Walker 1 Kadence Sky Walker ENGWR 300 11/7/2016 Research Paper Computers, The Unconventional Weapons of a Digital Age First there was the sword, then the bow and arrow, as time went on humans developed the first gun, and with even more innovation we created the atomic bomb. Each of these weapons were tools of their era’s weapons used in combat used to gain the upper hand against one’s foes. If a country like the US were unable to compete in the global arms race it could not hold onto to its position as a global power. Now that we are entering the information era, a new weapon has emerged, and it is one that possesses devastating effects, that have already begun to transpire within the global community. This new weapon is the computer and how it can be used to conduct malicious attacks with intent to control, distribute, manipulate, hinder, and disrupt digital information. This can be done through hacking,viruses, worms, and overloading systems. These are tactics being deployed by not only the lowly hacker, but also governments around the world. It must be understood that the power that a competent mind able to fully utilize the capabilities of a computer could quite possibly be capable of generating mass damage, to not only stored digital information, but also physical operations in the real world. So much of the world is run on computers now, from cars, Walker 2 power, industry and manufacturing, even currency is becoming digital, all lacking proper digital protection. The discussion of the effects that technology has had on our lives has been one in circulation for quite some time. It comes up in talks about social media, news outlets and their trustability, and even the complete access of information that is provided through the internet. Quite often it will even be asked if our lives depend entirely too much on technology as we continue to move forward into the information era. Whether you feel that our lives are beginning to revolve too much around the internet, it does not change the fact that this trend of reliance on the information that exists on the web, looks as if it will continue. Digital information has become far more prevalent within our global community and will continue to rise in importance as digital information becomes a valuable resource. The ability to maintain a steady flow of such a commodity, has become that of great importance to governmental bodies. As such, the idea of digital warfare is being pushed to the forefront of the geopolitical discussion as digital information becomes more and more important. Likewise, digital warfare has become all the more prevalent in our world, not just at the civilian level, but also at the governmental and economic levels. Information warfare may seem like a simple and easy idea to grasp but it is actually a multi-leveled process in definition, which changes the more its participants discover about it and its uses. In Martin Libicki’s book, What is Information Warfare? he says “Coming to grips with information warfare... is like the effort of the blind men to Walker 3 discover the nature of the elephant: the one who touched its leg called it a tree, another who touched its tail called it a rope, and so on.” As such, digitais information warfare is commonly misperceived by many with its implications and practical uses. Digital informational warfare can be conducted in a variety of ways, all very reminiscent of that of previous wars. Digital information is merely the new medium in which operations such as espionage, counterIntelligence, and homeland security must now be conducted. Dr. Ivan Goldberg defines information warfare as: The offensive and defensive use of information systems to deny, exploit, corrupt, or destroy, an adversary’s information, information-based processes, information systems, and computer-based networks while protecting one’s own. Such actions are designed to achieve advantages over military or business adversaries. A recent example of how information warfare was used is the release of confidential emails during the 2016 US presidential election. When confidential emails were released of a presidential candidate in order to disrupt and manipulate the outcome of the US presidential election. The action not only revealed potentially sensitive documents from a government official (an act of digital information warfare in its own right), but also the releasing of this information to the general public caused mass hysteria. In 2010 there was an incident where a Iranian uranium enrichment plant was targeted by a cyber attack by some unknown assailant, assumed to be an opposing government. The malicious virus used in this cyber attack, on the Iranian plant’s Walker 4 systems came to be known as Stuxnet. This type of virus is known as a worm as it moves, attacks, and infects all on its own. Furthermore, the code used to create Stuxnet was highly developed and one of the first digital weapons ever used. This is because it wasn't intended to be solely a cyber attack that possibly rendered a governmental site out of service, this was an attack meant to achieve physical damage in the real world. As according to Kim Zetter in her book, Count Down to Zero Day, “Stuxnet as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility.” An attack such as this is so an great example of how digital warfare could easily be used to cripple the manufacturing industry of a country. Especially a country such as the US that relies heavily on manufactured goods. Furthermore, attacks could also be carried out against nuclear power plants, water treatment facilities, and even water dams, all of which often lack sufficient protection from digital invasion.Immense costs in damages would be achieved, that would not only result in economic loss but also could result in human casualties. Coordinated digital attacks such as this could easily render a country economically damaged, and fairly vulnerable. The capture and use of digital information in order to manipulate or alter the outcome of political affairs, and the use of digital attacks on industry and infrastructure, are two different ways digital information warfare can be used to achieve the user’s desired outcome. Walker 5 Just like any war the government has to be able to not only protect its citizens but also be able to launch offensive countermeasures against enemies. The types of offensive measures used do not differ greatly from those used within military tactics before the information era, only they are digital. This is war, and in war information is incredibly useful whether this is information from the enemy or even information coming from allied forces. Information collection is very necessary to continue to have the upper hand over one's enemy. With more information comes better understanding, which in turn brings better plans to take on opponents. Meaning fast and efficient transportation of information is paradigm to success. Information can be transported in a multitude of ways, composed of networks of computers, routers, telephone lines,cable, telephones, televisions, radios, and other data transport technologies. Without these appliances the transportation of digital information would be impossible. Transporting and maintaining control over information and who views it is also a very important defensive aspect of digital warfare. Typically, the goal is to to limit the amount of information the enemy can obtain. When it comes to the digital space the most common practices are hacking or disruption. Protection can be obtained through something as simple as password protection, or even virus protection software. Digital firewalls may also be implemented as they act as a kind of barrier stopping any unwanted access to what may lie behind it. So how might something like a government site be attacked in order to achieve the goal of disruption? Well a very commonly used tactic would be a very well Walker 6 coordinated “DDOS” attack which is an acronym for a Distributed Denial of Service attack. An attack such as a DDOS can render the servers of its target almost useless. This is because its point is to overload the systems of its receiver disabling it from accomplishing its directive. In this case we can assume that the prime directive is to store, receive, and send out crucial information. Meaning the attacker through a DDOS attack can reduce the rate at which information flows. Another very important part of warfare is the gathering of information. This can be accomplished through virus softwares like aforementioned Stuxnet or through hacking a system and using back doors or even deception through IP spoofing. A virus can be used in various means and can be implemented in various different ways. In Stuxnet’s case it's believed as to have been transferred through USB drives containing its software. All it takes is one person to insert the USB drives and Stuxnet has infected the system. Quite often the virus can be used how Stuxnet was but it can also act as a door allowing its controller to peer through at information contained within the infected system. Hacking a system and finding a back door can often be quite difficult but is not all to impossible. Often when we think of hacking we imagine it's some guy typing away on a keyboard endless streams of code . But in reality hacking can often be a robot trying to force its way into a system by password cracking. Password cracking is basically trying to guess a password over and over again thousands of times until the right password is achieved. A back door is often left behind in a system's security by a creator in order to easily maintain its operation. It is like having a door to the Walker 7 maintenance room instead of having to knock a hole through wall every time you need to fix something. Often people will forget how involved technology is within our everyday lives and the greater roles it continues to take on. Much of our lives are entwined deeply with technology and its use. There are people out there that seek to do harm to others and can easily use the advances of technology to wreak havoc on the way society operates. They can use tactics like disruption and manipulation in order to inhibit the flow of digital information and how it's used. That's why it's so incredibly important to know how to protect against digital invasion. Hopefully this paper has provided insight of how digital information is being used and to be aware of its applications as technology continues to take part in our lives. Walker 8 Resources: Hrovat, Eric. “Information Warfare: The Unconventional Art In A Digital World.” Https://Www.sans.org/, SANS Institute, 30 June 2001, www.sans.org/reading-room/whitepapers/warfare/information-warfare-unconventional-art-digi tal-world-787. Burns, Megan. “Information Warfare: What and How?” Information Warfare: What and How?, 1999, www.cs.cmu.edu/~burnsm/InfoWarfare.html. Bennett, Jonah. “WikiLeaks: ‘Corrupt Ruling Power Factions’ Are Going To Win The Election.” The Daily Caller, 20 Oct. 2016, dailycaller.com/2016/10/20/wikileaks-corrupt-ruling-power-factions-are-going-to-win-the-electi on/. Libicki, Martin C. What Is Information Warfare? Washington, D.C., National Defense University, Institute for National Strategic Studies, 1995. Zetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Broadway Books, 2014. Goodman, Marc. Future Crimes: inside the Digital Underground and the Battle for Our Connected World. New York, Anchor Books, a Division of Penguin Random House, LLC, 2016.