You are on page 1of 9

[Francis] 1

Juliana Francis
Campbell
UWRT 1103
1 April 2016

Cyberwar: The threat to life


Imagine a world completely decimated, buildings destroyed, crumbling to the ground as
if made from paper. 1. Imagine the world littered with rubble, and undetonated bombs, families,
split up, lost, and destroyed. Now imagine if anyone had the power to do this with just the push
of a button, no longer do enemies have to send out armies to do this dirty work, all they have to
do is hack into our nations computer system, steal our information, tear down our defenses, and
destroy us. This is cyberwar; just how real is cyberwar? Have we, as a nation, hyped it up more
than it really is? In order to understand cyberwar and the threat it poses, you must first
understand cybercrime.
Cybercrime, as defined by Dictionary.com is crime conducted via the Internet or some
other computer network, cyberwar is The use of computers and other devices to attack
an enemy's informationsystems as opposed to an enemies armies or factories. According to
Cyberterrorism: Understanding, Assessment and Response, cyber-related crimes were introduced
in the 1980s as the intentional abuse of a digital information system. Cyber war is when
information is spread electronically from one nation and spread throughout another; warring
nations will have the ability to steal information digitally and use it to stay one step ahead.
Richard A. Clarke, in his book Cyber War, defines "cyberwarfare" as "actions by a nation-state to
penetrate another nation's computers or networks for the purposes of causing damage or
disruption. Technology has brought with it many advances in personal life and public
companies, however there have also been cases of technology misuse. Today, and with the

[Francis] 2
growth of personal computers we are able to share information and access information from all
over the world. This access to information has tempted many capable programmers to seek the
information and data that belongs to someone other than themselves.
This new era of technology has opened doors that many people jump at the chance to
pass through; and with this temptation, we have coined the term hacker for those who
participate in criminal activities. The threat to computer safety has become extremely large,
when you hear the word hacker you think of vicious criminals who hack into your computer
system to steal your information, your identity, and overall ruin your life. Sometimes, though not
as often, a hacker is a company employee, just trying to see if their companys computer antivirus program works. Often times 2. a hacker is young person, experimenting in the digital world
just to see what they can do; BellGuard Security states that As the underground computer
community grew during the 80s and 90s, virus writing got more competitive and the viruses
more malicious, the art of virus writing became more of a sport to most college students. The
act is more dangerous now than it has ever been before. In fact, now with the increase of social
media, hackers and cybercriminals have a large playing field. These criminals exploit sites to
gain money or to seek personal revenge, 3. and this has only been the beginning.
Cyber criminals and terrorists can distribute information through websites, viruses, and
social media accounts to create propaganda, and gain support to wage internet warfare. The
ability to create a large network of supporters is an important key in any war; networks such as
Facebook, with more than a billion active users, Instagram, with over 300 million active monthly
users and many other sites such as Twitter, Snapchat and Kik. Social media sites can be a strong
tool in starting a group intent to carry out the same agendas. Movements and groups can create
pages, slowly gaining support from followers and in turn gaining a support network. These

[Francis] 3
criminals can set meeting places or host online chats; if the support group is large enough, with
active supporters, 4.groups can become more and more violent and start effecting the public.
Advanced hackers have begun targeting big companies with larger quantities of money.
Hacking is sometimes coined as one of the most serious and economic and national security
challenges we face as a nation (Obama). Companies that are popular are the most widely
targeted, such as Microsoft and Apple. With the rise of cybercrime, the threat of cyberwar
continues to increase. Cybercriminals are not easy to spot or track. Advanced hackers can slip
through the cracks and shut us, as a nation, 5.down, electronically. The possibility of cyberwar
has brought out the issue of whether this threat is real or something exaggerated, used as a fear
tactic for the National Security Agency to gain power. The threat posed by cyberterrorism has
grabbed the attention of the public, creating small waves of doubt and fear. But just how real is
the threat?
6.According to James Bamford and Chris Schmidt, authors of CyberWar Threat, the
already, highly sophisticated, stealthy computer programs such as the notorious Stuxnet worm
can take over and even destroy the control systems that regulate everything from food factories
to gas pipelines, power plants, and chemical facilitieseven our cars. The U.S was actually the
stepping stone towards the possibility of cyberwar. We currently have cyber weapons such as
cruise missiles, drones, and other military weapons that can be detonated with just the push of a
button. These weapons can be places in strategical areas and set off from the other side of the
world if need be. Before cyberwar really became a threat, the Iranians were so far behind the U.S
and other countries that when they targeted U.S allies oil companies, it was with a virus so
mediocre that Edward Snowden, author of Cyber Attacks, called it a wiper virus, which is
actually sort of a Fisher Price, babys first hack kind of a cyber-campaign. Its not sophisticated.

[Francis] 4
Its not elegant, the virus was nasty, it began to replicate itself across the internal network, and
then it simply erases all of the machines. So people go into work the next day and nothing turns
on. And it puts them out of business for a period of time.
The attacks of enemy countries, such as Iran, may be childish however The threat
posed by cyberterrorism and the potential of war has grabbed the attention of the public,
increasing the publics fear. A quote from Giles Trendles Cyberwar states that Ehud
Tenenbaum, an Israeli hacker who gained notoriety in 1998 when he broke into the US Pentagon
computer, believe the Arab-Israeli cyberwar is going to reignite. The U.S militarys computers
have been often attacked by Chinese hackers. It is possible that the attacks occur so often
because of Chinas advancement in modern technology (including weapons), it is not only China
making moves. In 2007, Russia had suspected a mass botnet invasion of Estonia, the nations
largest bank, Hansabank took a huge hit. According to the Washington Post article Cyber War by
Richard Clarke, in 2008 Russia allegedly deployed an electronic version of the Dirty Dozen,
shutting down Georgian government Web series and cutting off news from outside.
This threat is real, but how is the nation preparing to protect itself and its people? For
years America has been taking precautionary measures, American technology is believed to be
still behind some countries, but we do have the ability to grow. One of the worlds most
successful digital weapons was introduced in 2010. Stuxnet, a worm that attacked Iran's uranium
enrichment facility and temporarily stopped its ability to produce more. This kind of cyberattack
demonstrates the immense power that the U.S possesses, and their ability to attack nations
without dropping a bomb or deploying soldiers.
Stuxnet was different from other viruses instead of just stealing valuable information, it
targeted computers, wormed its way into cyberspace and attacked, physically destroying

[Francis] 5
computers and the equipment the computers controlled. Newer versions of Stuxnet have two new
ways to spread than just a simple programming code. The newer versions of Stuxnet can spread
through infected USB drives or by local networking sites. Though it is undetermined how long
exactly Stuxnet took to destroy its target after infecting their machines, it is understood how
disastrous the outcome worked. Stuxnet did precisely what it was supposed to do: the worm
targeted computer systems and allowed its controllers to spy and control the industrial systems of
Irans nuclear-fuel plants. For years America had been ignoring the growing problem of
cybercrime, but no longer!
On February 12, 2013, President Obama signed Executive Order 13636, Improving
Critical Infrastructure Cybersecurity, in The Foreign Policy, Obama states: Americas
economic prosperity, national security, and our individual liberties depend on our commitment to
securing cyberspace Obama was aware of the nations risk from threats in cyberspace, and
our economys eventual harm. Hackers with the ability to gain access to important U.S
documents, and access to the militarys information systems stole valuable information. The
threats pointed towards the U.S are serious and they continue to grow as an issue; however, if
addressed correctly, we can ensure that the Internet remains an engine for economic growth and
a platform for the free exchange of ideas says Obama. The protection of the nation is one of
Americas greatest security agendas. The massive growth of technology, and the increasing
amount of internet users who are not cautious, has created obstacles that hinder the nations
ability to protect itself. In 2013 U.S. Defense Secretary Leon Panetta expressed his concern over
the possibility of a major cyber-attack.
Cyberspace is the new frontier, full of possibilities to advance security and prosperity in
the 21st century. And yet, with these possibilities, also come new perils and new dangers. The

[Francis] 6
Internet is open. It's highly accessible, as it should be. But that also presents a new terrain for
warfare. 7.It is a battlefield of the future where adversaries can seek to do harm to our country,
to our economy, and to our citizens I know that when people think of cybersecurity today, they
worry about hackers and criminals who prowl the Internet, steal people's identities, steal
sensitive business information, steal even national security secrets. Those threats are real and
they exist today.
Many fears of the public are exaggerated, even so, the potential threat is extremely
realistic and seems likely to continue to increase over the years, 8.making it excessively
important to address the danger without manipulating it or using it as a fear booster. The
American public is extremely concerned with the welfare of the people and the country; amateur
authors use the idea of threats and war to gain popularity and to sell their books. Over 400 books
on Amazon have the title information war, and over 600 with the title cyber war, these books
have many buys and many views because people are afraid. The increasing awareness of
cyberwar threats, also raises the question: the severity of cyberwar may be over exaggerated, but
it is not unrealistic. No matter how exaggerated these claims are, the question still remains: are
we prepared to protect ourselves in case of emergency? These threats are real and very serious,
the internet is not as safe as many people have come to believe.
Technology has brought with it many advances in personal life and public companies,
cyber-criminals and terrorists can distribute information through websites, viruses, and social
media accounts to create propaganda, and gain support to wage internet warfare. Is cyberwar
reality or hype? The answer is both. The act of cyberwarfare is very real, the possibility of such a
war can happen at any moment, right under our noses. Cyberwar is also used as a scare tactic to
gain control, power, and money.

[Francis] 7
Cyberwarfare can be used to threaten the economy, such as banks, ATMs and personal
property like computers and electronics; this possibility can be used to target the public and
cause widespread panic. If the public is panicked, then authors could write more on the topic and
create realistic solutions that would make the public interested in buying their works. If the
public is afraid, then any official running to be elected can target that fear and talk on all they
would do to stop this impending war. In an article for the Global Post, Jeb Boone wrote, Its
hard to know how justified the concern really is. There is clearly a threat but its difficult to
evaluate that threat, making it hard to evaluate their response to the threat as well, and he is
right. We really dont know just how real this information is, and that leads to unanswered
questions about the laws of cyberwar, the possibility of cyberwar, and who has the power to
wage such a war. It is fascinating to look at but it is still a problem. This element of fear is being
used against us, but fear is not always a bad thing, fear prepares a person for what may come.
There may come a day when an enemy nation decides to press a button and hack
America. No warning, no army rushing in and giving us just a bit of time to think about fighting
back. Our defenses could be torn down in second, our modern life would be completely
destroyed, unless we find a way to fight back. The possibility pf cyberwar may not be extremely
serious at the moment, but there may come a day where its right around the corner, and how will
this nation prepare itself? How can we fight what we cant see coming?

[Francis] 8
Works Cited
Bamford, James, and Chris Schmidt. CyberWar Threat. PBS. NOVA. 14 October 2015. Video.
03 April 2016.
Bamford, James, and Tim De Chant. Exclusive: Edward Snowden on Cyber Warfare. PBS. 08
January 2015. Video. 01 April 2016.
Bhardwaj, Kuldeep. 50 Facebook Facts and Figures. Facebook Logo. Facebook. 08 August
2011. Web. 07 April 2016.
Boone, Jeb. Is Cyber War Just a Scare Tactic? Global Post. Global Post. 15 May 2013. Web.
02 April 2016.
Cavazos, Edward, and Gavino Morin. Cyberspace and the Law: Your Rights and Duties in the
On-Line World. Cambridge. MIT Press. 1994. Print. 07 March 2016.
Chen, Thomas, and Lee Jarvis, and Stuart Macdonald. Cyberterrorism: Understanding,
Assessment, and Response. n.p. 2014. Print. 01 March 2016.
Clarke, Richard, and Robert Knake. Cyber War: The Next Threat to National Security and What
to Do About It. New York. Ecco. 2012. Web. 07 April 2016.
Harris, Shane. The Cyberwar Plan. National Journal. 2009. Print. 05 March 2016.
Kaiser, R. The Birth of Cyberwar. Political Geography. 46: 11-20. 2015. Print. 01 April 2016.
LePage, Evan. "A Long List of Instagram Statistics and Facts That Prove Its Importance."
Hootsuite Social Media Management. HootSuite, 17 September 2015. Web. 07 April
2016.
Scheiner, Bruce, and Matthew Rotenberg, and Johnathan Zittrain, and Mike McConnell. Cyber
War Threat Has Been Grossly Exaggerated: A Debate. YouTube. 2014. Video. 08 April
2016.

[Francis] 9
The White House. Foreign Policy Cyber Security. The White House. n.p. 01 May 2015. Web.
07 March 2016.
Trendle, Giles. "Cyberwar." World Today. 58:4. 2002. Print 07 April 2016.
Wikepidia. Sony Entertainment Hack. Wikipedia. Wikimedia Foundation, n.d. Web. 07 April
2016.

1. consider revising intro, it is very good now but I want to see more of this image,
also second sentence begins to run on, split into two perhaps?
2. Add an and here or change sentence
3. consider revising sentence for better ending of the paragraph.
4. Consider revising and removing an and, also could make present tense to increase
fear factor
5. too many commas
6. run-on sentence, consider revising
7. run on sentence, consider a revision here
8. break into two sentences?
9. I enjoyed the paper as a whole, it is a very good paper. The things that you want to
take a look at correcting is the length of your sentences as they can run a little
long, you use pronunciation to break it up, but sometimes a sentence break is
necessary. You use a lot of good sources but you do not want to overload a person
with information so an explanation could be necessary. Your overall work is great
and I can see where you are going with this and know the final work will be good.

You might also like