12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Conclusion and the Futureof <strong>Cyber</strong> <strong>Warfare</strong>This book explored many of the major incidents of cyber warfare over the past decade.Prior <strong>to</strong> the year 2000, cyber warfare was theorized about, but there was little indication(at least in the public discourse) that it actually occurred. During the late 1990s and early2000s, detrac<strong>to</strong>rs even claimed cyber warfare would never amount <strong>to</strong> a serious threat. Sincethen, incidents such as the Russia-Georgia war of 2008, the theft of UAV video feeds publicizedin 2009, the accounts of Stuxnet in 2010, and Anonymous’ support of the Arab Spring in2011 seem <strong>to</strong> have shifted the debate on cyber warfare from “Is cyber war important?” <strong>to</strong>“What should we do about cyber war?” One thing we learned while writing this book is thatmany attacks that were theorized about in the 1990s were realized just over a decade later. Wehave examined how the Internet plays a part in real-world conflicts from governments’ use ofthe Internet as propaganda <strong>to</strong>ol (Chapter 4) or <strong>to</strong> curb internal discord (Chapters 5 and 7) <strong>to</strong>the support of physical operations on the ground (Chapters 3 and 10). Nevertheless, the employmen<strong>to</strong>f the Internet as means <strong>to</strong> political ends is not limited <strong>to</strong> nation states and theirofficial institutions. Most notably, the Internet crusades of the Anonymous collective and variousaffiliates come <strong>to</strong> mind. In Chapter 6, the reader caught a glimpse of the consequences ofemerging global, border-transgressing online social networks. Albeit highly prominent in thepast 2 years, it is merely the amplification of the global citizen, who now is more able than ever<strong>to</strong> voice his/her discontent over matters far removed from his/her actual home base. The inherentdangers of the global interconnectedness, which is unfortunately only slowly enteringthe body of common knowledge, are highlighted in mostly criminal and <strong>to</strong> a lesser extent politicallymotivated social network exploitations. We outline the most prominent mechanismthat makes such an endeavor likely <strong>to</strong> be highly successful in Chapter 9 with the outline of theRobin Sage experiment. In 2012, 34% of the world population finds itself in the favorable position<strong>to</strong> have Internet access—a growth of more than 500% since December 2000. In this book,we were able <strong>to</strong> <strong>to</strong>uch only marginally how the use of social media by ordinary citizens of thisworld is quickly gaining in its potential <strong>to</strong> change the world (Chapters 2 and 5). Moreover, itcan be alleged that we focused on the organized, concerted efforts that significantly s<strong>to</strong>od outin the successfulness of their operation—alas, reports about most of them can be found inpopular media outlets. Thus, later chapters (Chapter 8, and all the chapters in Part 3) describeimminent and possible future threats <strong>to</strong> industrial control systems and other industrial infrastructure.Here we dedicate an entire chapter (Chapter 13) <strong>to</strong> the highly sophisticated wormStuxnet, which apparently was meant <strong>to</strong> curb the enrichment of Uranium at Iran’s primaryproduction site—a large high-security site with underground structures that house the cascadehalls.241

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!