Examples of War in Cyberspace
There are various types of wars being fought in cyberspace from
information warfare to activating missiles through cyberspace. Methods
used in cyberwar is not a new form of warfare being witnessed in the
21st century but a strategic method of warfare fought in cyberspace
with the advancement and development of telecommunication technology
and satellite navigation. The idea of organising in networks and
gathering information to attack may have been taken from ancient
military dynasties. According to Arquilla and Ronfeldt1, the ancient
military force the Mongols in 1241 fought accordingly to the
principles of cyberwar. The idea was to have absolute command of
battlefield information, ‘they fought like organised networks rather
then a hierarchy’. Arquilla and Ronfeldt1 also argue that the warfare
adopted by the combined forces of North Vietnam and Viet Cong which
defeated the modern superpower United States of America was due to
them operating like networks than an institution.
The Second World War and the use of the enigma machine to intercept
and crack codes are examples of war in cyberspace, the cold war fought
by the allies against the communists regime was a war without a
physical battle field but a war of controlling information and
manipulating it for the purpose of propaganda. The term ‘war’ doesn’t
necessarily imply that the war is a physical war in cyberspace because
cyberspace is a virtual space, it is not tangible hence the method of
warfare is unconventional to battles fought with soldiers and tanks.
To simplify it even more one can say it is a ‘war of controlling
information’ or attacking...
... middle of paper ...
...trol, communication
and intelligence and trying to locate, read, surprise and deceive the
enemy.
Bibliography
Andrew Rathwell 2002
Information warfare and sub state actors, an organisation approach
Cybercrime 2002
Law enforcement, security and surveillance in the information age
Edited by Douglas Thomas and Brian Loader
Routledge
Internet sites
1.
http://www.rand.org/publications/randreview/issues/RRR.fall95.cyber/cyberwar.html
Excerpted from Cyber War Is Coming, by John J. Arquilla and David F.
Ronfeldt, in Comparative Strategy, Vol. 12, pp. 141-165, 1993.
2. http://news.bbc.co.uk/1/hi/world/asia-pacific/965344.stm
3. http://www.afsa.org/fsj/sept00/Denning.cfm
4. http://news.bbc.co.uk/2/hi/business/3457823.stm
5. http://newswww.bbc.net.uk/1/hi/technology/4105007.stm
The pros of electronic surveillance are extensive. The ability for agents of the United States Intelligence Community (IC) to intercept and process communications and information from foreign powers, agents of foreign powers, international terrorist organizations, and others who seek to engage in activities with such groups, provides the ...
Trahair, R. C., & Miller, R. L. (2009). Encyclopedia of Cold War espionage, spies, and secret operations (1. pbk. ed.). New York: Enigma Books.
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital Crime and Digital Terrorism 2nd edition. Upper Saddle River, New Jersey: Prentice Hall.
All of Sun Tzu’s strategies in The Art of War have been adopted by American businesses in order for them to be successful. Chapter one of The Art of War is “Laying Plans” which has five fundamental factors: the moral law, heaven, earth, the commander, and method and discipline. In business the moral law means one’s mission or goal. Heaven compares to outside forces such as the market and dependencies. Earth would be the scene of action such as people, place, product, and process included in production. Commander is leadership like a sponsor or a bachelor of arts. Method and discipline are the guiding principles similar to business ethics, laws, and policies. Sun Tzu said, “These five heads should be familiar to every general; he who knows them will be victorious; he who knows them not will fail” (Tzu 2). Basically, what this means and how businesses relate to it is that before one does anything one evaluates all business options.
One of the longest lasting debates in the United States is the struggle to balance freedom and safety. Throughout history there have been instances were freedoms have been suspended- whether for the better or worse- because the United States was in a time of crisis. The Quasi War against the French, the Civil War, and the First World War were events where presidents found themselves under fire because of their controversial suspension of certain constitutional rights. Should certain freedoms be curtailed in times of crisis? This debate has always been so controversial because there has never been a majority one way or another. There have always been people for suspending freedoms to preserve safety and at the same time there have always been people that have believed that freedom is ultimately more important than safety.
Warfare is a prominent theme in Beowulf . The reasons and conduct for and during warfare are mentioned and displayed throughout the poem. The reason for warfare is usually for retribution. As an act of revenge, battles are fought. The conduct is also very standard and prevalent. All warfare fought by honorable men had to be fought fair. If the opposing side bore no weapons, then the other side also used no weapons. The author of this poem depicts himself/herself to be an advocate of warfare. By idolizing Beowulf because of his heroic deeds during warfare, the poet makes armed conflict courageous and noble.
More than two thousand years ago, a Chinese strategist known as Sun Tzu wrote one of the enduring classics of military theory. Most likely written during a period of Chinese history referred to as the ‘Warring States’ period, Sun Tzu’s The Art of War has continued to be studied by military strategists for millennia. Even today, The Art of War is required reading for Naval Officer Candidates. At nearly the same time in the fourth century B.C., the Greek city-states were facing invasion from the mighty Persian army. Vastly outnumbered, the Greeks eventually triumphed by defeating their enemies at Plataea, but not before fighting one of history’s greatest military stands at Thermopylae. By using Sun Tzu’s classic text to analyze the battles of Thermopylae and Plataea, it is possible to gain a better understanding not only of the battles themselves, but also of the reasons why The Art of War has remained such an influential and respected text over the centuries.
Science fiction never ceases to amaze me as I take great enjoyment in exploring these creative universes. I have always had a great interest in military science fiction for its take on technological innovation and critical analysis. Military science fiction in general is very speculative about future of technology and warfare. The military science fiction genre also serves as a critique of contemporary politics as it deals with many of the same issues that go on today. This has made military science fiction one if the most well respected genres of science fiction for it ability to indirectly criticize modern society. My Integrated Project explores the relationship between how technology that has arisen from war has been some of the most innovative and why war has become an unshakeable aspect of human existence.
New York Times, p. 1. http://www.nytimes.com/2009/09/09/business/economy/09leonhardt.html?_r=1 Lipman, Marc. A. A. Personal Interview. March 21, 2010. Marano, Hara E. (2004).
“The trouble is that a praise worthy quest for precision can descend into a flattering of tidy minds at the cost of a realistic grasp of the complexity and interconnectedness that is the story of strategic history.” Colin Gray warns in the opening sentences of the chapter “Irregular Warfare and Terrorism” in his book Another Bloody Century of the dangers of oversimplifying the categories of warfare. To look at warfare as either regular or irregular without being absolutely clear on the definitions of each and the context in which the terms are used is fruitless. Regular forces have been known to use irregular type tactics just as irregular forces have used conventional warfare to reach their political goals. It is imperative then, that the U.S. military forces are trained to fight wars falling on a spectrum of warfare and educated to distinguish the type of war they face. In order to protect national security interests as outlined in the 2014 Quadrennial Defense Review, the U.S. armed forces must rebalance and be capable of conducting operations across the spectrum of conflict in order to win against both a regular and irregular adversary, combating a wide scope of tactics and strategies ranging from terror tactics to full scale, multi-phased conflict against a peer or near peer by maximizing the capability of the force and nation.
Technology changes every day, sometimes the events in our life shape what new technology we use. You would have to be living in a hole not know that we are in conflict with Iraq, and this event has changed digital warfare.
Out of the eight country, Singapore, Hong Kong, Taiwan and South Korea were known as “Asia’s Four Little Dragon” along with Japan has modern it industry in rapid growth after World War II, (Ezra F, 1991).
In today's society, many aspects of crime are committed on a regular basis. Civilians take advantage of people all the time using online resources such as fraudulent websites requiring credit card information to get a free monthly trial. Other examples of cyber crimes include online chat websites, full of predators, or websites needing a downloadable program that contains a hacking virus. Sadly, there are many cases of cyber crime all over the internet. The acts of cyber crimes are considered violent acts like any other.
Information Warfare is an innovative and dangerous new way to harm your opponents. When one thinks of warfare the mind is usually bombarded by thoughts of M16’s, grenades, and hand to hand combat. In this new era of technology that we are living in warfare has come to mean so much more. Information warfare is the use of any type of information used to injure your opponent’s progress and further your own. The power of Information Warfare spans a broad scope of uses, from the gathering information about companies, to personal blackmail. It’s used not only by individuals against other persons, but companies and even the nation as well. As the third wave, defined by Tofflers, becomes more widely spread across the nation and world we can only expect a far larger usage of such technological tactics, being used in the home, workplace, and even international politics. Schwartau’s definition of Information Warfare is, “the use of information, and information systems as both weapons and targets in a conflict,'; (Schwartau 12). We are now living in a time when knowledge is power, and what is knowledge made up of? Quite simply, information.
It is difficult to define cyberculture because its boundaries are uncertain and applications to certain circumstances can often be disputed. The common threads of defining cyberculture is a culture which has evolved and continues to evolve from the use of computer networks and the internet and is guided by social and cultural movements reflective of advancements in scientific and technological information. It is not a unified culture but rather a culture that exists in cyberspace and is a compilation of numerous new technologies and capabilities, used by diverse people in diverse real – world locations. Cyberculture, a twentieth century phenomenon, has brought challenges unlike any other that the United States has seen in the areas of cyber security and its impact on our most critical institutions. This presentation will focus on the aforementioned three entities where national security is in jeopardy, in part due to cyberculture and its intentional use for disruptive and destructive purposes.