{"id":711,"date":"2025-04-18T04:34:41","date_gmt":"2025-04-18T04:34:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/epres010\/?p=711"},"modified":"2025-04-18T04:34:41","modified_gmt":"2025-04-18T04:34:41","slug":"cs-462-kinetic-cyberwarfare","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/epres010\/2025\/04\/18\/cs-462-kinetic-cyberwarfare\/","title":{"rendered":"CS 462 &#8211; &#8220;Kinetic Cyberwarfare&#8221;"},"content":{"rendered":"\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n<p><strong>Watch this video on \u201cCyber warfare is everywhere\u201d:\u00a0<a href=\"https:\/\/www.ted.com\/talks\/brijesh_singh_brijesh_singh_cyber_warfare_is_everywhere\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ted.com\/talks\/brijesh_singh_brijesh_singh_cyber_warfare_is_everywhere<\/a><\/strong><\/p>\n\n\n\n<p><strong>He explains how human warfare evolved through the ages and how cyberwarfare is a culmination of it all. Something new he talks about is the concept of \u201cKinetic Cyberwarfare\u201d and provided \u201cStuxnet\u201d as an example. Research on other examples and provide your feedback.<\/strong><\/p>\n\n\n\n<p>I agree with the speaker on the importance of Kinetic Cyberwarfare and how it needs to be acknowledged as a genuine threat. Due to its capability for cyberattacks causing harm to physical forms of infrastructure should be a pressing concern. Some of the speaker\u2019s examples such as power grids and factories now involve the employees maintaining them as an additional risk on top of data loss. An example of an older kinetic cyber-attack was the hacked Tramways in Poland. In 2008, a 14-year-old managed to rewire a television remote into a control for the tram system in Lodz. He had rerouted two trams, which ended up derailing four vehicles and causing many people to be injured. While the purpose of the event was to be a prank, this kind of attack shows that even devices that may not seem like possible weapons are if the right person is tinkering with them and that unintentional consequences of harm can come from actions like this.<\/p>\n\n\n\n<p>Applegate, Scott. (2013). The Dawn of Kinetic Cyber.\u00a0<a href=\"https:\/\/www.researchgate.net\/publication\/237065308_The_Dawn_of_Kinetic_Cyberhttps:\/\/www.researchgate.net\/publication\/237065308_The_Dawn_of_Kinetic_Cyber\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.researchgate.net\/publication\/237065308_The_Dawn_of_Kinetic_Cyberhttps:\/\/www.researchgate.net\/publication\/237065308_The_Dawn_of_Kinetic_Cyber<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Watch this video on \u201cCyber warfare is everywhere\u201d:\u00a0https:\/\/www.ted.com\/talks\/brijesh_singh_brijesh_singh_cyber_warfare_is_everywhere He explains how human warfare evolved through the ages and how cyberwarfare is a culmination of it all. Something new he talks about is the concept of \u201cKinetic Cyberwarfare\u201d and provided \u201cStuxnet\u201d as an example. Research on other examples and provide your feedback. I agree with the &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/epres010\/2025\/04\/18\/cs-462-kinetic-cyberwarfare\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CS 462 &#8211; &#8220;Kinetic Cyberwarfare&#8221;<\/span><\/a><\/p>\n","protected":false},"author":24915,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/711"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/users\/24915"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/comments?post=711"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/711\/revisions"}],"predecessor-version":[{"id":712,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/posts\/711\/revisions\/712"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/media?parent=711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/categories?post=711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epres010\/wp-json\/wp\/v2\/tags?post=711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}