Cyber Threats & Nuclear Dangers

Serious cyber attacks on business are a global problems, but many other cyber issues present even greater problems. In particular, the threat to nuclear weapons systems, materials and facilities which are vulnerable to cyber attacks, sabotage and theft present a serious danger. 
 
Cyber attacks on nuclear facilities are known to have occurred, perhaps the most well known being those directed against Iran's nuclear facility at Natanz which has been the target of a sequence of attacks, widely thought to originate from Israel. Other attempts at hacking, cyber attacks and other intrusions have gone unreported.   
 
The International Atomic Energy Agency (IAEA) has identified three significant risk scenarios involving cyber attacks on civil nuclear facilities: 
 
  • An act of cyber sabotage, which affects the normal functioning of a nuclear facility or other parts of the nuclear fuel cycle. States, terrorist organizations, political activists and criminals may all have an interest in this type of furtive cyber operation. 
All three scenarios are feasible, although the first would be very challenging. To obtain ma- material a cyber attack would have to be com- combined with physical access to remove the mate- rial. Most likely physical access would involve an attack on the facility’s security forces, which would be risky and difficult .
 
A cyber attack leading to the launch of a nu- clear weapon is the ultimate nightmarish scenario- , and thankfully the one with the highest barriers to success. The number of actors that would be able to pull off an offensive and com- complex cyber attack is smaller than commonly assumed. 
 
As cyber expert Thomas Rid has argued that the, “vulnerabilities have to be identified before they can be exploited; complex industrial sys- systems need to be understood first; and a sophisticated- attack vehicle may be so fine-tuned to one specific target configuration that a generic use may be difficult or impossible.”  The core argument of Rid’s is that computer attacks, those which exclude crime, take place in three dimensions: sabotage, which can potentially damage machines or processes; espionage, both political and commercial; and subversion - activism or militancy online.
 
Compared to any traditional act of force, a cyber attack helps diminish rather than accentuate violence. In the context of sabotage or espionage, it is now possible to either directly target systems without human operators or to exfiltrate information and data from a target without necessary infiltrating human agents. In the context of subversion, the goal of a cyber attack is to undermine established authority in a non-violent way.
 
It is clear that although cyber war has not yet happened, it is likely to happen in the future. This is primarily because some cyber attacks can fulfill the criteria necessary to constitute an act of war which is as follows; inherently violent, political and instrumental. It is also the case that small acts of force, such as the tap of a keyboard can cause inconceivable violence.
 
Cyber attacks have the potential to induce a ‘cascade effect’ where all components of the trinity are damaged and thus seize the enemy through strategic paralysis. It is no longer a question of if cyber war will take place but rather a question of when it will take place.  
  
NATO:     Academia:       Taylor & Francis:    E-International Relations:      Image: Unsplash
 
You Might Also Read: 
 
Israel Responds To A Cyber Attack With Bombs:
 
 
« 61% Of Employees Fail A Basic Cyber Security Test
CYRIN - Where Education Comes to You »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

National Security Authority (NBU) - Slovakia

National Security Authority (NBU) - Slovakia

The National Security Authority (NBU) is the central government body in Slovakia for the Protection of Classified Information, Cryptographic Services, Trust Services and Cyber Security.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Matias Consulting Group (MCG)

Matias Consulting Group (MCG)

Your Business needs competitive and resilient ICT solutions. MCG defines, deploy & support them enabling you to focus on your core business.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

PRE Security

PRE Security

PRE Security is leading the transition into the next era of AI cybersecurity with a new model: Predict & Prevent.

Actelis Networks

Actelis Networks

Actelis Networks is a market leader in cyber-hardened, rapid deployment networking solutions for wide-area IoT applications.

Liverton Security

Liverton Security

Liverton Security is a New Zealand-owned cyber security provider offering consultancy and security-related products to government and commercial customers throughout New Zealand.

IntelliBridge

IntelliBridge

IntelliBridge supports our nation’s most critical missions by solving complex technology, intelligence, and mission support challenges.