Internet Warfare Essay

943 words - 4 pages

The referred article describes various examples of internet-based conflicts. Some of these fall under criminal category while others are non-criminal. Here are the listed conflicts and their classification.
The Kosovo and NATO conflict of 1999 was to some extent characterized by internet warfare. In this conflict, the Yugoslavian side was under heavy bombardment from the NATO forces. In the midst of the conflict, Yugoslav hackers attacked a NATO website using viruses and spam emails on a daily basis, therefore overloading it with these intrusions. In this same conflict, Serbian supporters jammed selected websites within the United States. In addition, these supporters used the internet to give warnings on NATO attacks as well as to offer messages of support. When the People’s Republic of China-PRC was lured into the conflict, it reacted by attacking the White House website. This was after NATO bombed the PRC embassy in Belgrade. This is a good example of non-criminal cyber attack. Both sides were already in conflict with each other and the attacks were only used by to gain advantage. In addition, none of the attacks was profit-motivated and that makes them non-criminal in nature.
The other attack was during the Gulf War when Netherlands based hackers had offered to assist Iraq by attacking and penetrating coalition networks, even though their offer was rejected. If the Iraq side had accepted the hackers’ offer, then the attack would still not have been criminal. This is because the motivation of the attack was more political than financial in nature. However, if the hackers were not in any way politically affiliated, this attack would have been considered to be criminal in nature.
In another attack, the Pentagon’s network was hacked by invaders who tried to cover their tracks through intrusion. Since the attackers failed to identify themselves or reveal their mission, the intrusion can be classified as a criminal attack.
In yet another attack in 1998, a planned military air strike was almost compromised. If the attack came from the opposing side in this particular conflict, then the attack would have been classified as non-criminal. If the attack was from parties irrelevant to the conflict, then it would be classified as criminal.
The 1999 Mellissa and Chernobyl virus attacks are perfect examples of criminal attacks. This is because they were aimed at causing financial harm to their victims. In addition, they were the main source of the terrorist activities that followed.
Cyber Warfare and the Iraq War
The Iraq war is a good example of a modeled conflict. Modern warfare is almost certainly consisted of internet warfare. Although the Iraq war was not fronted as an internet-based war, there is evidence pointing towards the use of internet-based resources.
In a report to congress, General David Petraus had indicated that the war was also being fought on the internet (ABC News, 2007). In his argument, he stated that there was need to...

Find Another Essay On Internet Warfare

Invisible Death Essay

1051 words - 4 pages . Works Cited "The 2001 Amerithrax Anthrax Attack & the Investigation - Crime Library on TruTV.com." TruTV.com: Not Reality. Actuality. Web. 31 Mar. 2010. . "Anthrax Causes, Types, Symptoms, Diagnosis and Treatment on MedicineNet.com." Web. 31 Mar. 2010. . "Biological Warfare." Internet Dermatology Society. Web. 17

E-Warfare Essay

1936 words - 8 pages Question The 21st century has seen warfare adopt many new faces, among those the use of the Internet as a weapon. Explore an e-warfare incident and discuss its success or failure. In your answer detail how you as a network manager could protect your organisation against e-warfare. Abstract In the following essay I will define ‘E-warfare’ and outline types of attacks which are associated with it. I will identify an incident which has taken

Cyber Warfare

861 words - 3 pages cyber-warfare could never happen to them, and it is more often than not, these same people who get hit the hardest. Some additional general guidelines one may like to note are: never give out personal information over the internet, keep your system including anti-virus, and be sure to turn off your computer system when not in use. While the internet and technology as a whole can most certainly help us, it can also do great harm and put us in a very

Examples of War in Cyberspace

2881 words - 12 pages deceive the enemy. Bibliography Andrew Rathwell 2002 Information warfare and sub state actors, an organisation approach Cybercrime 2002 Law enforcement, security and surveillance in the information age Edited by Douglas Thomas and Brian Loader Routledge Internet sites 1. http://www.rand.org/publications/randreview/issues/RRR.fall95.cyber/cyberwar.html Excerpted from Cyber War Is

Cyber Operations

2705 words - 11 pages vulnerable to a retaliatory cyber-attack and have little to lose as cyber-attack attribution is so difficult to discern. The United States’ reliance and dependency on information networks is only going to increase, so too must our defensive and offensive capabilities. As one cyber warfare debater commented “Cyber-space is still predominantly a P2P (people to people) internet and we still have a chance to prevent the inevitable final exchange of

The psychological warfare during the Golf War 2

737 words - 3 pages theelectronic spectrum of radio, television and military communication bands in afocused area. Those aircrafts constantly flew over Iraq and conducted radiobroadcasts to criticize Saddam Hussein's policies and to explain U.S. role in theregion. Psychological attacks were also lunched by pentagon thought Internet tobreak into Iraqi defense system. Psychological warfare proved to be on of the mostimportant phases of the conflict with Iraq.Although U.S

Stop Cyber Warfare Before It Happens

2884 words - 12 pages Shortly after the horrendous violations of human rights by the Nazi’s, in 1949 the Geneva Convention was created. This fourth treaty was established to create the rules and regulations of what is expectable in times of warfare. It gives protection to civilians in times when war tares families and countries apart. President Obama speaking on the importance of the fourth Geneva Convention stated, “We lose ourselves when we compromise the very

Scuba Diving

1575 words - 6 pages about 4500 BC. Greeks, Mesopotamians, Chinese, and many others dove for food, commerce, and warfare (Cooper). Searching the sea bed for food was the main reason that drove people to dive. Modern man knows this because ancient drawings depict people diving. Ancient artifacts have been discovered in Greece that show divers partaking in military endeavors and searching the ocean floor for sponges (“History of Scuba Diving”, ScubaSoul.com Internet

Africa: Warfare Causes and Effects

1908 words - 8 pages methods. The methods I used consisted of researching through The Ohio State University’s online library system. Using the Ohio State University’s online library resources, I spent countless hours looking through peer-reviewed articles on the causes and effects of warfare in Africa. There were multiple other research methods I used, such as using the Google Scholar website. Using the Google Scholar, I was able to search the Internet for even more

Cyberwarfare in the Real World

1774 words - 8 pages Cyber warfare, the use of computers to fight in cyberspace, is both effective in playing offense and defense in a modern day war. “Cyber war uses computer software to attack an enemy’s computer systems” (Smith). In today’s world, there is cyber warfare all over the place, you just cannot see it. Cyber warfare takes place in the ‘cyber realm’ also known as the internet. The people that take part in the online “war” are the hackers, and their

Prophet History

1168 words - 5 pages access to valuable SIGINT intelligence and Electronic Warfare unlike any time in history. After the gulf war and Somalia, It was determined that the U.S. needed to re-examine their ability to perform SIGINT collection operations. During the Mid 1990’s a decision was made, both versions of the Ground Based Common Sensor (GBCS Heavy and Light) as well as the Advanced, needed replacement. Born out of this desire and years of development the “Prophet

Similar Essays

Information Warfare Essay

1291 words - 5 pages As we entered the third wave, we traded in our pens and notebooks, for keyboards and CPU’s. A simple wire connected from a phoneline to a modem to your CPU, brings the whole world into your hands. And you into the worlds hand as well. Political realism is defined as doing what is necessary for survival. One must depend on themselves, because no one else will look out for them. Information Warfare has become a massly used tactic by

Development Of Information Warfare Essay

5893 words - 24 pages United States over the past two hundred years. The advent of the Internet and the development of information warfare require a paradigm shift in military thought. The current revolution in military affairs is not simply in weaponry or strategy; it is also in the fundamental concepts of war and armed conflict, in defining what is military and what is not, in outlining what is and is not acceptable during war. War can now be bloodless; it also

Twats Essay

3280 words - 14 pages battlefield but merely over the internet and networks, due to the nature and ease of access to a computer (system) it’s now less costly to attack others without the need for physical violence and mass forces. Looking back to just 100 years ago, warfare was still fought in a similar context of mass violence towards another nation or group, since then we entered the “Information age” Information age (Wikipedia, 2013). The ‘information age’ meant we

Cyber Warfare: The Importance Of The New Digital Battlefield

2258 words - 9 pages For thousands of years warfare remained relatively unchanged. While the tactics and weapons have changed as new methods of combat evolved, men and women or their weapons still had to meet at the same time and place in order to attack, defend, surrender or conquer. However, the advent of the of the internet has created a new realm of combat in which armies can remotely conduct surveillance, reconnaissance, espionage, and attacks from an ambiguous