BCM206 – Week 10 Dark fiber: exploits, botnets and cyberwar

Last week blog, I had talked about hacker. This week i’ll going to talk about something related – Cyber Warfare. According to this article (Ranger, 2018), cyberwarfare refers to the use of cyber attacks — like computer viruses and hacking — by one country to disrupt the vital computer systems of another, with the aim of creating damage, death and destruction. Future wars will see hackers using computer code to attack an enemy’s infrastructure, fighting alongside troops using conventional weapons like guns and missiles.

A cyber attack is an attack begun by cybercriminals using one or more computers against the computers or networks. A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks. The cyberattack has huge and far-reaching power. It can not only deaden the website and even disintegrate the rocket launch system. The special features of cyberattacks; first, they are no geographical restriction like the traditional weapons subject; second, criminals, spies, or soldiers can practice cyberattacks, which means it is difficult to identify the enemy when the country is under attack.

The example such as; North Korea is threatening to retaliate against the US over a Hollywood film portraying the assassination of Kim Jong-un. In 2014, Sony was was hacked by a group calling itself the “Guardians of Peace”. Sony Pictures said that their computer system down after reported hack, the screens displayed an image of a red skeleton with the phrase “Hacked By #GOP”. The hackers are working with some capacity with North Korea, took huge amounts of information off of Sony’s network. The hackers threatened the unit of Sony company that they had acquire their “secrets” and would spreading on the Web.(Staff, 2014)

The example fully illustrate, how does cyber attack essentially change the understanding and face of war. The Internet as a tool to effect social change and a strategic high ground for changing the world.

“The strategic war in the industrial age is nuclear war, while in the information age, the strategic war is mainly cyber-war.” We are no longer able to ignore the cyber-weapons, cyber-attacks and cyber-warfare have begun into the armoury of modern warfare. No one will know where and when the next attack will be launched, the only thing for sure is there will be more.


Ranger, S., 2018. What Is Cyberwar? Everything You Need To Know About The Frightening Future Of Digital Conflict | Zdnet. [online] ZDNet. Available at: <https://www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-of-online-conflict/&gt; [Accessed 31 October 2020].

Staff, R., 2014. Sony Pictures Computer System Down After Reported Hack. [online] Reuters. Available at: <https://www.reuters.com/article/us-sony-cybersecurity-idUSKCN0J920720141125&gt; [Accessed 1 November 2020].

Gazula, M., 2017. Cyber Warfare Conflict Analysis And Case Studies. [online] Web.mit.edu. Available at: <http://web.mit.edu/smadnick/www/wp/2017-10.pdf&gt; [Accessed 1 November 2020].

3 thoughts on “BCM206 – Week 10 Dark fiber: exploits, botnets and cyberwar

Add yours

  1. I very much agree that a cyberwar would eliminate the boundaries and restraints that a conventional war with physical weaponry and distance inherently has. I also love the fact that you’ve pointed out that the geographical location of the attacks would be eliminated. This almost absolves the clear sides of attack of war, masking countries in anonymity via internet hacking. Your example is so good! I think it fits perfectly, do you think that this type of maliciousness in hacking from governmental bodies could be done at anytime and we should all be more aware? What are your thoughts on sock puppets? I thought this was a very dangerous concept so I explored it in my blog.I tried to use tarot cards in my remediation to prophesies that we can arm ourselves against internet cyberwar if we begin to prepare.


  2. Hey, Jessie! This is such a fantastic blog post which really clearly illustrates what Ted was saying in the lecture. Seriously, fantastic job. I love that you had a focus on cyberwarfare. You demonstrated the point really clearly and your remediation was really original too. In my blog post and remediation, I focused more on an idea which Ted touched on earlier in the lecture of the internet never forgetting what we post, and how the internet is a river of copies. I think it’s super interesting how much was going on in that lecture that there’s really so much to talk about. It’s exhausting, huh. I know you’ve already got a great grasp of the concepts, but I did find this fantastic article on cyberwarfare which you might like! https://www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-of-online-conflict/#:~:text=Cyberwarfare%20refers%20to%20the%20use,creating%20damage%2C%20death%20and%20destruction.
    Keep up the great work, Jessie!


  3. another really good blog. you really understood what you were talking about and all the concepts Your example is so good I think it fits perfectly with what you were talking about,


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create a website or blog at WordPress.com

Up ↑

Create your website with WordPress.com
Get started
%d bloggers like this: