Welcome to the Age of Digital Warfare

War in the Fifth Domain

In the months running up to the 2016 election, the Democratic National Committee was hacked. Documents were leaked, fake news propagated across social media — the hackers, in short, launched a systematic attack on American democracy.

Whether or not that’s war, however, is a matter for debate. In the simplest sense, an act of cyber warfare is defined as an attack by one nation on the digital infrastructure of another.

These threats are what Samuel Woolley, research director of the Digital Intelligence Lab at Institute for the Future, calls “computational propaganda,” which he defines as the spread of disinformation and politically motivated attacks designed using “algorithms, automation, and human curation,” and launched via the internet, particularly social media. In a statement to Futurism, Woolley added that these attacks are “assailing foundational parts of democracy: the press, open civic discourse, the right to privacy, and free elections.”

Attacks like the ones preceding the 2016 election may be a harbinger of what’s to come: We are living in the dawn of an age of digital warfare — more pernicious and less visible than conventional battles, with skirmishes that don’t culminate in confrontations like Pearl Harbor or 9/11.

Our definitions of warfare — its justifications, its tactics — are transforming. Already, there’s a blurry line between threats to a nation’s networks and those that occur on its soil. As Adrienne LaFrance writes in The Atlantic: an act of cyber warfare must be considered an act of war.

A War of 0s and 1s

A little over a decade ago, the United States Cyber Command began developing what would become the world’s first digital weapon: a malicious computer worm known as Stuxnet. It was intended to be used against the government of Iran to stymie its nuclear program, as The New York Times reported. In the true spirit of covert operations and military secrecy, the U.S. government has never publicly taken credit for Stuxnet, nor has the government of Israel, with whom the U.S. reportedly teamed up to unleash it.

Stuxnet’s power is based on its ability to capitalize on software vulnerabilities in the form of a “zero day exploit.” The virus infects a system silently, without requiring the user to do anything, like unwittingly download a malicious file, in order for the worm to take effect. And it didn’t just run rampant through Iran’s nuclear system — the worm spread through Windows systems all over the world. That happened in part because, in order to enter into the system in Iran, the attackers infected computers outside the network (but that were believed to be connected to it) so that they would act as “carriers” of the virus.

As its virulence blossomed, however, analysts began to realize that Stuxnet had become the proverbial first shot in a cyber war.

Like war that takes place in the physical world, cyber warfare targets and exploits vulnerabilities. Nation-states invest a great many resources to gather intelligence about the activities of other nations. They identify a nation’s’ most influential people in government and in general society, which may come in useful when trying to sway public opinion for or against a number of sociopolitical issues.

image credit: pixabay

Gathering nitty-gritty details of another country’s economic insecurities, its health woes, and even its media habits is standard fare in the intelligence game; figuring out where it would “hurt the most” if a country were to launch an attack is probably about efficiency as much as it is efficacy.

Historically, gathering intel was left to spies who risked life and limb to physically infiltrate a building (an agency, an embassy), pilfer documents, files, or hard drives, and escape. The more covert these missions, and the less they could alarm the owners of these targets, the better. Then, it was up to analysts, or sometimes codebreakers, to make sense of the information so that military leaders and strategists could refine their plan of attack to ensure maximum impact.

The internet has made acquiring that kind of information near-instantaneous. If a hacker knows where to look for the databases, can break through digital security measures to access them, and can make sense of the data these systems contain, he or she can acquire years’ worth of intel in just a few hours, or even minutes. The enemy state could start using the sensitive information before anyone realizes that something’s amiss. That kind of efficiency makes James Bond look like a slob.

In 2011, then-Defense Secretary Leon Panetta described the imminent threat of a “cyber Pearl Harbor” in which an enemy state could hack into digital systems to shut down power grids or even go a step beyond and “gain control of critical switches and derail passenger trains, or trains loaded with lethal chemicals.” In 2014, TIME Magazine reported that there were 61,000 cybersecurity breaches in the U.S that year; the then-Director of National Intelligence ranked cybercrime as the number one security threat to the United States that year, according to TIME.

Computer viruses, denial of service (DDS) attacks, even physically damaging a power grid — the strategies for war in the fifth domain are still evolving. Hacking crimes have become fairly common occurrences for banks, hospitals, retailers, and college campuses. But if these epicenters of a functioning society are crippled by even the most “routine” cybercrimes, you can only imagine the devastation that would follow an attack with the resources of an enemy state’s entire military behind it.

image credit: pixabay

Nations are still keeping their cards close to their chest, so no one is really certain which countries are capable of attacks of the largest magnitude. China is a global powerhouse of technology and innovation, so it’s safe to assume its government has the means to launch a large-scale cyber attack. North Korea, too, could have the technology — and, as its relationship with other countries becomes increasingly adversarial, more motivation to refine it. After recent political fallout between North Korea and China, Russia reportedly stepped in to provide North Korea with internet — a move that could signal a powerful alliance is brewing. Russia is the biggest threat as far as the United States is concerned; the country has proven itself to be both a capable and engaged digital assailant.

The Russian influence had a clear impact on the 2016 election, but this type of warfare is still new. There is no Geneva Convention, no treaty, that guides how any nation should interpret these attacks, or react to them. To get that kind of rule, global leaders would need to look at the ramifications for the general population and determine how cyberwar affects citizens.

At present, there is no guiding principle for deciding when (or even if) to act on a perceived act of cyberwarfare. A limbo that is further complicated by the fact that, if those in power have benefitted from, or even orchestrated, the attack itself, then what incentive do they have to retaliate?

If cyber war is still something of a Wild West, it’s clearly citizens who will become the casualties. Our culture, economy, education, healthcare, livelihoods, and communication are inextricably tethered to the internet. If an enemy state wanted a more “traditional” attack (a terrorist bombing or the release of a chemical agent, perhaps) to have maximum impact, why not preface it with a ransomware attack that freezes people out of their bank accounts, shut down hospitals and isolate emergency responders, and assure that citizens didn’t have a way to communicate with their family members in a period of inescapable chaos?

As cybersecurity expert and author Alexander Klimburg explained to Vox, a full-scale cyber attack would result in damage “equivalent to a solar flare in terms of damaging infrastructure.” In short, it would be devastating.

How the US Can Fight Russian Cyberattacks?
Click to View Full Infographic

A New Military Strategy

In summer 2016, a group called the Shadow Brokers began leaking highly classified information about the arsenal of cyberweaponry at the National Security Agency (NSA), including cyber weapons actively in development. The agency still doesn’t know whether the leak came from someone within the NSA, or if a foreign faction infiltrated Tailored Access Operations (the NSA’s designated unit for cyber warfare intelligence-gathering).

In any case, the breach of a unit that should have been among the government’s most impervious was unprecedented in American history. Aghast at the gravity of such a breach, Microsoft President Brad Smith compared the situation “to Tomahawk missiles being stolen from the military,” and penned a scathing blog post calling out the U.S. government for its failure to keep the information safe.

The last time such a leak shook the NSA, it was in 2013, when Edward Snowden released classified information about the agency’s surveillance practices. But as experts have pointed out, the information the Shadow Brokers stole is far more damaging. If Snowden released what was effectively battle plans, then the Shadow Brokers released the weapons themselves, as the New York Times analogized,

Earlier this year, a ransomware attack known as “WannaCry” began traversing the web, striking organizations from universities in China to hospitals in England. A similar attack hit IDT Corporation, a telecommunications company based in Newark, New Jersey, in April, when it was spotted by the company’s global chief operations officer, Golan Ben-Oni. As Ben-Oni told the New York Times, he knew at once that this kind of ransomware attack was different than others attempted against his company — it didn’t just steal information from the databases it infiltrated, but rather it stole the credentials required to access those databases. This kind of attack means that hackers could not only take that information undetected, but they could also continuously monitor who accesses that information.

WannaCry and the IDT attack both relied upon the cyber weapons stolen and released by the Shadow Brokers, effectively using them against the government that developed them. WannaCry featured EternalBlue, which used unpatched Microsoft servers to spread malware (North Korea used it to spread the ransomware to 200,000 global servers in just 24 hours). The attack on IDT also used EternalBlue, but added to it another weapon called DoublePulsar, which penetrates systems without tripping their security measures. These weapons had been designed to be damaging and silent. They spread rapidly and unchecked, going undetected by antivirus software all over the world.

The weapons were powerful and relentless, just as the NSA intended. Of course, what the NSA had not intended was that the U.S. would wind up at their mercy. As Ben-Oni lamented to the New York Times, “You can’t catch it, and it’s happening right under our noses.”

“The world isn’t ready for this,” he said.

The Best Defense

The average global citizen may feel disenfranchised by their government’s apparent lack of preparedness, but defending against the carnage of cyber warfare really begins with us: starting with a long overdue reality check concerning our relationship with the internet. Even if the federal agencies aren’t as digitally secure as some critics might like, the average citizen can still protect herself.

“The first and most important point is to be aware that this is a real threat, that this potentially could happen,” cybersecurity expert Dr. Eric Cole told Futurism. Cole added that, for lay people, the best defense is knowing where your information is being stored electronically and making local backups of anything critical. Even services like cloud storage, which are often touted as being safer, wouldn’t be immune to targeted attacks that destroy the supportive infrastructure — or the power grids that keep that framework up and running.

“We often love going and giving out tons of information and doing everything electronic,” Cole told Futurism, “but you might want to ask yourself: Do I really want to provide this information?”

 Some experts, however, argue that your run-of-the-mill cyber attack against American businesses and citizens should not be considered an act of war. The term “war” comes with certain trappings — governments get involved, resources are diverted, and the whole situation escalates overall, Thomas Rid, professor and author, recently told The Boston Globe. That kind of intensity might, in fact, be counterproductive for small-scale attacks, ones where local authorities might be the ones best equipped to neutralize a threat.

As humans evolve, so too do the methods with which we seek to destroy each other. The advent of the internet allows for a new kind of warfare — a much quieter one. One that is fought remotely, in real time, that’s decentralized and anonymized. One in which robots and drones take the heat and do our bidding, or where artificial intelligence tells us when it’s time to go to war.

Cyber warfare isn’t unlike nuclear weapons — countries develop them in secret and, should they be deployed, it would be citizens that suffer more than their leaders. “Mutually assured destruction” would be a near guarantee. Treaties mandating transparency have worked to keep nuclear weapons in their stockpiles and away from deployment. Perhaps the same could work for digital warfare?

We may be able to foretell what scientific and technological developments are on the horizon, but we can only guess at what humanity will do with them.

Humans made airplanes. These allowed them to fly above the clouds…and they used it to drop bombs on each other.

The post Welcome to the Age of Digital Warfare appeared first on Futurism.

Futurism

SpaceX Is Attempting Another First Next Week

Another First

Elon Musk recently took to Instagram to announce that SpaceX will soon be attempting yet another first: re-launching both an orbital rocket and the Dragon spacecraft together for the first time ever. Musk posted a photo gallery of the last mission each reusable spacecraft took part in, adding that the launch is scheduled to take place on Tuesday, December 12.

The Dragon model craft has been used since 2012 as a part of NASA’s Commercial Resupply Services program to regularly resupply the International Space Station (ISS).

This is another huge advancement for reusable space technology. While SpaceX has launched refurbished Dragon capsules in the past, with the first lifting off back in June of 2017, the company is still working on optimizing the cost-effectiveness of reusing the spacecraft. Pairing the reusable spacecraft with reusable orbital rockets will undoubtedly do a lot to cut those costs.

Reusability Renaissance

The ability to reuse expensive space travel technology has transformed the spaceflight industry. This technology is saving the company, and their government partners, many millions of dollars, which SpaceX can use to further advance their reusability pursuits.

A SpaceX Falcon 9 rocket and Dragon reusable spacecraft await liftoff from NASA Kennedy Space Center in August. (Image credit: NASA TV)
A SpaceX Falcon 9 rocket and Dragon spacecraft await liftoff from NASA Kennedy Space Center in August. (Image credit: NASA TV)

Reusable tech allows SpaceX’s launches to be cheaper; which, in turn, allows greater access to spaceflight capabilities, literally rocketing the potential for space exploration to new heights. Musk has previously announced that launches using SpaceX’s reusable rockets are $ 300 million cheaper than conventional launches. That is a high threshold for potentially prohibitive costs, and likely opens up the possibility for launches to those who would never be able to afford one under previous launch models.

SpaceX has also recently repaired the launchpad that was damaged during a catastrophic explosion last year. This will also allow for the number of launches SpaceX is capable of to increase. To that end, SpaceX is also focusing on speeding up the turn around time of its reusable tech. Musk has set a goal of refurbishing rockets for reuse in just 24 hours after landing from a mission.

The post SpaceX Is Attempting Another First Next Week appeared first on Futurism.

Futurism

An “Odd Paper” Confirms the Importance of Critical Thinking in Science Journalism

A Case for the Odd?

Issac Asimov said today’s science fiction is tomorrow’s science fact, and truly, much of the cutting-edge tech we’re starting to see emerge today previously appeared in one form of sci-fi or another — artificial intelligence, robots, and flying cars, anyone?

Still, a distinct line must exist between the realm of sci-fi and that of science, and the only way to cross that line should be through rigorous experimentation and peer-reviewed research.

However, a study published in the journal ACS Applied Materials & Interfaces in December 2016 appears to blur this line to the point it practically disappears, raising question about science journalism.

The paper’s title, “Earthicle: The Design of a Conceptually New Type of Particle,” is enough to confuse anyone, including medical chemistry expert Derek Lowe. Lowe writes commentaries on drug discovery and the pharmaceutical industry in an independent blog from the publishers of Science Translational Medicine, and in a recent post, he took a closer look at this “earthicle” study.

Image Credit: Uskokovic, et al./ACS Applied Materials & Interfaces
Image Credit: Uskokovic, et al./ACS Applied Materials & Interfaces

Lowe said he initially assumed the paper was about the discovery of a nanoparticle with an iron core, with the authors comparing the layering of the particle’s components to the composition of the Earth itself. However, after reading the rather long abstract, Lowe realized the paper wasn’t exactly about nanoparticles, nor did it seem to be about science.

“[H]ere we pioneer the idea of an earthicle, a conceptually novel type of particle, which we see as endlessly modifiable in analogy with the structure of planets or other astral bodies and utilizable in unforeseen applicative contexts,” wrote the researchers, a trio from Chapman University in Irvine, California, and the University of Illinois.

Don’t worry if that confused you; it certainly did Lowe. Apparently, the study is proposing a new particle that’s derived using quite unconventional and largely untested means: alchemy. The researchers claim that this theoretical particle would “inevitability” have “therapeutic potentials,” but the study itself lacks any proof of this potential or even a hypothesis, according to Lowe.

Sound Science Journalism

This study opens the door to addressing one of the most important aspects of science journalism and reading scientific research: critical thinking. Futurism reached out to Lowe, who offered a bit of advice to both the journalists who cover science and the people who read such reports.

Critical thinking begins with identifying which scientific journals are worthwhile. Today, it’s not enough that they’re supposedly peer-reviewed.

“I think that you first have to trim off the lower end of the spectrum, basically the journals on Beall’s list and the like,” Lowe told Futurism. “If it’s from some web-only, pay-to-publish outfit that has 75 journals with similar titles and is run out of a PO Box in the Cayman Islands, then I dismiss it out of hand.”

Lowe said, however, that higher-end journals aren’t necessarily wholly reliable either as they often produce “big, high-impact papers from big-name labs.” Those studies are highly unlikely to work out. “In my own field, the Journal of Organic Chemistry is much more reliable than the more gaudy venues, simply because no one is putting their hottest results there (on one end) and because no one would bother to counterfeit a $ 10 bill (on the other).”

Of course, at the end of the day, the journalists who report on these scientific papers and the people who read them must do so with discretion.

“It’s tough,” Lowe told Futurism. “A lot of people have a lot of reasons to try to make their results look interesting, so ‘Hey, this is a great new paper/result/invention’ is a statement that always deserves the response ‘According to whom?’ The closer the person making the statement is to the results themselves, the greater the chance for conscious or unconscious bias.”

Ultimately, journalists and readers must decide for themselves what to believe. Just like something dreamed up by a fiction writer can one day cross the line into non-fiction, the studies published in seemingly legitimate journals can be little more than fiction in disguise.

The post An “Odd Paper” Confirms the Importance of Critical Thinking in Science Journalism appeared first on Futurism.

Futurism

Architects Created a Foldable House That Can Withstand Earthquakes

Foldable Houses

From homes you can order off of Amazon to bio-houses, moving sail-bridges, and natural skyscrapers, architecture seems to be getting more futuristic with each passing day. In the latest development in remarkable architecture, Italian architect Renato Vidal has developed a foldable earthquake-proof house, which comes prefabricated and takes less than a single day to install.

Known as the M.A.Di home, this A-shaped house can be folded down completely flat, making it easy and economical to ship. Additionally, these homes are built specifically to withstand earthquakes using cross-laminated timber, or CLT.

A M.A.Di home, a foldable earthquake-proof house that's easily and quickly built. Image Credit: M.A.Di
A M.A.Di home. Image Credit: M.A.Di

The M.A.Di home comes in a variety of sizes, including a 27-sq m (290-sq ft) tiny home, a 46-sq m (495-sq ft) or 56-sq m (603-sq ft) double home, and a 70-sq m (753-sq ft) or 84-sq m (904-sq ft) triple family house. At all sizes, these homes come with two levels, a kitchen, a dining area, a bathroom, and bedroom(s).

The tiny module costs €21,600 (US$ 25,195), while the largest runs for €67,200 (US$ 73,385). Compare that to the average cost of buying a new home in the United States, which in October 2017 was $ 400,200.

Advanced Living

Domenico Antonucci from Area Legno, the Italian wood specialist that manufactures the M.A.Di, told New Atlas: “Thanks to the home’s steel profile and steel hinges we can open and close this module with ease. When the module is closed and folded for transportation the packed height measures 1.5 m (4.9 ft), and then when it is opened on site, it has a height of 6.5 m (21.3 ft).”

Folding and transporting a M.A.Di home. Image Credit: M.A.Di
Folding and transporting a M.A.Di home. Image Credit: M.A.Di

As urban areas continue to crowd and economic struggles seem only to grow, simplistic, compact, economic housing innovations like the M.A.Di home could be a vision of the future. Since it doesn’t require any ground-level foundations, this house can act as either a temporary or permanent structure, moving and folding flexibly with those who live inside of it.

This home folds up so neatly and compactly that it can even be folded and kept in storage as emergency housing or as an investment for the future. Modules can also be joined together, so owners of these homes could grow the home with their families.

Galvanized steel frames help the M.A.Di home fold down. Image Credit: M.A.Di
Galvanized steel frames help the M.A.Di home fold down. Image Credit: M.A.Di

As our world grows and changes, so does what we require from our housing. This and other futuristic housing solutions are perfect examples of this changing housing narrative.

The post Architects Created a Foldable House That Can Withstand Earthquakes appeared first on Futurism.

Futurism