Acta Informatica Pragensia 2014, 3(1), 23-32 | DOI: 10.18267/j.aip.338854
The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.
- Institute of Information Studies and Librarianship, Faculty of Arts, Charles University in Prague, U Kříže 8, 158 00 Praha 5, Czech Republic
This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.
Keywords: Cyber Warfare, Cyber Security, Middle East, Malware, Stuxnet, Flame, Duqu
Received: March 30, 2014; Revised: May 24, 2014; Accepted: June 1, 2014; Published: June 20, 2014 Show citation
References
- BBC News. (2012a, June 8). Flame malware makers send 'suicide' code. Retrieved from http://www.bbc.com/news/technology-18365844.
- BBC News. (2012b, May 31). Flame: Israel rejects link to malware cyber-attack. Retrieved from http://www.bbc.com/news/technology-18277555.
- Biggs, J. (2007, October 18). Cyberwar: China Declares War On Western Search Sites. Retrieved from http://techcrunch.com/2007/10/18/cyberwar-china-declares-war-on-western-search-sites/.
- Carr, J. (2011). Inside Cyber Warfare: Mapping the Cyber Underworld. Sebastopol, CA: O'Reilly Media.
- Clarke, R. A., Knak, R. K. (2010). Cyber War: The Next Threat to National Security and What to Do about It. New York: HarperCollins.
- Collins, S., McCombie, S. (2012). Stuxnet: the emergence of a new cyber weapon and its implications. Journal of Policing, Intelligence and Counter Terrorism, 7(1), 80-91.
Go to original source...
- CRySyS Lab. (2012, 28 May). sKyWIper: A Complex Malware for Targeted Attacks. Budapest University of Technology and Economics. Retrieved from http://www.crysys.hu/skywiper/skywiper.pdf.
- Engleman, E. (2012, December 20). Major Banks Under Renewed Cyber Attack Targeting Websites. Retrieved from http://www.bloomberg.com/news/2012-12-20/major-banks-under-renewed-cyber-attack-targeting-websites.html.
- Erdbrink, T. (2012, April 23). Facing Cyberattack, Iranian Officials Disconnect Some Oil Terminals From Internet. The New York Times. Retrieved from http://www.nytimes.com/2012/04/24/world/middleeast/iranian-oil-sites-go-offline-amid-cyberattack.html?_r=0.
- Esposito, M. K. (2012). Quarterly Update on Conflict and Diplomacy. Journal of Palestine Studies, 42(1). Retrieved from http://www.palestine-studies.org/files/pdf/jps/9765.pdf.
Go to original source...
- Farewell J. P., Rohozinski R. (2011). Stuxnet and the Future of Cyber War. Survival: Global Politics and Strategy, 53(1), 23-40.
Go to original source...
- Fidler, D. P. (2011). Was Stuxnet an Act of War? Decoding a Cyberattack. IEEE Security & Privacy, 9(4), 56-59.
Go to original source...
- Finkle J. (2013, January 16). UPDATE 1-Malicious virus shuttered U.S. power plant -DHS. Reuters. Retrieved from http://www.reuters.com/article/2013/01/16/cybersecurity-powerplants-idUSL1E9CGFPY20130116.
- Howard, M., Paret, P. (1984). On War. New Jersey: Princeton University Press.
- Janczewski, L., Colarik, A. M. (2008). Cyber Warfare and Cyber Terrorism. Hershey: Information Science Reference.
- John, A. J., Ronfeldt, D. (1993). Cyberwar is Coming! Comparative Strategy, 12(2), 141-165.
Go to original source...
- Kaminski, R. (2012). Clash of Interpretations: Cyberattacks as "Weapons of Mass Destruction" In The 2012 Annual Meeting of the American Political Science Association. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2107008.
- Kaspersky Lab. (2012, June 11). Resource 207: Kaspersky Lab Research Proves that Stuxnet and Flame Developers are Connected. Retrieved from http://www.kaspersky.com/about/news/virus/2012/Resource_207_Kaspersky_Lab_Research_Proves_that_Stuxnet_and_Flame_Developers_are_Connected.
- Kindlund, D. (2012, May 30). Flamer/sKyWIper Malware: Analysis. FireEye. Retrieved from http://www.fireeye.com/blog/technical/targeted-attack/2012/05/flamerskywiper-analysis.html.
- Langner, R. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security & Privacy, 9(3), 49-51.
Go to original source...
- Lee, D. (2012, May 29). Flame: Massive Cyber-Attack Discovered, Researchers Say. BBC News. Retrieved from http://www.bbc.com/news/technology-18238326.
- Lynn, W. J. (2010). Defending a New Domain: The Pentagon's Cyberstrategy. Foreign Affairs. 97-108.
- Matrosov, A., Rodionov, E., Harley, D., Malcho, J. (2010). Stuxnet Under the Microscope. Retrieved from http://www.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf.
- Muskal, M., Guynn, J. (2013, February 1). Hackers target Western news organizations in China. Los Angeles Times. Retrieved from http://articles.latimes.com/2013/feb/01/business/la-fi-china-hacking-20130201.
- Nakashima, E. (2012, June 20). Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say. The Washington Post. Retrieved from http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html.
- Nicolas F., Liam O. M., Eric, Ch. (2011) W32. Stuxnet Dossier. Symantec Report. Retrieved from http://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-Stuxnet-Update-Feb-2011.pdf.
- SciencePages. (2013, March). Cyber Security. Retrieved from
- http://sciencepages.ca/wp-content/uploads/cybersecurity.pdf.
- Schneier B. (2010, July 10). Threat of 'cyberwar' has been hugely hyped. Retrieved from http://edition.cnn.com/2010/OPINION/07/07/schneier.cyberwar.hyped/index.html.
- Schwartz, M. J. (2012, August 9). Flame 2.0: Gauss Malware Targets Banking Credentials. Retrieved from http://www.darkreading.com/attacks-and-breaches/flame-20-gauss-malware-targets-banking-credentials/d/d-id/1105727?.
- Securelist.com. (2012, October 15). MiniFlame aka SPE: "Elvis and his friends". Retrieved from http://www.bbc.com/news/world-europe-20429704.
- Silverstein, R. (2012, May 29). Flame: Israel's New Contribution to Middle East Cyberwar. Retrieved from http://www.richardsilverstein.com/2012/05/28/flame-israels-new-contribution-to-middle-east-cyberwar/.
- Symantec. (2012, August). The Shamoon Attacks. Retrieved from http://www.symantec.com/connect/blogs/shamoon-attacks.
- Symantec Official Blog (2012, May 30). Flamer: Highly Sophisticated and Discreet Threat Targets the Middle East. (Web log post). Retrieved from http://www.symantec.com/connect/blogs/flamer-highly-sophisticated-and-discreet-threat-targets-middle-east.
- The New York Times. (2013, 12 February). President Obama' State of Union speech. Retrieved from http://www.nytimes.com/2013/02/13/us/politics/obamas-2013-state-of-the-union-address.html?pagewanted=all.
- Zetter, K. (2012, May 29). Meet 'Flame,' The Massive Spy Malware Infiltrating Iranian Computers. Wired. Retrieved from http://mashable.com/2012/06/04/flame-malware/.
This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.