xv For as long as humans have organized themselves into societies, there have been conflicts between those societies. The largest and most violent conflicts are col- lectively termed “wars,” and most theorists and philosophers of human interaction consider war to be an inherent part of the human condition. Wars are propagated by individuals, but they are organized and conducted by governments, using all the means at their disposal. As new innovations occur, they are often adapted for mili- tary conflict. The development of computer networks and the internet are no excep- tion to this phenomenon. Although to date no humans have been killed as a direct result of cyberattacks, operations throughout the cyber domain have still caused and enabled enormous devastation in the past two decades. The cyber domain is unique in that it is the first human-made domain through which nations may engage in violence against one another. It has also been utilized to enable crime, espionage, sabotage, and terrorism, all of which are often grouped under the term “cyber warfare.” The terminology of warfare has been adapted to fit the digital realm, often by simply adding “cyber” as a prefix to an existing term. Thus, “cybersecurity,” “cyberterrorism,” and “cyberwar” have all entered the lexicon of human conflict. In general, the same operations that might be launched in the physical domain have their corresponding possibilities in the cyber domain. Thus, the development of economic opportunities through the internet has also enabled the expansion of cybercrime, vastly increasing the amount that skilled thieves might pilfer in a short period of time. The creation of ways to store and secure large vol- umes of information has triggered a spate of cyberespionage, as hostile states, orga- nizations, and individuals seek to access materials through cyberespionage, despite the efforts of the owners to keep access strictly controlled. The internet has enabled a much greater interconnectivity of devices, including aspects of critical infrastruc- ture, making systems much more effective and efficient. Yet, this networking of physical items has also created an opportunity for cybersabotage, as hostile com- puter users attempt to hijack and destroy the same systems. Military recruitment and propaganda distribution have both been enabled by computer networks—but so has the recruitment of individuals to join terror organizations. INTRODUCTION
Previous Page Next Page