Preview

Virtual Attack Case Summary

Powerful Essays
Open Document
Open Document
1738 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Virtual Attack Case Summary
A good case example to showcase US actions in virtual warfare took place in 2014 with the alleged hacks by North Korea on the US companies Sony Pictures. Although not committed on the US government directly, the 2014 Sony Hack represents an indirect virtual attack on US interests. This episode of virtual conflict is one of many that the US has played a part in. An offensive example showcasing the US’s alleged engagement in virtual attacks against Iranian Nuclear facilities with the military grade Stuxnet virus. Stuxnet had much more serious political implications, but the Sony Pictures Attack serves to exhibit how the US is limited in its available responses to certain virtual attacks, from the high threshold it sets based on its allegiance to international law. Other states that do not share the same perception take advantage …show more content…
According to the Treasury Secretary, these sanctions were meant to defend US businesses and interests from “attempts to undermine our values or threaten the national security of the United States” . In a later statement the White House added: “We take seriously North Korea’s attack that aimed to create destructive financial effects on a US company and to threaten artists and other individuals with the goal of restricting their right to free expression.” While the response was limited, the economic sanctions were meant to send a signal to North Korea (and other potential cyber-attackers) that similar attacks would not be tolerated. It is important to note that at the same time of the implementation of additional sanctions, a series of mysterious Internet outages took place across North Korea. Many audiences believed this was another response to the virtual attack by the US, however, the US government refused to comment whether this was caused by any covert US retaliatory

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    References: Department of Veterans Affairs. (2007). VA Handbook 6500. Washington, DC: US Government Printing Office. Retrieved February 20, 2013, from http://www.va.gov/vapubs/viewPublication.asp?Pub_ID=56…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Our experience in the war on terror (WOT) reinforces the fact that protecting the Nation and its global interests requires more than passive defensive measures. The threats posed by terrorist groups and rogue states, especially those that gain access to WMD, mandate a swift offense.…

    • 1070 Words
    • 5 Pages
    Good Essays
  • Good Essays

    For so long as America has existed as a country, there has been the ever-present idea of a warfare paradox when it comes to our involvement in conflicts. The clash between our ideals as a nation and what we do to further those ideals throughout the world will always be, to some extent, conflicting. Our Founding Fathers laid down the tenets of our land centuries ago, and through our course of trying to uphold those tenets, we have undoubtedly had complications I regards to conflicting ideals. The three mainstays of the warfare paradox, isolationism, interventionism, and protectionism, all have their roots in the foundations of the United States. This reality can be seen in some of the documents that decorate the annals of our collective history;…

    • 1544 Words
    • 7 Pages
    Good Essays
  • Good Essays

    World Order Legal Studies

    • 1073 Words
    • 5 Pages

    The North Korean Crisis of 2013 was a rise of pressure between nation-states which included North and South Korea, U.S. and Japan that began after North Korea had launched a satellite. Following the launch, arguments were instantly created because at the request of the United States, the Security Council of the United Nations approved new sanctions against the North Korea under the accusation that the launch was in fact a test of a ballistic missile. The launch surprised many. Diverse world media including China, Russia and Japan reported that North Korea had entered the ranks of the countries able to manufacture and launch satellites in the world. The North American Aerospace Defence Command reported that both the satellite and the launcher and space debris "did not come to be factors threatening the security of the United States".…

    • 1073 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Looking back on the 20th century the United States was forced to change and add different things to their foreign policy due to advancements in weaponry, and technology. The 20th century has seen many wars and vast advancements in society like atomic bombs, cells phones, tv’s, lasers, computers, and wireless technology. All of these items have each posed an important role in the United States Foreign Policy. Throughout the wars and advancements in technology in the 20th century, the United States Foreign Policy now covers a vast range of functions and issues including establishing and maintaining diplomatic relations with other countries and international organizations. It also involves peacekeeping functions, foreign disaster and relief, and deals with a range of international economic issues including trade, travel,…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Stuxnet

    • 749 Words
    • 3 Pages

    In further examination of its role in protecting the homeland from this type of attack, US-CERT responded to an ever-increasing barrage of incidents year after year, deploying as they did in response to Stuxnet for a handful of those. US-CERT prioritizes those incidents with the greatest potential for harm and applies its effort there. (Farran, 2012)…

    • 749 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the years 1991 to 2004 the USA’s response international aggression was often based on protecting its own national interests. Post 9/11 especially saw the USA base nearly all of its responses on protecting its own national interests. However, on some occasions prior to 9/11 they did show some desire to protect global interests rather than just their own.…

    • 740 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Perlroth, N. (2012, October 23). In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back. New York Times, http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html?pagewanted=all&_r=0…

    • 2002 Words
    • 9 Pages
    Better Essays
  • Best Essays

    Homeland Securty]

    • 2862 Words
    • 12 Pages

    To begin with, the Department of Homeland Security uses the concept of virtuality to predict and prevent terrorist attacks. The DHS is “faced with unbounded and unlocatable threats [and] attempt to rein in the seemingly infinite opportunities for disaster into a matrix of predictable and measureable results” (Martin and Simon 283). The concept makes two primary assumptions: there is always a present threat and that it can be predicted and prevented (294). The DHS aims to prevent and alter attacks on US soil by allocating resources towards various response and training methods. The concept makes sense because since September 11th, 2001,…

    • 2862 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Evolution Of The US Army

    • 559 Words
    • 3 Pages

    During the Cold War the U.S.A.’s military was strong and big and was meant to be a deterrence. It was a race to keep up with Russia. Money was spent in excess on weapons development intended on a traditional war. Our adversaries were uniformed soldiers back by a recognized government, state vs. state and soldier vs soldier (Gorka, n.a., p. 31). As time progressed to today, the Cold War ended as we knew it in the 1950’s and new type of war started; a technology war. The same adversaries we had during the Cold War to include China are in another race for technology dominance. The US Army has adapted in responses with US Army cyberwar teams.…

    • 559 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Lone Wolf Terrorism

    • 8850 Words
    • 36 Pages

    Casebeer, William, Troy, Thomas (2004): Violent Systems: Defeating Terrorists, Insurgents, and Other Non-State Adversaries. Occasional Paper 52. USAF Institute for National Security Studies USAF Academy, Colorado.…

    • 8850 Words
    • 36 Pages
    Powerful Essays
  • Good Essays

    The sanctions are an attempt by the US and European powers to hurt Iran’s economy so that they have no choice but to halt all nuclear developments.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    HIS 105 Assignment 2

    • 474 Words
    • 2 Pages

    After the Civil War and by the mid-20th century, the United States had become the dominant force in international relations. Some have argued that the United States’ military functions as the world’s “police.”…

    • 474 Words
    • 2 Pages
    Satisfactory Essays

Related Topics