• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

TECHi

Fresh daily technology news

  • Mobile
  • Technology
  • Gadgets
  • Apple
  • Google
  • Offbeat
  • Gaming
  • Microsoft
  • Lifestyle
TechEngage » Offbeat

Global cyberwarfare is civilization’s greatest threat

Avatar of JD Rucker JD Rucker Updated: July 2, 2022

Cyberwarfare

The depths to which cyberwarfare has grown is one of the most controlled and guarded secrets in most of the major governments around the world. The United States, China, Israel, Russia, England, Japan, Iran, Germany – these are just some of the countries that have been revealed to be researching and participating in “cyberops” over the last few years. It can be assumed that what we know doesn’t even scratch the surface.

A recent revelation that the NSA’s “Perfect Citizen” program is designed to explore both defensive and offensive tactics surrounding energy infrastructure and the cyberattacks that can cripple them gives us an idea about a single direction that global cyberwarfare are heading. They understand that the vulnerabilities are countless. What they don’t tell us directly in the heavily redacted 190-page document that the Electronic Privacy Information Center (EPIC) obtained through the Freedom of Information Act is that their greatest fear isn’t what hackers could do through internet connections but what average US citizens employed at the facilities could inadvertently do to bring a crippling worm into a sensitive computer system.

It’s hard enough to find the culprits. What’s worse is that anyone with a smartphone or a flash drive could help take down a portion of the electric grid, for example, without even knowing what they had done. Iran learned this the hard way when the US and Israel infected the software driving over 1000 centrifuges with Stuxnet.

 

Herding cats: the impossibility of real safeguards

The biggest problem facing agencies like the NSA, the US military’s Cyber Command, and their counterparts around the world isn’t in understanding how to protect against cyberattacks. It’s that the systems on which nearly everything has been built are antiquated and vulnerable, making it a logistics nightmare to put in the proper safeguards. There are simply too many points of entry available right now for a clever individual to cry havoc and let slip the worms of cyberwar, let alone what organizations or government agencies could do.

In October, President Obama signed a secret document known as Presidential Policy Directive 20. It outlines a the procedures for clearance and gives a guideline for the protocols that can be followed in different situations where the security of both government and private networks are at risk of breach. It covers both defensive and offensive operations; they have the power to not only act within the networks but to also “cut the lines” when a breach is imminent or in progress.

“What it does, really for the first time, is it explicitly talks about how we will use cyber-operations,” a senior administration official said. “Network defense is what you’re doing inside your own networks. . .  Cyber-operations is stuff outside that space, and recognizing that you could be doing that for what might be called defensive purposes.”

If Stuxnet proved anything, it’s that anything is vulnerable. A similar attack could be carried out on the electric grid, water purification plants, air traffic control systems, and any number of high-value targets that have less security and more access points than Iran’s nuclear program. To close all points of entry into critical systems is nearly impossible for small areas such as cities, let alone for entire countries.

 

The dominoes of chaos

For better or for worse, the world is plugged in. The people in most developed nations have become reliant on certain levels of infrastructure. For example, when hurricane Sandy pummeled the east coast and caused widespread power outages, it took efforts from across the country and around the world to maintain order and assure that the long term toll was minimized.

Imagine what a sustained power outage across several states would do.

Sandy was anticipated. We saw it coming days before it hit. With a cyberattack, infrastructure can be crippled instantly. The one thing that keeps outages caused by known natural events from escalating to chaos is preparation of some sort by most who will be affected. Imagine if an area is hit and nobody saw it coming. Imagine if the hit is so severe that restoring the infrastructure component isn’t a matter of days or even weeks, but months. These are all very real potential scenarios.

In such an circumstance, the dominoes of chaos would likely kick in. As people in the affected area start to realize that their situation is not going to improve, they will resort to measures of self-preservation. They may leave and cause a swelling of need in unaffected areas. They may stay and either participate in or become the victim of crimes that spawn from perceived needs.

Fear would take hold in the unaffected areas. What if they were next?

In The Dark Knight, the Joker said something that could possibly ring true if a major cyberattack was enacted on a large area in a developed country. “They’re only as good as the world allows them to be. I’ll show you; when the chips are down these uh, these civilized people; they’ll eat each other.”

More than the threat of nuclear attacks during the height of the cold war, more than an outbreak of a deadly super virus, more than meteor strikes or alien invasions or biological attacks, cyberwarfare looms as the single greatest threat to the current state of civilization. Technology has helped us to overcome many of the challenges that our forefathers faced, but it has also made us vulnerable to man-made disasters in the various grids that support our lives.

* * *

“Cyberwarfare” image courtesy of Shutterstock.

This post was orginally published on: December 25, 2012 and was updated on: July 2, 2022.

Related Tags: cyberwarfare Electronic Privacy Information Center Iran israel Japan Nuclear program of Iran Perfect Citizen Shutterstock stuxnet United States

Related Stories

  • Tiltor rewards protesters for being non-violent

  • Kinect

  • Star Wars snow board choppers and R2-D2 helmet

Avatar of JD Rucker

JD Rucker

JD Rucker is Editor at Soshable, a Social Media Marketing Blog. He is a Christian, a husband, a father, and founder of both Judeo Christian Church and Dealer Authority. He drinks a lot of coffee, usually in the form of a 5-shot espresso over ice. Find him on Twitter, Facebook, and Pinterest.

Reader Interactions

Share Your Thoughts Cancel reply

Please read our comment policy before submitting your comment. Your email address will not be used or publish anywhere. You will only receive comment notifications if you opt to subscribe below.

Primary Sidebar

Recent

  • Swedish companies are leading the charge on autonomous vehicles
  • Google and Huawei might be working on a new tablet
  • Apple is purging hundreds of thousands of apps from the App Store
  • Can video games help autistic children improve their social skills?
  • Chicago tried and failed to use big data to predict crimes

Things to do on TECHi

Reviews – Browse Product Reviews
Deals – Checkout latest Tech Deals
News – 24x7 Technology news
Tech Guides – Technological How to Guides

Copyright © 2023 · All Rights Reserved · TECHi™ - Fresh daily technology news, editorials and reviews.
Techi® is a registered trademark in United Kingdom under Trademark Number UK00003417167.

  • About us
  • Advertising
  • FAQs
  • Disclaimer
  • Contact us