Cyber Threats & Nuclear Dangers

Serious cyber attacks on business are a global problems, but many other cyber issues present even greater problems. In particular, the threat to nuclear weapons systems, materials and facilities which are vulnerable to cyber attacks, sabotage and theft present a serious danger. 
 
Cyber attacks on nuclear facilities are known to have occurred, perhaps the most well known being those directed against Iran's nuclear facility at Natanz which has been the target of a sequence of attacks, widely thought to originate from Israel. Other attempts at hacking, cyber attacks and other intrusions have gone unreported.   
 
The International Atomic Energy Agency (IAEA) has identified three significant risk scenarios involving cyber attacks on civil nuclear facilities: 
 
  • An act of cyber sabotage, which affects the normal functioning of a nuclear facility or other parts of the nuclear fuel cycle. States, terrorist organizations, political activists and criminals may all have an interest in this type of furtive cyber operation. 
All three scenarios are feasible, although the first would be very challenging. To obtain ma- material a cyber attack would have to be com- combined with physical access to remove the mate- rial. Most likely physical access would involve an attack on the facility’s security forces, which would be risky and difficult .
 
A cyber attack leading to the launch of a nu- clear weapon is the ultimate nightmarish scenario- , and thankfully the one with the highest barriers to success. The number of actors that would be able to pull off an offensive and com- complex cyber attack is smaller than commonly assumed. 
 
As cyber expert Thomas Rid has argued that the, “vulnerabilities have to be identified before they can be exploited; complex industrial sys- systems need to be understood first; and a sophisticated- attack vehicle may be so fine-tuned to one specific target configuration that a generic use may be difficult or impossible.”  The core argument of Rid’s is that computer attacks, those which exclude crime, take place in three dimensions: sabotage, which can potentially damage machines or processes; espionage, both political and commercial; and subversion - activism or militancy online.
 
Compared to any traditional act of force, a cyber attack helps diminish rather than accentuate violence. In the context of sabotage or espionage, it is now possible to either directly target systems without human operators or to exfiltrate information and data from a target without necessary infiltrating human agents. In the context of subversion, the goal of a cyber attack is to undermine established authority in a non-violent way.
 
It is clear that although cyber war has not yet happened, it is likely to happen in the future. This is primarily because some cyber attacks can fulfill the criteria necessary to constitute an act of war which is as follows; inherently violent, political and instrumental. It is also the case that small acts of force, such as the tap of a keyboard can cause inconceivable violence.
 
Cyber attacks have the potential to induce a ‘cascade effect’ where all components of the trinity are damaged and thus seize the enemy through strategic paralysis. It is no longer a question of if cyber war will take place but rather a question of when it will take place.  
  
NATO:     Academia:       Taylor & Francis:    E-International Relations:      Image: Unsplash
 
You Might Also Read: 
 
Israel Responds To A Cyber Attack With Bombs:
 
 
« 61% Of Employees Fail A Basic Cyber Security Test
CYRIN - Where Education Comes to You »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

Cloudmark

Cloudmark

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

VietSunshine

VietSunshine

VietSunshine is a leading provider of network security infrastructure and solutions in Vietnam.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

CyberSecurityTrainingCourses.com

CyberSecurityTrainingCourses.com

Cyber Security Training Courses is a portal to help candidates find the best courses to progress their career within the IT security industry.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.

CeTu

CeTu

CeTu - Data Orchestration for the Modern SOC. Strengthen security and optimize costs with the world's first AI-native platform for scaling and future-proofing your data stack.