Tuesday 10 May 2016

Cyber War Summary

Cyber War Summary
Richard Clarke was right when he warned the United States of an imminent terrorist havoc that would wreak the national security. The government took his predictions lightly. In his Cyber War book, he signals of another silent but dangerous threat. The novel entails the government structure, technological advancements, and military counter-strategies. It features stories about criminal minds, soldiers, spies, and hackers. Experts argue that Cyber War is one of the first books that cover on the war of the future and how the United States and the West are at a peril of losing. 
Chapter 1, 2
In the first chapter, Richard Clarke explores beyond the “geek-talk” of computer scientist and reputed hackers to expound convincingly and clearly the meaning of cyber war, the workings of cyber weapons, and the extent of vulnerability as a web of cyber criminals loom. The author documents the initial cyber crisis meeting conducted in the White House more than a decade ago and its importance in the successive introduction of policies to monitor cyberactivity. He reveals the presence of underground electrical tunnels in Manhattan that can possibly serve as launch points of future cyber wars.  Furthermore, Clarke traces the rise of information technology and cyber age as he profiles the unlikely places and characters at the battlefield epicenter. 
Clarke demonstrates his experience as a one-time government agent when he insightfully gave a unique perspective on state operations. This helps the reader to understand the problems faced by the federal government during the conception of comprehensive national security strategies. He openly criticizes the government unwillingness and inability to hand over cyber security standards to private firms. He gives instances of China and Russia’s strengthening cyber defenses because of state regulation and oversight of ISPs (Internet Service Providers).
In Cyber War, Clarke describes in detail multiple methods of hacking networks for malicious purposes. For example, he explains that “spoofing” of IP address is intentional to alter the source of internet communication. On the other hand, Distributed Denial of Service (DDOS) attack floods particular servers with data traffic with an intention of crashing the system. He also highlights logic bombs, trapdoors, and worms. Furthermore, the author outlines ARPANET’s (Advanced Research Projects Agency Network) origins and its uses by government facilities and major universities in sharing of data. It was done via peer networks and has grown today to as a critical tool for military and commercial communications.
Chapter 4: Defense Fails
In chapter four’s “Defense Fails”, the writer recounts a league of foreign cyber spies that gained unauthorized access into the office of the Defense Secretary and US control systems. He also hints of plans to protect the secrets of America’s future fighter jets. Militarily and economically, Richard Clarke argues that The US government has already lost cyber battles in the new millennium to Russia and China through theft of nuclear and hydrogen bomb secrets.
In several chapters across the book, the author prescriptions on an improvement of cyber security are valuable and helpful if implemented. First, he proposes that carriers with fiber optic networks should be obligated to routinely inspect their packets while deleting those that are defective with malware and virus signatures. However, it is notable that the information security industry is shifting away from strategies that are signature-based. Additionally, Clarke proposes that the ISP providers should be required to filter faulty packets. He persuades the authorities to set up binding and auditable rules for firms that oversee operations of critical infrastructure.

Cyber Peace
            In the 6 and7, Richard Clarke provides theoretical and practical prescriptions for improved cyber security both nationally and internationally. He reasons that there is no need for the US domination of cyberspace domain because it already possesses some of the best and advanced cyberspace offensive capabilities. Contrasting sharply is the America's need for a conception of cyber strategy to create a better defense to her critical infrastructure.
The writer is convinced that the cracks that are evident in the country’s defensive position cannot be reciprocated by the current offensive prowess.  Unless there is a reduction or complete elimination cyberspace vulnerabilities, chances are high that America could fall a victim of self-deterrence. In light of this realization, defending the country the current and future cyber-inspired attacks should be prioritized. In fact, the author states that a lacking credibility in cyber defense strategy could escalate the cyber conflict to an all-out kinetic war. 
In summary, it is clear that Cyber War touches on an important and interesting topic that should be included in the agenda of national security discussions. It is true that not all the threats highlighted by Clarke are feasible, but he underscores that critical infrastructure in the United States lacks adequate security against cyber attacks. Improving military and cyber technology capabilities of countries such as North Korea, Russia and China are indeed a threat to Americas’ global dominance. While America’s defensive and offensive capabilities are guaranteed to ensure safety in the short-run, the growing influence and technological might of China and Russia should not be underestimated. 
















References

Clarke, R. A., & Knake, R. K. (2014). Cyber War. Saybrook: Tantor Media, Incorporated.

No comments:

Post a Comment