Preview

Should we prohibit the development of the cyber command?

Good Essays
Open Document
Open Document
1665 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Should we prohibit the development of the cyber command?
Cyber warfare
Cyber warfare has been defined as any hostile measures against an enemy designed“ to discover, alter, destory, disrupt or transfer data stored in a computer, manipulated by a computer or transmitted through a computer.” Examples of hostile use include computer attacks on air traffic control systems, on oil pipeline flow systems and nuclear plants.

Cyber Weapon
Cyber weapons includes computer viruses and software that can be used to penetrate enemy networks. Defining these tools as weapons, as opposed to systems or processes, allows the military to apply the same authorisation controls as they apply to conventional weapons such as guns and tanks.

Cyber command
Cyber command has been defined as a command for network which subordinate to the state.They have three tasks, attack, defence and development. Lets use the first establishment of cyber command, the US Cyber Command, to be an example to explain. US Cyber Command centralizes command of cyberspace operation and organizes existing cyber resources, these can help for the network developmant. In the defence side, US Cyber Command synchronizes defense of US military and the US government services networks, to comfirm that US will be safe under any situations.
In the attack side, it also include that the background why Cyber Command had aroused the international concern. In 2010, It has waged cyberwar. US Cyber Command postponed the development of nuclear weapon of Iran. It involves hacking and attack. This aggressive action had aroused international concern.

Why
We chose this topic because of Edward Joseph Snowden. He was an NSA system administrator. He was wanted by USA because he published th of the U.S. classified intelligence to public. He came to Hong Kong to publish these secret file. This action had aroused international concern, including us. He had published the PRISM project which U.S. is preparing to do. U.S. can through PRISM to get all the data about us, like e-mail,

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In recent discussions of Edward Snowden, a controversial issue has been whether or not he was wrong for leaking government information. On the one hand, some argue that he is an American hero. From this perspective, it is a good thing that he exposed the inappropriate surveillance tactics of the American government. On the other hand, however, others argue that he is a traitor. From this perspective, he betrayed his country by leaking information to other countries. In the words of President Barack Obama, “If any individual who objects to government policy can take it into their own hands to publicly disclose classified information, then we will not be able to keep our people safe, or conduct foreign policy” (Mason). In sum, then, the…

    • 1669 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Cyber-war, the use of computers and the internet in conducting warfare in cyberspace, has been introduced as both an effective offense and defense towards modern warfare. Presently many countries have developed a policy towards cyber-warfare. The US, although a strong influence to the world, has yet to step up and create an effective policy towards warfare. One that should state what the military would do to respond to a cyber-attack, what defines a cyber-attack and what the government will do to take effective measures against a catastrophic attack. Along with that, what advantages does this new type of warfare have against modern warfare and is it worth the massive amounts of training and investments. Also, in what circumstances should a…

    • 794 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    A good case example to showcase US actions in virtual warfare took place in 2014 with the alleged hacks by North Korea on the US companies Sony Pictures. Although not committed on the US government directly, the 2014 Sony Hack represents an indirect virtual attack on US interests. This episode of virtual conflict is one of many that the US has played a part in. An offensive example showcasing the US’s alleged engagement in virtual attacks against Iranian Nuclear facilities with the military grade Stuxnet virus. Stuxnet had much more serious political implications, but the Sony Pictures Attack serves to exhibit how the US is limited in its available responses to certain virtual attacks, from the high threshold it sets based on its allegiance to international law. Other states that do not share the same perception take advantage…

    • 1738 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    As cyber-attacks related to information warfare have increased throughout the twenty first century we have seen a rise the use of cyber-attacks by nation states. These nation state attackers focus on targeting other nations in the hope of disrupting the nation’s economy, causing public panic, or crippling a country defenses along with many other goals which damage a nation. These attacks in turn allow the nation state which performed the attack to weaken the other nation, make political statement, steal nation’s information or resource, or use the attacks as a greater warfare plan. This often raises the question when discussing nation state cyber-attacks…

    • 843 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Some of the global threats included cyber, counterintelligence, terrorism, weapons of mass destruction and proliferation, space and counter space, transnational organized crimes, economic, natural resources, and human security. According to the 2015 National intelligence estimate report, there is an ever-increasing cyber threat. Such cyber threats can come in several different forms and can affect American citizens and the economy alike. For example, Attackers successfully compromised U.S. Department of Energy computer systems more than 150 times between 2010 and 2014 (usatoday.com). According to the report, although the cyber threat is imminent, catastrophic cyber attacks against the U.S. is unlikely. Some of the nations that have the highest risks of launching a cyber attack against the U.S. are china, Russia, Iran and North Korea (dni.gov). The U.S. defense system against cyber attack cannot eliminate the threat the systemic interdependencies between different critical infrastructure sectors (dni.gov). The cyber threat actors are motivated by different factors and all pose a different threat to the national security of the United States. According to the national security estimates, Russia military is establishing a cyber security division and its main objective is to implement cyber attacks against other states. Those attacks can include propaganda, and inserting malware into a country command system and network operations (dni.gov). According to the report, Russia’s cyber division has been proven to be successful at implementing malware into other countries website and the likelihood of such attack on the U.S. is coming. Another country that continuously poses a cybersecurity threat is China. The Chinese government has always been trying to get an economic advantage against the U.S. The report assert that in order to…

    • 501 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Read the paragraph below taken from the text “Myth of Cyberterrorism” and analyse the content and organisation.…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    References: Army, U. (2005). Cyber Operations and Cyber Terrorism. In U. Army, U.S. Army Training…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cyber terrorism is terrorist activities intended to damage or disrupt vital computer systems (Merriam-Webster). Cyber Terrorism is a form of fear and is very similar to physical terrorism, except terrorist use computers to wreak havoc on innocent people. An example of cyber terrorism would be putting a virus on business computers which allows them to hack into their databases stealing or changing information. They could also steal money from the business. Terrorist groups also use cyber warfare for modern communications like planning, recruiting, propaganda purposes, enhancing communications, command and control, fund raising and funds transfer, and information gathering. The…

    • 519 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cybercrime refers to criminal use of a computer and the internet. Cybercrime as credit card scams, identity theft, unauthorized access to computer and if a company that has a website is convicted of a cybercrime then the company will lose money. The cyber law are one of the newest form of global law, escorting in the greater regulation of the Internet related legal guideline worldwide to lodge e-commerce, globalization, and the extent of western independent ideals. The correct trademark can protect a business or company against cyber infringement, patent issues in cyberspace. Some fear that the cyber law will profit the welfares of large, international industry and constabularies’ observation. Cyber jurisdiction is a law that impact over activities taking residence on the internet.…

    • 343 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Computer Forensics

    • 322 Words
    • 2 Pages

    Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.…

    • 322 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In many ways, the computer network will be the face of government. For instance, the Army has begun to develop a uniform that is a networked computer that not only will provide protection from biological and chemical weapons but also will provide a constant stream of information through conductive fibers woven into the uniform’s material.…

    • 730 Words
    • 3 Pages
    Good Essays