Cyberwarfare

= What Is Cyberwarfare? = toc Cyberwarfare involves conducting malicious actions via the electronic environment, particularly in conjunction with computer networks over the internet. A definitive term for “cyberwarfare” has not been recognized, however, since a range of people or groups can conduct malicious operations to varying degrees. Some have argued the importance of distinguishing it from concepts like “cyber espionage, cyber crime, identity theft, credit card fraud…”, and other kinds of computer attacks, because without a proper definition it is hard to determine how to confront it (Defining Cyber Warfare, 2011). As it receives more attention from government and international organizations, however, a common understanding of “cyberwarfare” is being developed. For instance, researchers at The Institute for Security, Technology, and Society at Dartmouth College published an analysis report wherein they described cyberwarfare as involving computerized attacks on information systems conducted under the auspices of regulated bodies or institutions such as nation-states (Billo & Chang, 2004). Other aspects of cyberwarfare are that it can involve attacks in an overt or even covert sense. The key component of any attack, however, is a computer program made up of code. Cyberwarfare, then, involves creating a code and using it to access a program and act on it in some detrimental way.

Cyberwarfare can present itself through various kinds of computer attacks. An overt attack is where the damage is immediately recognized, such as the Stuxnet code that destroyed nuclear facilities in Iran (Greenberg, 2010). A covert attack would involve a situation in which a computer program gains unauthorized access to an encrypted network and takes information unbeknownst to the source provider. One possible example of this is the “Duqu” virus. This new virus supposedly enters a computer system, records key information, and after a predetermined time period sends out that information and then self destructs (“Stuxnet Clone…”, 2011).

Cyberwarfare And The World Of Information
Cyberwarfare is a characteristic of the modern world where information has become the driving commodity for developed nations. A key component of this latest generation of warfare is information as well, with computers equitable to guns and programming code analogous to bullets. China, for example, has developed a comprehensive plan of action for conducting cyberwarfare that involves people creating spam, malware, and viruses to attack or infect the information systems of its adversaries (Marinero, 2011). The United States has even created a branch of the military dedicated to operations conducted via cyberspace known as U.S. Cyber Command.

==media type="youtube" key="DSMOs7CF1Eo" height="315" width="560" ==

How Does Cyberwarfare Affect The LIS Profession?
Many ideas have been presented for ways to prevent or deter cyberwarfare. At the core of nearly every idea is the need to create more secure systems. Additionally, international legislation addressing ways to identify and confront cyberwarfare is of increasing importance.

Cyberwarfare thus presents an important area for LIS professionals who are proficient in web technologies, database systems, or possibly even policy-making. The need for people to design, create, and monitor more secure systems is a growing concern. LIS professionals with such technical backgrounds could readily apply themselves to this kind of work, ensuring the safety and maintenance of sensitive information. Furthermore, those with a background in writing information policies and codes of conduct could potentially assist national and international bodies to develop the framework to deal with cyberwarfare.

An example of research relevant to policy-making in this area can be found at Rice University's James A. Baker III Institute for Public Policy.

**References**
Billo, C., & Chang, W. (2004, November). Cyber Warfare: An analysis of the means and motivations of selected nation states. Retrieved October 20, 2011, from http://info.ists.dartmouth.edu/library/list_all_by_type#type_6

//Defining Cyber Warfare//. (2011, February 23). Retrieved October 20, 2011, from http://www.homelandsecuritynewswire.com/defining-cyber-warfare

Greenberg, A. (2010, September 22). Theories mount that Stuxnet worm sabotaged Iranian nuke facilities. Retrieved October 20, 2011, from @http://www.forbes.com/sites/andygreenberg/2010/09/22/theories-mount-that-stuxnet-worm-sabotaged-iranian-nuke-facilities/

//Information Technology Policy//. (2011). Retrieved November 16, 2011, from @http://bakerinstitute.org/programs/information-technology-policy

Makki98. (2010, September 30). Stuxnet [Photograph]. Retrieved November 12, 2011, from @http://commons.wikimedia.org/wiki/File%3AStuxnet.jpg

Marinero, J. (2011, August 7). Chinese cyberwar activities. Retrieved October 20, 2011, from http://www.jamesmarinero.com/Research-Articles/Chinese-Cyberwar-Activities.html

Masters, J. (2011, May 23). Confronting the cyber threat. Retrieved October 20, 2011, from http://www.cfr.org/technology-and-foreign-policy/confronting-cyber-threat/p15577#p4

Mitchell, S., & Clair, P. (2011, July 3). Stuxnet - Cyber warfare [Video file]. Retrieved November 13, 2011, from @http://www.youtube.com/watch?v=DSMOs7CF1Eo

//Stuxnet Clone ‘Duqu’: The Hydrogen Bomb of Cyberwarfare?// (2011, October 19). Retrieved October 20, 2011, from http://www.foxnews.com/scitech/2011/10/19/stuxnet-clone-duqu-hydrogen-bomb-cyberwarfare/

Taipale, K. A. (2006, October 30). Deconstructing information warfare [Powerpoint presentation]. Retrieved October 20, 2011, from http://deconstructing-infowar.info/

//U.S. Cyber Command//. (2011, October). Retrieved November 10, 2011, from @http://www.stratcom.mil/fCyber_Command