Political Cyber Warfare

Superior Essays
The Political Cyber Warfare: Stuxnet
It is no exaggeration to say that the development of the Internet leads the world in the twenty-first century. The Internet globalizes the world quickly by forming a network among countries. However, the advancement of cyberspace makes international information flow abnormally fast. As a result, governments cannot monitor and control what information is exchanged in their countries. The aspect of the difficulty regulating the network generates cyber-crimes such as data destruction. These crimes are also used for political cyber-warfare at present. One of the well-known cases of cyber-warfare is the Stuxnet worm. This cyber-attack arose in Iran from 2007 to 2012. The United States and Israel implemented Stuxnet
…show more content…
Stuxnet is the first malicious software that targets specifically certain industrial control system (ICS). This malware has particular object to attack. It obstructs a Microsoft Windows-based application that is run by certain ICS, which was developed by the German company Siemens. It is possible for the worm to be spread through transportable devices like thumb drives and through computers connected to the Internet. In addition, the Stuxnet worm can hide from a protection system of the target. Determining the origin of the malware is hard. Cyber attackers use complex techniques such as peer-to-peer networking or spoofing IP address in order to elude detection. Similarly, the Stuxnet worm is also positioned on a removable device, so it is difficult to clarify its creator. Thus, some security experts surmise the intervention of a nation in order to develop the worm because the code is very sophisticated (Kerr …show more content…
Each impact considers potentiality for new types of cyber-attacks (Denning 672).
Stuxnet will be able to help and influence on the development of new cyber-weapons, which attack industrial control system (ICS) devices. Furthermore, the progress of these weapons can attract the cyber-security researchers, who lead information flow. The researchers can reveal the vulnerable point of the cyber-weapons and exploit the program, which can be used against ICS devices, but Stuxnet can make the development to more sophistication than the researchers’ detection (Denning 684).
In the future, Stuxnet can be an ancestor of a nation that uses cyber-warfare. Cyber-warfare is less harmful and dangerous than a traditional weapon such as a bomb even though it achieve same goal, whereas a traditional weapon is more immoral and hazardous. In addition, the Stuxnet worm provides an actual example of cyber-warfare to people who study about it, and it also affects academic discussions and policies related to cyber-warfare (Denning

Related Documents

  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Jonathan, I liked that Professor Rosenzweig has brought up a few excellent points to make us think critically, rather than jump to conlclusions or provide us with his own opinon. His comparison of Stuxnet to the first nuclear bomb is a good example for this lecture. The unknown damages, consequnces, and fear are only a few of many concerns that spread around world when the nuclear bomb was tested. In Stuxnet's case, it is difficult to try and build a defense against something that is difficult to discover, trace, and stop, therefore the best defense is to highly protect the computer system and anything that is attached to…

    • 109 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Moreover, there are other types of cyber-attacks and acts of cyber warfare that are not solely military and defense concentrated, but nevertheless are dangerous. An example of this type of attack is explained in columnists, DJ Summers (2014) article “Fighting in the Cyber Trenches”. In his example, he explains how an honest biomedical company going through the process of creating a new technological innovation may have to wait up to five years to be able to release a new product. On the other hand, a different company who is trying to release the same product may use a hacker to release this new product into the market in as shorter span of time for instance, as 18 months (Summers, 2014). Summers explains how hackers are able to infiltrate…

    • 230 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Zero Days Film Techniques

    • 311 Words
    • 2 Pages

    As technology becomes more and more integrated into modern civilization, the documentary, Zero Days, informs us of humanity's dependency on technology and how we are more vulnerable because of it. The director introduces us to “Stuxnet”. A virus capable of sabotaging the operation of power plants and factories. Highlights were then used to emphasize what the virus was able to do.…

    • 311 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Cyber deterrence has been thrown out in the public, governmental, and military sectors for the better part of the first half of the decade, stretching into discussions currently in organizations like NATO, and governments worldwide. The theory is simple: “deter someone from doing something out of fear of repercussion or retaliation.” Theory and concept however, are very different premises and conclusions. Everyone in the information warfare area knows that attribution is a slippery slope, and with the quick typing of a few characters on a keyboard, an attacker can choose to be anyone they want to appear to be. Officials pounding any “attribution” on any pulpit, continue to learn nothing, and attackers will continue with their cyber-shenanigans.…

    • 1639 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Carl Von Clausewitz

    • 541 Words
    • 3 Pages

    Clausewitz’s definition of an act of war requires cyber-attacks to meet three elements to elevate to the level of an act of war. Clausewitz defined an act of war as, “…an act of force to compel the enemy to do our will,” with a purpose that, “…is a political intention…,” and…

    • 541 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Covert Action Case Study

    • 2055 Words
    • 9 Pages

    Economic power is very precious to any country and it’s what makes the world go round. Johnson and Wirtz say, “Today, a prime target of economic dislocation is an adversary’s computer systems.” If we disrupt their computer systems, we’re disrupting their lines of…

    • 2055 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    One of the first attacks of cyber terrorism was in the early 1980s during the phase of the cold war, where CIA implemented a backdoor virus which is commonly referred as “Logic Bomb” in the Siberian pipelines.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    ¨Usually law enforcement agencies collect data on a suspect after they have been identified. This often resulted in missed opportunities, lost lives, just paving the way for only more destruction. But what if data could be collected in advance, before the suspect was even known? What if just the act of collecting data could result in the identification of completely new suspects? More than a few have pondered this question, just days after the Sept. 11th attacks on New York and the Pentagon, John Yoo, the Justice Department lawyer at the time, wrote an internal memo that argued that the government should use "electronic surveillance techniques and equipment that are more powerful and sophisticated than those available to law enforcement agencies…

    • 806 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Indeed, cyberspace challenges the international order. Its global, borderless nature shakes the international regime dating from the Peace of Westphalia to such an extent that scholars, such as Nazli Choucri, claim that even the analytical tools of international politics are outdated and useless in the cyber era. From the communication of populations across the globe, civil society emerges as a new actor, which can lead to new political rules and systems. These self-regulatory actions show, to those who doubted, that humans are reactive, inventive, and can show solidarity, which, from a democratic perspective, is rather good news. The public authority that the military partly represents should, therefore, foster and not hinder these…

    • 1110 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Zero Day Economy Essay

    • 620 Words
    • 3 Pages

    An Overview of the Zero Day Economy: Classification, Longevity, and Costs of Zero Day Exploits Offensive cyber security hinges on exploiting vulnerabilities in order to create effects on adversaries’ cyber systems. A commonly shared belief in the field is that an attacker has more of an advantage if the effect uses an unknown vulnerability, also known as a zero day. Given this shared belief, the discovery of zero days, the process of turning them into reliable effects, and their eventual sale and use to either nation-state actors or criminal organizations is the foundation of offensive cyber security operations. Despite this importance, the world surrounding zero days, primarily their development and their sale, has not garnered much formal research.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Without losing a single soldier on the battlefield, a (speculated) nation-state was able to set back Iranian nuclear efforts for years, sending a strong signal to Tehran and the rest of the world that cyberspace is open for…

    • 847 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Too much investment on high technology can lead to failure to invest in other necessities such as military training, military police and linguists (37). Linguists are needed as a way to communicate with people of countries where a power has military presence such as the United States in Afghanistan. Hard power used in cyber information can do damage to physical targets in another country destroying the soft power that cyber information can create to attract citizens to that country. An example of this is when malicious software is used by modern companies to shut down processes such as the Stuxnet worm virus inserted into Supervisory Control And Data Acquisition (SCADA) systems that instructed Iranian nuclear facilities to shut down in 2010…

    • 1535 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays