Friday, July 25, 2014

Project Blog


 

 

 

Cyber Warfare and its Effects on Us All

Bryan Prewitt

IT103-C01

George Mason University

Friday, July 10, 2014
 

"By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code/. I am fully aware of the following sections of the Honor Code: Understanding the Honor Code, Understanding the Consequences. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://copyright.gmu.edu/?page_id=301 web site."

 

 

 

 

Introduction

Cyber Warfare is an entity that has the potential to leave entire countries in unrecoverable foreign debt; undesired physical warfare; or even worse, completely neutralized by nuclear weapons all by the flick of a sinister switch. The internet, what was once developed to increase the efficiency of laboratories, corporations, military operations, public resources, and even farming has transitioned into another ever developing essence of humanity. This essence of humanity known as violence, defined by Merriam-Webster’s online dictionary as “intense, turbulent, or furious and often destructive action or force” (Merriam-Webster’s, 2014). Throughout this paper there will be compelling evidence to support the notion that the internet has become just another weapon in humanities arsenal against its fellow man. This will be done through a presentation of information in specific sections. These sections will be: background, potential benefits, legal and ethical issues, and future research.

Background

ARPANET, the use of this acronym means everything and nothing to almost anyone you may run into in today’s society; but the Advanced Research Projects Agency Network (ARPANET) was the first concrete version of a connection between two computers for the purpose of sending and receiving information between each other (Who invented the internet?, 2013). What was once an imaginative idea exploded form just wishful thinking and hopes for the future of humanity into what is now known as “the information super-highway,” but, much like any other entity connected to humanity, so did the effects of hostility and disseat; these effects can be characterized as “cyber warfare.” While the definition of cyber warfare is still facing points of debate the United States Department of Defense (DoD) has given the term cyberspace their best interpretation of the term:

 “The DoD (Joint Publication 3.0 Joint Operations 17 September 2006 Incorporating Change 2, 22 March 2010) defines cyberspace as a global domain within the information environment. It consists of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Within cyberspace, electronics, and the electromagnetic spectrum are used to store, modify, and exchange data via networked systems. Cyberspace operations employ cyberspace capabilities primarily to achieve objectives in or through cyberspace. Such operations include computer network operations and activities to operate and defend the Global Information Grid” (Andress & Winterfeld, 2011, p. What is Cyber Warfare?).

            Once defining what cyberspace or cyber we are better equipped to create an idea of what cyber warfare truly is, Shakarian et al. (2013) defines cyber war as:  “an extension of policy by actions taken in cyber space by state or nonstate actors that either constitute a serious threat to a nation’s security or are conducted in response to a perceived threat against a nation’s security” (p. 1-8). After defining cyber war, we can deduct with a basic understanding that cyber warfare is the actions of conducting cyber war between two or more populations of people or networks.

Potential Benefits

            While many would suggest that there are no benefits to cyber warfare some would disagree. Because of the actions between multiple parties involved in cyber warfare many job, products, and conceptual ideas have spawned as a result. Some of the basic properties of cyber warfare have generated thousands, if not, hundreds of thousands of job in the areas of research and development of new network security products, distribution of developed products, and the ever helpful service representative that one may deal with when buy or servicing a personal computer. Much like the creation of jobs cyber warfare has created opportunities for developing ideas, the most common concept people can be familiar with is Secure Socket Layer (SSL) and Transport Layer Security (TLS). SSL and TLS are the most common security protocols between two machines operating on a network (What is SSL? A brief explanation, 2014), essentially they are the invisible wire between computer A and computer B that prevent others from intercepting the information for any reason good or bad.

Security Concerns

            Much like the concerns anyone has about one’s family, friend, neighbors, country, and even professional aspects cyber warfare presents major concerns. Concerns associated with cyber warfare can range from the issues associated with a third party while purchasing an item over the internet all the way up to another governmental state unleashing nuclear war upon their enemies through the use of cyber-attacks.

In a 2011 report from the DoD-Cyberspace division to Congress, in support of the National Defense Authorization Act for Fiscal Year 2011, Section 934, the DoD states their main objective is Deterrence. They establish two principles as to how they will deter attacks; the first principle being denying the adversary’s completion of specific objectives, and the second being imposing penalties or reactions so harsh that attackers are presented with no benefit of executing any form of cyber warfare (Defense, 2011, p. 2). While these objects are continuously pursued by our government agencies as well as our allies and even privatized contractors there are legal and ethical concerns that accompany the processes involved.

Legal and Ethical Issues

            Any portion of any policy or action associated with government decision making has faced opposition from someone in some form or fashion. While some issues are able to be resolved through increased understanding of the policy or action others are not. This principle is evident in cyber warfare as much as any other issue. Before being able to understand the reasoning associated with policies relating to cyber warfare there must be an understanding of what can happen if policies or defenses are too weak or incapable of preventing attacks.

2008’s conflict between Russia and Georgia is a prime representation of weak defenses and policies on part of the Georgians, during this conflict Russian attackers were able to disable the media outlets as well as internet capabilities of the entire Georgia population (Shakarian, Shakarian, & Ruef, 2013, pp. 23-32).  Because not all attacks are from a defined governmental body onto another there must be rules and regulations placed to prevent the violation of both individual and political rights.

The Tallinn Manual, international law scholars define the State’s responsibility concerning cyber warfare, “A State bears international legal responsibility for a cyber operation attributable to it and which constitutes a breach of an international obligation” (Schmitt, 2013, p. 29). What this means for both the citizens within a State as well as parties of other States is that any cyber-action that is not justified under laws such as the law of armed conflict or United Nations Charters will be the result of illegal actions by the actor(s) involved. While many there are many laws and regulations such as the one previously listed the issue related prosecution of attackers is presented through the ethical dilemma of individual rights as well as inherent complexity that is cyberspace.

Social Problems

            The social issues relating to cyber warfare are intertwined with the legal and ethical issues of the same nature. While many believe that increased laws and policies present greater protection against cyber-attacks others believe that they are just increased violations of individual rights and freedoms. The greatest social problem associated with cyber warfare is just that, what is considered too much? Is China’s level of cyber censorship too extreme or is it valid to protect the masses? Is government monitoring of its own citizens unethical when it’s in the name of national security? While these questions may fall under legal and ethical issues, they are ultimately social issues that must be defined and accepted at some level before enacted as policy.

Further Research

            As we progress into the future of cyberspace and advancing technology there are many questions that can and will be asked; can we develop the technology to travel backwards in time or will there ever be a cure for cancer, but the questions related to cyber warfare present other questions. Some believe that once the development of a quantum computer, a computer that relies on quantum mechanics-physics that controls subatomic particles, the methods of encryption used today will be deemed completely useless (Shakarian, Shakarian, & Ruef, 2013, pp. 241-243). While this research affects the overall future of cyber warfare I believe the immediate future in research will be the result of increased tracking and locating of cyber-attackers through the use of better algorithms.

Conclusion

            Cyber warfare’s effects on the human population are both necessary and unnecessary at the same time. The increase in jobs, technology, and capabilities that result from cyber warfare have catapulted humanities advancements politically, socially, medically, and ethically far beyond what may have resulted if ARPANET had never been realized. Through the evaluation of the pros and cons of cyber warfare we can confirm that the actions are justifiable defined as a violent act among humankind, but the effects are also necessary for the continued growth of our species.

Bibliography

Andress, J., & Winterfeld, S. (2011). Cyber warfare: techniques, tactics and tools for security practitioners. Waltham: Elsevier. Retrieved from http://books.google.com/books?hl=en&lr=&id=0oXL2u-Qmy0C&oi=fnd&pg=PP2&dq=cyber+warfare&ots=iPyo96pWGo&sig=-r7vQ6lzsxZbLNKli-7MUHVqO7E#v=onepage&q=cyber%20warfare&f=false

Cyber Warfare: Techniques, Tactics, and Tools for Security Practitioners is a book authored by Jason Andress and Steve Winterfeld. Both authors hold extensive background knowledge associated with cyber security. This book was authored with the intent for educational purposed. Because the information within this book was authored with the purpose of education the reliability of the information can be inferred to be highly reliable.

Defense, D. o. (2011). Department of defense cyberspace policy report: a report to congress pursuant to the national defense authorization act for fiscal year 2011, section 934. Washington: Department of Defense. Retrieved from http://www.defense.gov/home/features/2011/0411_cyberstrategy/docs/NDAA%20Section%20934%20Report_For%20webpage.pdf

Department of Defense Cyberspace Policy Report: A Report to Congress Pursuant to The National Defense Authorization Act for Fiscal Year 2011, Section 934 was authored by the cyberspace division of the Department of Defense in response to questions asked during a prior hearing. The information within this document was presented to the congressional committee as a formal doctrine outlining the support for the approval of the policy update. Because the information was authored for office use in the United States government the information involved maintains the implication of high reliability and validity.

Schmitt, M. N. (2013). Tallinn manual on the international law applicable to cyber warfare. New York: Cambridge University Press. Retrieved from http://books.google.com/books?hl=en&lr=&id=FujYDXdOMQgC&oi=fnd&pg=PR1&dq=cyber+warfare&ots=M1nSFuO1Qt&sig=DzNrGNG5KiNNiXKXIWVLXdlIMyk#v=onepage&q=cyber%20warfare&f=false

Tallinn Manual on The International Law Applicable to Cyber Warfare was authored by twenty international law scholars and practitioners to better clarify and consolidate the international laws relating to cyber warfare. This book addresses the offensive and defensive operations and capabilities a State holds while conducting cyber warfare. Based on the nature of the authors combined experience and knowledge levels the information presented within this book offers an understanding of high reliability to the information and implications associated with the overall topic of cyber warfare.

Shakarian, P., Shakarian, J., & Ruef, A. (2013). Introduction to cyber-warfare. Waltham: Elsevier, Inc. doi:10.1016/B978-0-12-407814-7.09991-7

Introduction to Cyber-Warfare holds many of the same principles and concepts as Cyber Warfare: Techniques, Tactics, and Tools for Security Practitioners. The authors of this book also products this works for the purpose of education. Based on the nature of the purposed usage of this book the reliability and validity of information can be inferred as high.

Violence. (2014, July 9). Retrieved from Merriam-Webster dictionary: http://www.merriam-webster.com/dictionary/violence

Merriam-Webster is a dictionary which provides readers with detailed descriptions and means of words associated within a language. The reference used in this work was selected based of the best association of the definition establish within the work to the concept discussed within this paper. Based on the nature of this book/website the information within is can be determined as valid and accurate.

What is SSL? A brief explanation. (2014, July 9). Retrieved from GlobalSign GMO Internet Group: https://www.globalsign.com/ssl-information-center/what-is-ssl.html

What is SSL? A brief explanation is a website reference page associated with providing reading a clear definitive understanding of the conceptual model of SSL and TLS functions. While the authors of this site claim to be leaders among their field of expertise this information maintains a lower level of reliability because of the understanding that this site is associated with a commercial company, which works for profits. While this bias is understood the acceptance of the overall conceptual knowledge is deemed high because of the established professional expertise of the related field of information.

Who invented the internet? (2013, December 18). Retrieved from History Channel: http://www.history.com/news/ask-history/who-invented-the-internet

Who invented the internet? is a webpage produced by the television network History Channel. The information presented on this page describes a historical record of the development and evolution associated with the internet known in today’s standards. Based off of the producers’ intention to present the information in an unbiased detailed account of the information associated with this event there is an inference that the information is accurate and reliable as a source.

 

No comments:

Post a Comment