Copyright

Cyber Threats to US National Security

Instructor: Kaitlin Oglesby
While images of terrorism may keep us up at night, the real threat to American national security comes from cyber attacks. This lesson details the commonalities of those threats.

Different Threats

When you think of threats to national security, you probably think of the latest threat out of North Korea or terrorist groups making statements about what they want to do to American civilians. However, if you were to ask people in the know about what they think the biggest threat to national security is, they would all agree that cyber threats that affect networks and the Internet are the biggest concerns that the United States has at this moment. Of course, the threats themselves come from a number of places. When it comes to the Internet, it is knowledge, not numbers, that matter. A small agitator in the suburbs can cause damage, just like a state-sponsored effort from China or Russia. However, there are a few commonalities in what these efforts all seem to want to do.

Gaining Information

In 2013, one of the biggest leaks in world history happened when Edward Snowden published a vast array of documents on WikiLeaks, a site for leaking government data. The released documents provided evidence that the US National Security Agency (NSA) was collecting phone data from millions of Americans and breaking privacy laws. Other documents exposed surveillance of embassies and a continent-wide surveillance program in Latin America. No matter your opinion on this event, I think it is safe to say that many in the government did not want that information released.

A great deal of cyber warfare currently focuses on keeping secret information secret. As we saw in the WikiLeaks scandal, knowledge is power, and policymakers expect all but the finished product to be kept secret. However, it is not just diplomatic cables that are of interest. The military keeps data on its latest active and prototyping machines. Much of this data would be useful to foreign powers in trying to either defeat or replicate American technology. Finally, the personal information of important people is of interest. Spy agencies keep detailed tabs on the health, finances, and personal lives of overseas leaders, and do their best to keep those details of their own leaders secret. Finding out that a Cabinet official has a severe allergy could put him or her at risk. As a result, many try to gain access to these databases.

Disable Infrastructure

In modern military strategy, one of the most important first acts is to take out communications and infrastructure. As recently as twenty years ago, that meant bombing these centers. However, now that everything is online, cyber attacks can render these useless. Imagine the chaos that would result if suddenly the electrical grid of the United States was rendered useless. Or if GPS could not be used to communicate between military units? Needless to say, being able to do this would be of great use during a time of conflict.

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create an account
Support