{"id":24074,"date":"2015-06-09T18:01:48","date_gmt":"2015-06-09T10:01:48","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=24074"},"modified":"2022-07-15T17:24:17","modified_gmt":"2022-07-15T09:24:17","slug":"cyberwarfare-and-consequences","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/","title":{"rendered":"How a Full-Blown Cyberwarfare Can Change the World"},"content":{"rendered":"<p>The internet is a beautiful thing. It has no boundaries and the only limitation it has is the imagination of its users. <strong>New cultures have been born because of it,<\/strong> and more are being developed daily. New tech, new many things. On the internet you don\u2019t need a visa to travel to a different country.<\/p>\n<p>The internet, in itself, is an <strong>unclaimed territory with more than 2 billion citizens<\/strong>. Easy to say, the world\u2019s superpowers are busy trying to get their own piece of it. And just like a physical territory, there\u2019s also espionage, spying, and a war going on in the cyber world. You may not realize it, but it\u2019s been going on for several years now.<\/p>\n<h2>What\u2019s Happening In The Cyberworld?<\/h2>\n<p>One prime example is the United States\u2019 Nasional Security Agency (NSA) that spies on Americans and <a target=\"_blank\" href=\"https:\/\/time.com\/2945037\/nsa-surveillance-193-countries\/\" rel=\"noopener\">193 other countries<\/a> every minute of every day, with one goal in mind (and I\u2019m simplifying it here): to <strong>collect information and use them to deter acts of terrorism<\/strong>.  If you want to get your heart pumping, here\u2019s a timeline of <a target=\"_blank\" href=\"https:\/\/www.eff.org\/nsa-spying\/timeline\" rel=\"noopener\">NSA\u2019s domestic spying<\/a>.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/cyberwarfare-and-consequences\/in-the-dark.jpg\" width=\"800\" height=\"663\"><figcaption class=\"entry-image-caption\"><a target=\"_blank\" href=\"https:\/\/www.flickr.com\/photos\/halderman\/7349691184\/\" rel=\"noopener\">IMAGE: Chris Halderman<\/a><\/figcaption><\/figure>\n<p>But in their bid to do this, <a target=\"_blank\" href=\"https:\/\/www.cbc.ca\/news\/world\/nsa-backlash-sparks-new-technology-1.2021655?cmp=rss\" rel=\"noopener\">backlash from across the globe<\/a> has started. China is a big country and in the recent decades it has proved to be an industrial and economic marvel. And now they have begun to <a target=\"_blank\" href=\"https:\/\/thediplomat.com\/2015\/04\/chinas-growing-cyberwar-capabilities\/\" rel=\"noopener\">heavily invest<\/a> in their cyber capabilities. Last year, <a target=\"_blank\" href=\"https:\/\/www.businessinsider.com\/iran-is-officially-a-real-player-in-the-cyber-war-2014-12\" rel=\"noopener\">Iran<\/a>\u2018s supreme leader told students to <a target=\"_blank\" href=\"http:\/\/rt.com\/news\/iran-israel-cyber-war-899\/\" rel=\"noopener\">prepare for cyberwar<\/a>. Perhaps it\u2019s a reaction to Saudis and Israelis\u2019 <a target=\"_blank\" href=\"http:\/\/rt.com\/news\/stuxnet-iran-nuclear-mossad-565\/\" rel=\"noopener\">cyber attack on Iran\u2019s nuclear program<\/a> back in 2010.<\/p>\n<p>Russia is on the offensive too. One of the most publicized cyber attack they did was hacking into the <a target=\"_blank\" href=\"https:\/\/edition.cnn.com\/2015\/03\/10\/politics\/state-department-hack-worst-ever\/index.html\" rel=\"noopener\">US State Department\u2019s mail servers<\/a>. And just recently, the Pentagon announced a <strong>new strategy for cyberwarfare<\/strong> in which <a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2015\/04\/24\/us\/politics\/pentagon-announces-new-cyberwarfare-strategy.html\" rel=\"noopener\">cyberweapons<\/a> were discussed.<\/p>\n<p>And it\u2019s not just governments attacking other governments in the cyberspace. Vital companies are also being cyber attacked by governments. And as a response, half of the surveyed UK companies said that they were <a target=\"_blank\" href=\"https:\/\/www.wired.co.uk\/article\/kpmg-big-companies-should-hire-hackers\" rel=\"noopener\">considering hiring hackers<\/a> in order to deter other hackers. Fight fire with fire, right?<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/cyberwarfare-and-consequences\/need-a-hacker.jpg\" width=\"800\" height=\"456\"><figcaption class=\"entry-image-caption\"><a target=\"_blank\" href=\"https:\/\/www.flickr.com\/photos\/adulau\/8442476626\" rel=\"noopener\">IMAGE: Alexandre Dulaunoy<\/a><\/figcaption><\/figure>\n<p>But back to the global stage, the world is currently under a cyber semi-cold war with the US, Russia, Iran, and China as the main players. Just recently, news about the US getting hacked by the Chinese broke out.<\/p>\n<p>According to experts, the incident involved the gathering of over 4 million current and former federal employee records. But while the motive of the hack is unclear, it is a <strong>highly targeted attack<\/strong> that could point to the possibility that the hackers are building their own <a target=\"_blank\" href=\"https:\/\/www.theatlantic.com\/international\/archive\/2015\/06\/why-did-china-hack-federal-employees-data\/395096\/\" rel=\"noopener\">database of US government employees<\/a>.  As it so happens, the Office of Personnel Management <a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2015\/06\/06\/us\/chinese-hackers-may-be-behind-anthem-premera-attacks.html?_r=0\" rel=\"noopener\">warned<\/a> the US late last year that their networked systems are a \u201chacker\u2019s dream,\u201dand that <strong>they are not ready for an attack<\/strong>.<\/p>\n<h2>Well, Can\u2019t They Just Not Connect Their Important Systems To The Internet?<\/h2>\n<p>That\u2019s actually a great question. The truth is, they don\u2019t. The government and military generally have their own intranet \u2013 <strong>a private network that is only accessible to authorized personnel<\/strong>. Sure, it might still utilize the world wide web, butit is the kind that makes use of totally disconnected cable networks. In fact, big corporations have their own intranets as well, where their files can only be accessed on-site.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/cyberwarfare-and-consequences\/disconnecting.jpg\" width=\"800\" height=\"464\"><figcaption class=\"entry-image-caption\"><a target=\"_blank\" href=\"https:\/\/www.flickr.com\/photos\/42931449@N07\/6088751332\" rel=\"noopener\">IMAGE: photosteve101<\/a><\/figcaption><\/figure>\n<p>But just like businesses, governments and militaries can\u2019t survive on intranet alone. While classified information are kept on systems that are not connected to the internet, there are still devices that are, <strong>mostly used for communication purposes<\/strong> like emailing, video conferencing, and the sending of files<\/p>\n<p>When you hear in the news that a top-level government official\u2019s email has been hacked, that\u2019s most likely because the computer that was being used was connected to the internet.<\/p>\n<p>Also, if a network that is not connected to the internet has been hacked and classified information has been leaked, it\u2019s almost always a 100% chance that <strong>someone from the inside did it. <\/strong> But that\u2019s not what we are here to discuss today.<\/p>\n<h2>What Could The Repercussions Of A Full-Scale Cyberwar Be?<\/h2>\n<p>The answer to this is simple, and scary: <strong>governments could build their own internet<\/strong>. Imagine a world where there are several Internets. Germany wants <a target=\"_blank\" href=\"https:\/\/www.reuters.com\/article\/2013\/10\/25\/us-usa-spying-germany-idUSBRE99O09S20131025\" rel=\"noopener\">its own internet<\/a> because of NSA\u2019s spying scandal, while  Iran is building its <a target=\"_blank\" href=\"https:\/\/www.voanews.com\/a\/irans-next-step-in-building-a-halal-internet\/2672948.html\" rel=\"noopener\">own \u201chalal\u201d internet<\/a> which will be free of \u201cimpurities\u201d from the outside world.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/cyberwarfare-and-consequences\/underground-at-work.jpg\" width=\"800\" height=\"533\"><figcaption class=\"entry-image-caption\"><a target=\"_blank\" href=\"https:\/\/www.flickr.com\/photos\/brianklug\/6870003490\" rel=\"noopener nofollow\">IMAGE: Brian Klug<\/a><\/figcaption><\/figure>\n<p>And it is not just a gimmick to think that other governments will follow in their lead. If these cyber attacks go out of hand, the only thing that could safeguard governments from each other is by totally disconnecting from one another. If that isn\u2019t scary enough for you, let\u2019s take a step back and look at what the internet is right now.<\/p>\n<h2>Effects on Communication<\/h2>\n<p>Right now I am talking to you while I am in the Philippines. You might be in South Korea, Japan, Kuwait, or the US, but you can still read this. You can talk to your friends through Skype who are in a different country. You can play online games in an international setting.<\/p>\n<p>But what happens when the internet as we see it now disappears, and instead <strong>become smaller, confined, restrictive bubbles<\/strong>? That borderless communication will be gone. Which leads us to a new different way of getting information: information about other countries will be harder to come by. It is entirely possible that <strong>we will only get information from government-sanctioned channels<\/strong>.<\/p>\n<p>This changes the way everything works; everyone will take a big hit. Think of how major a role Facebook and Twitter played during the <a target=\"_blank\" href=\"https:\/\/www.wired.com\/2013\/04\/arabspring\/\" rel=\"noopener\">Arab Spring<\/a>. The whole world was watching and supporting them. But if governments cut off their connection to the rest of the world, this kind of free-flowing information will be a thing of the past.<\/p>\n<p>Perhaps one major issue regular users will suffer from is <strong>the way we navigate the internet<\/strong>.  It might get more difficult and <a target=\"_blank\" href=\"https:\/\/www.reddit.com\/comments\/9yj1f\/heres_a_new_scenario_i_just_created_illustrating\" rel=\"noopener\">expensive<\/a> to get connected. Like withdrawing money from an ATM that is not from your bank, international calls may cost more because of rerouting. Plus, getting through will require going through many gateways and checkpoints, <strong>slowing down the information-gathering process<\/strong>, because of how the request is passed around. Alternatively, a \u201c<a target=\"_blank\" href=\"https:\/\/www.pocket-lint.com\/apps\/news\/129560-what-is-net-neutrality-and-internet-fast-lanes-and-why-is-obama-stepping-in-now\" rel=\"noopener\">fast lane\u201d<\/a> may be <strong>offered for a fee<\/strong>.<\/p>\n<p>Scary now when you think of it that way, right? And that\u2019s a looming threat to us all. But there are <em>far<\/em> scarier things than this.<\/p>\n<h2>Power Grids Going Down<\/h2>\n<p>Power grids in the US and around the world are <strong>vulnerable to attacks<\/strong>, and we aren\u2019t speaking hypothetically. In 2014 alone, the US power grid was<a target=\"_blank\" href=\"https:\/\/money.cnn.com\/2014\/11\/18\/technology\/security\/energy-grid-hack\/\" rel=\"noopener\"> attacked by hackers 79 times<\/a>. Hackers <strong>managed to get into 37% of the companies that <em>make<\/em> the grid work<\/strong>.<\/p>\n<p>According to reports, the attacks were (and still are) done by an army of hackers in a coordinated attempt to make entire cities go dark. Imagine an unassailable country like the US going dark, the ensuing panic will be chaotic.<\/p>\n<h2>Cars Being Controlled Remotely<\/h2>\n<p><a href=\"https:\/\/www.hongkiat.com\/blog\/future-car-technology\/\">Cars are getting smarter<\/a> every year. From being able to diagnose what is wrong in their hardware or software, to totally <a href=\"https:\/\/www.hongkiat.com\/blog\/google-products-and-future\/\">skipping the need for a human driver<\/a>. This is the future of cars, and it is coming fast.<\/p>\n<p>Cars may even get upgrades by receiving updates from a remote server, and you probably know what that means by now \u2013 <strong>anything that is connected to the internet has the possibility of being hacked<\/strong>. In this case, autonomous cars can be targeted by hackers to <a target=\"_blank\" href=\"https:\/\/www.cbsnews.com\/news\/car-hacked-on-60-minutes\/\" rel=\"noopener\">control car functions<\/a>.<\/p>\n<h2>Smartphones Acting As Ubiquitous Spying Tool<\/h2>\n<p>Google can push codes to Android devices, and NSA had this brilliant idea to <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2015\/05\/21\/nsa-five-eyes-google-samsung-app-stores-spyware\/\" rel=\"noopener\">hijack Google Play<\/a> and basically hack everyone\u2019s phones. Good for us that this didn\u2019t really pan out. Or did it?<\/p>\n<p>The thing is, if one agency planned on doing it, other organizations might dedicate their time and resources into hacking not only Android devices, but also all phones that rely on automatic updates from a main server. This can then be used to not only track everyone\u2019s movements, but also get into everyone\u2019s private lives, <strong>making everyone\u2019s personal data open to unwarranted espionage<\/strong>.<\/p>\n<h2>Hacking Into Inter-Continental Ballistic Missiles (ICBM)<\/h2>\n<p>On October 23, 2010, 50 ICBMs that are equipped with nuclear tips <a target=\"_blank\" href=\"https:\/\/content.time.com\/time\/nation\/article\/0,8599,2030685,00.html\" rel=\"noopener\">went dark<\/a>. Their human controllers lost communications with them for 45 minutes. Why is this scary? Because during that 45 minutes, <strong>the launch centers had no way of detecting unauthorized launch attempts<\/strong>.<\/p>\n<p>It was not clear what the exact reason for the lockout was, which could be anything from a faulty cabling, someone hacking into the ICBMs through radio receivers, a staffer\u2019s honest mistake  in triggering the blackout, or a very dedicated hacker who was tapping into America\u2019s thousands of miles of cables (highly unlikely). <strong>Whatever caused it  could have started a nuclear war<\/strong>.<\/p>\n<h2>Military Drones Being Used Against The People They\u2019re Supposed To Protect<\/h2>\n<p>US military drones are already flying on their areas of interest. And they are carrying <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/General_Atomics_MQ-1_Predator\" rel=\"noopener\">hellfire missiles<\/a>. It is also inevitable that <strong>these drones connect wirelessly to their base stations <\/strong>where<strong> humans can control or update their systems<\/strong> once in a while.<\/p>\n<p>With that in mind, do you think it\u2019s entirely possible that <a target=\"_blank\" href=\"https:\/\/www.bbc.com\/future\/article\/20140206-can-drones-be-hacked\" rel=\"noopener\">hackers can gain access to these drones<\/a> for their own purposes? Definitely.<\/p>\n<h2>Crashing The Stock Market, And The Economy<\/h2>\n<p>Hackers can manipulate the stock market, which they did in  2010, when Russian hackers <a target=\"_blank\" href=\"http:\/\/www.bloomberg.com\/bw\/articles\/2014-07-17\/how-russian-hackers-stole-the-nasdaq\" rel=\"noopener nofollow\">hacked into NASDAQ<\/a>. While this attempt might simply mean someone wants information in order to earn big money, it is also not a far-fetched idea that in the future <strong>some organization bent on destroying a specific country\u2019s economy<\/strong> would and could do so.<\/p>\n<p>If this happens, people could lose jobs, houses could be foreclosed and the rate of homelessness will spike, civil unrest will ensue, and the collapse of law and order could destroy governments. This has happened before, in a pre-Internet period known as the <a target=\"_blank\" href=\"https:\/\/www.history.com\/topics\/great-depression\" rel=\"noopener\">Great Depression<\/a>.<\/p>\n<h2>In Conclusion<\/h2>\n<p>The stakes are high in the cyberworld. Private groups, corporations, and even governments are both on the offensive and defensive. It\u2019s like watching several tribes battle for power and land. The only difference is that in the 21st century the thing they are fighting for isn\u2019t even a physical place, but it sure contains great power.<\/p>\n<p>And at the end of the day, we, the regular users, will be the casualties of this war between superpowers.<\/p>","protected":false},"excerpt":{"rendered":"<p>The internet is a beautiful thing. It has no boundaries and the only limitation it has is the imagination of its users. New cultures have been born because of it, and more are being developed daily. New tech, new many things. On the internet you don\u2019t need a visa to travel to a different country.&hellip;<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3398],"tags":[4605],"topic":[4521],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How a Full-Blown Cyberwarfare Can Change the World - Hongkiat<\/title>\n<meta name=\"description\" content=\"The internet is a beautiful thing. It has no boundaries and the only limitation it has is the imagination of its users. New cultures have been born\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How a Full-Blown Cyberwarfare Can Change the World\" \/>\n<meta property=\"og:description\" content=\"The internet is a beautiful thing. It has no boundaries and the only limitation it has is the imagination of its users. New cultures have been born\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-09T10:01:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-15T09:24:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.hongkiat.com\/uploads\/cyberwarfare-and-consequences\/in-the-dark.jpg\" \/>\n<meta name=\"author\" content=\"Rean\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rean\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/\"},\"author\":{\"name\":\"Rean\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/9055cf045c2ed578773e8a4e184ba621\"},\"headline\":\"How a Full-Blown Cyberwarfare Can Change the World\",\"datePublished\":\"2015-06-09T10:01:48+00:00\",\"dateModified\":\"2022-07-15T09:24:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/\"},\"wordCount\":1770,\"commentCount\":6,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/cyberwarfare-and-consequences\\\/in-the-dark.jpg\",\"keywords\":[\"Internet Security and Privacy\"],\"articleSection\":[\"Internet\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/\",\"name\":\"How a Full-Blown Cyberwarfare Can Change the World - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/cyberwarfare-and-consequences\\\/in-the-dark.jpg\",\"datePublished\":\"2015-06-09T10:01:48+00:00\",\"dateModified\":\"2022-07-15T09:24:17+00:00\",\"description\":\"The internet is a beautiful thing. It has no boundaries and the only limitation it has is the imagination of its users. New cultures have been born\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/#primaryimage\",\"url\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/cyberwarfare-and-consequences\\\/in-the-dark.jpg\",\"contentUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/cyberwarfare-and-consequences\\\/in-the-dark.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/cyberwarfare-and-consequences\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How a Full-Blown Cyberwarfare Can Change the World\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/9055cf045c2ed578773e8a4e184ba621\",\"name\":\"Rean\",\"description\":\"Rean is an operations specialist, growth hacker, and a consultant specializing in remote team setup and management.\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/rean\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How a Full-Blown Cyberwarfare Can Change the World - Hongkiat","description":"The internet is a beautiful thing. It has no boundaries and the only limitation it has is the imagination of its users. New cultures have been born","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/","og_locale":"en_US","og_type":"article","og_title":"How a Full-Blown Cyberwarfare Can Change the World","og_description":"The internet is a beautiful thing. It has no boundaries and the only limitation it has is the imagination of its users. New cultures have been born","og_url":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2015-06-09T10:01:48+00:00","article_modified_time":"2022-07-15T09:24:17+00:00","og_image":[{"url":"https:\/\/assets.hongkiat.com\/uploads\/cyberwarfare-and-consequences\/in-the-dark.jpg","type":"","width":"","height":""}],"author":"Rean","twitter_card":"summary_large_image","twitter_creator":"@hongkiat","twitter_site":"@hongkiat","twitter_misc":{"Written by":"Rean","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/"},"author":{"name":"Rean","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/9055cf045c2ed578773e8a4e184ba621"},"headline":"How a Full-Blown Cyberwarfare Can Change the World","datePublished":"2015-06-09T10:01:48+00:00","dateModified":"2022-07-15T09:24:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/"},"wordCount":1770,"commentCount":6,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/cyberwarfare-and-consequences\/in-the-dark.jpg","keywords":["Internet Security and Privacy"],"articleSection":["Internet"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/","url":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/","name":"How a Full-Blown Cyberwarfare Can Change the World - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/#primaryimage"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/cyberwarfare-and-consequences\/in-the-dark.jpg","datePublished":"2015-06-09T10:01:48+00:00","dateModified":"2022-07-15T09:24:17+00:00","description":"The internet is a beautiful thing. It has no boundaries and the only limitation it has is the imagination of its users. New cultures have been born","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/#primaryimage","url":"https:\/\/assets.hongkiat.com\/uploads\/cyberwarfare-and-consequences\/in-the-dark.jpg","contentUrl":"https:\/\/assets.hongkiat.com\/uploads\/cyberwarfare-and-consequences\/in-the-dark.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/cyberwarfare-and-consequences\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How a Full-Blown Cyberwarfare Can Change the World"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/9055cf045c2ed578773e8a4e184ba621","name":"Rean","description":"Rean is an operations specialist, growth hacker, and a consultant specializing in remote team setup and management.","url":"https:\/\/www.hongkiat.com\/blog\/author\/rean\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-6gi","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/24074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=24074"}],"version-history":[{"count":3,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/24074\/revisions"}],"predecessor-version":[{"id":60471,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/24074\/revisions\/60471"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=24074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=24074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=24074"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=24074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}