International organizational feuds: acts of aggression?
In this paper I will take an in depth look at recent state sanctioned Chinese cyber-attacks against United States organizations and agencies. These attacks have had profound effects, ultimately altering structures and processes. Government officials are calling for millions of dollars in training and defense measures, while many are now becoming aware of a new type of threat. The inter-organizational relationships, external environment, and ecosystem have also been denaturized. I will also take a look at scholarly definitions of war and how they may be applied to the issue at hand. Finally, I will examine the United Nation’s doctrine and deem whether these attacks should be considered aggressive acts made by China, and what may result.
Before state sanctioned cyber-attacks against U.S. organizations, infrastructure, and government can be analyzed, the concepts and environment surrounding the issue must be explored. These concepts include the traditional theoretical views of war and armed conflict, the current definitions of cyber-warfare, and the relationship of armed conflict and law in the changing landscape of the twenty-first century. Many of these concepts are still actively debated today due to building and breaking of relationships, evolving nature of cyber warfare, and the dynamism phenomenon or state of the environment, which Daft (2016) defines as “stable or unstable, simple or complex” (p.146). In
The most recents detections of how cyber warfare is inevitably coming was the accusations of Russia hacking the the Democratic National Committee and former Secretary of State Hillary Clinton’s email’s releasing damaging evidence against them which ultimately lead to Donald Trump being named the President of The United States (Diamond, 2016). The effects of cyber warfare have leaked over in to televise series, forming shows such as CSI cyber, and the gaming world, Call Of Duty Infinite Warfare. Neglect regarding cyber security can: undermine the reputation of both the government and elected officials; force unacceptable expenditures associated with the cost of cleaning up after security breaches; cripple governments' abilities to respond to a wide variety of homeland security emergency situations or recover from natural or man-made threats; and disable elected officials' ability to govern (Lohrmann, 2010). Classified information such as overseas operators and attacks, missile locations, response plans and weaknesses, and much more cripples America’s ability to defend itself from enemies both foreign and domestic. To combat cyber terrorism is the Cybersecurity Information Sharing Act, or CISA. In an article titled “Why Cybersecurity Information Sharing Is A Positive Step for Online Security” it is discussed that under CISA, the Department of Homeland security will have more responsibility for domestic cybersecurity. CISA’s fundamental purpose is to better enable cybersecurity information to be shared between the private and public sectors (2016). The sharing of threat information between public and private sectors can give the the United States a head start by allowing them to share information rapidly and more often to combat enemy threats while still providing safety for privacy and civil
The book “Conquest in Cyberspace” went in depth on the United States’, Russia’s, and China’s views on information warfare and cyber warfare. It also discussed the areas where their policies, guidance, and operations differ and are the same. One of the most interesting things which I noticed in the completion of this assignment is how the United States has the most well defined and in depth policies and governances regulating their information warfare and cyber warfare operations and how both China and Russia has taking the policies and governances created by the United States and mimicked them in the creation of their own policies and governances for information
In a documentary by Admiral Vern (2002), “the events of September 11, 2001 tragically illustrated that the promise of peace and security in the 21st Century is fraught with profound dangers”. The US foreign policies and interest in key geographic regions of the world sparks controversies resulting in state funded cyber attacks, cyber espionage and terrorism against the United States and its allied nations. When several attempts to cripple the United States and its allied nations through negotiations failed, enemy states and nefarious groups have shifted their focus to cyber attacks and cyber espionage. According to Gady (2016), “China continues cyber espionage against the United States”. Drezner (2014), “Washington and Beijing hardly agree on everything, but they agree on the big things, like maintaining an open global economy, reducing the likelihood of a military confrontation, and tackling climate change”.
Each viewpoint, the hawk, the dove, and the internationalist base their consequent arguments on the perceived current political and moral position of the United States regarding international cybersecurity. Similar to relations between the USSR and the US, the rhetoric between the United States and China draws from the tensions surrounding superpower military supremacy and moral imperatives. Between the hawkish, dovish, and internationalist perspectives, the themes of American military and moral power persist.
Today however, a new type of warfare has emerged and occurs when outside entities conduct an attack on a power grid, network, or both with the intent of causing damage. This type of warfare is called cyber warfare. In the United States computers control everything. It is no secret that hostile countries and terrorist organizations are cognizant and they know our economy, security, and infrastructure can be crippled by a successful cyber-attack. Examples of potential targets for cyber terrorists include military bases, water systems, banking facilities, air traffic control centers and power plants. Even the Commander in Chief, President Obama has stated the threat of a cyber war is real and we must prepare for it and increase our security measures. First, this paper will discuss cyberterrorism and cyber-attacks as they pose a direct threat to national security and the economy. Then, we will review cyber-attacks against the U.S. from China, Iran, and Russia along with the impact and possible ramifications from those attacks. Finally, this paper discusses U.S. strategies to minimize the impact of cyber-attacks.
Hypothesis: The United State’s foreign policy will make a shift in the coming years to focus more intently on suppressing individual groups that use terrorism as a political strategy, rather than focusing on specific and identifiable States as in the past. The organizations mentioned before will be using the Internet to coordinate attacks, as well as attempt to hack US Government systems to their advantage. As a result, cyber security and antiterrorism stand to be the biggest future challenges for American foreign policy.
Pfleeger, S. Pfleeger, and Margulies (2015) outline possible examples of cyber warfare between Canada and China (p. 844). According to Pfleeger, S. Pfleeger, and Margulies (2015), “the Canadian government revealed that several of its national departments had been victims of a cyber attack…” (p. 844). Eventually, the attack was unofficially traced to a computer in China (p. 844). Cyber warfare can be used negatively and positively. It is evident that China was seeking to gain protected information form Canada. Although a purpose of cyber warfare, it is not a conventional way of obtaining information. Additionally, cyber warfare can be used to collect intelligence on an enemy. Anyone seeking to gather intelligence on another individual or group can launch a cyber attack that gains access to protected files. This could be used to help future militant operations or expose critical information. Lastly, cyber warfare can be used to test systems internally. Acting with no malicious intent, “insiders” can utilizing cyber warfare tactics to attack their own cyber security barriers in order to test the strength of their systems. Seeking to expose the vulnerabilities in a system that contains important assets without actually harming the assets provides the system a diagnosis of what needs to be strengths and fixed. Identifying the problem or threats before an actual attack can ultimately save the protected
The JIE considers that the future security environment will continue to feature a range of adversaries attempting to shape political behavior by conducting damaging or disruptive cyber-attacks. This is a consequence of the globalization and cannot be stopped, however timely contention is needed. The Joint Force must minimize the consequences of threatened or successful cyberattacks against the United States, its allies, and partners by conducting Military Support to Cyber
In order to properly answer the question posed we must first define what cyber-war and cyber-terrorism are. The Oxford Dictionaries defines cyber-war as “The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of communication systems by another state or organization:” Although there is no dictionary definition of cyber-terrorism, The Center for Strategic and International Studies (CSIS) has defined it as “the use of computer network tools to shut down critical national infrastructures (e.g., energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” The author defines cyber terror as “the intimidation of civilian enterprise through the use of high technology to bring about political, religious, or ideological aims, actions that result in disabling or deleting critical infrastructure data or information.”
In this paper I will take an in depth look at the recent state sanctioned Chinese cyber-attacks against United States organizations and agencies. These attacks have had profound effects, ultimately altering structures and processes. Government officials are calling for millions of dollars in training and defense measures, while many are now becoming aware of a new type of threat. The inter-organizational relationships, external environment, and ecosystem have also been denaturised. I will also take a look at scholarly definitions of war and how they may be applied to the issue at hand. Finally, I will examine the United Nation’s doctrine and deem whether these attacks should be considered aggressive acts made by China, and what may
Cyber security is a major concern for every department, business, and citizen of the United States because technology impacts every aspect of our daily lives. The more we use technology the more complacent, we get with the information that is stored within our cyber networks. The more complacent, we get, the more vulnerable we become to cyber-attacks because we fail to update the mechanisms that safeguard our information. Breaches to security networks are detrimental to personal, economic, and national security information. Many countries, like Russia, China, Israel, France, and the United Kingdom, now have the abilities and technology to launch cyber-attacks on the United States. In the last five years there have been several attacks on cyber systems to gain access to information maintained by major businesses and the United States Government. Cyber-attacks cause serious harm to the United States’ economy, community, and the safety, so we need to build stronger cyber security mechanisms. Based on my theoretical analysis, I recommend the following:
For thousands of years warfare remained relatively unchanged. While the tactics and weapons have changed as new methods of combat evolved, men and women or their weapons still had to meet at the same time and place in order to attack, defend, surrender or conquer. However, the advent of the of the internet has created a new realm of combat in which armies can remotely conduct surveillance, reconnaissance, espionage, and attacks from an ambiguous and space-less digital environment. Both state and non-state actors have already embraced this new realm and utilized both legal and illegal means to further facilitate their interests. What complicates cyber security further is as states attempt to protect themselves from cyber-warfare, private
Most nations today fear terror attacks that include bombing use of reinforcements like machines guns and other firearms. This is because terror attacks most of the times leave many people dead and others disabled while others are left without families. However, there is another attack today in many nations that can be destructive like a terror attack and this is the cyber-attack and threats. Cyber-attacks can be responsible for large mass destructions by making all systems connected to cyber networks fail to work (Rhodes 20). An example is the Morris worm that affected the world cyber infrastructures and caused them to slow down to a position of being impractical. Therefore, as a result of these cyber-attacks resources are being established and designed to help counter the attacks.
A lot of opinions and meanings has been given to the word “Cyberterrorism”. Some of these meanings and definitions varies. In this light, Gordon and Ford (2003) are concerned that when 10 people define cyberterrorism and nine of the given answers are different, and these 10 people represent different government agencies tasked with safeguarding national assets and infrastructure, then it becomes a critical issue.
Cyber warfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and cripple financial systems -- among many other possibilities (definition of cyberwarfare) “.The Tech Target definition includes no reference of nation states. That is because cyber warfare has such a low barrier to entry, a teenager can effectively shut down or damage thousands or millions of dollars of digital infrastructure, something that a real world counterpart would take years to plan, would take weeks, and the only tools needed are a mouse, keyboard, and some type of motivation. Cyber warfare is constantly evolving, constantly becoming more of a threat and is, in fact, being employed right now as this sentence is being read.