The Pros And Cons Of Cyber Warfare

Improved Essays
World War I saw the emergence of tanks and machine guns. The Second World War saw the prominent use of flame throwers and the introduction of long range guided ballistic missiles. The Cold War was a standoff centered on nuclear bombs. The Persian Gulf War was won through extensive bombing via stealth fighter-bombers and Tomahawk cruise missiles. So what is the world’s newest way to wage or threaten war?
The internet.
As large nations—such as the United States and many of its allies—become ever more reliant on electronic assets to function, those tasked with waging war or defending against war—whether domestic agencies such as the U.S. Department of Defense or elements of foreign groups such as the Islamic State—dedicate increasing amounts of
…show more content…
Likewise, the training needed to execute some degree of cyber warfare is minimal. For instance, the aforementioned civilian group Anonymous has published a “NoobGuide” for hacking the Islamic State, with a goal of increasing the civilian involvement in their war on the Islamic State. However, just as cyber warfare allows for more direct influence on war by civilians, it also allows for more direct influence on civilians by …show more content…
An article from The New Yorker goes as far as to compare the rash implementation and potentially devastating global response to cyber warfare—particularly Stuxnet—to the Cold War nuclear arms race. However, this comparison falls short for one key aforementioned reason; accessibility. Civilians or small—whether by physical size, manpower or resources—militant groups cannot often afford to develop or procure nuclear weapons, thus the risk for large and developed nations that can afford those technologies is relatively low, compared to a high risk for those who cannot afford the technologies. However, those same civilians and small groups can utilize much of the same technology that larger nations can with regards to cyber warfare, thus reducing the risk for themselves and maximizing the risk for the large nations with everything to

Related Documents

  • Improved Essays

    The United States has come a long way since the days of the American Revolution or either of the World Wars. Today war is all about airstrikes, drones, and the use of any other new technology in order to find a way to keep our troops at home and fighting conflicts without having “boots on the ground” as the saying goes. However even with, or perhaps because of, this new technology our country finds itself involved in conflicts that are unconventional to what we have seen in our history. The young generation of Americans today has grown up learning about the wars against terrorism where the enemy is hard to really signal out from a large crowd. We have become accustomed to fighting against what Max Boot calls “invisible armies” because it’s…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Cold War: How the Icy Rivalry Gave Us Fiery Technology Throughout history, we have experienced many technological influences, inventions, and innovations, many of which have changed the world and how we live in it. Our modern era depends on new, cutting-edge technology, but few look back to the origin. Some people believe that war brings new technology, since war motivates. Whether in the form of a theory, weapon, tool, or all three, the Cold War stands true to this and but this and played a major part in the advancement of our modern technological society by developing instruments for space exploration, bringing the advent of the internet, and upgrading operational capabilities of the computer.…

    • 881 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    "In this day of age, we have dedicated large portions of our lives to the internet and staying connected. This allows a wide variety of knowledge and entertainment to be brought into every home. However, the vast amount of resources available online can possibly be a bad thing. Countless organizations of crime and terrorism roam the online world with a sense of anonymity and the resources to mass spread their ideologies across the world. This has led to the creation of governmental organizations such as the National Security Agency (NSA) that hold the main goal of trying to prevent terrorist and crime organizations from carrying out evil and violent attacks on the people of the United States and the world.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Countries now are trying for nuclear power and to out produce the United States and Russia, who as of now hold the most. The likelihood of nuclear is far fetched as of now but the chemical and biological weapons is very prominent. Biological due to one small slip of the head and a new virus is created when its original intent was to cure something else. Unlike the Biological weapon a chemical weapon can be gained through means of obtaining from an outside source or made at home. Even though the chemicals that are usually associated with are not in liquid form they are in powders and gases.…

    • 1612 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Adin Rackham Morgan WHAP-6 1 Feb. 2017 LEQ for 1.62% Extra Credit Throughout history weapons have helped unite, conquer, and overthrow powerful empires. Warfare has changed so greatly over time due to weapons becoming more technologically advanced and much more deadly. During the time period 1500-2017 weapons have changed drastically. Weapons have progressed from new steel weaponry during the mid-century to cyber warfare making itself known during the past 100 years.…

    • 787 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    You live in Syria, your hometown is taken over by terrorists. As if the terroristic violence is enough, you constantly hear the roar of drones invading the skies. At work with your co-workers and at home with your families, every second of the day you ponder upon the question, “Am I next?”. Target drone strikes create even more unnecessary fear in neighborhoods taken over by terrorists. We should stop trying to end terrorism with lethal force such as drone strikes.…

    • 1739 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Essay On Homeland Security

    • 1030 Words
    • 5 Pages

    After the 2001 attacks The Department of Homeland Security had to completely remodel its system and focus on terrorism as the main threat. “Terrorists today can strike at any place, at any time, and with virtually any weapon. This is a permanent condition and these new threats require our country to design a new homeland security structure.” Our country suffered from this event and it has been the focus of Homeland Security to make sure nothing like that ever happens again. The USSS has taken effective measures in expanding its investigation in computer networks and monitoring internet activity.…

    • 1030 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    September 11th, 2001 globally altered the processes in which countries assess their national security. From the perspective of international relations – concerning war and conflicts – nations all across the globe are currently enjoying a relative peaceful period in world history. Fewer nations declare war on each other. Since WWII, nations have experienced intense globalization, increased trade, more sophisticated diplomacy apparatuses, and a reverse trend in nuclear weapons proliferation. Nations must now contend with a threat – domestic and international terrorism – that demands different intelligence gathering processes and a sweeping change in militaristic strategy.…

    • 1189 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    “We’ve been talking about this for a good while, the immorality of drones, dropping bombs on innocent people. It’s been over 200 children so far. These are war crimes.” (Gavin) Princeton professor Cornel West says during the Smiley & West radio show. Drone strikes have been an area of controversy, but the topic is usually under the radar in the typical American’s life.…

    • 1286 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Cyber attackers have come from in the country and outside of the country, and these other countries need to know that we aren’t going to accept it. In the debate, Clinton said, “the United States has much greater capacity. And we are not going to sit idly by and permit state actors to go after our information, our private-sector information or our public-sector information.” (Washington Post)…

    • 1185 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    ¨Usually law enforcement agencies collect data on a suspect after they have been identified. This often resulted in missed opportunities, lost lives, just paving the way for only more destruction. But what if data could be collected in advance, before the suspect was even known? What if just the act of collecting data could result in the identification of completely new suspects? More than a few have pondered this question, just days after the Sept. 11th attacks on New York and the Pentagon, John Yoo, the Justice Department lawyer at the time, wrote an internal memo that argued that the government should use "electronic surveillance techniques and equipment that are more powerful and sophisticated than those available to law enforcement agencies…

    • 806 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    As with any advantage, however, there are also downsides. At the heart of most IIoT systems throughout any industry is what is referred to as Supervisory Control and Data Acquisition (SCADA) applications. A combination of hardware and software, SCADA “is an automation control system that is used in industries… [to] provide the user with remote controls of any equipment in a given system” (Krambeck, 2015). A prominent instance of the exploitation of one of these systems, outside of the incident in Ukraine, is what General Hayden referred to as the “crossing of the Rubicon event” of Stuxnet back in 2010 on the Iranian Natanz nuclear facility (Hayden, 2016). Decreasing enrichment efficiency by approximately 30%, this was the first instance of a cyber version of August 1945 when the United States decided to drop two nuclear bombs on Nagasaki and Hiroshima (Holloway, 2015).…

    • 847 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Too much investment on high technology can lead to failure to invest in other necessities such as military training, military police and linguists (37). Linguists are needed as a way to communicate with people of countries where a power has military presence such as the United States in Afghanistan. Hard power used in cyber information can do damage to physical targets in another country destroying the soft power that cyber information can create to attract citizens to that country. An example of this is when malicious software is used by modern companies to shut down processes such as the Stuxnet worm virus inserted into Supervisory Control And Data Acquisition (SCADA) systems that instructed Iranian nuclear facilities to shut down in 2010…

    • 1535 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    A group of men are sitting inside a hut in the middle of the dessert, the three men are all known terrorists. Suddenly, the hut disappears in a flash of fire and shrapnel, unknown to the men a missile was launched from a circling reaper drone controlled by another man thousands of miles away in Nevada. This is a prime example of a fairly new tactic of drone warfare used by Armies around the world to fight terrorists. Drone warfare is the use of unmanned radio or satellite controlled aircraft to destroy enemy targets, and conduct surveillance on enemy forces, these aircraft can hold missiles or cameras and are saving countless lives by taking out enemies or scouting them without putting soldiers in harm’s way. One of the arguments of why drones…

    • 1930 Words
    • 8 Pages
    Great Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays