Error message

  • Warning: count(): Parameter must be an array or an object that implements Countable in theme_table() (line 1998 of /home/admin/web/peeweepc.com/public_html/includes/theme.inc).
  • Warning: count(): Parameter must be an array or an object that implements Countable in theme_table() (line 2061 of /home/admin/web/peeweepc.com/public_html/includes/theme.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/admin/web/peeweepc.com/public_html/includes/menu.inc).

Cyber weapon in 21st century Part 3

As paradoxical as it sounds, Yes. Despite the simplicity of the jammer, we are dealing with a device specifically designed for the neutralization of the technical means of the enemy. It is a defensive system, operating in the space of solutions to cyber challenges of disorder in the functioning of some specific machine. And already we can identify some characteristic features of the first type of cyber weapons:

  • Impact on the system is informational, there is no physical intervention;
  • Exposure occurs to a specific system or type of system with the exploitation of their vulnerabilities.
  • The effect is predicted and repeatable result;
  • The impact is not necessarily destructive, the goal is primarily a violation of normal functioning.

Consider another example: the use of broadband interference compromising the integrity of radio communications in a space. This impact also is informational and not aimed at producing any damage. Possible violation of the radio lead to the disruption of command and control of the enemy then such effects can be considered effects of a cybernetic system in its high level consideration. But in this case it will be inappropriate; mediated and unpredictable specifically the achieved results. Fails sign No. 3: an accurate prediction of the result of the impact impossible. On closer examination it can be stated that and also violated the symptom No. 2: the effect has no specific purpose. Attempts to disrupt the operation of all radio systems (including its own) regardless of their specific type. Depending on the used ways of transmitting information, some specific samples can be weakly vulnerable to this non directional exposure.

In this example, we are dealing with a weapon of information, but not cybernetic. It is used as if at random, based on some unknown in advance the negative impact from previously unknown effects. That is the use of information weapons should include malicious software (including viruses). Although in this case, attributing them to the class of weapons is the most controversial.

The proposed set of features is at first glance sufficient for the determination of cyber weapons, but at the same time, contrary to the already (unfortunately) the current terminology. Indeed, the Department of informational influence in the space of solutions to cyber challenges abstract from informational influence to the layman is very difficult. In addition, depending on the level review system may cause a change in classification of exposure. For example, calculated information influence, may go into the field of Cybernetics when considering the effects of its influence on higher level control schemes.

This refers to the above mentioned disruption of control military structures and impaired strategic decision making, issues of reaction mass, etc. At a sufficiently high level of consideration any information influence can be considered a common task Cybernetics, but this consideration has no practical value. In the example with the breakdown of the induction machine the rocket is already marked field of interaction: closed loop control system, operating on predetermined laws. The limitations of this field leads to another clarifying the characteristics of cyber weapons of the first type:

  • The impact of cyber weapons happens within restricted systems;
  • The purpose of cyber weapons are systems operating according to clearly established laws and algorithms.

With these refinements a set of attributes of cyber weapons becomes a necessary focus. Pay attention to the fact that under the described features are not only software systems (which are usually distinguished in modern practice), but any machines, functioning according to known laws. It would seem that this is redundant we are expanding the range of the systems. However, such an extension is a deliberate and justified.

Category: