Cyber Batalla

Páginas: 7 (1679 palabras) Publicado: 24 de abril de 2012
Cyberwar

Introduction
Since the arrival of the Internet in the 1990s, not all users have acted in cyberspace for peaceful purposes. In fact, the threat and impact of attack in and through cyberspace has continuously grown to the extent that cyberspace has emerged as a setting for war equal to land, sea, air, and space, with increasing potential to damage the national security of states.Roughly a decade after the arrival of the Internet, the international community still has no codified, sanctioned body of norms to govern state action in cyberspace. Such a body of norms, or regime, must be established to prevent aggression in cyberspace. This project explores the potential for cyber attack to cause exceptionally grave damage to a state’s national security, and examines cyber attackas an act of war. The paper examines efforts to protect our cyberspace from any attack outside of the U.S., if our military forces are well prepared for a cyber attack and what are the legislators and the president doing to prevent this to happen to protect American national interests.

Issues
The U.S. Military is one of the prime targets of hacker to daily try to enter the Pentagon Databaseto obtain information of the most technologically advance weaponry. So it was a little embarrassed when the Pentagon revealed last December that live video feeds from its predators had been intercepted by rebels in Iraq and Afghanistan. The information gave the rebels when and where would be the next imminent attack were going take place. The tool used to hijack feeds from the predator was a $26piece of software that can be downloaded from the Internet. And it is not just military technology that is vulnerable. In January Google announced that it was considering pulling out of China. David Drummond, chief legal officer from Google say, “ a Highly sophisticated and targeted attack on our corporate infrastructure originated from China that resulted in the theft of intellectual property fromGoogle.” (Nakashima) The hackers appeared to be trying to steal sensitive corporate data and to access the e-mail accounts of Chinese Human rights advocates.
Also in January investigators revealed that hackers in Europe and China hag gained access to computer at more than 2,400 companies and government agencies in more then 196 countries. Apparently the hackers stole financial information, tradesecrets and intellectual property. These cyberattacks are just the latest in an increasing number of attacks on government, commercial and personal data around the world. Cybersecurity experts estimate there are more than 100,000 attempted intrusions into Pentagon Computers alone each year. And McAfee, Inc., a global computer security company projects that private sector companies lost more thana $1 trillion to cybercriminals in 2008.
The cyberattack on Google made Secretary of State Hillary Rodham Clinton to warn that an attack on one of the country’s networks “can be an attack on all,” and that the United States would defend itself from such attacks. Also she added, “Those who disrupt the free flow of information in our society or any other pose a threat to our economy, ourgovernment and our civil society. Country or Individuals that engaged in cyberattacks should face consequences and international condemnation.”
As the attack on Google explains, cyberattacks present a number of challenges not usually present in conventional military attacks. There are not clear lines between government, military and private sector targets. Countries as well as individuals can attackmilitary targets, utilities, private companies or government databases, depending upon whether they are seeking military intelligence, conducting diplomatic or industrial espionage or trying to intimidate anti-government activists.
Richard Clarke, former counterterrorism coordinator for the Bill Clinton and George W. Bush administrations, writes “One of the major differences between Cyberwar and...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Cyber
  • Cyber
  • Cyber
  • Cyber
  • Cyber
  • Cyber
  • Cyber
  • cyber

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS