The Dangers Of Cyber Warfare

Great Essays
It seems every day there is a new headline in the news involving cyber warfare. Across the globe governments and their citizens are being affected by cyber warfare more than ever before. From the Ukraine to America’s very own elections anyone plugged into the internet is impacted by this new and mysterious form of attack. However, it seems to have become overshadowed by the recent presidential election and other major headlines and shoved into the back of the general public’s minds. This issue needs to be addressed as soon as possible or the fallout could be devastating. Attacks can cause individuals to lose all of their financial assets, or in extreme situations cause entire governments to shut down. This issue needs to be addressed in more …show more content…
Only in the past few decades has it been effective enough to be used by militaries and criminal groups to reach their goals. NATO claims that the first cyber attack occurred in 1988 and destroyed computer systems by inserting a virtual worm into the systems causing them to slow down so much that they became unusable (Review). The person responsible for this attack now works as a professor at the Massachusetts Institute of Technology which shows the intellectual ability required to attempt a cyber attack when it was first proved effective. For the next two decades cyber warfare slowly became more dangerous but was not thought of as a major threat until 2006 when NASA discovered they were at risk of being hacked. They were forced to delay shuttle launch plans in order to secure their systems and prevent them from being tampered with (Review). Since then cyber attacks have become more frequent and become so complex that it has caught the attention of world leaders. Attacks have become so common that those paying attention know how much of a threat cyber warfare really is. Over the past few years nations have become more aware of the dangers and are beginning to take steps to prevent the damages that can be done. Many nations are beginning to assemble specialized teams and hold high level meetings in order to combat these hackers and protect their citizens. Cyber warfare …show more content…
Before the presidential election, there were many rumors going around that Russia was tampering with the election, more specifically the primaries. If these rumors are true then cyber warfare has affected the very foundation of the American Democracy. Although primaries are technically not officially a part of the government, they do play a major part in the deciding of the next President of the United States of America. The New York Times stated on October 7th, “The U.S. government for the first time on Friday formally accused Russia of a campaign of cyber attacks against Democratic Party organizations ahead of the Nov. 8 presidential election” (Reuters). This was after Newsweek stated back in August, “Officials and cyber security experts say recent breaches at the Democratic National Committee and elsewhere in the Democratic Party were likely carried out by people within the Russian government” (Rinaldi). This is a critical statement because before this time the United States Government had not formally accused Russia of tampering with the elections. This could cause a rift in the relationship between the Russian government and the United States government which has been stable since the end of the Cold War in the 1980s. Russia has denied all allegations of course, but if these accusations are true then this could

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Joel Pollak, a senior political editor, writes on the topic of Russian hacking of the 2016 U.S Presidential election in Breitbart News, an online publication that aligns with his right-wing views. His article aims to persuade reader’s that the CIA’s allegations of Russian hacking within the election are false, all while reassuring republican supporters that they have “nothing to fear” (Pollak, 2016), as they won the election fairly. While Pollak’s logical and emotional appeals are strong, his political bias heavily impacts his argument. In addition, several fallacies become apparent throughout his article. Though Pollak’s argument is well-structured, readers should account for the heavy political leanings of the author, the website, and the…

    • 846 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    One of the other options in having more aggressive operation is the ability to disrupt operations being conducted in our IC, as well as determine what the enemy wants to know. If the CI community is able to determine what the enemy wants to know then the IC can then be strengthened where there are issues. With the new evolutions of technology, espionage may not be conducted in some back alley in Moscow or Tehran, but in a blog or forum where OPSEC has been compromised. With the integration of Cyber in the CI community the ability to cover another avenue of approach, as well as give another ability to conduct active operations against the enemies is a large advantage.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Cyber deterrence has been thrown out in the public, governmental, and military sectors for the better part of the first half of the decade, stretching into discussions currently in organizations like NATO, and governments worldwide. The theory is simple: “deter someone from doing something out of fear of repercussion or retaliation.” Theory and concept however, are very different premises and conclusions. Everyone in the information warfare area knows that attribution is a slippery slope, and with the quick typing of a few characters on a keyboard, an attacker can choose to be anyone they want to appear to be. Officials pounding any “attribution” on any pulpit, continue to learn nothing, and attackers will continue with their cyber-shenanigans.…

    • 1639 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Cyber-attackers invaded the largest defense company in the world and the most important suppliers of the Pentagon to the network - but who they were and what they wanted? Officially there is to much information, but a look at the recent past may shed light on the object and purpose of the action. The affected defense contractor Lockheed Martin and the Pentagon was already target of cyber espionage: In April 2009, a 1.4-terabyte file was stolen, which was the largest at the time, weapons project of the United States to content: Plans of the 300-billion dollar " Joint Strike Fighters "who now call" is produced F-35 Lightning II "-Tarnkappen fighter jet (WSJ report). "It may well be that the attacker wanted to catch a few more information," says the German Cyberwar expert Sandro Gaycken of the Freie Universität Berlin.…

    • 845 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Terrorism is the most popular headline in Media in the present situation. From past few decades’ world’s leading countries have been attacked by terrorist groups. Cyber terrorism is an act of terrorism used by many terrorist groups in order to steal highly classified from opponent countries or disrupt countries operations like nuclear generation, gas supplies etc. Cyber Terrorism is also known to be a way leading countries could show their dominance on other enemy countries. Cyber terrorism became a global threat right from its initial stages.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Cyber attackers have come from in the country and outside of the country, and these other countries need to know that we aren’t going to accept it. In the debate, Clinton said, “the United States has much greater capacity. And we are not going to sit idly by and permit state actors to go after our information, our private-sector information or our public-sector information.” (Washington Post)…

    • 1185 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Today's technology is evolving at an unprecedented rate making the use, and misuse, of cyberspace easily accessible to anyone with access to a computer, smartphone, and the internet. Many governments realize how invaluable of an asset the internet is and have integrated it as an integral part of their nation's infrastructure and society. Unfortunately, whether it be by way of an individual person or a national institution, it is not uncommon to have enemies' attempting to exploit weaknesses. Having an accumulated 18 years of service in the military; and seeing first-hand the integration of the internet for military communication and coordination, I have witnessed numerous cyber-attacks on our nation and individuals over the span of my military…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    It is the 21st century where technology is so advanced for online and the threats that arise from the online world. Cyberterrorism is such a gray area because of the cyber attacks that falls into gray areas that can be considered hacking, or cyber…

    • 235 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Cyberwarfare is dangerous because it can all be done without an identity and can trigger immense conflicts. Nuclear weapons will still act as a backdrop during the cyber cold war. The US, Russia, and China have all began modernizing their nuclear systems. While cyber will be the prominent form of warfare, nuclear weapons will act as a “don’t mess with our arsenal”. The concept of mutually assured destruction will remain prevalent throughout the cyber war, as each superpower would rather expand their sphere of influence no matter the…

    • 922 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays