Armies invade and
occupy countries. Air raids drop explosives on both military and
civilian targets. Terrorists hijack planes and deploy suicide
bombers.
All of these are
common representations of modern warfare. A major yet commonly
overlooked facet of warfare, however, is cyberwarfare. This has been
on the rise since the invention and increased usage of technology
such as computers. In cyberwarfare, casualties are not counted in
bodies, but in virtual damages.
In the past several
years, cyberwarfare has manifested itself in increasingly prominent
ways. One very well-known (yet relatively tame) example is WikiLeaks,
headed by Julian Assange. Assange's work, which can be found online,
is a far cry from the release of the Pentagon Papers in 1971, each of
which were photocopied in someone's home study. Then there are many
lesser-known instances, including one manifestation of an advanced
virus called “Stuxnet.”
Stuxnet is the most
complicated virus that has ever been released – it's about 20 times
more complex than anything that has ever been seen before. This sheer
complexity allows for Stuxnet to be able to accomplish things
previous viruses couldn't even begin to do. Most viruses hack their
targets by using a forged authority clearance; essentially, it
pretends to be something it's not. On the other hand, Stuxnet uses
actual authority clearance from the various places it penetrates. It
is not known where these clearances came from. Many viruses also use
“zero days,” or holes in a system's security lineup that are
unknown to the creators. Each zero day can sell for about $100,000 on
the black market. According to experts who disassembled and looked at
Stuxnet, it employed at least twenty of these zero days.
Stuxnet is
introduced into computer systems through an outside source, like an
infected USB memory stick. Who brings this in could be an unknowing
worker or an infiltrator. Once one computer is infected, the virus
uses the Local area Network (LAN) to spread to other systems within
the network. It searches for the computer that controls the PLC, or
Programmable Logic Controller. From inside this key computer, Stuxnet
is able to take hold of the system, as the writer of the virus is
able to send code to the PLC once they get a read on what is
occurring in the system. One of the amazing things about it is that
it is able to do its work undetected – system operators cannot tell
that anything is wrong until the equipment that the PLC is
controlling malfunctions.
However, Stuxnet was
not employed to just wreak havoc – in fact, it was found dormant in
several situations. The virus was created to activate only in certain
situations. In its most publicized attack, Stuxnet is said to have
affected nuclear centrifuges in Iran. The hype began in November
2010, when one fifth of Iranian reactors were shut down with no
excuse. Initially, Iran denied that these shutdowns were due to
Stuxnet, but as speculation grew, it became apparent that the virus
was the culprit. Later, it was revealed that if the reactors were
turned back on, Stuxnet would have created a massive electrical power
outage across Iran.
The main questions
being raised are: who created Stuxnet? Why was it used and activated
in Iranian nuclear plants, and not Russian or North Korean? And what
impact will viruses like Stuxnet have in our future global conflicts?
The most basic of
these questions is not easily answered. Many experts agree that
Stuxnet was a collaboration effort, probably stemmed from the aid of
a nation state. Currently, fingers are being pointed to the United
States, Israel, or a team of Western countries intent on making sure
Iran's nuclear facilities are crippled.
Cyberwarfare levels
an entirely new playing field when it comes to cross-country
conflict. Many nations now fund and run “online armies,” or
legions of hackers and coders who, in turn, protect a nation's
computerized interests and potentially attack other countries'
systems. There are few boundaries protecting the extent to which
cyberwarfare can happen, as information has no transcendental or
programmable rights. If someone “kills” a database, the public
outcry is likely to be far less than if that same person were to
assassinate an important figure. However, in our advancing
technological world, it is a huge issue in which a catastrophe could
potentially ruin the world as we know it. Through a well-placed
undetectable virus such as Stuxnet, nuclear reactors around the world
could melt down. All electrical power throughout a country could be
shut down. Information that is intrinsically necessary to a nation's
survival could be stolen or destroyed. Because so much of
cyberwarfare is anonymous, like the creation of Stuxnet, it has the
potential to create mass quantities of mistrust between countries.
Cyberwarfare is
something that cannot be ignored. There are no viable finite
solutions to ending it; however, regulation of cybersecurity could be
a huge asset to the global community at large. In addition to higher
regulations, nations should perhaps pay more attention to what's
occurring in the technological world, and not just the physical one.
People need to realize what is at stake if we do not recognize how
important cyberwarfare will be now and in the future. Falling behind
other countries in the new technological climate could mean anyone's
demise.
WORKS CITED
Clair, Patrik, Dir. Stuxnet: Anatomy
of a Virus. Zapruder's Other
Films, 2011. Film. <http://vimeo.com/25118844>.
Fildes,
Jonathan. “Stuxnet virus targets and spread revealed.” BBC
15 Feb 2011. n. pag. Web. 21 Oct. 2011.
<http://www.bbc.co.uk/news.technology-12465688>.
Halliday,
Josh. “WikiLeaks: US advised to sabotage Iran nuclear sites by
German thinktank.” The Guardian 18
Jan 2011. n. pag. Web. 21. Oct 2011.
<http://www.guardian.co.uk/work/2011/jan/18/wikileaks-us-embassy-cable-iran-nuclear>.
“Stuxnet
'hit' Iran nuclear plans.” BBC
22
Nov 2010. n. pag. Web. 23 Oct. 2011.
<http://www.bbc.co.uk/news/technology-11809827>.
Ward,
Mark. “Code clues point to Stuxnet maker.” BBC
19 Nov 2010. n. pag. Web. 22 Oct. 2011.
<http://www.bbc.co.uk/news/technology-11795076>.
Signe,
ReplyDeleteOn Thursday, a lot of what we discussed in relation to terrorism was fear. You mention that cyber-terrorism is something that cannot go “ignored.” I think the reason that this type of terrorism is under the radar is become of the dread effect. Acts like 9/11, car bombs, and other acts of violent terrorism cause so much fear in populations because of their explicit nature. When these types of incidents are on the news or make headlines of newspapers, people react very strongly.
However, cyber-terrorism is much more discrete. The average American’s ability to comprehend a virus such as, Stuxnet, is quite minimal. When incidents of viruses are discussed on the news, it is difficult to elicit the same amount of fear, as say, an explosion.
Therefore, the challenge is getting people to realize the danger of cyber-terrorism via viruses. Businesses, the government, and individuals must be more aware of how to protect themselves. Do you have any ideas as to how to create this awareness without simultaneously creating an environment of extreme fear?
Hannah,
ReplyDeleteI think that a level of higher attention from the media would help, along with education - maybe in schools? Lots of people have had viruses on their personal computers, and even though something like Stuxnet is highly unlikely to affect personal lives.
The only real way people will start paying attention to cyberterrorism, however, is if a virus successfully melts down a nuclear reactor or shuts down the main power grid in a very large region.
Also, you mentioned not creating an environment of "extreme fear." Would such an environment really be a bad thing? Yes, I agree that the extreme fear has been awful, especially many use it as an excuse to target hatred and sometimes violence towards the Muslim population. However, with cyberterrorism, to whom would this fear be directed? The IT department? Fear often leads people to act, for better or for worse. I, for one, would rather have people acting in ways where they would feel safe rather than staying apathetic to a very dangerous threat.