International Journal of Sustainable Development Research

| Peer-Reviewed |

Cyberwar-The New Frontier of International Warfare

Received: 20 August 2015    Accepted: 10 September 2015    Published: 14 September 2015
Views:       Downloads:

Share This Article

Abstract

In cyberwar, people use technological means to launch a variety of attacks. Some of these attacks take a very conventional form. Computers can be used, for example, for propaganda, espionage, and vandalism. Denial of service attacks can be used to shut down websites, silencing the enemy and potentially disrupting their government and industry by creating a distraction. Cyberwar can also be utilized to attack equipment and infrastructure, which is a major concern for heavily industrialized nations which rely on electronic systems for many tasks. Using advanced skills, people can potentially get backdoor access to computer systems which hold sensitive data or are used for very sensitive tasks. A skilled cyberwarrior could, for example, interrupt a nation's electrical grid, scramble data about military movements, or attack government computer systems. Stealthier tactics might involve creating systems which can be used to continually gather and transmit classified information directly into the hands of the enemy or using viruses to interrupt government computer systems.

DOI 10.11648/j.ijsdr.20150101.11
Published in International Journal of Sustainable Development Research (Volume 1, Issue 1, September 2015)
Page(s) 1-6
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Previous article
Keywords

Cyberwarfare, Cyberspace, Espionage, Virtual Attacks, Cyberattacks, Propaganda, Denial-of-Service (DoS)

References
[1] DOD – Cyberspace. Dtic.mil. Retrieved 8 November 2011.
[2] Richard Clarke, Cyber War (New York: Harper-Collins, 2010), p. 6.
[3] Markoff, “A Code for Chaos”; "Cyberwar: War in the Fifth Domain" Economist, 1 July 2010.
[4] The Lipman Report, 15 October 2010.
[5] "Malware Hits Computerized Industrial Equipment" New York Times, 24 September 2010.
[6] Reuters: US concerned power grid vulnerable to cyber-attack. In.reuters.com (9 April 2009).
[7] Gorman, Siobhan. (8 April 2009) Electricity Grid in U.S. Penetrated By Spies. Online.wsj.com.
[8] "Clarke: More defense needed in cyberspace" HometownAnnapolis.com, 24 September 2010.
[9] Shiels, Maggie. (9 April 2009) BBC: Spies 'infiltrate US power grid'. BBC News.
[10] AFP: Stuxnet worm brings cyber warfare out of virtual world. Google.com (1 October 2010).
[11] Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon | Video on. Ted.com.
[12] "War in the fifth domain. Are the mouse and keyboard the new weapons of conflict?". The Economist. 1 July 2010. http://www.economist.com/node/16478792.
[13] Tom Gjelten (23 September 2010). "Seeing The Internet As An 'Information Weapon'". National Public Radio. http://www.npr.org/templates/story/story.php?storyId=130052701
[14] Arquilla, John, and David Ronfield. Networks and Netwars. Santa Monica, CA: Rand Corporation, 2001.
[15] Bush, George W.. The President’s Commission on Critical Infrastructure Protection, The National Strategy to Secure Cyberspace . Washington D.C.: The White House September 2002.
[16] Cater, Ashton. The Architecture of Government in the Face of Terrorism . International Security, vol. 26.
[17] Cordesman, Anthony. Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction . New York, NY: Praeger Publishers Inc., 2002.
[18] Cordesman, Anthony. Cyber-Threats, Information Warfare, and Critical Infrastructure Protection . New NY: Praeger Publications Inc., 2002.
[19] Ford, Warwick, and Michael S. Baum. Secure Electronic Commerce. Upper Saddle River, NJ: Prentice-Hall Inc., 2001.
[20] Garfinkel, Simson. Web Security, Privacy, and Commerce. Sebastopol, CA: O’Reilly & Associates, Inc., 2002.
[21] Green, Joshua, (2002). The Myth of Cyber Terrorism. http://www.washingtonmonthly.com/features/2000/0211.green.html.
[22] Hoffman, Bruce. Inside Terrorism . New York, NY: Columbia University Press, 1998.
[23] Huntington, Samuel P.. The clash of civilizations and the remaking of world order. New York, NY: Simon & Schuster Inc., 1996.
[24] Institute for Security Technology Studies. Cyber Attacks During the War on Terrorism: A Predictive Analysis. Darmouth College, 2001.
[25] Institute for Security Technology Studies. Combating Terrorism: A Compendium of Recent Counterterrorism Recommendations from Authoritative Commissions and Subject Matter Experts. Darmouth College, 2001.
[26] Kusher, Harvey. The Future of Terrorism: Violence in the new millennium . London, U.K.: Sage Publications Inc., 1998.
[27] Laquer, Walter. The New Terrorism: Fanaticism and the Arms of Mass Destruction. Oxford, U.K.,1999.
[28] Lesser, Ian, Bruce Hoffman, John Arquilla and Michelle Zanini. Countering the New Terrorism . Santa Monica, CA: Rand Corporation,1994.
[29] Molander, Rodger C., Andrew S. Riddile and Peter A. Wilson. Strategic Information Warfare. A new face of war. Santa Monica, CA: Rand Corporation, 1996.
[30] Nelson, Bill, Major, Major Rodney Choi, Major Michael Iacobucci, Major Mark Mitchell, and Captain Greg Gagnon. Cyberterror, Prospects and Implications.
[31] Monterey, CA: Center for the Study of Terrorism and Irregular Warfare. Naval Post Graduate School. 1999.
[32] Parks, Raymond C. and David P. Duggan. Principles of Cyber-Warfare. Proceedings of the 2001 IEEE workshop on Information and Security.
[33] Pillar, Paul. Terrorism and U.S. Foreign Policy. Washington, DC: Brookings Institution Press. 2001.
[34] Thomas, Douglas and Brian D. Loader. Cybercrime, Law enforcement, security and surveillance in the information age. New York, NY: Routledge Inc., 2000.
[35] Sofaear, Abraham D. and , Seymour E. Goodman. The Transnational dimension of cyber crime and terrorism . Stanford, CA: Hoover Institution Press. 2001.
[36] U.S. Joint Chief of Staff. Joint Doctrine for Information Operations. Joint Publication 3-13. Washington, D.C.: Joint Chief of Staff, 9 October 1998.
[37] Wall, David S. Crime and the Internet. New York, NY: Routledge Inc., 2001.
[38] ITU Toolkit for Cybercrime Legislation, p. 12, www.itu.int/cybersecurity.
[39] The United States Army’s Cyberspace Operations Concept Capability Plan 2016-2028, 22 February 2010, p. 6.
[40] Cabinet Office, “Cyber Security Strategy of the United Kingdom” (Safety, Security and Resilience in Cyber Space), June 2009, p. 7.
[41] Federal Ministry of the Interior, “The New Cyber Security Strategy for Germany,” Berlin, February 2011, p. 14.
[42] Sebastian M. Convertino II, Lou Anne De Mattei, Tammy M. Knierim, Flying and Fighting in Cyberspace (Alabama: Air University Press, July 2007).
[43] Amos Granit, Cyberspace as a Military Domain – In What Sense? Institute for Intelligence Studies at IDF Military Intelligence, March 2010.
[44] “RSA Computerization Infrastructures Breached; Risk to Customer Information Security,” The Marker, March 19, 2011.
[45] U.S. Department of Defense, Office of the Assistant Secretary of Defense,“Remarks on Cyber at the RSA Conference,” as delivered by William J. Lynn, III, San Francisco, California, February 15, 2011 [hereafter: Lynn, February 15,2011]. http://www.defense.gov/speeches/speech.aspx?speechid=1535.
[46] John Markoff, “A Code for Chaos,” New York Times, October 2, 2010, based on Thomas C. Reed, a former secretary of the Air Force, in his book At the Abyss: An Insider’s History of the Cold War (New York: Ballantine Books, 2004).
[47] Siobhan Gorman, August Cole, and Yochi Dreazen, “Computer Spies Breach Fighter-Jet Project,” Wall Street Journal, April 21, 2009.
[48] Yitzhak Ben-Horin, “War on the Web: Fictitious Bloggers Serving the US,” Ynet, March 18, 2011.
[49] Anshel Pfeffer, “Weapon against Oppression: Plane for Internet Connection,” Haaretz, February 9, 2011.
[50] William J. Lynn, “The Pentagon Cyber Strategy,” Foreign Relations, August 2010.
[51] Thomas Rid and Peter McBurney, “Cyber-Weapons,” RUSI Journal 157, no. 1(February 6-13, 2012).
[52] Yaniv Leviatan, “This is how we Fought with Computers, about Computers, and through Computers in the Last Decade,” Maariv Online, December 31, 2009.
[53] “The NATO Cyber War Agreement,” Strategy Page (www.strategypage.com),May 1, 2010.
[54] U.S. Cyber Consequences Unit, “Overview by the US-CCU of the Cyber Campaign against Georgia in August of 2008,” 2009, http://www.registan.net/wp-content/uploads/2009/08/US-CCU-Georgia-Cyber-Campaign.
[55] Matan Mittelman, “Another Step in Exposing the Mystery Surrounding Stuxnet,” The Marker, November 16, 2010.
[56] “Ahmadinejad Admits: Virus Damages Nuclear Computers,” Walla, November 29, 2010.
[57] Yossi Hatoni, “The War for the Atom,” People and Computers website, September 26, 2010.
[58] “Iran Accuses: Israel and the United States Created the Stuxnet Computer Worm,” Haaretz Online, April 16, 2011.
[59] International Strategy for Cyberspace, The White House, May 2011. See http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.
[60] Allied Command Operations (ACO), “NATO’s ‘Cyber Coalition’ Exercise a Collaboration in Cyber Defence,” www.aco.nato.int, November 18, 2010.
[61] Spacewar, “US: NATO Networks Vulnerable to Cyber Threat,” www.spacewar.com, January 25, 2011.
[62] “DOD Report Cyber Attacks Could Elicit Military Response,” November 16, 2011,http://www.infosecisland.com/blogview/18218-DoD-Report-Cyber-Attacks-Could-Elicit-Military-
[63] Yossi Hatoni, “The United States: The Pentagon to Establish Headquarters for Online Warfare against Terrorism and Crime,” People and Computers website, June 24, 2009.
[64] TEHILA website, www.tehila.gov.il.
[65] Israel Government Information Security website, www.cert.gov.il.
[66] General Security Service (Shabak) website, www.shabak.gov.il.
[67] Gabi Siboni, “Protecting Critical Assets and Infrastructures from Cyber Attacks,” Military and Strategic Affairs 3, no. 1 (2011): 96, at http://www.inss.org.il/upload/(FILE)1308129638.pdf.
[68] Amir Oren, “IDF’s New Fighting Arena – in Computer Networks,” Haaretz, January 2, 2010.
Author Information
  • Department of Computer Science, Adekunle Ajasin University, Akungba Akoko, Ondo State, Nigeria

  • Department of Mathimatical Science, Ekiti State University, Ado-Ekiti, Ekiti State Nigeria

Cite This Article
  • APA Style

    Bello O. A., Aderbigbe F. M. (2015). Cyberwar-The New Frontier of International Warfare. International Journal of Sustainable Development Research, 1(1), 1-6. https://doi.org/10.11648/j.ijsdr.20150101.11

    Copy | Download

    ACS Style

    Bello O. A.; Aderbigbe F. M. Cyberwar-The New Frontier of International Warfare. Int. J. Sustain. Dev. Res. 2015, 1(1), 1-6. doi: 10.11648/j.ijsdr.20150101.11

    Copy | Download

    AMA Style

    Bello O. A., Aderbigbe F. M. Cyberwar-The New Frontier of International Warfare. Int J Sustain Dev Res. 2015;1(1):1-6. doi: 10.11648/j.ijsdr.20150101.11

    Copy | Download

  • @article{10.11648/j.ijsdr.20150101.11,
      author = {Bello O. A. and Aderbigbe F. M.},
      title = {Cyberwar-The New Frontier of International Warfare},
      journal = {International Journal of Sustainable Development Research},
      volume = {1},
      number = {1},
      pages = {1-6},
      doi = {10.11648/j.ijsdr.20150101.11},
      url = {https://doi.org/10.11648/j.ijsdr.20150101.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ijsdr.20150101.11},
      abstract = {In cyberwar, people use technological means to launch a variety of attacks. Some of these attacks take a very conventional form. Computers can be used, for example, for propaganda, espionage, and vandalism. Denial of service attacks can be used to shut down websites, silencing the enemy and potentially disrupting their government and industry by creating a distraction. Cyberwar can also be utilized to attack equipment and infrastructure, which is a major concern for heavily industrialized nations which rely on electronic systems for many tasks. Using advanced skills, people can potentially get backdoor access to computer systems which hold sensitive data or are used for very sensitive tasks. A skilled cyberwarrior could, for example, interrupt a nation's electrical grid, scramble data about military movements, or attack government computer systems. Stealthier tactics might involve creating systems which can be used to continually gather and transmit classified information directly into the hands of the enemy or using viruses to interrupt government computer systems.},
     year = {2015}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Cyberwar-The New Frontier of International Warfare
    AU  - Bello O. A.
    AU  - Aderbigbe F. M.
    Y1  - 2015/09/14
    PY  - 2015
    N1  - https://doi.org/10.11648/j.ijsdr.20150101.11
    DO  - 10.11648/j.ijsdr.20150101.11
    T2  - International Journal of Sustainable Development Research
    JF  - International Journal of Sustainable Development Research
    JO  - International Journal of Sustainable Development Research
    SP  - 1
    EP  - 6
    PB  - Science Publishing Group
    SN  - 2575-1832
    UR  - https://doi.org/10.11648/j.ijsdr.20150101.11
    AB  - In cyberwar, people use technological means to launch a variety of attacks. Some of these attacks take a very conventional form. Computers can be used, for example, for propaganda, espionage, and vandalism. Denial of service attacks can be used to shut down websites, silencing the enemy and potentially disrupting their government and industry by creating a distraction. Cyberwar can also be utilized to attack equipment and infrastructure, which is a major concern for heavily industrialized nations which rely on electronic systems for many tasks. Using advanced skills, people can potentially get backdoor access to computer systems which hold sensitive data or are used for very sensitive tasks. A skilled cyberwarrior could, for example, interrupt a nation's electrical grid, scramble data about military movements, or attack government computer systems. Stealthier tactics might involve creating systems which can be used to continually gather and transmit classified information directly into the hands of the enemy or using viruses to interrupt government computer systems.
    VL  - 1
    IS  - 1
    ER  - 

    Copy | Download

  • Sections