Preview

Cyber Warfare

Good Essays
Open Document
Open Document
720 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Warfare
Samuel Newman Professor Cox Censorship & the Media 5 December 2012
The Fusion of Censorship with Anonymity Computers have become an integral part of human activity. We rely on them to answer our questions, to communicate, and recently for cyber warfare. Cyber warfare is anonymous political or social attacks that are conducted via the internet. As time progresses computers will advance and play a larger role in our lives, inevitably cyber warfare and the internet will fill a void. The internet allows cyber warfare to exist globally and for individuals to become more powerful. The evolution of the internet has opened the gates of censorship into a new era of inconspicuous concealment. When you attempt to access a gaming site on your high school’s system and see the heart-breaking “Access to site denied” phrase, you know that a school administrator is prohibiting you. You are censored from information or access, but you are aware of what administrator or company is censoring you. However, cyber warfare has changed the ability to recognize the locus of control. For example, look at the most recent cyber warfare attack on Iran’s nuclear facility, Stuxnet. This virus was created to infect a computer that was linked to a specific box that regulates temperature and timing. The ingenious part of this virus was that it was designed to discreetly disrupt the number pattern of this particular box so that the company would not see immediate effects. It turns out the particular box that Stuxnet was searching for was located in only one computer in the world, Iran’s nuclear facility. People disregarding cyber warfare as an imminent, sincere threat may be asking how this particular attack is different than any other military procedure that has happened in the last century. I have one simple response; who did it? Despite hours of tracking, the source of Stuxnet was never discovered. For all we know it could have been a twenty-four year old college graduate who

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Good Essays

    In “Douse the Online Flamers” Andrew Keen writes about individuals who choose to hide behind a façade in cyber crime. He goes on to speak of the unlawful acts inflicted upon innocent individuals of cyber space. Keen reflects on three major cases where cyber criminals are protected under the freedom of speech act while the innocent are left vulnerable. In all three cases, the judges failed the victims of unidentified slander. In his article, Keen forcefully expresses his opinion on why he believes we, as Americans, should take a stand against the anonymity of today’s internet tormenters because too many innocent lives are destroyed due to the cruel intentions of anonymous speech.…

    • 428 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Stuxnet

    • 749 Words
    • 3 Pages

    When Stuxnet was found on a U.S manufacturing company’s systems, US-CERT responded to the incident quickly. Specifically, the Industrial Control Systems division of US-CERT, known as ICS-CERT, reported that this virus, ostensibly created by a nation-state actor to affect Iran’s nuclear program, was found on thousans of other systems everywhere. When the U.S facility was infected, ICS-CERT quickly deployed to coordinate the response on-site. While they were able to remove the virus from the hardware, the thought of the impact to our infrastructure if Stuxnet confused hardware in our industrial complexes and critical resources was grave. DHS reported that there was no damage to equipment at the site, but experts rail at the potential for danger from even these very targeted malware codes. (Farran, 2012)…

    • 749 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Gourarie, Chava. "Censorship in the Social Media Age." Columbia Journalism Review. N.p., 21 Jan. 2016. Web. 13 Feb. 2017.…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Olson, Parmy. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York: Little, Brown and Company, .…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    “The main reason for this controversy is that cyber-threats have not materialized as a national security threat, even granted that there have been some few incidents with at least some potential for grave consequences. Interestingly enough, both hypers and de-hypers tend to agree on this point. But while the first group assumes that vicious attacks that wreak havoc and paralyze whole nations are imminent, more cautious researchers often point to the practical difficulties of a serious cyberattack (Ingles-le Nobel,…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Data Breach Essay

    • 665 Words
    • 3 Pages

    War is a part of the past and the present. In every war there are two sides, each hoping for land, power, or individual rights. When someone brings up the topic of war, images of guns and soldiers come to mind. But what if the war extended into cyberspace? No weapons or ruined battlegrounds, just virtual barriers and coding. It no longer becomes a two sided battle, but instead millions of individuals hidden behind computer screens. Anyone can participate in this, including terrorist groups, hackers, and phishers. And for this reason, everyone is at risk. People are getting away with their crimes because they keep information secret, working anonymously to perform illegal acts using the data stored in cyberspace. The United States government…

    • 665 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The Censorship in the American Society Jennifer Stern ENC 1102 Essay 1 6 February, 1997 As society emerges into the twenty-first century, control amongst the people is still evident in the actions sought by both houses of Congress. Individuals, in many cultures, are being sheltered from the controversial issues. By suppressing ideas or themes of materials in which a person does not agree, portrays a false atmosphere of society. When the Congress feels that people do not have the ability to form decisions for themselves, this is where the censorship begins.…

    • 282 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There’s a global war going on right now. I’m not talking about Syria, I’m talking about the war on the Internet. As the Internet has gotten bigger over the years, it has become a bigger interest for governments all over the world. Presidents and kings have a Twitter account now, and all the plans for budget spending are put on government websites. But it also has become a bigger problem for people in power all over the world. The giant spread of the internet means that governments can’t hide anything from the people. People can have private conversation easily now, without having to meet in real life. However, it is beneficial for governments to know what people are discussing. This is what caused massive Internet surveillance. For a long time, the internet was one of the only places the governments didn’t have any surveillance. There are cameras on the streets, they can see what kind of packages you send, but they couldn’t see what you were doing on the Internet. That had to change, or so thought the people in power. Back in 1973, US president Richard Nixon had to resign after it became public that his administration bugged and wiretapped multiple political enemies. Today, the Obama administration is spying on the entire world; and they’re prosecuting the person who told everyone about it.…

    • 1073 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Terrorism is one of the most remembered and feared occurrences in the world. Terrorism changes the lives and hearts of everyone that it affects. This paper explores the different types of terrorism, who commits the acts, how it affects the surrounding world, and what can be done to prevent it. This review of the different types of terrorism focuses primarily on the specific types of terrorism. This paper then tries to relay to the reader the understanding of all types, and the differences between them.…

    • 1251 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays