Page 70 - Pure Life 23
P. 70

The Role of States… H. Aziz  / 69

               were  defined,  without  much         CST  the  victim  states  should
               reference  to  what  would  harm      lead  the  resistance  to  the
               the  interests  of  disadvantaged     application of “martial laws” to
               governments.                          CST.
                  In    this    cyberwar     the        This is no easy task when the
               hegemonic  states  and  their         marauders have a 20-year lead in
               militaries have a 20-year lead.       an    abstract    space    where
                  CST appears as a domain of         perimeter-defence  cannot  be
               freedom  but      its  lack  of       applied.
               legislation  makes  it  one  of          Their  commands  of  CST
               anarchy,  which  by  default          have  allowed  the  intrusion  of
               permits             unauthorised      criminal  activities,  which  use
               distribution   of    copyrighted      complex  malware  to  infect
               materials.                            private  computers  to  send
                  Hegemonic  governments  use        money-earning       spam     and
               their international sovereignty as    ransomware encrypting personal
               a  pretext  to  coerce  platform      files with a demand for payment
               owners  within  their  jurisdiction   of ransom.
               to force changes to software and         Autopilot  is  activated  to
               hardware.                             accept        payments         in
                  As their mainstream media is       cryptocurrency.  In  mid-2017  a
               part  of  their  military-industrial-  ransomware  attack  known  as
               media complex they use existing       “Petya”  crippled  many  large
               social    media     to    change      businesses  in  the  USA  and
               perceptions  and  views  of  world    Europe.  Their  computers  and
               citizenry.                            data were locked up and held to
                  Victim    states   have    the     ransom.
               responsibility     to     counter        Earlier  the  British  National
               hegemonic cyberstrategies.            Health Service was attacked by a
                  While  brutal  militaries  that    ransomware        known        as
               promote  regional  wars  for  the     “WannaCry”,  which  affected
               sake  of  private  profits  organise   about 230000 computers in 150
               their  competing  commands  of
   65   66   67   68   69   70   71   72   73   74   75