Cyber Threats & Nuclear Dangers

Serious cyber attacks on business are a global problems, but many other cyber issues present even greater problems. In particular, the threat to nuclear weapons systems, materials and facilities which are vulnerable to cyber attacks, sabotage and theft present a serious danger. 
 
Cyber attacks on nuclear facilities are known to have occurred, perhaps the most well known being those directed against Iran's nuclear facility at Natanz which has been the target of a sequence of attacks, widely thought to originate from Israel. Other attempts at hacking, cyber attacks and other intrusions have gone unreported.   
 
The International Atomic Energy Agency (IAEA) has identified three significant risk scenarios involving cyber attacks on civil nuclear facilities: 
 
  • An act of cyber sabotage, which affects the normal functioning of a nuclear facility or other parts of the nuclear fuel cycle. States, terrorist organizations, political activists and criminals may all have an interest in this type of furtive cyber operation. 
All three scenarios are feasible, although the first would be very challenging. To obtain ma- material a cyber attack would have to be com- combined with physical access to remove the mate- rial. Most likely physical access would involve an attack on the facility’s security forces, which would be risky and difficult .
 
A cyber attack leading to the launch of a nu- clear weapon is the ultimate nightmarish scenario- , and thankfully the one with the highest barriers to success. The number of actors that would be able to pull off an offensive and com- complex cyber attack is smaller than commonly assumed. 
 
As cyber expert Thomas Rid has argued that the, “vulnerabilities have to be identified before they can be exploited; complex industrial sys- systems need to be understood first; and a sophisticated- attack vehicle may be so fine-tuned to one specific target configuration that a generic use may be difficult or impossible.”  The core argument of Rid’s is that computer attacks, those which exclude crime, take place in three dimensions: sabotage, which can potentially damage machines or processes; espionage, both political and commercial; and subversion - activism or militancy online.
 
Compared to any traditional act of force, a cyber attack helps diminish rather than accentuate violence. In the context of sabotage or espionage, it is now possible to either directly target systems without human operators or to exfiltrate information and data from a target without necessary infiltrating human agents. In the context of subversion, the goal of a cyber attack is to undermine established authority in a non-violent way.
 
It is clear that although cyber war has not yet happened, it is likely to happen in the future. This is primarily because some cyber attacks can fulfill the criteria necessary to constitute an act of war which is as follows; inherently violent, political and instrumental. It is also the case that small acts of force, such as the tap of a keyboard can cause inconceivable violence.
 
Cyber attacks have the potential to induce a ‘cascade effect’ where all components of the trinity are damaged and thus seize the enemy through strategic paralysis. It is no longer a question of if cyber war will take place but rather a question of when it will take place.  
  
NATO:     Academia:       Taylor & Francis:    E-International Relations:      Image: Unsplash
 
You Might Also Read: 
 
Israel Responds To A Cyber Attack With Bombs:
 
 
« 61% Of Employees Fail A Basic Cyber Security Test
CYRIN - Where Education Comes to You »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Romanian Association for Electronic Industry & Software (ARIES)

Romanian Association for Electronic Industry & Software (ARIES)

ARIES is the Romanian Association for Electronic Industry and Software, the biggest and most influental organization created for the IT&C industry in Romania.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

Cybercrime Support Network (CSN)

Cybercrime Support Network (CSN)

CSN is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

Vijilan Security

Vijilan Security

Vijilan provides 24/7 SOC services to MSPs/VARs. Our Security Operations Center is global, and our services are exclusive to the Channel.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

Evina

Evina

Evina offers the most advanced cybersecurity and fraud protection for mobile payment.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Orro Group

Orro Group

Orro create 'future now' solutions that make it faster, simpler and safer for you to access, store and share information. Wherever, whenever and with whomever you want.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

EDGE Group

EDGE Group

EDGE is one of the world’s leading advanced technology groups, established to develop agile, bold and disruptive solutions for defence and beyond.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.

SixMap

SixMap

SixMap is a continuous threat exposure management platform that automatically provides comprehensive enterprise visibility, contextual threat intelligence, and a suite of remediation actions.