At this juncture, it may be somewhat difficult to accept the claim that a threat to the telecommunications network, both wired and wireless, in the United States could potentially be subject to an attack catastrophic cyber attack. After careful research on the subject, it appears that the potential for an event of this magnitude, disrupting one or the other of the grids for an extended period or destroying both, is theoretically and realistically impossible. It may be that proponents – those who advance such theories – equate such “doomsday” scenarios as if a cyber attack were or could be of the same magnitude as a conventional or nuclear military attack. Terms like “cyber Pearl Harbor,” “cyber 9/11,” and “cyber Vietnam” have been used to describe potential catastrophic cyberattacks, and yet, “while many have put forward ideas about what a 'real' cyberwarfare would look like, we lack understanding. of how such conflicts will be conducted and develop." (Rattray and Healey, 2010, p. 77). However, the US government continues to focus on such events, as if the plausibility of small-scale cyberattacks were not so pressing. In 2010, former senior US officials ran a simulation imagining a catastrophic cyber attack, the origins of which trace back to how a mobile application equipped with self-replicating malware eventually overwhelmed wireless networks and disabled parts of wired and network communications. Internet, as well as reducing electricity supply channels and oil and gas pipelines (Corbin, 2010). Instead of considering the likelihood of such a catastrophe, the committee felt that if such an event were to occur, the government should take charge of telecommunications in this country, 85% of which o...... mid-paper . .....in the age of catastrophic terrorism. London: Routledge.Kotapati, K., Liu, P., Sun, Y., & LaPorta, T. F. (2005). A taxonomy of cyber attacks on 3G networks. In Intelligence and Security Computing (pp. 631-633). Retrieved November 11, 2013, from http://nsrc.cse.psu.edu/tech_report/NAS-TR-0021-2005.pdfTelecommunications and Cybersecurity Policy Program. (n.d.). The program of the global information society project for telecommunications policy. Retrieved November 11, 2013, from http://www.telecom-program.org/Rattray, G., & Healey, J. (2010). Categorization and understanding of offensive cyber capabilities and their use. In Committee on Deterring Cyber Attacks: Information Strategies and Development Options (Ed.), Proceedings of a Workshop on Deterring Cyber Attacks: Information Strategies and Development Options for US Policy. Washington, DC: National Academies Press.
tags