Page 70 - Pure Life 23
P. 70
The Role of States… H. Aziz / 69
were defined, without much CST the victim states should
reference to what would harm lead the resistance to the
the interests of disadvantaged application of “martial laws” to
governments. CST.
In this cyberwar the This is no easy task when the
hegemonic states and their marauders have a 20-year lead in
militaries have a 20-year lead. an abstract space where
CST appears as a domain of perimeter-defence cannot be
freedom but its lack of applied.
legislation makes it one of Their commands of CST
anarchy, which by default have allowed the intrusion of
permits unauthorised criminal activities, which use
distribution of copyrighted complex malware to infect
materials. private computers to send
Hegemonic governments use money-earning spam and
their international sovereignty as ransomware encrypting personal
a pretext to coerce platform files with a demand for payment
owners within their jurisdiction of ransom.
to force changes to software and Autopilot is activated to
hardware. accept payments in
As their mainstream media is cryptocurrency. In mid-2017 a
part of their military-industrial- ransomware attack known as
media complex they use existing “Petya” crippled many large
social media to change businesses in the USA and
perceptions and views of world Europe. Their computers and
citizenry. data were locked up and held to
Victim states have the ransom.
responsibility to counter Earlier the British National
hegemonic cyberstrategies. Health Service was attacked by a
While brutal militaries that ransomware known as
promote regional wars for the “WannaCry”, which affected
sake of private profits organise about 230000 computers in 150
their competing commands of