Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Society That’s Fully Dependent Upon Technology is Set Up for an Epic Fall

b2ap3_thumbnail_cyberwar_400_20150827-185354_1.jpgModern society has become fully reliant upon technology. While technology has certainly done much to improve just about every facet of our lives, it also leaves us quite vulnerable to a scenario where we abruptly lose it. What would a worst-case scenario like this actually look like?

To get to the bottom of this frightening inquiry, we look to David Gewirtz. He recently did a “thought experiment” for ZDNet where he went into details answering this very question. For Gewirtz, he refers to the state of society without its modern devices as a “Stone Age,” which essentially equates to the era of computing that precedes the Information Age--before personal computers were a thing and rock n’ roll was controversial.

Believe it or not, a scenario like this is more plausible than you may realize, especially if a hacker were to deploy the Stuxnet virus (a complex virus which targets nuclear reactors). The scenario that Gewirtz explored is one where this virus is deployed against The United States, along with other viruses meant to disable the country’s infrastructure.

Surprisingly, due to most of the country’s infrastructure being operated by older technology, a devastating hack like this is entirely within the realm of possibility.

To be sure, having the grid essentially go down would be much more than a minor inconvenience. Think about it, how often do you actually use cash? We’ve become so heavily-dependant upon electronic payments that losing this would literally cripple the economy. People would be unable to access the critical supplies they need, and since a country like America is so closely tied to the economic dealings of the rest of the world, the negative effects would be far reaching. And let’s not forget about how everyone is dropping landlines for mobile phones. People having to wait days to send and receive messages would be a complete shock to a society built on instant gratification.

Now, you might be an optimistic individual who has faith in humanity and thinks, “Okay, this would be a bump in the road. People would pull together, neighbors would help each other, and the good people of Saratoga Springs and the Tri-State area would get through it.” Gewirtz doesn’t think a happy-ending scenario like this where people “regroup, rebuild, and recover” is nearly as realistic as what Hollywood makes it out to be in their popular disaster movies.

Instead, he believes it’s more likely for people’s survival instincts to kick in as they selfishly look out for themselves and turn on each other. Think more “Mad Max” and less “Independence Day.” Also in Gewirtz’ scenario, he assumes that the culprits of the hack aren’t looking to just make a one-time big splash. He proposes that “clever enemies are capable of playing a long game.”

For example, people’s faith in recovery depends on their government having a plan. But what if these recovery plans are just as dependant on technology as the infrastructure that’s no more, and those backup plans were sabotaged too? Essentially, government as we know it would be nonexistent; and, if the hackers were to do something like infiltrate the ranks of government agencies using threat actors whose identities were compromised from the hacks of personnel files (a hack which actually happened recently to the U.S. Office of Personnel Management), then the government’s ability to function would be sabotaged.

Gewirtz theorizes that, in the government's place, there might be small groups that work for the common good, but probably not. Here’s how he sees it:

Without financial support and communications, our supply chains would be toast. Goods and services would no longer move across the country. There would be mobs storming supermarkets, hardware stores, and gun shops. Gasoline for vehicles would run out in a matter of days. National government would cease to function. Instead, the primary governance touch points would be some responsible local law enforcement officers. More likely, we would see feudal governance take hold, where those with the most firepower, survival resources, and physical strength would take power.

Recall how we mentioned that a major hack like this would set society back to the days before the Information Age, well Gewirtz thinks this is the best-case scenario of a worst-case scenario. It’s more probable that, due to the sudden and drastic loss of the world’s communications systems, society would regress even further, perhaps even back to the 18th Century, before the days of the telegraph. This would be in part due to society's inability to communicate apart from digital devices.

At this point in Gewirtz’ thought experiment, he tackles the likelihood of this actually happening. Thankfully, it’s not very likely. One reason is because the world’s economy is so connected that if this were to happen to a major player like The United States, then the standard of living for pretty much the rest of the world would take a nosedive. Therefore, a well-funded government organization wouldn’t be much inclined to engage in this level of cyber warfare because their nation would also be negatively affected by such a hack.

Instead, a more likely candidate to act out like this would be a group that’s dedicated to seeing the entire world spiral into chaos. Typically, people who buy into these anarchist ideas are lone wolves and lack the significant organizational capacity and resources it would take to make all of this happen. So with that in mind, the likelihood of this entire scenario goes down considerably, but it’s still not completely ruled out.

Therefore, we can take comfort in technology’s primary role in today’s society--but don’t get too comfortable.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 December 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Hosted Solutions Microsoft Upgrade Efficiency Computer IT Support Mobile Devices Innovation Smartphone Windows 10 Gmail Hardware Network Security Ransomware Office Backup Apps Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Operating System The Internet of Things Social Media Microsoft Office Bandwidth Data Windows Firewall Experience Smartphones Content Filtering Cybercrime Website Money Mobile Device Management Network Employer-Employee Relationship Managed Service Provider Outlook Two-factor Authentication History Small Business Phishing App Wireless Technology Android Mobile Computing Apple Big Data communications Safety Unified Threat Management Best Practice Quick Tips Alert Networking Data storage Laptop Remote Computing Shortcut Cryptocurrency IBM DDoS Heating/Cooling Google Docs Word Education Holiday Cleaning Black Market YouTube Processors Retail Office Tips Business Management LiFi Staffing Downtime BYOD Passwords Streaming Media Help Desk Competition Managed IT services Presentation Micrsooft Entrepreneur Visible Light Communication Disaster Domains Business Growth Data Management Bluetooth Hacker Robot Advertising Recovery Sports Society Google Wallet Spam Automation Application Memory Customer Service Information Technology Running Cable Internet of Things Windows 8 Hosted Solution Windows XP IT Services Deep Learning BDR Router Artificial Intelligence Documents Compliance Office 365 Tech Support Drones Vendor Management Analytics Social Saving Money intranet Browser Lithium-ion battery Printer Virtual Desktop Wireless Monitors Unified Communications Securty Social Networking Encryption Document Management Public Speaking Law Enforcement SaaS VoIP Displays IP Address Virtualization Cortana Proactive IT Network Congestion Government End of Support Augmented Reality Keyboard Save Money Search User Music Hard Drives Writing
QR-Code