Cyber
War Summary
Chapter
1, 2
In
the first chapter, Richard
Clarke explores beyond the
“geek-talk” of computer scientist and reputed hackers to expound convincingly
and clearly the meaning of cyber war, the workings of cyber weapons, and the
extent of vulnerability as a web of cyber criminals loom. The author documents
the initial cyber crisis meeting conducted in the White House more than a
decade ago and its importance in the successive introduction of policies to
monitor cyberactivity. He reveals the presence of underground electrical
tunnels in Manhattan
that can possibly serve as launch points of future cyber wars. Furthermore, Clarke
traces the rise of information technology and cyber age as he profiles the
unlikely places and characters at the battlefield epicenter.
In
Cyber War, Clarke
describes in detail multiple methods of hacking networks for malicious
purposes. For example, he explains that “spoofing” of IP address is intentional
to alter the source of internet communication. On the other hand, Distributed
Denial of Service (DDOS) attack floods particular servers with data traffic
with an intention of crashing the system. He also highlights logic bombs,
trapdoors, and worms. Furthermore, the author outlines ARPANET’s (Advanced
Research Projects Agency Network) origins and its uses by government facilities
and major universities in sharing of data. It was done via peer networks and
has grown today to as a critical tool for military and commercial
communications.
Chapter
4: Defense Fails
In
chapter four’s “Defense Fails”, the
writer recounts a league of foreign cyber spies that gained unauthorized access
into the office of the Defense Secretary and US control systems. He also hints
of plans to protect the secrets of America ’s future fighter jets.
Militarily and economically, Richard
Clarke argues that The US
government has already lost cyber battles in the new millennium to Russia and China through theft of nuclear and
hydrogen bomb secrets.
In
several chapters across the book, the author prescriptions on an improvement of
cyber security are valuable and helpful if implemented. First, he proposes that
carriers with fiber optic networks should be obligated to routinely inspect
their packets while deleting those that are defective with malware and virus
signatures. However, it is notable that the information security industry is
shifting away from strategies that are signature-based. Additionally, Clarke proposes that the ISP providers should be required to
filter faulty packets. He persuades the authorities to set up binding and
auditable rules for firms that oversee operations of critical infrastructure.
Cyber
Peace
In the 6 and7, Richard Clarke
provides theoretical and practical prescriptions for improved cyber security
both nationally and internationally. He reasons that there is no need for the US
domination of cyberspace domain because it already possesses some of the best
and advanced cyberspace offensive capabilities. Contrasting sharply is the America 's
need for a conception of cyber strategy to create a better defense to her
critical infrastructure.
The
writer is convinced that the cracks that are evident in the country’s defensive
position cannot be reciprocated by the current offensive prowess. Unless there is a reduction or complete
elimination cyberspace vulnerabilities, chances are high that America could fall a victim of
self-deterrence. In light of this realization, defending the country the
current and future cyber-inspired attacks should be prioritized. In fact, the
author states that a lacking credibility in cyber defense strategy could
escalate the cyber conflict to an all-out kinetic war.
In
summary, it is clear that Cyber War
touches on an important and interesting topic that should be included in the
agenda of national security discussions. It is true that not all the threats
highlighted by Clarke are feasible, but he
underscores that critical infrastructure in the United States lacks adequate
security against cyber attacks. Improving military and cyber technology
capabilities of countries such as North Korea ,
Russia and China are indeed a threat to Americas ’
global dominance. While America ’s
defensive and offensive capabilities are guaranteed to ensure safety in the
short-run, the growing influence and technological might of China and Russia should not be
underestimated.
References
No comments:
Post a Comment