Explain Why The Threats Should NOT Be Considered An Act Of War

Improved Essays
Imagine being an agent who is in charge of launching the country's nukes but then you realize that the systems have been hacked and compromised. That is a prime example of an extreme cyber attack. Examples like that are the reason why that some cyber attacks should be considered acts of wars depending on how severe the attacks are and who they target. For example the security breach that Yahoo had which leaked all of their user accounts out should not be considered an act of war because it didn't have an impact on national security. While for example the shadow brokers who hacked into the NSA and got the NSA hacking tools could be considered a threat to national security because with their tools they are able to hack into a wide variety of …show more content…
So if a computer has the ransomware it has a chance to spread like wildfire. Luckily for the users Microsoft released an emergency security patch when they found out about the vulnerability and blocked the ransomware from becoming widespread. The Eternal Blue exploit would not be directly considered an act of war but, for example, wikileaks could be looked at as an act of war because they leaked alleged CIA documents for the country to see which the United states might take as an act of war to the publisher of Wikileaks. Which the United States wouldn't classify as an act of war because they have yet to figure out what would constitute an act of war from a cyber attack. Eventually the United states government will fully grasp how threatening and dangerous cyber attacks could be. The government should start thinking about how to deal with these cyberattacks now before it’s too late. For example imagine a scenario where our country's missile launches are getting hacked if we don't have an infrastructure set up to deal with it now, it will be too late when the time comes to deal with it. Imagine not having a plan for natural disasters, that’s how it will turn

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    War Powers During the Civil War in America, Abraham Lincoln did many things that are not specifically outlined in the constitution. The only reason he could do this was because of the cryptic war powers clause. In this clause of the constitution the president of the United States is given special powers in times of war. This is one of the few times that the constitution does not clearly outline what these powers are.…

    • 404 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Rhetoric Countering War

    • 435 Words
    • 2 Pages

    Rhetoric Countering War Throughout history, war has become the only solution to resolving conflicts between nations or groups. War is often something that is started off with tension, tension which is often caused or started due to conflicts or disagreements between different nations or different groups, and it is commonly characterized by violence, resistance, and mortality. A few examples in American history are the American-Indian Wars and the Revolutionary War. These various groups of people firmly believed that the only way they could advocate for what they were passionate in was to use violence to express it. However, in the first chapter of Everyone’s An Author, Wayne Booth takes another perspective into consideration and is quoted,…

    • 435 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    According to James Jay Carafano, PhD and Jessica Zuckerman, “ Since 9/11, today the terror attacks have gone up from 19 attacks to 40 attacks” (Carafano Phd and Zuckerman). Given these points, this means that the NSA, FBI, and government aren’t doing a good job with security and should have looked into the terrorists plans before they could be carried out. So the government needs to improve on ways to keep people safe and at the same time to respect their privacy. Many people believe that the government need to step up the security to keep their information safe by the government could easily leak the information or give it to another country. The government need to stop collecting massive amounts of data from some of the 7 billion people on this earth or the people could get all of their money stolen along with stuff that is need for important things such as taxes and things like that.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    I agree that the comparison of the cybersecurity to the healthcare system is a great analogy, although not perfect. Professor provided examples where a cybersecurity breach and healthcare system are similar and could be treated in a similar way to stop or prevent a different outbreak. Even though most cyber-attacks are minor, there will time when all the information gathered from those small attacks that could be formulated into recipe of a major attack. Also, you pointed out that it is important to realize that it is impossible to prevent all and any cyberattacks, and that they evolve at a fast rate.…

    • 157 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Consequently, the aftereffects of engaging in warlike…

    • 398 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    A war can have a number of causes that lead to horrific consequences such as the…

    • 1984 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Past War Theory

    • 130 Words
    • 1 Pages

    I agree with your statement, “The United States needs to develop and employ policies, doctrine, tools, deterrent models, and rules of engagement against actors in cyberspace.” The AF is faced with writing the theory and doctrine for handling cyber-warfare, and defining which acts quantify as acts of war. Past war theory will help our AF make decisions, but cyberspace is not well covered in current warfare theory. The White House stated in 2011that the “United States will respond to hostile acts in cyberspace as we would to any other threat to our country.…

    • 130 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    Last resort explains that leaders should not pursue war until exhausting all diplomatic negotiation efforts (Orend 59). The violation of Just War Theory is less clear as it relates to drone strikes in Yemen, since negotiation efforts with Yemen are complicated through an absence of a United States embassy in the country (CNN). However, because the United States does not actively negotiate or have strong ties to the Yemeni government, their use of drone attacks is that much more unethical. Without supporting a dialogue between itself and the Yemeni government, the United States does not have the ethical right to employ drone strikes. In this scenario, the United States is the aggressor because the nation has taken upon itself to initiate a war without considering it as a last resort.…

    • 1540 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    War is always changing . There are many questions about it such as , is war ever justifiable ? much say no it is never justifiable . However it is at strict conditions…

    • 1107 Words
    • 5 Pages
    Improved Essays