The Bomb by Stephen M. Younger
Author:Stephen M. Younger
Language: eng
Format: epub
Publisher: HarperCollins
THE DISASTROUS EFFECT of unauthorized entry into computer networks has been repeatedly demonstrated in the commercial sector as hackers have planted viruses, worms, and other network attack software on the Internet. Businesses have lost tens of millions of dollars through downtime, lost revenue, and the need to replace credit cards whose numbers have been compromised. Experts in computer security maintain that the advantage remains with the attacker and that defensive measures such as firewalls and virus scans are temporary at best. Data encryption can help, at the expense of speed, but few organizations or even countries have the sophistication to create an essentially unbreakable code.
There are three approaches to computer network attack: surveillance, modification, and destruction. Surveillance is intended to find out what the adversary is doing, such as what orders are being given to whom and where key targets are located. Skillfully conducted, computer surveillance can be performed without the adversary ever knowing that it is happening. The value of such clandestine surveillance can be immense—if you know that a given military unit is being sent to a given location, then you can deploy your own forces to counter it, eliminating the necessity of searching, keeping large numbers of your own troops in reserve, and so forth.
In addition to just listening, it is also possible to inject your own information into an adversary’s network, right up to the point of directing enemy troops into a trap or ordering them to stand down from attacking your own forces. The ability to mimic orders from central command requires considerably more skill than simple surveillance, since orders may be encrypted or may contain special authentication codes. However, amateur hackers have successfully inserted messages on the commercial Internet, despite security measures installed specifically to make it impossible for them to do so. Professionals can presumably do even better.
Destruction of computer networks can take the form of erasing data on storage media, disconnecting vital nodes, and inserting a virus that will propagate through and incapacitate the network. It is not necessary to physically destroy the equipment—it might be sufficient to make it inoperative during critical periods. Denying an enemy the opportunity to communicate with and control its forces can sometimes render them ineffective and accessible to attack.
The fundamental problem with electromagnetic weapons of all varieties is that they typically produce a “soft kill,” or one that is not always observable from a distance. Perhaps the microwave weapon or the computer attack was successful, and perhaps it was not—how much credence would a commander be willing to give a theoretical probability when lives are at stake? Also, microwave and other electromagnetic weapons more frequently result in “upset” rather than destruction. The equipment is not destroyed, but computers need to be rebooted and communication links reset. While this type of upset could be catastrophic in a modern fighter jet moving faster than the speed of sound, it might be only an annoyance in a field artillery unit that could rapidly rejoin the fight.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
| Arms Control | Diplomacy |
| Security | Trades & Tariffs |
| Treaties | African |
| Asian | Australian & Oceanian |
| Canadian | Caribbean & Latin American |
| European | Middle Eastern |
| Russian & Former Soviet Union |
The Secret History by Donna Tartt(18840)
The Social Justice Warrior Handbook by Lisa De Pasquale(12141)
Thirteen Reasons Why by Jay Asher(8791)
This Is How You Lose Her by Junot Diaz(6778)
Weapons of Math Destruction by Cathy O'Neil(6139)
Zero to One by Peter Thiel(5684)
Beartown by Fredrik Backman(5594)
The Myth of the Strong Leader by Archie Brown(5421)
The Fire Next Time by James Baldwin(5246)
How Democracies Die by Steven Levitsky & Daniel Ziblatt(5127)
Promise Me, Dad by Joe Biden(5087)
Stone's Rules by Roger Stone(5026)
100 Deadly Skills by Clint Emerson(4840)
A Higher Loyalty: Truth, Lies, and Leadership by James Comey(4840)
Rise and Kill First by Ronen Bergman(4701)
Secrecy World by Jake Bernstein(4640)
The David Icke Guide to the Global Conspiracy (and how to end it) by David Icke(4624)
The Farm by Tom Rob Smith(4434)
The Doomsday Machine by Daniel Ellsberg(4415)