Cyber Warfare and its Effects on Us All
Bryan Prewitt
IT103-C01
George Mason University
Friday, July 10, 2014
"By placing this
statement on my webpage, I certify that I have read and understand the GMU
Honor Code on http://oai.gmu.edu/the-mason-honor-code/. I am fully aware of the
following sections of the Honor Code: Understanding the Honor Code,
Understanding the Consequences. In addition, I have received permission from
the copyright holder for any copyrighted material that is displayed on my site.
This includes quoting extensive amounts of text, any material copied directly
from a web page and graphics/pictures that are copyrighted. This project or
subject material has not been used in another class by me or any other student.
Finally, I certify that this site is not for commercial purposes, which is a
violation of the George Mason Responsible Use of Computing (RUC) Policy posted
on http://copyright.gmu.edu/?page_id=301 web site."
Introduction
Cyber
Warfare is an entity that has the potential to leave entire countries in
unrecoverable foreign debt; undesired physical warfare; or even worse,
completely neutralized by nuclear weapons all by the flick of a sinister
switch. The internet, what was once developed to increase the efficiency of
laboratories, corporations, military operations, public resources, and even
farming has transitioned into another ever developing essence of humanity. This
essence of humanity known as violence, defined by Merriam-Webster’s online
dictionary as “intense, turbulent, or furious and often destructive action or
force” (Merriam-Webster’s, 2014). Throughout
this paper there will be compelling evidence to support the notion that the
internet has become just another weapon in humanities arsenal against its
fellow man. This will be done through a presentation of information in specific
sections. These sections will be: background, potential benefits, legal and
ethical issues, and future research.
Background
ARPANET, the use of this acronym means everything and
nothing to almost anyone you may run into in today’s society; but the Advanced
Research Projects Agency Network (ARPANET) was the first concrete version of a
connection between two computers for the purpose of sending and receiving
information between each other (Who invented the internet?, 2013) .
What was once an imaginative idea exploded form just wishful thinking and hopes
for the future of humanity into what is now known as “the information
super-highway,” but, much like any other entity connected to humanity, so did
the effects of hostility and disseat; these effects can be characterized as
“cyber warfare.” While the definition of cyber warfare is still facing points
of debate the United States Department of Defense (DoD) has given the term
cyberspace their best interpretation of the term:
“The DoD (Joint Publication 3.0 Joint Operations 17 September 2006
Incorporating Change 2, 22 March 2010) defines cyberspace as a global domain
within the information environment. It consists of the interdependent network
of information technology infrastructures, including the Internet,
telecommunications networks, computer systems, and embedded processors and
controllers. Within cyberspace, electronics, and the electromagnetic spectrum
are used to store, modify, and exchange data via networked systems. Cyberspace
operations employ cyberspace capabilities primarily to achieve objectives in or
through cyberspace. Such operations include computer network operations and
activities to operate and defend the Global Information Grid” (Andress & Winterfeld, 2011, p. What is Cyber
Warfare?) .
Once defining what cyberspace or
cyber we are better equipped to create an idea of what cyber warfare truly is,
Shakarian et al. (2013) defines cyber war as:
“an extension of policy by actions taken in cyber space by state or nonstate
actors that either constitute a serious threat to a nation’s security or are
conducted in response to a perceived threat against a nation’s security” (p.
1-8). After defining cyber war, we can deduct with a basic understanding that
cyber warfare is the actions of conducting cyber war between two or more
populations of people or networks.
Potential Benefits
While many
would suggest that there are no benefits to cyber warfare some would disagree.
Because of the actions between multiple parties involved in cyber warfare many
job, products, and conceptual ideas have spawned as a result. Some of the basic
properties of cyber warfare have generated thousands, if not, hundreds of
thousands of job in the areas of research and development of new network security
products, distribution of developed products, and the ever helpful service
representative that one may deal with when buy or servicing a personal
computer. Much like the creation of jobs cyber warfare has created opportunities
for developing ideas, the most common concept people can be familiar with is
Secure Socket Layer (SSL) and Transport Layer Security (TLS). SSL and TLS are
the most common security protocols between two machines operating on a network (What is SSL? A brief explanation, 2014) , essentially they
are the invisible wire between computer A and computer B that prevent others
from intercepting the information for any reason good or bad.
Security
Concerns
Much like the concerns anyone has
about one’s family, friend, neighbors, country, and even professional aspects
cyber warfare presents major concerns. Concerns associated with cyber warfare
can range from the issues associated with a third party while purchasing an
item over the internet all the way up to another governmental state unleashing
nuclear war upon their enemies through the use of cyber-attacks.
In a 2011 report from the DoD-Cyberspace division to
Congress, in support of the National Defense Authorization Act for Fiscal Year
2011, Section 934, the DoD states their main objective is Deterrence. They
establish two principles as to how they will deter attacks; the first principle
being denying the adversary’s completion of specific objectives, and the second
being imposing penalties or reactions so harsh that attackers are presented
with no benefit of executing any form of cyber warfare (Defense, 2011, p. 2) . While these objects
are continuously pursued by our government agencies as well as our allies and
even privatized contractors there are legal and ethical concerns that accompany
the processes involved.
Legal
and Ethical Issues
Any portion of any policy or action associated with
government decision making has faced opposition from someone in some form or
fashion. While some issues are able to be resolved through increased
understanding of the policy or action others are not. This principle is evident
in cyber warfare as much as any other issue. Before being able to understand the
reasoning associated with policies relating to cyber warfare there must be an
understanding of what can happen if policies or defenses are too weak or
incapable of preventing attacks.
2008’s conflict between Russia and Georgia is a prime
representation of weak defenses and policies on part of the Georgians, during
this conflict Russian attackers were able to disable the media outlets as well
as internet capabilities of the entire Georgia population (Shakarian, Shakarian, & Ruef, 2013, pp. 23-32) . Because not all attacks are from a defined
governmental body onto another there must be rules and regulations placed to
prevent the violation of both individual and political rights.
The Tallinn Manual, international law scholars define the State’s
responsibility concerning cyber warfare, “A State bears international legal
responsibility for a cyber operation attributable to it and which constitutes a
breach of an international obligation” (Schmitt, 2013, p. 29) . What this means for
both the citizens within a State as well as parties of other States is that any
cyber-action that is not justified under laws such as the law of armed conflict
or United Nations Charters will be the result of illegal actions by the actor(s)
involved. While many there are many laws and regulations such as the one
previously listed the issue related prosecution of attackers is presented
through the ethical dilemma of individual rights as well as inherent complexity
that is cyberspace.
Social
Problems
The social issues relating to cyber
warfare are intertwined with the legal and ethical issues of the same nature.
While many believe that increased laws and policies present greater protection
against cyber-attacks others believe that they are just increased violations of
individual rights and freedoms. The greatest social problem associated with
cyber warfare is just that, what is considered too much? Is China’s level of
cyber censorship too extreme or is it valid to protect the masses? Is government
monitoring of its own citizens unethical when it’s in the name of national
security? While these questions may fall under legal and ethical issues, they
are ultimately social issues that must be defined and accepted at some level
before enacted as policy.
Further
Research
As we progress into the future of
cyberspace and advancing technology there are many questions that can and will
be asked; can we develop the technology to travel backwards in time or will
there ever be a cure for cancer, but the questions related to cyber warfare
present other questions. Some believe that once the development of a quantum
computer, a computer that relies on quantum mechanics-physics that controls
subatomic particles, the methods of encryption used today will be deemed
completely useless (Shakarian, Shakarian, & Ruef, 2013, pp. 241-243) . While this research
affects the overall future of cyber warfare I believe the immediate future in
research will be the result of increased tracking and locating of
cyber-attackers through the use of better algorithms.
Conclusion
Cyber warfare’s effects on the human
population are both necessary and unnecessary at the same time. The increase in
jobs, technology, and capabilities that result from cyber warfare have
catapulted humanities advancements politically, socially, medically, and
ethically far beyond what may have resulted if ARPANET had never been realized.
Through the evaluation of the pros and cons of cyber warfare we can confirm that
the actions are justifiable defined as a violent act among humankind, but the
effects are also necessary for the continued growth of our species.
Bibliography
Andress, J., & Winterfeld, S. (2011). Cyber
warfare: techniques, tactics and tools for security practitioners. Waltham:
Elsevier. Retrieved from
http://books.google.com/books?hl=en&lr=&id=0oXL2u-Qmy0C&oi=fnd&pg=PP2&dq=cyber+warfare&ots=iPyo96pWGo&sig=-r7vQ6lzsxZbLNKli-7MUHVqO7E#v=onepage&q=cyber%20warfare&f=false
Cyber Warfare: Techniques, Tactics, and
Tools for Security Practitioners is a book authored by Jason Andress and
Steve Winterfeld. Both authors hold extensive background knowledge associated
with cyber security. This book was authored with the intent for educational purposed.
Because the information within this book was authored with the purpose of
education the reliability of the information can be inferred to be highly
reliable.
Defense, D. o. (2011). Department of defense
cyberspace policy report: a report to congress pursuant to the national defense
authorization act for fiscal year 2011, section 934. Washington: Department
of Defense. Retrieved from
http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf
Department of Defense Cyberspace Policy
Report: A Report to Congress Pursuant to The National Defense Authorization Act
for Fiscal Year 2011, Section 934 was authored by the cyberspace division
of the Department of Defense in response to questions asked during a prior
hearing. The information within this document was presented to the
congressional committee as a formal doctrine outlining the support for the
approval of the policy update. Because the information was authored for office use
in the United States government the information involved maintains the
implication of high reliability and validity.
Schmitt, M. N. (2013). Tallinn manual on the
international law applicable to cyber warfare. New York: Cambridge
University Press. Retrieved from http://books.google.com/books?hl=en&lr=&id=FujYDXdOMQgC&oi=fnd&pg=PR1&dq=cyber+warfare&ots=M1nSFuO1Qt&sig=DzNrGNG5KiNNiXKXIWVLXdlIMyk#v=onepage&q=cyber%20warfare&f=false
Tallinn Manual on The International Law
Applicable to Cyber Warfare was authored by twenty international law
scholars and practitioners to better clarify and consolidate the international
laws relating to cyber warfare. This book addresses the offensive and defensive
operations and capabilities a State holds while conducting cyber warfare. Based
on the nature of the authors combined experience and knowledge levels the
information presented within this book offers an understanding of high
reliability to the information and implications associated with the overall
topic of cyber warfare.
Shakarian, P., Shakarian, J., & Ruef, A. (2013). Introduction
to cyber-warfare. Waltham: Elsevier, Inc.
doi:10.1016/B978-0-12-407814-7.09991-7
Introduction to Cyber-Warfare holds many
of the same principles and concepts as Cyber
Warfare: Techniques, Tactics, and Tools for Security Practitioners. The
authors of this book also products this works for the purpose of education.
Based on the nature of the purposed usage of this book the reliability and
validity of information can be inferred as high.
Violence.
(2014, July 9). Retrieved from Merriam-Webster dictionary:
http://www.merriam-webster.com/dictionary/violence
Merriam-Webster is a dictionary which
provides readers with detailed descriptions and means of words associated
within a language. The reference used in this work was selected based of the
best association of the definition establish within the work to the concept
discussed within this paper. Based on the nature of this book/website the
information within is can be determined as valid and accurate.
What is SSL? A brief explanation. (2014, July 9). Retrieved from GlobalSign GMO
Internet Group:
https://www.globalsign.com/ssl-information-center/what-is-ssl.html
What
is SSL? A brief explanation is a website reference page associated with
providing reading a clear definitive understanding of the conceptual model of
SSL and TLS functions. While the authors of this site claim to be leaders among
their field of expertise this information maintains a lower level of
reliability because of the understanding that this site is associated with a
commercial company, which works for profits. While this bias is understood the
acceptance of the overall conceptual knowledge is deemed high because of the
established professional expertise of the related field of information.
Who invented the internet? (2013, December 18). Retrieved from History Channel:
http://www.history.com/news/ask-history/who-invented-the-internet
Who
invented the internet? is a webpage produced by the television network History
Channel. The information presented on this page describes a historical record
of the development and evolution associated with the internet known in today’s
standards. Based off of the producers’ intention to present the information in
an unbiased detailed account of the information associated with this event
there is an inference that the information is accurate and reliable as a
source.
No comments:
Post a Comment