Modern Technologies
Modern Technologies
NETWORKED COMPUTERS
The most developed technology of mass empowerment is the
planet’s networked computer infrastructure. Access to the
Internet is ubiquitous in much of the world: according
to some statistics, 40 percent of households globally are
connected, reflecting explosive growth over a decade ago. An
immense and ever growing number of people are
capable of manipulating computers connected to the network.
As a result, the expertise to launch cyberattacks and
cyberexploitations is widely, though certainly not
evenly, distributed, and the subject of cybersecurity has
spawned an enormous literature. For our purposes, the most
relevant points are that cyberintrusions—whether aimed
at military systems, intendedto disrupt social and economic
activity, or used simply to steal information, data, or
money—take place constantly. They come from governments of
rival nations, from members of criminal gangs, from
politically motivated hacker groups, or simply from
disaffected individuals. Identifying perpetrators involves time,
money, and significant doubt. The anonymity and accessibility of
the Internet, together with the sheer volume of cyberattacks,
makes deterrence and attribution of intrusions particularly
9
difficult.
The objectives behind cyberintrusions can vary as
widely as the societal functions that now depend on
computerized networks. Most involve garden-variety attempts
at fraud and theft. Some, like Luis Mijangos’s crimes,
involve more intrusive assaults on people’s personal dignity—
something closerto online rape. In others, as in the
case of MonaJaud Awana, a Palestinian woman, who lured
an Israeliteenager via Internet chat to meet with her and
then killed him, cyberspace only serves to facilitate traditional
criminal or terrorist activity. Cyberintrusions also involve
espionage, as attackers regularly steal huge volumes of information
from companies and governments alike.10
Some intrusions seek not merely to exploit information
technology systems but to damage them or alter their functioning.
So-called denial-of-service attacks against a variety of
governmental and corporate targets have become common
in recent years.More sophisticated attacks that exploit
software vulnerabilities and human weakness have become
prevalent as well, threatening military systems, vital
infrastructure, and other crucial, network-dependent
installations.
Although hard to assess, the probability of a truly
catastrophic cyberattack, like a meltdown of the world’s
financial system or a broad-based attackon the
electric grid, is certainly not negligible. An attackof this
magnitude will likely remain the province of professional
intelligence services for some time to come. But a
number of high-profile incidents in recent years have
underscored the fact that such an attackcannot be ruled
out. In 2007, the Departmentof Homeland Security conducted
a test in whichit hacked into a model power plant
control system and destroyed a generator by changing
its operating cycle. The nations of Georgia and Estonia
foundtheir government computers and Internet connectivity
subject to systematic attackwhen they had political and
military confrontations with Russia. And, of course, the
possibility of cyberwarfare involving nuclear power plants
was vividly on display in the case of the so-called
Stuxnet worm, revealed in 2010 to have attacked the
Iranian uranium-enrichment program by speeding up specific
centrifuge models, and in other attacks of a similar
nature dubbed “Olympic Games,”both reportedly launched by
the United States and Israel.11
While the highest-profile cybersecurity incidents of
recent years have generally been state-to-state affairs, the
power to conduct low- to medium-grade attacks and
exploitations on a wide scale has clearly migrated to
actors far below the level of sovereign states. The
most famous example is the hacker groupknown as
Anonymous, whose diffuse and largely uncoordinated
membership has launched attacks on a range of
targets—from Sony, to companies that refused to host
WikiLeaks, to government websites, to the Church of
Scientology.But it is not the only example. Consider the
following, all of whichtook place in August 2013 alone:
A hacker collective calling itself the Syrian Electronic
Army launched successful attacks against Twitter, the New
York Times, and the WashingtonPost, taking one newspaper off
the Internet for the better part of a day and
redirecting traffic from the other to its own site. Someone
launched a denial-of-service attackon the entire Chinese
Internet, slowing or stopping trafficfor more than six hours
(it was unclear whether the attackwas the work of a
nation-state). The press revealed “deepcyberattacks” against three
banks over the previous three months, costing those institutions
millions of dollars as hackers gained control of their
wire-payments applications. A Pakistani hacker claimed credit
for a series of hacks that affected 650 Israeliwebsites
associated with the government, corporations, and individuals. A
groupof Afghan hackers, meanwhile, attacked Pakistani
websites. One can compile a similar list for any
12
month of any recent year.
Of course, nonstate intrusions lie along a continuum, from
entirely legitimate cyberactivism—which can often serve to erode
government power in salutary ways—to cyberharassment
and “hacktivism,” all the way to full-on attacks. What
all have in common is the use of widely distributed
networked computers and telecommunications to allow individuals
—for good or ill, on their own or in formal or
informal arrangements with one another—to engage in
conflict against governments or other large entities that
have traditionallywielded great power.