Cyber Threats & Nuclear Dangers

Serious cyber attacks on business are a global problems, but many other cyber issues present even greater problems. In particular, the threat to nuclear weapons systems, materials and facilities which are vulnerable to cyber attacks, sabotage and theft present a serious danger. 
 
Cyber attacks on nuclear facilities are known to have occurred, perhaps the most well known being those directed against Iran's nuclear facility at Natanz which has been the target of a sequence of attacks, widely thought to originate from Israel. Other attempts at hacking, cyber attacks and other intrusions have gone unreported.   
 
The International Atomic Energy Agency (IAEA) has identified three significant risk scenarios involving cyber attacks on civil nuclear facilities: 
 
  • An act of cyber sabotage, which affects the normal functioning of a nuclear facility or other parts of the nuclear fuel cycle. States, terrorist organizations, political activists and criminals may all have an interest in this type of furtive cyber operation. 
All three scenarios are feasible, although the first would be very challenging. To obtain ma- material a cyber attack would have to be com- combined with physical access to remove the mate- rial. Most likely physical access would involve an attack on the facility’s security forces, which would be risky and difficult .
 
A cyber attack leading to the launch of a nu- clear weapon is the ultimate nightmarish scenario- , and thankfully the one with the highest barriers to success. The number of actors that would be able to pull off an offensive and com- complex cyber attack is smaller than commonly assumed. 
 
As cyber expert Thomas Rid has argued that the, “vulnerabilities have to be identified before they can be exploited; complex industrial sys- systems need to be understood first; and a sophisticated- attack vehicle may be so fine-tuned to one specific target configuration that a generic use may be difficult or impossible.”  The core argument of Rid’s is that computer attacks, those which exclude crime, take place in three dimensions: sabotage, which can potentially damage machines or processes; espionage, both political and commercial; and subversion - activism or militancy online.
 
Compared to any traditional act of force, a cyber attack helps diminish rather than accentuate violence. In the context of sabotage or espionage, it is now possible to either directly target systems without human operators or to exfiltrate information and data from a target without necessary infiltrating human agents. In the context of subversion, the goal of a cyber attack is to undermine established authority in a non-violent way.
 
It is clear that although cyber war has not yet happened, it is likely to happen in the future. This is primarily because some cyber attacks can fulfill the criteria necessary to constitute an act of war which is as follows; inherently violent, political and instrumental. It is also the case that small acts of force, such as the tap of a keyboard can cause inconceivable violence.
 
Cyber attacks have the potential to induce a ‘cascade effect’ where all components of the trinity are damaged and thus seize the enemy through strategic paralysis. It is no longer a question of if cyber war will take place but rather a question of when it will take place.  
  
NATO:     Academia:       Taylor & Francis:    E-International Relations:      Image: Unsplash
 
You Might Also Read: 
 
Israel Responds To A Cyber Attack With Bombs:
 
 
« 61% Of Employees Fail A Basic Cyber Security Test
CYRIN - Where Education Comes to You »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Hotlava Systems

Hotlava Systems

HotLava network adapters enable today's powerful servers and workstations to deliver more productivity by reducing congestion at the network interface.

Grid32

Grid32

Grid32 provides independent computer system and physical security audit services to government and corporate clients of all sizes.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Seltek Technology Solutions

Seltek Technology Solutions

Seltek provides Digital Forensics, eDiscovery, Cybersecurity Assessments and IT Support services.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Web3fied

Web3fied

Web3fied is a seed stage company building the future of decentralized digital identity and credentials management.

Rescana

Rescana

Rescana offers a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk assessment.

Highen Fintech

Highen Fintech

Highen is a blockchain software development company with offices in the United States and development centers in India.

Keepit

Keepit

Keepit offer all-inclusive, secure, and reliable backup and recovery services for your data.