There are several different forms of cyber weapons, all of which can be used for either an attack or espionage. There are principally five common practices. The first of three attacks that will be examined is spoofing.
Spoofing is an attack that falsifies information in order to disguise and misconstrue an identity to appear as someone else, or as an application. An example, per say, would be an instance that took place in Arizona at the works of Daniel David Rigmaiden. Rigmaiden used what is known as an air card to spoof a nearby cell tower. Rigmaiden was indeed caught by the FBI, but this case was a major event for the intelligence community, due to the judges’ skeptical preceding’s in order to catch a major criminal.5
The second attack is termed man-in-the-middle (MITM). MITM is when an attacker makes independent connections with targets and relays communication that deceives the victims to think that they are in authentic contact with one another, when in reality communication is being altered. A major benefactor of this would be the NSA. In order to apparently snoop on an increase in traffic over Secure Sockets Layer (SSL), the NSA performed a man-in-the-middle attack by impersonating Google security certificates. This NSA operation is asserted to be operation “Flying Pig.” SSL involves an infamous anonymity browser referred to as Tor. The motivation behind this operation was in order to collect information about specific SSL encryption certificates that would other wise be unattainable.5
The Final CNA to examine is buffer overflow. This is when an attacker inputs a larger than expected piece of information, which causes an application to malfunction in such a way that the attacker can remotely execute nearly any desired function. Depending on the extent of a computers vulnerability, this attack proves to be the most malicious. This CNA can evoke what is known as denial of security (DOS). This function can illegitimately obtain permissions not granted by the system administrator, and in some cases, the computer can be fully controlled by the attacker. The FBI exploited Eric Eoin Marques, a US-born 28-year-old, using buffer overflow methods. Marques is accused of creating and engineering Freedom Hosting, the hidden website indicated to be responsible for facilitating child pornography on 550 servers throughout Europe. One FBI agent declared that Marques is undoubtedly 'the largest facilitator of child porn on the planet".5
VULNERABILTIES & POTENTIAL HARM
The damage of a full-fledged cyber attack would be devastating, the destruction would be unparalleled to any other tragedy that has occurred America. Since technology is responsible for providing America with vital entities and resources, an unadulterated cyber attack would nearly fail the American economy; this is what is known as critical systems failure. Weapons of mass destruction and cyber attacks present imminent...