anomaly detection is there is a great challenge on managing the detection systems, certain behavior that you think is odd may be normal to a certain group of people, and that it is hard to make generalizations on new data. Link analysis develops relationships between different kinds of entities. Links can be made with how entities relate to...

Words: 2974 - Pages: 12

Premium Essay

Cybercrime

... Cybercrime can also include non-monetary offenses, such as creating and distributing viruses on other computers or posting business information on the Internet that is meant to be confidential. There is no boundaries or jurisdictions when it comes to cybercrime ŞTEFAN, I. (2011). Below is three known cybercrimes though there are many more cybercrimes in the past and the future these are just a few. This cybercrime is considered being the biggest attack in US history. Five hackers hacked into companies like NASDAQ, Visa Inc., J.C. Penny Co, Jet blue airways Co, and Carrefour SA. They caused over 300 million to these companies. The hackers primarily wanted to steal and sale the 160 credit card numbers they stole from the companies. Authorities say each man had their own role, two hacked networks, another mined them for data, another provided anonymous web-hosting services to hide the group’s activities, and the last person sold the stolen data and distributed the profits. The suspects were caught because they sent each other instant messages saying if the hacks were successful, one man used google news alerts to see if his attacks had been discovered. All five of these men are from Russia and Ukraine....

Words: 1242 - Pages: 5