User:Piash07

Page 2 CYBER WARFARE

Cyber Warfare Piash Debnath Comment by Owner: Comment by Owner: Format center of page 201370.70716 IT-103-004 (Fall 2013) 09/25/2013 "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/honor-code/. I am fully aware of the following sections of the Honor Code: Extent of the Honor Code, Responsibility of the Student and Penalty. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://universitypolicy.gmu.edu/1301gen.html web site."

Introduction In an age of computers and information technology, it is easy to grasp how cyber warfare can break out between nations and ultimately the world. Seldom mentioned in public media, cyber warfare plays an important role in establishing positive or and negative relationships between countries. “Cyber war uses computer software to attack an enemy's computer systems. Most nations use computers to control everything from their military infrastructure to their electric power grids” (Smith, 2013, p. 6-7). In this technological era, it is a frightening thought to fathom how simple leaks in computer information can start a world war and kill millions of people. Looking in a larger aspect of this issue, it is important to note how this phenomenon first started as a cause proxy of war, the potential benefits it will develop it may brings in the twenty first century by hindering casualties, the ethical issues associated with it via privacy matters, the security problems it may convey regarding stolen information, and future dysfunctionality it may bring to the world. Background-Origins of Cyber Warfare As internet usage began to rise and governments around the world began doing things more digitally, it helped to fuel the period of cyber attacks. It is an easier tactic to infiltrate a government’s secrets by putting an espionage type of virus in a central government’s system computers rather than having to train an actual personnel, like they did in previous centuries. There are two main purposes to cyber operations; computer network attacks aim to alter, disrupt, deceive, degrade, or destroy adversary computer systems while computer network exploitations aim to extract information without causing any damage (Lobel, 2012, p. 617-640). Both of these types of operations have great benefits to the supporter and great damage to the adversary. It has become more common for obvious reasons. For instance, the U.S. is usually considered the sole superpower of the twenty first century and it is common knowledge that it has the largest military in the world. Looking from a practical view, it would be a much easier task to take on the U.S. virtually rather than confront it in the battle field. And furthermore, virtual attacks are more blurred and it is much easier for a country to deny any involvement. Potential Benefits- No Casualties Even though it may seem like there are not really any benefits of cyber war, one positive consequence is noticeably evident. Fighting back and forth in a cyber theatre of war means that there are rarely any casualties that regular war may often bring. In an article published by the Wall Street Journal, the Pentagon has stated that “computer sabotage coming from another country can constitute an act of war” (Gorman, 2011). A cyber attack on the Pentagon may seem like a vindication for war, but because it was a cyber attack and not a physical attack, the public is not astonished and does not have the mentality to declare war. Instead, cyber attacks most likely would cause for cyber retaliation rather than a manned one. Another positive outcome of being able to attack in the cyber world is avoiding blame. Four years ago it seemed likely that the United States was bracing itself for some kind of strike against Iran for its use of nuclear power. Instead of such a terrible outcome, the United States sent a computer worm that wiped out a fifth of Iran’s centrifuges that are used to make enriched uranium, curtailing Iran and its ability to create nukes for years (Smith, 2012, p. 6-7). A nuclear war in the Middle East was ultimately avoided because the U.S. was able to use Information Technology to cripple another nation without brute force.

Legal and Ethical issues-Privacy Issues Hacking is not only illegal but is a major breach of one’s rights. The right to privacy is taken away when cyber hackings start. When cyber hostilities begin, there are specific targets aimed by the culprit for various reasons. In one instance, China broke through Google and its Gmail accounts where it tried to spy on Chinese political exiles that were refuging in the United States (Lobel, 2012, p. 617-640). China, a country where free speech is not exercised, is breaching ordinance by trying to impede on the rights of humans in another nation; America. Such grotesque ethics and infringement of law should not be tolerated. As stated by Mike Rogers, the chair of the House of Intelligence Committee, “the Chinese government has launched a predatory campaign of cyber theft that has reached an intolerable level” (Hallinan, 2012). It is evident how these violations of human rights are testing the patients of the Congressmen within the United States government. Because the United States have had the right to free speech as one of its core fundamental rights, it is hard to comprehend how easily and unconditionally China is violating that basic right. Privacy being taken away through cyber warfare is tarnishing the rights of humans worldwide. Security Concerns-Breaches of Cyber Security Security breaches caused by cyber war may bring chaos to the internet. Firewalls may fail and viruses may run amuck in emails and other common lines of communications between the common public. The national Cyber Security Partnership and the US Department of Homeland Security created a public partnership made solely to “develop shared strategies and programs for the protection of critical information infrastriction in the US” (Patricia, 2004, p. 17-18). Online security is an imperative thing. It helps to make for a pleasant web experience. Better security means for less viruses, pop-ups, and an easier way to browse through the web. When cyber attacks occur, they may attack in random because they are trying to thwart their main target. Or if they are trying to make a statement, an entire site may be shut down or infected with some kind of virus. The activist group known as Anonymous have done things like stolen more than 200 gigabytes of data from email and credit card details and used them to donate money to charities that cost over a million dollars, taking advantage of weak passwords and database security (Fraser, 2013, p. 18-21). Many cyber hacks are done to make statements such as Anonymous did. Even if such acts are done to help a particular group and punish the bad guys for their wrong doings, it is still huge breaches in cyber security that makes the public uneasy to conduct online transactions. Soon, such acts of discrepancy will cause more common hacks in bank accounts and systems unless the right measures and precautions are taken. Further Required Research As information technology continues to broaden and more and more things become available online, cyber security and warfare will continue to scope the headlines. “Missiles, bombs, guns, and warships might not be the most important weapons in the next major war. Computer operators hundreds, even thousands, of miles away from the enemy could play as big a role as soldiers on the battlefield” (Smith, 2013, p. 6-7). Cyber war could actually lead to the next World War. Whether it is from an attack at a nuclear missile facility or military base, it is important to stay vigilant in understanding how the scope of cyber networks may alter the world forever. In order to prevent such an outcome, security in the cyber world needs to increase and stay up tp date for the latest attacks. The United States needs to arm its resources of cyber information so that terrorist organizations or groups with high hacking knowledge cannot break through its security walls and cause for mass chaos. The World Wide Web may have been created to connect the world, but blockades of border security by each nation should still exist to fend of attacks by one another.

Conclusion It is a likely possibility that war will erupt in the near future that will be initiated from a virtual strike. Even right now, the Pentagon constitutes a cyber attack on the United States as an official act of war that they are not afraid to retaliate with manned troops (Lobel, 2012, p. 617-640). Other major powers that try to steal information from the US may lead to back to back assaults from one another with an eventual air strike. With a broad spectrum of right and wrong, the internet tends to dilute what constitute as wrong-doing by a nation. Because of this, countries tend to push the limitations and do heinous things online because they are covered in the veil of uncertainty and masked from the public media. Sometimes done in closed doors, cyber war can cause massive damage to even average citizens. An outbreak of viruses, or having their information compromised may occur because they were in the line of crossfire. A popular site may shut down or have information stolen, which would cause individuals to be affected. Overall, it is important to understand how war is not just a bloody clash in grass fields, but also attacks on cyber fields that can be an infinite times worse.

Reference Page Fraser, M. (2012). Hackers with a cause. Operational Risk & Regulation, 13(4), 18-21. Retrieved from http://search.proquest.com/docview/1023798978?accountid=14541 (visited September 23, 2012) (Trade Journals) This trade journal published in the United Kingdom talks about the activist group anonymous and the crimes hackers have done and their specific motives for doing so. It talks about a variety of good and bad things they have done in the recent past. Gorman, S., & Barnes, J. E. (2011, May 31). Cyber combat: Act of war --- pentagon sets stage for U.S. to respond to computer sabotage with military force. Wall Street Journal. Retrieved from http://search.proquest.com/docview/869095903?accountid=14541 (visited September 22, 2013) (Newspaper) This newspaper article done by the Walls Street Journal (New York, New York), specifically dictates the seriousness of Pentagon attacks and procedures in place of what to do by the U.S. if a major attack was to ensue. Hallinan, C. (2012). Cyber war: Reality or hype? . Albuquerque: Inter-Hemispheric Resource Center Press. Retrieved from http://search.proquest.com/docview/922394766?accountid=14541 (visited September 22, 2013) (Reports) This report focuses on a US-Chinese relationship on cyber war that interviews Congressmen on how they view the Chinese government over their spying and past attacks. Lobel, H. (2012). Cyber war inc.: The law of war implications of the private sector's role in cyber conflict. Texas International Law Journal, 47(3), 617-640. Retrieved from http://search.proquest.com/docview/1018566780?accountid=14541 (visited September 22, 2013) (Scholarly Journal) The author, a scholar from the University of Texas, cites how hacks are becoming more and more common and are violations of human rights. She talks about the hacks on Google for gmail accounts of Chinese dissidents living in America and other specific incidents. Patricia, V. A. (2004). Information technology insights: Cyber security ushers IT into corporate governance practices.Chemical Market Reporter, 265(17), 17-18. Retrieved from http://search.proquest.com/docview/194744284?accountid=14541 (visited September 23, 20132) (Magazine) This trade journal written by Patricia Arnum talks focuses solely on the aspect of cyber security in information technology and how it plays back to the government and breaches of that security could mean. Smith, P. (2013, April 02 01). CYBER WAR. Junior Scholastic, 115, 6-7. Retrieved from http://search.proquest.com/docview/1327955036?accountid=14541 (visited September 22, 2013)(Magazine) The author, a magazine writer for the New York Times international section, describes how much computer technology is integrated into our military and how hacks can severely cripple a nation’s military systems and even machinery.