What could do more damage than a nuclear weapon? A hacker
06/16/2020 // Arsenio Toledo // Views

A nuclear attack is terrifying, that much is certain. Both the United States and Russia have pulled out of a decades-old nuclear weapons pact; North Korea continues to test their missile program; and tensions in Iran are putting a lot of people on edge. However, there's another threat that the world needs to look out for that can be just as deadly as a nuclear bomb: hackers and cyber attacks.

Unlike nuclear-capable countries, deadly hackers have fewer inhibitions. The idea that any incoming nuclear attack can be detected, and a retaliatory strike can easily be conducted, prevents the United States and Russia from launching nukes at either Moscow or Washington, D.C. Hackers, however, are much more difficult to pinpoint. Their digital footprints are very easy to disguise. With enough resources, a group of hackers can even trigger a nuclear grade cyber attack.

Nuclear grade cyber attacks

Nuclear grade – or nuclear rated – cyber attacks are the kind that, as their name suggests, can cause as much devastation as a nuclear strike. There are three scenarios when a nuclear grade cyber attack could happen.

Firstly, a nuclear grade cyber attack can develop slowly. One country might steal another's data. If the country that got attacked retaliates, it could cause a chain of retaliation that would expand the scope of the attacks and the toll they would cause on human life.

Secondly, a nation or a well-funded terrorist organization could launch a massive, destabilizing cyber attack. This destructive attack could target a nation's infrastructure, such as power grids, water treatment facilities or industrial plants. This would lead to a lot of people dying from a variety of reasons like corrupted traffic lights or a lack of power or gas for heating.

Brighteon.TV

Thirdly, and perhaps most worryingly, a nuclear grade cyber attack could occur because of a simple mistake. A bug or an error in a nation's software and hardware might lead them to believe they are getting attacked and retaliate with full force, leading to the deaths of thousands – possibly millions – of people.

How to protect against a cyber attack

Cybersecurity and government watchdog groups have shown that not only is American infrastructure vulnerable to cyber attacks, but this vulnerability extends to the United State's weapons systems. (Related: U.S. cybersecurity experts scrambling to thwart major attacks on power, water, gas infrastructure by “bolting on” fixes to old vulnerable systems.)

America's crumbling infrastructure has been targeted before. In 2016, hackers attempted to change the chemical mixture used to purify water in a water treatment facility. If the change had not been noticed, people would have been poisoned. In June 2019, the North American Electric Reliability Corporation (NERC) warned that a major hacking group with Russian ties was looking for vulnerabilities in the networks of electrical utilities.

To protect against a cyber attack, government, businesses and organizations and regular people need to make sure their systems are secured. One analysis found that only around a fifth of companies in the U.S. that use computers to control their industrial machinery monitor their equipment for potential cyber attacks.

You can also do your part to make your own data less vulnerable to hackers by taking some preventative steps. (h/t to LaTrobe.edu.au)

  • Install reliable anti-virus software.
  • Regularly update computers. New updates may contain security upgrades.
  • Do not click email attachments sent by strangers. Similarly, delete any links sent to your social media from people you don't recognize.
  • Only purchase software from reputable sources.
  • Change passwords regularly and use multi-factor authentication.
  • Browse the internet using new-generation browsers that are less vulnerable to cyber attacks.

For more information about cybersecurity and America's vulnerability to a large-scale cyber attack, read up on the articles at CyberWar.news.

Sources include:

LiveScience.com

CyberSecurityIntelligence.com

SecurityBoulevard.com 1

ForeignPolicy.com

CSIS.org

LaTrobe.edu.au

SecurityBoulevard.com 2



Take Action:
Support Natural News by linking to this article from your website.
Permalink to this article:
Copy
Embed article link:
Copy
Reprinting this article:
Non-commercial use is permitted with credit to NaturalNews.com (including a clickable link).
Please contact us for more information.
Free Email Alerts
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.
App Store
Android App
eTrust Pro Certified

This site is part of the Natural News Network © 2022 All Rights Reserved. Privacy | Terms All content posted on this site is commentary or opinion and is protected under Free Speech. Truth Publishing International, LTD. is not responsible for content written by contributing authors. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. Truth Publishing assumes no responsibility for the use or misuse of this material. Your use of this website indicates your agreement to these terms and those published here. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners.

This site uses cookies
Natural News uses cookies to improve your experience on our site. By using this site, you agree to our privacy policy.
Learn More
Close
Get 100% real, uncensored news delivered straight to your inbox
You can unsubscribe at any time. Your email privacy is completely protected.