Threat of Cyber Operations to Democracy and National Security Essay (Critical Writing)

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The nature of warfare has changed significantly since the end of the Second World War. While there have been several military conflicts during this period, the major powers have not declared all-out wars on each other. This used to be common in the first half of the 20th century (Bahgat 2018). After 1945, covert operations became the preferred mode of exerting influence (Muñoz et al. 2018). The United States, the Soviet Union, and their allies secretly sponsored belligerents who in-turn pledged to facilitate the political effects intended by powerful nations (Acton 2018). The advent of the Internet and related technology has prompted these and other countries to alter their modus operandi yet again. Cyber warfare is a lot cheaper and safer than armed combats (Fuller 2019). The United States is increasingly concerned by the fact that adversaries such as China, Iran, and Russia have a more effective means of actualizing their motives than it has ever been the case before.

Cyber Operations Threatening the Stability of the United States

Democracy is the cornerstone of the American society without which the country would lose its identity. Among its most important characteristics include the recognition of individual’s dignity, respect for equality, faith in the rule of the majority, and respect for the rights of the minority (Muñoz et al. 2018). Moreover, the necessity to compromise is widely accepted, and this is why there are several omnibus bills will bi-partisan support. Another element not found among the US’ adversaries is insistence on individual freedoms (Fuller 2019). The fact that these values are treasured anywhere in the world threatens the stability of such totalitarian regimes as China, Iran, and Russia. This is why the exploit the capability that is facilitated by the Internet to unduly influence American elections (Banks and Evan 2016). The most significant intrusion in recent history was in 2016 (Acton 2018). Nonetheless, it is believed that they interfere with voting machines in every election cycle.

Apart from ruining democracy within the US, cyber-attacks have also been used to undermine American foreign relations. When Wikileaks published details of what was alleged to have been America’s spying on countries around the world, cooperation with such allies as Brazil and Germany was negatively impacted (Fuller 2019). These materials had been acquired through hacking, and the parties which disseminated them did not understand how and why the data was being gathered (Muñoz et al. 2018). Even if the entire information was positive, other nations would still be hesitant to share sensitive materials with the American government officials. In essence, overt leakers like Wikileaks, Edward Snowden, and Chelsea Manning undermine the American status in the world (Banks and Evan 2016). It is not usually apparent who commissions such attacks on the US systems, but it has been alleged that Wikileaks has worked in close coordination with Russia. China and Iran may also be coordinating their activities with saboteurs in America.

Cyber-attacks by China, Russia, and Iran undermine the US national security. First, it demands for a complete analysis of the system to determine to what extent it was intruded, and the kind of damage that was done (Fuller 2019). These activities as well as the efforts to repair the destruction done cost a significant amount of money, and they are time consuming (Muñoz et al. 2018). Resources are redirected to repair rather than on research and development of the systems which would keep Americans safe and improve their quality of life (Banks and Evan 2016). This calls for the government and other parties involved to routinely conduct penetration testing in order to uncover any vulnerabilities.

Penetration testing is the practice of examining computer systems for vulnerabilities. It is common with business organizations, but it is unclear if government agencies engage in this process on a regular basis. The idea behind this process is to imagine the loopholes which an attacker would exploit in their endeavor to undermine the American society (Bahgat 2018). It can either be done manually, or software applications may be developed in a bid to observe their effect on the functionality of the American government’s computing resources (Acton 2018). The vulnerabilities identified are then addressed before a foreign adversary takes advantage of them.

There are various testing methods, and the most appropriate choice depends on a couple of factors. These include the availability of resources, time, and the personnel (Muñoz et al. 2018). An agency can undertake external or internal testing, or even blind testing. Other options include double-blind, and targeted penetration testing. External testing is usually the most preferable as it targets the kinds of resources which are publicly available (Bahgat 2018). That means an adversary based in a foreign jurisdiction can stage a successful attack (Acton 2018). If the circumstances allow, several kinds of approaches ought to be used in order to ensure that every potential weakness is addressed.

Conclusion

It is possible that US adversaries have opted to utilize cyber operations due to their cost effectiveness and the significant impact they have. There have been a couple of successful operations by countries such as Russia and Iran, and this is a matter of serious concern to the US (Bahgat 2018; Banks and Evan 2016). American national security is being undermined, and so is the country’s foreign relations (Fuller 2019). Through penetration testing, the United States can mitigate Internet-based attacks of all kinds.

References

Acton, James M. 2018. “Escalation through Entanglement: How the Vulnerability of Command-and-Control Systems Raises the Risks of an Inadvertent Nuclear War.” International Security 43 (1): 56–99.

Bahgat, Gawdat. 2018. “The Brewing War between Iran and Israel: Strategic Implications.” Middle East Policy 25 (3): 67–79.

Banks, William C., and Evan J. Criddle. 2016. “Customary Constraints on the Use of Force: Article 51 with an American Accent.” Leiden Journal of International Law 29 (1): 67–93.

Fuller, Christopher J. 2019. “The Roots of the United States’ Cyber (In)Security.” Diplomatic History 43 (1): 157–85.

He, Meilin, Laura Devine, and Jun Zhuang. 2018. “Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach.” Risk Analysis: An International Journal 38 (2): 215–25.

Muñoz, Fernando Román, Esteban Alejandro Armas Vega and Luis Javier García Villalba. 2018. “Analyzing the Traffic of Penetration Testing Tools with an IDS.” Journal of Supercomputing 74 (12): 6454–6469.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2023, June 26). Threat of Cyber Operations to Democracy and National Security. https://ivypanda.com/essays/threat-of-cyber-operations-to-democracy-and-national-security/

Work Cited

"Threat of Cyber Operations to Democracy and National Security." IvyPanda, 26 June 2023, ivypanda.com/essays/threat-of-cyber-operations-to-democracy-and-national-security/.

References

IvyPanda. (2023) 'Threat of Cyber Operations to Democracy and National Security'. 26 June.

References

IvyPanda. 2023. "Threat of Cyber Operations to Democracy and National Security." June 26, 2023. https://ivypanda.com/essays/threat-of-cyber-operations-to-democracy-and-national-security/.

1. IvyPanda. "Threat of Cyber Operations to Democracy and National Security." June 26, 2023. https://ivypanda.com/essays/threat-of-cyber-operations-to-democracy-and-national-security/.


Bibliography


IvyPanda. "Threat of Cyber Operations to Democracy and National Security." June 26, 2023. https://ivypanda.com/essays/threat-of-cyber-operations-to-democracy-and-national-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1