Cyber Wars

The Internet is an infinite source of information that our society uses recreationally and professionally. As large organizations are more reliant on the positive aspects of the digital age it is important to analyze the negative abilities of this technology. This week’s, “On the Media” discusses societies vulnerability to cyber attacks as well as President Obama’s recent executive order to secure our networks and infrastructures.

Within the past several years the development of cyber weapons has become increasingly relevant. As stated in The New York Times, an article written by Norman Asa, in 2010 a worm called “Stuxnet” was developed by the United States and Israel in order to targeted Iran’s nuclear operations. The cyber attack on Iran’s nuclear Nutanz plant destroyed 1,000 out of 5,000 centrifuges. Additionally, the United States also used  “The flame”, a virus developed for data mining that obtained private information from Iranian officials. These intricate codes have proved to be capable of physical destruction and advanced data mining; so how can this affect us?

Recently, the United States has been accused of developed a worm called the “Bug.” This “Bug” is responsible for once again destroying centrifuges in Iran. It is an complex design that is difficult to detect and slowly destroys infrastructures from within. Additionally it has the ability to send messages to the control panel of a structure that creates an illusion of properly functioning equipment. After “The Bug’s” most recent attack it demonstrated a defect in the code in which it continued to replicate and destroy infrastructures outside its initial target. This could pose an immanent danger in which a highly destructive code is unable to be contained.

Ultimately Cyber warfare is likely something we will have to prepare for in the future. It is a scary thought knowing a computer worm or virus can now destroy infrastructures. In a sense, it is not very far off from science fiction novels that depict a chaotic world run by robots and computers.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s