Welcome to the Age of Cyber Warfare


Mandiant, a U.S. security firm recently released a report accusing China of orchestrating or being involved in cyber espionage. Mandiant says it has been collecting evidence since 2004 connecting China to a variety of so called “Advance Persistent Threats” stemming from China’s secretive Unit 61398. [1] According to CNBC, Mandiant’s own CEO Kevin Mandia accused China of involvement on this particular cyber warfare attack that targeted U.S. government agencies and companies [2]. This continues a long stream of accusations against China’s government actively using cyber warfare against U.S. companies and government. It seems that we have entered the age of cyber warfare.

These types of cyber security problems are by no means new. Probably one of the largest compromises in intelligence and cyber security occurred during the peak years of WikiLeaks, which affected the U.S. but embarrassed many other foreign governments. With the rise of groups such as these and Anonymous, cyber warfare is not only state based but involves individual groups as well. Even at a national level cyber security is still a difficult to issue to resolve. Recently in the U.S. SOPA, an act that was meant to target online piracy was prevented due to public outcry against infringement on internet rights.

Cyber warfare is a new weapon in the arsenal of many governments; and while it might seem futuristic there is cause for alarm. Defense Secretary Leon Panetta was quoted that there is a growing importance for Americans to become more aware of cyber war; “it is the kind of capability that can basically take down a power grid, take down a water system, take down a transportation system, take down a financial system” [3]. Although there has not been a case of such a severe incident; the recent report by Mandiant seems to indicate a clear escalation in cyber warfare.

Even more dangerous is that governments are beginning to accept the use of cyber warfare as a true instrument of war. In 2006 the Pentagon was set to consider cyber warfare as an act of war that could warrant military response [4]. Although China has been recently accused, they are not the only ones using cyber warfare. According to the New York Times, President Obama authorized secret attacks on Iran’s computer systems using the Stuxnet and Flame viruses to target and delay their nuclear program. [5]
While the cyber warfare seen in the last few years is a relatively new battle tactic, it has escalated quickly. There seems to be a potential for a second Cold-War, where nations covertly combat each other through third parties and secretly damage each other’s systems and networks. It seems that in our increasingly wired and electronic world, it is more important than even to determine what types of tactics are legal (if any) and how to present a catastrophic attack from occurring. At the very least, the international community needs to work to slow down the escalation that has already happened.

[1] http://www.bbc.co.uk/news/world-asia-china-21502088

[2] http://www.cnbc.com/id/100470478

[3] http://nation.time.com/2012/10/12/panetta-sounds-alarm-on-cyber-war-threat/

[4] http://www.nytimes.com/2011/06/01/us/politics/01cyber.html?_r=0

[5] http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_malware/stuxnet/index.html

[Image Credit: http://www.wired.com/images_blogs/beyond_the_beyond/2012/05/208193530.png]

About author
  • John Deere Technical Manuals#1

    April 18, 2019

    I am only in order that willing to ought to see this. It’s the version of handbook that is loaned and never the very animal falsehoods might be on extra content. Recognize the value of your main showing such largest file.

  • Marilou#2

    April 12, 2019

    I like reading personal blog sites, Mother blog sites, and so on. What is the best method to discover these types of blogs online? The very best technique I have is simply complying with faves individuals have – going to one blog writers “faves” then the next blog owners favorites, and so forth … I have actually tried Google Blogsearch but all that gives me is old newspaper article, etc. Absolutely nothing personal at all … How do you look for personal blogs?.

  • John Deere Repair Manuals#3

    April 10, 2019

    Other great roles are delivered by Brian Cox, Richard Dreyfus, Karl Urban, Mary Louise-Parker (whom I’ve never seen before), as well as multiple others.

  • Johnny#4

    April 10, 2019

    Can I start a blog that has recording of bad customer service?

  • John Deere Diagnostic and Test Manuals#5

    April 9, 2019

    Studying to experience the blues might seem as a overwhelming task, even when you’re not a rookie guitar player. How ever with all the right Blues Guitar Lessons and trainer you’ll be able to understand the “tools of the trade” so to speek to help demystify the truly amazing grooves, solos and riffs you cherish.

  • sneak a peek at these guys#6

    April 8, 2019

    Is anything better then WordPress for building a web presence for a small Business?

  • John Deere Diagnostic and Test Manuals#7

    April 6, 2019

    This is so great to read. We have do more things like this for the police men. They are protecting us and we need to support them in this way.

  • recommended you read#8

    April 2, 2019

    I just want to mention I’m beginner to weblog and honestly loved this web page. Most likely I’m going to bookmark your blog . You absolutely come with great articles. Thanks a lot for sharing your web site.


Your email address will not be published. Required fields are marked *