Hackers attempted to wipe the hard drives of Sony’s computers before the release of their film The Interview, which has Seth Rogen attempting to assassinate Kim Jong-un. The data the companies hold on the American populace as well as the importance of their purposes within society may also make them prime targets for attack.Īn absurd but valuable example of a cyber attack came from North Korea against Sony Pictures. When attacks target the software of Microsoft and Google, for example, these companies are likely to discover the intrusions before the government does. One unique aspect of current and future cyber operations is the degree to which private corporations will be involved. Still, a sort of Geneva Convention will likely prove necessary as the cyber front grows in importance. While the attacks seem extreme, they are still generally preferable to a traditional invasion if they are preventing war, they can be justified, in Sanger’s view. has yet to renounce using such an attack on our adversaries. Many fear a foreign adversary decommissioning American electric grids, though so far the U.S. The real worry is far more subtle: the “selective change of data.”Ĭyber warfare has yet to come under any sort of humanitarian convention, leaving the realm of acceptability incredibly murky. Sanger argued that cyber weapons are often misconceived in popular media they are not a new nuclear weapon. Sanger’s main topic was the evolution of cyber attacks over the last 15 years and what the future holds for this frontier. Previous Presidential Lecture Series speakers include historian Jared Diamond, journalists Carl Bernstein and Bob Woodward, and composer Stephen Sondheim. Sanger is the chief Washington correspondent for the New York Times and the author of “The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age.” He was given a brief introduction by TU President Brad Carson before his talk. Sanger gave a public talk in TU’s Reynolds Center as part of the Presidential Lecture Series. The New York Times writer discussed cyber warfare and geopolitics.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |