blog




  • Essay / Cyberwar: the past, present and future - 1937

    The branches of the military, for several generations, have always been the Army, Navy, Air Force, Marine Corps and the Coast Guard; However, in an ever-changing digital world, the idea that space is the next military front is quickly being replaced by the idea that cyberspace will be the next arms race. The United States defends its infrastructure day after day, night after night, when a hacker on one side of the world sleeps, another takes his place to try to compromise the American government. Motivations can range from a political "hacktivist" trying to prove something, to an economic spy trying to gain a competitive advantage over newer rivals, to an attempt to control the United States' "smart" power grid. United, giving a nation an advantage in the event of external armed conflict. With all of these types of conflicts happening at once, relentlessly, and becoming more complex every day, the United States must step up its game to survive, and the government plans its cyber strategy accordingly. On November 16, 2011, according to an unclassified cybersecurity bulletin, the United States government will authorize offensive cyber retaliation for the first time, something China has done for years; the US retaliatory order must, however, include an approval from the President (Parnell). The United States government said it is currently working on cyber rules of engagement for this new “Domain” battle, as it calls it. Governments around the world are preparing for it, but the definition of cyberwar is a little fuzzy. Richard A. Clarke defined it in 2011 in his book Cyber ​​War as "the actions of a nation-state to penetrate another nation...... middle of paper...... -saviors of war." Taken from www.theregister. co.uk: http://www.theregister.co.uk/2011/11/29/bruce_schneier_cyber_war_hype/Staff, CW (nd). 19-year-old arrested for hacking Sony, London police say Extract from CNN: http. ://articles.cnn.com/2011-06-21/world/uk.sony.hack.arrest_1_sony-pictures-denial-of-service-attacks-website?_s=PM:WORLDStrohm, C. (nd). Encouraged to share cyber threats with the United States under Bill. Retrieved from Bloomberg: http://www.businessweek.com/news/2011-12-01/companies-urged-to-share-cyberthreats-with-us-under-bill.html William. J. Broad, J.M. (n.d.). Israeli test on worm called crucial in Iranian nuclear delay Extracted from the New York Times: http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html? pagewanted=allwww.alexa.com/telegraph.co.uk# (undated). Retrieved from www.alexa.com: http://www.alexa.com/siteinfo/telegraph.co.uk.#