Some of the potentially greatest threats to our national security revolve around that of a computer network. These networks are vulnerable to human error, negligence, and internal sabotages. In the years of 2014 and 2015 the United States Intelligence Community’s threat assessment placed cyber security as the top priority. External attacks on computer mainframes and data networks that contain critical intelligence are being recognized as the nation’s most vulnerable weakness and steps must be taken to combat the threat of the digital age. I predict that the weakest link to cyber security is not policy or macro-cyber protection efforts, but actually on an individual personnel level. Thus, I propose the idea of a physical line of defense consisting of counter-cyber personnel. This paper will attempt to analyze the nature of cyber security and how cyber attacks can pose a threat to national security. I will also suggest solutions on how to mitigate the risks and problems that arise in creating a flexible, and capable cyber defense policy.
China China has been known to use cyber technology for the use of collecting intelligence on US sources and for supplementing military operations. Clearly, this poses a significant threat to US national security. In the past year, various intelligence reports have indicated that China’s cyber network provides its government and the People’s Liberation Army access into confidential information belonging to over one hundred other countries,
The most recents detections of how cyber warfare is inevitably coming was the accusations of Russia hacking the the Democratic National Committee and former Secretary of State Hillary Clinton’s email’s releasing damaging evidence against them which ultimately lead to Donald Trump being named the President of The United States (Diamond, 2016). The effects of cyber warfare have leaked over in to televise series, forming shows such as CSI cyber, and the gaming world, Call Of Duty Infinite Warfare. Neglect regarding cyber security can: undermine the reputation of both the government and elected officials; force unacceptable expenditures associated with the cost of cleaning up after security breaches; cripple governments' abilities to respond to a wide variety of homeland security emergency situations or recover from natural or man-made threats; and disable elected officials' ability to govern (Lohrmann, 2010). Classified information such as overseas operators and attacks, missile locations, response plans and weaknesses, and much more cripples America’s ability to defend itself from enemies both foreign and domestic. To combat cyber terrorism is the Cybersecurity Information Sharing Act, or CISA. In an article titled “Why Cybersecurity Information Sharing Is A Positive Step for Online Security” it is discussed that under CISA, the Department of Homeland security will have more responsibility for domestic cybersecurity. CISA’s fundamental purpose is to better enable cybersecurity information to be shared between the private and public sectors (2016). The sharing of threat information between public and private sectors can give the the United States a head start by allowing them to share information rapidly and more often to combat enemy threats while still providing safety for privacy and civil
Cyber espionage is the act of attempting to penetrate an adversarial system for the purposes of extracting sensitive or protected data of either social or technical in nature. They are illicit activities that range from the commercial and economic to the political and strategic. They include small nuisance attacks to matters of high magnitude and importance like the national security and intelligence (Cornish 2012). Chinese cyber espionage has continued to escalate in recent years; it has continued to gain attention in many institutions including the media, the technology and information services industries, in scientific research and innovations, and as well as the general public. All these institutions are aware that china is taking part in the systematic development of cyber techniques that they intentionally use to invade international organizations, national governments, commercial companies, universities, and research institutes (Cornish, 2012).
When considering the technological advances over the past 50 years, the Internet has undoubtedly had the greatest impact on everyday life of developed economies and its citizens. The world has become smaller, societies interconnected, and the pace of global integration dramatically increased since the introduction of the Internet. With the world connected, cyber actors represent a very real and often underestimated threat to the United States’ ability to defend national security, protect industrial innovation, and secure privacy information. As a result of globalization, the foreign cyber actors represent the most imminent threat to national security, corporate innovation, and citizen privacy rights.
Since the onset of the first packet switching event that many believe to be beginning of the internet, no other technology besides the printing press has ever transformed the ability to deliver information. Although the internet is used by a large percentage of the civilized world, few Americans realize how vital cyberspace is to our national infrastructure. Today, we are faced with even more threats although it has been a recognized problem since 2009, when President Barrack Obama said “The cyber threat is one of the most serious economic and national security challenges we face as a nation. It’s also clear that we’re not as prepared as we should be, as a government or as a country (Obama, 2009).” Every industry that operates in the United States is dependent on the internet for some aspect of their business. Commerce, transportation, financial institutions, military, as well as industrial control systems are all interconnected. This interconnectedness has created vulnerabilities within their infrastructure that have increasingly become targets of terrorists, script kiddies, foreign governments and hackers of all types.
The Internet, as we all know, has rapidly spread around since its commercialization in the 1990s. It is evident that cybersecurity attacks are not going anywhere, and that government will continue to remain a target. In addition, the Internet of Things (IoT) growth will lead to more devices being connected to the networks. Therefore, with technology moving forward and hackers being more motivated as ever, the government finds itself struggling to keep up with effective cybersecurity measures and with filling up the designated positions in the Cybersecurity department.
Most ISIS practice customs from the 7th century, but the methods they use to fight a war are 21st century techniques. ISIS have an advanced computer network that uses social media to attract terrorists worldwide to help them attack countries like the United States. Many countries have been victims of cyber attacks but may not realize it until long after the security breach occurred.
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, software programs and data from unintended or unauthorized access, change or destruction. Post 9/11 and other terrorist attacks, the United States grows its endeavors to repulse cyberattacks, U.S. corporate organizations and the government agencies wind up in strife over how to adjust to new methods of security and privacy. The current state of security measure protocols and privacy policies placed by the US government in cyberspace raises concerns for the 99%. This is due to the recent cyber-attacks on American corporate organization systems and government alike, where their digital information and network infrastructures within the systems were compromised, and personal data was hacked and stolen.
As a nation, today’s society must invest in cyber security to execute military power, protect citizens information, and safeguard businesses.
In a documentary by Admiral Vern (2002), “the events of September 11, 2001 tragically illustrated that the promise of peace and security in the 21st Century is fraught with profound dangers”. The US foreign policies and interest in key geographic regions of the world sparks controversies resulting in state funded cyber attacks, cyber espionage and terrorism against the United States and its allied nations. When several attempts to cripple the United States and its allied nations through negotiations failed, enemy states and nefarious groups have shifted their focus to cyber attacks and cyber espionage. According to Gady (2016), “China continues cyber espionage against the United States”. Drezner (2014), “Washington and Beijing hardly agree on everything, but they agree on the big things, like maintaining an open global economy, reducing the likelihood of a military confrontation, and tackling climate change”.
Today however, a new type of warfare has emerged and occurs when outside entities conduct an attack on a power grid, network, or both with the intent of causing damage. This type of warfare is called cyber warfare. In the United States computers control everything. It is no secret that hostile countries and terrorist organizations are cognizant and they know our economy, security, and infrastructure can be crippled by a successful cyber-attack. Examples of potential targets for cyber terrorists include military bases, water systems, banking facilities, air traffic control centers and power plants. Even the Commander in Chief, President Obama has stated the threat of a cyber war is real and we must prepare for it and increase our security measures. First, this paper will discuss cyberterrorism and cyber-attacks as they pose a direct threat to national security and the economy. Then, we will review cyber-attacks against the U.S. from China, Iran, and Russia along with the impact and possible ramifications from those attacks. Finally, this paper discusses U.S. strategies to minimize the impact of cyber-attacks.
The JIE considers that the future security environment will continue to feature a range of adversaries attempting to shape political behavior by conducting damaging or disruptive cyber-attacks. This is a consequence of the globalization and cannot be stopped, however timely contention is needed. The Joint Force must minimize the consequences of threatened or successful cyberattacks against the United States, its allies, and partners by conducting Military Support to Cyber
Cyber security is a major concern for every department, business, and citizen of the United States because technology impacts every aspect of our daily lives. The more we use technology the more complacent, we get with the information that is stored within our cyber networks. The more complacent, we get, the more vulnerable we become to cyber-attacks because we fail to update the mechanisms that safeguard our information. Breaches to security networks are detrimental to personal, economic, and national security information. Many countries, like Russia, China, Israel, France, and the United Kingdom, now have the abilities and technology to launch cyber-attacks on the United States. In the last five years there have been several attacks on cyber systems to gain access to information maintained by major businesses and the United States Government. Cyber-attacks cause serious harm to the United States’ economy, community, and the safety, so we need to build stronger cyber security mechanisms. Based on my theoretical analysis, I recommend the following:
For thousands of years warfare remained relatively unchanged. While the tactics and weapons have changed as new methods of combat evolved, men and women or their weapons still had to meet at the same time and place in order to attack, defend, surrender or conquer. However, the advent of the of the internet has created a new realm of combat in which armies can remotely conduct surveillance, reconnaissance, espionage, and attacks from an ambiguous and space-less digital environment. Both state and non-state actors have already embraced this new realm and utilized both legal and illegal means to further facilitate their interests. What complicates cyber security further is as states attempt to protect themselves from cyber-warfare, private
This section of paper includes why we need cloud computing as a security control tool against the cyber criminal activities and in how many ways it can be implemented. As we are living in a technical era, many aspects of our lives rely on the Internet and computers, including transportation, communications, government, medicine, finance and education. Consider how much of our personal information is stored either on our own computer or on someone else’s system.
The damage of a full-fledged cyber attack would be devastating, the destruction would be unparalleled to any other tragedy that has occurred America. Since technology is responsible for providing America with vital entities and resources, an unadulterated cyber attack would nearly fail the American economy; this is what is known as critical systems failure. Weapons of mass destruction and cyber attacks present imminent threats of critical systems failure. Although currently Americas’ critical infrastructures are coordinated by controlled systems, majority of these systems are indeed connected to the American cyberspace. This exposes one of America’s most vulnerable spot amidst cyber security. Another major vulnerable spot within the nations IT security would be the geographical physical location for each of Americas primary infrastructures, as well as their productivity. Due to the proximal locations, the major infrastructures could very well be infiltrated by one efficient CNA.