fighting with unequal means, rarely go out. In the case of the asymmetric conflicts of the present are mostly the supposedly Stronger, which will make losses. Nation-States with conventional armed forces, civil societies. The current attack on the digital security of Germany.
Would the attack of a nation-state, he would be a warlike act, even if the Nations do that which is lawful with questions about cyber-war cases yet very difficult. The attack was not launched by a state or a group, but by a 20-year-old single offender. What makes the case even more controversial, because it illustrates the asymmetry of cyber conflict even more dramatic, as it makes the excitement of unauthorized releases of private data and photos of politicians and Celebrities once believe.
cyber attacks overwhelm all three of the powers of the state to a legal state. The Executive branch is difficult, such an attack, because you meet from the depths of the digital space very suddenly, the centres of the society. The judiciary is fighting a losing battle, because it is in the case of digital attacks to a difficult, if not impossible, to identify the attacker. On the other hand, the laws are still too short. Because the legislature is lagging behind with their slow cycles of Consensus in the current technical progress for years.
this mismatch between hackers, who can be reached with the minimum of expense a lot, and lumbering state-owned institutions will not change anything. It will continue to grow. Although it is not so that you can protect yourself as an Individual. Each can hold computer programs and mobile applications up-to-date cryptographic use, and most importantly, healthy people to apply mind. A large part of the bait, the Hacker lay in foreign networks to penetrate, as can be seen by the bizarre web addresses, windy concerns, or all-too-tempting Offers.
But that alone will not be enough. Even Hillary Clinton campaign Manager John Podesta fell on a lock, mail, disguised as a security warning from Google. This is not realized once the IT expert of the team. What led to the explosive Material of the American presidential candidate was leaked to the Public, and against them was used.
The current digital progress, it will make hackers in the future even easier. Artificial intelligences (AI), so programs that improve automatically even and develop your own strategies, yet can be sudden, even more comprehensive attack. The development of the quantum computer can use quantum mechanics the laws of classical physics, and therefore any encryption method will be override, which is based on classical mathematics models. So currently all.
so What to do, if not even high-ranking government can protect members of the United States? How to react if the technical progress is making the digital world and its infrastructures on the one hand, more effective, and ubiquitous, but at the same time becoming more and more vulnerable?
The civil societies in the digital space on asymmetric wars without end. Also, since you can Orient yourself in the recent US history. No one declared military enemies, so the war such as American presidents. As Lyndon B. Johnson in 1964, the poverty, Richard Nixon in 1972, drug, George W. Bush, in 2001, the terrorist. In any of these conflicts to an end is in sight. Is fought anyway.
Also need to lead wars, Cyber Nations and societies without any prospect of victory. Governments still have a duty to protect their citizens against digital attacks with the same effort as before, Terror, disease, or Hunger. This is a new fundamental task of the state.
in the long term, education is essential. For this, there would be ways. Not only do the schools have a duty to the public media. As a first step, but does not have to be a formal commitment that the governments of the danger are only aware of, but you will also fight actively and in the long term.
Created: 08.01.2019, 21:08 PM