Cyber Warfare: Prepping for Tomorrow

Cyber Warfare: Prepping for Tomorrow

609
0
SHARE

By Bobby Akart, Author and APN Contributor

Albert Einstein once wrote:

I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones.

In poll after poll, one of the primary threats concerning preppers is the use of a cyber attack to cause a collapse of our vulnerable critical infrastructure. There are many bad actors on the international stage – Russia, China, North Korea, Iran, Syria, and now the terrorist group, ISIS. Each is capable of wreaking havoc in the US by shutting down our power grid and enjoying the resulting chaos.

No bombs. No bullets. No swordfights. Just a few keystrokes on the computer.

And we’re done.

 Cyber Warfare

Simply put, a Cyber Attack is a deliberate exploitation of computer systems. Cyber Attacks are used to gain access to information but can also be used to alter computer code, insert malware or take over the operations of a computer driven network.

Why would terrorists bother with an elaborate, dangerous physical operation—complete with all the recon and planning of a black ops mission — when they could achieve the same effect from the comfort of their home? An effective cyber attack could, if cleverly designed, produce a great deal of physical damage very quickly, and interconnections in digital operations would mean such an attack could bypass fail safes in the physical infrastructure that stop cascading failures.

One string of ones and zeroes could have a significant impact. If a computer hacker could command all the circuit breakers in a utility to open, the system will be overloaded. Power utility personnel sitting in the control room could do it. A proficient cyber-terrorist can do it as well. In fact, smart-grid technologies are more susceptible to common computer failures. New features added to make the system easily manageable might render it more vulnerable.

bobby akart cyber warfare

The very real threat posed to America by cyber warfare can be summarized by six central scenarios.
Over many decades, the U.S. has created the greatest military force the world has ever seen. But our research has proven that the biggest threat to national security comes from a computer with a simple Internet connection— not from aircraft carriers, tanks or drones.

Threats to the public sector

The U.S. government fends off a staggering eighty thousand cyber attacks a year. There is good reason Director of National Intelligence James Clapper ranks cyber terrorism as the number one national security threat, ahead of traditional terrorism, espionage and weapons of mass destruction.

Threats to the private sector

While rogue nation-states are interested in causing damage to governments, for some hackers and cyber criminals, cyber intrusions in the form of theft of intellectual property, personal data, and website defacement is enough to keep them occupied. The FBI notified nearly four thousand U.S. companies that they were the victims of cyber attacks in 2014. Victims of hackers ranged from the financial sector to major defense contractors to online retailers.

Use of social media to issue threats and calls to action for terrorists

Social media has become a haven for cyber criminals and terrorists. As Facebook, Twitter and Pinterest have become an integral part of our lives, criminals now use these venues to commit cyber theft or as a method of communication for terrorists. Nearly one in three U.S. adults say one of their social media accounts has been compromised. Cyber security analysts believe ten to fifteen percent of home computers globally are already infected with viruses and malware.

Use of the cyber arena to spread propaganda to gain economic or military advantage

The Russians established a sophisticated propaganda machine under the supervision of its Internet Research Agency that waged a massive disinformation campaign in support for its annexation of Crimea and its invasion of Ukraine. These hired guns work hard, each one pumping out hundreds of comments and blog posts per shift. In addition, each hacktivist troll is reportedly required to post 50 news articles a day while maintaining half a dozen Facebook and more than ten Twitter accounts. It is not unusual for this machine to be used to gain a militaristic advantage as the Russians spread incorrect information throughout the online media.

Use of cyber attacks to conduct industrial espionage

While the Russians are notorious for gaining a military advantage through the use of cyber tactics, the Chinese are a determined bunch when comes to stealing valuable public and private sector trade secrets. The vast majority of America’s intellectual property theft is believed to originate from China. The Chinese employ elite hackers housed by the government throughout the world to mask their real affiliations. China’s goal has been to catch up with the U.S. in direct military strength.

The biggest threat: Collapse of the nation’s power grid

On July 8, 2015, Americans watched as trading was halted on the New York Stock Exchange (NYSE) floor. At the same time, computer reservation systems at United Airlines were down, and the Wall Street Journal newspaper computer networks crashed.

This was not a scene from your favorite author’s books of fiction; it was very real. According to reports, the interruption of the services mentioned was a mere coincidence, and the events were unrelated. These incidents and many more have raised public awareness of the vulnerability of our nation’s critical infrastructure.

cyber warfare map

How do we prepare?

Cybergeddon or World War C is not here yet, but it might be tomorrow. You never know when the day before—is the day before.

Under the most likely scenarios, the effects of a cyber war on most businesses are more likely to be disruptive than apocalyptic for two main reasons. Cyber intrusions can immobilize your business operations for hours and maybe days. Modern critical infrastructures tend to have enough built-in stop-gap measures and protections to prevent a cataclysmic crash of the entire power grid simultaneously or for an extended period.

However, the potential for a collapse of America’s power grid is what concerns preppers the most. The threats we face are many. At FreedomPreppers.com, Americans are urged to prepare for a worst-case scenario. If nothing happens, you’ve lost nothing. For the United States, short of nuclear annihilation, the worst case scenario is an extended grid down collapse event.

Many preparedness consultants urge you to be ready for the plausible – natural disasters such as hurricanes, tornados, floods, earthquakes. At Freedom Preppers, we believe that a committed prepper is one who is ready for the worst-case-scenario, like a collapse of the critical infrastructure. Cyber Warfare is plausible, trust us. The extensive research we compiled can be found in our new book, Cyber Warfare, book one in the Prepping for Tomorrow Series. Once you have read this important analysis, I think you will agree that today is a great day to enhance your preparedness plan.

Because, we won’t know from whom or from where, but we will certainly know when.

Bobby is the best-selling author of the epic series of novels entitled The Boston Brahmin Series. Political suspense collides with post-apocalyptic thriller fiction as nine Bostonians whose lineage dates back to the American Revolution navigate the societal and economic collapse of America.  Can The Loyal Nine save the republic while protecting the interests of their mysterious benefactors — The Boston Brahmin.  Learn more at www.TheBostonBrahmin.com.

Because you never know when the day before … is the day before.
Prepare for tomorrow.

~ by Bobby Akart, Contributing writer to the American Preppers Network and Amazon best selling author of The Boston Brahmin Series, Cyber Warfare, Seeds of Liberty and  Evil, Meet Opportunity.

For more information, visit FreedomPreppers.com,  BobbyAkart.com
and TheBostonBrahmin.com

Follow us on Twitter: @FreedomPreppers and @BobbyAkart

Follow us on Facebook: FreedomPreppers and BobbyAkart

 

 

This article first appeared on American Preppers Network and may be copied under the following creative commons license.  All links and images including the CC logo must remain intact.

creative

The post Cyber Warfare: Prepping for Tomorrow appeared first on American Preppers Network.

American Preppers Network