Cyber Warfare Research Paper

Superior Essays
“I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We 've created life in our own image.” (Hawking, n.d.) No matter what humans invent it will always end up being used for warfare and computers are no different. Cyber warfare is now commonplace throughout the world because just about any country can do it. This causes it to have many various effects throughout the world.
“Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems.” (Rouse, 2010) Not much is actually known about the effects of cyber warfare because most cases either go undiscovered or are seen as warnings. Some of the more well-known cyber-attacks are stuxnet, equation group, and most recently the Sony Pictures attack. All of these attacks had their reasons for happening, and have had far reaching effects on the world.
Saudi Arabia has long defended its oil lines from physical attacks. However, on August 15,
…show more content…
However, because the letter asked for money rather than political change it is believed that this group has nothing to do with later attacks. The first actual attack was from the “Guardians of Peace” and caused a neon skeleton to appear on several computers belonging to SPE. This attack also had the added benefit of completely erasing everything off of numerous hard drives. Then over the next several days the hackers started to release documents and information with several changes to shed SPE in a bad light. This took place over several weeks so that people would be constantly reminded of Sony’s “transgression.” Then as the movie was getting closer to its theatrical release is when the terrorist threats started to happen. It was because of these threats that most theaters decided to not show the movie. (Haggard & Lindsey,

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The people that set out these attacks were Islamic terrorists and most of them were from Saudi Arabia. The terrorists were supported and helped by Osama Bin Laden and his group called Al-Qaeda (“History”). Osama Bin Laden was a Saudi fugitive who founded Al-Qaeda in 1989. Al-Qaeda was originally formed to fight a jihad, a war or struggle against unbelievers, against the Soviet Union in Afghanistan, but soon turned its attention towards the United States (“Events”). Some of the terrorists had lived in the United States for over a year and had completed flying lessons.…

    • 346 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Cyber Terrorism Case Study

    • 1053 Words
    • 4 Pages

    Chemical Corps. The Road Travelled The Civil Support Team Asymmetric Engagements aren’t a new topic for the United States. Since the early part of the 1960’s America has had to deal with this threat in some form or fashion. Civil disturbances of the 1960’s, the frequency of terrorist acts in the 1970’s, illegal drug use in the 1980’s.…

    • 1053 Words
    • 4 Pages
    Improved Essays
  • Brilliant Essays

    User Liberties/Rights Assessment USCENTCOM and ultimately the 160th Signal Brigade is responsible for maintaining communications in a very dynamic and high risk environment. The mission is to maintain our human rights and defend against terrorism. This mission needs to transfer to defending rights on in cyberspace. Policies confronting challenges of preserving core rights and liberties is part of the commitment.…

    • 1749 Words
    • 7 Pages
    Brilliant Essays
  • Superior Essays

    (Littleton) One month after the attacks of 9/11, a former national security cyber terrorism expert expressed concern about the launch of a cyber attack, which would cause confusion and panic. Most recently, the “SONY” attacks by North Korea and the hijacking of the web site ‘Ashley Madison’ by the group known as The Impact Team, was an attempt to not only destroy software or equipment, but was an act of cyber terrorism used to exploit sensitive information that could be detrimental to lives of politicians, business leaders, and thousands of others. (Ellyatt) “When a U.S. military plane crashed in Chinese territory in 2003 after computer hackers attacked American systems with viruses, the academic, Dr. Alan Ryan, warned that cyber terrorism was the way of the future and the nation’s security experts would have to focus their attention on the problem.” (Murrill)…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    According to the Zertag video the three classes of cyber-attacks are intellectual property theft, attacks that disrupt our way of life and attacks that threaten the military’s ability to defend itself. The effects of intellectual property theft are that it will degrade our economic competitiveness. The effect of attacks that disrupt our way of life is attacked that disrupt our infrastructure like 9/11. After 9/11 Americans were shaken and the government cracked down on airport security, immigration, and the war of terrorism. The effect of attacks that threaten the military's ability to defend itself is that it will leave us vulnerable to other attacks, other countries, and more deaths of…

    • 111 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Imagine being an agent who is in charge of launching the country's nukes but then you realize that the systems have been hacked and compromised. That is a prime example of an extreme cyber attack. Examples like that are the reason why that some cyber attacks should be considered acts of wars depending on how severe the attacks are and who they target. For example the security breach that Yahoo had which leaked all of their user accounts out should not be considered an act of war because it didn't have an impact on national security.…

    • 464 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Carl Von Clausewitz

    • 541 Words
    • 3 Pages

    Carl Von Clausewitz’s definition of an act of war substantiates particular state sponsored cyber-attacks as acts of war. Clausewitz’s definition requires cyber-attacks to meet three elements to elevate to the level of an act of war. Categorization of the perpetrator to determine the intent and nature of their attack is imperative in determining whether a cyber-attack meets Clausewitz’s definition. John Stone correctly advocated in “Cyber War Will Take Place!” that an act of force isn’t necessarily an act of violence when determining whether a cyber-attack is an act of war.…

    • 541 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    What Is Cybercrime?

    • 858 Words
    • 4 Pages

    "Cybercrime" is a criminal offense committed to internet technology (cyberspace), whether it attacks public facilities in cyberspace or private ownership. Technically such crime can be distinguished into off-line crime, semi on-line crime, and cybercrime. Each has its own characteristics, but the main difference between the three is the relationship with the public information network (internet).cybercrime is formulated as an act against the law that is done by using a computer network as a means / tool or computer as an object, whether to gain profit or not, to the detriment of other parties. "Cyberstalking" means the use of the Internet or other electronic means to harass a person, group of persons, or an organization. Cyberstalking is the…

    • 858 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The term “Cyber” has been overlooked in term of fighting terrorist radicalization and online recruitment. Cyber involves computer or computer network as the internet. The lame definition of cyber or the cyberspace, it refers to the internet. Today the society is embracing the advancement of technology and the internet (Ines, et al., 2013). The devices created today such portable computer, laptops, mobile phones, kindles e.t.c they easily gain access to the internet.…

    • 2000 Words
    • 8 Pages
    Improved Essays