ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Society That’s Fully Dependent Upon Technology is Set Up for an Epic Fall

b2ap3_thumbnail_cyberwar_400_20150827-185354_1.jpgModern society has become fully reliant upon technology. While technology has certainly done much to improve just about every facet of our lives, it also leaves us quite vulnerable to a scenario where we abruptly lose it. What would a worst-case scenario like this actually look like?

To get to the bottom of this frightening inquiry, we look to David Gewirtz. He recently did a “thought experiment” for ZDNet where he went into details answering this very question. For Gewirtz, he refers to the state of society without its modern devices as a “Stone Age,” which essentially equates to the era of computing that precedes the Information Age--before personal computers were a thing and rock n’ roll was controversial.

Believe it or not, a scenario like this is more plausible than you may realize, especially if a hacker were to deploy the Stuxnet virus (a complex virus which targets nuclear reactors). The scenario that Gewirtz explored is one where this virus is deployed against The United States, along with other viruses meant to disable the country’s infrastructure.

Surprisingly, due to most of the country’s infrastructure being operated by older technology, a devastating hack like this is entirely within the realm of possibility.

To be sure, having the grid essentially go down would be much more than a minor inconvenience. Think about it, how often do you actually use cash? We’ve become so heavily-dependant upon electronic payments that losing this would literally cripple the economy. People would be unable to access the critical supplies they need, and since a country like America is so closely tied to the economic dealings of the rest of the world, the negative effects would be far reaching. And let’s not forget about how everyone is dropping landlines for mobile phones. People having to wait days to send and receive messages would be a complete shock to a society built on instant gratification.

Now, you might be an optimistic individual who has faith in humanity and thinks, “Okay, this would be a bump in the road. People would pull together, neighbors would help each other, and the good people of Arizona would get through it.” Gewirtz doesn’t think a happy-ending scenario like this where people “regroup, rebuild, and recover” is nearly as realistic as what Hollywood makes it out to be in their popular disaster movies.

Instead, he believes it’s more likely for people’s survival instincts to kick in as they selfishly look out for themselves and turn on each other. Think more “Mad Max” and less “Independence Day.” Also in Gewirtz’ scenario, he assumes that the culprits of the hack aren’t looking to just make a one-time big splash. He proposes that “clever enemies are capable of playing a long game.”

For example, people’s faith in recovery depends on their government having a plan. But what if these recovery plans are just as dependant on technology as the infrastructure that’s no more, and those backup plans were sabotaged too? Essentially, government as we know it would be nonexistent; and, if the hackers were to do something like infiltrate the ranks of government agencies using threat actors whose identities were compromised from the hacks of personnel files (a hack which actually happened recently to the U.S. Office of Personnel Management), then the government’s ability to function would be sabotaged.

Gewirtz theorizes that, in the government's place, there might be small groups that work for the common good, but probably not. Here’s how he sees it:

Without financial support and communications, our supply chains would be toast. Goods and services would no longer move across the country. There would be mobs storming supermarkets, hardware stores, and gun shops. Gasoline for vehicles would run out in a matter of days. National government would cease to function. Instead, the primary governance touch points would be some responsible local law enforcement officers. More likely, we would see feudal governance take hold, where those with the most firepower, survival resources, and physical strength would take power.

Recall how we mentioned that a major hack like this would set society back to the days before the Information Age, well Gewirtz thinks this is the best-case scenario of a worst-case scenario. It’s more probable that, due to the sudden and drastic loss of the world’s communications systems, society would regress even further, perhaps even back to the 18th Century, before the days of the telegraph. This would be in part due to society's inability to communicate apart from digital devices.

At this point in Gewirtz’ thought experiment, he tackles the likelihood of this actually happening. Thankfully, it’s not very likely. One reason is because the world’s economy is so connected that if this were to happen to a major player like The United States, then the standard of living for pretty much the rest of the world would take a nosedive. Therefore, a well-funded government organization wouldn’t be much inclined to engage in this level of cyber warfare because their nation would also be negatively affected by such a hack.

Instead, a more likely candidate to act out like this would be a group that’s dedicated to seeing the entire world spiral into chaos. Typically, people who buy into these anarchist ideas are lone wolves and lack the significant organizational capacity and resources it would take to make all of this happen. So with that in mind, the likelihood of this entire scenario goes down considerably, but it’s still not completely ruled out.

Therefore, we can take comfort in technology’s primary role in today’s society--but don’t get too comfortable.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Managed IT Services Data Recovery Communication Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Facebook Business Continuity Windows 10 Disaster Recovery Covid-19 Passwords Holiday Windows 10 IT Support Apps Browser Managed Service Cloud Computing Outsourced IT Miscellaneous Data Management Remote Work Internet of Things Managed Service Provider Government Saving Money Operating System Workplace Strategy Artificial Intelligence Managed IT services Networking Gadgets Windows App Virtualization Blockchain Mobile Device Management Spam Business Technology Remote WiFi Information Bandwidth Encryption Server Budget Office History Two-factor Authentication Office 365 Apple Information Technology Employee/Employer Relationship Gmail BDR Health Conferencing Analytics Cybercrime Access Control Data Security Wi-Fi Big Data Help Desk Hacking Employer-Employee Relationship Remote Monitoring Cost Management Hacker IT Management Remote Computing Training Document Management Compliance Vendor Save Money Voice over Internet Protocol Patch Management Search... Best Practice BYOD Managed Services Project Management Computing Retail Vendor Management Alert Data loss Hard Drive Hiring/Firing Money Outlook Password Customer Service Unified Threat Management Legal Firewall Data storage Applications Augmented Reality Word IBM Vulnerabilities Website Mobile Office Antivirus Cleaning Windows 7 The Internet of Things Robot Free Resource Maintenance YouTube Storage How To Laptop Websites Meetings Mobility User Twitter Google Maps Social Scam Sports Law Enforcement DDoS End of Support SaaS Windows 11 Printer Data Breach Chrome VPN iPhone Cortana Education Update Content Filtering Travel Mobile Computing Virtual Reality Monitoring Social Engineering Marketing Router Cryptocurrency Healthcare Remote Workers Black Market Paperless Office Running Cable Saving Time Co-Managed IT Managed Services Provider Entertainment Physical Security Virtual Private Network Politics Bitcoin Machine Learning Settings Computers Telephone Current Events Solid State Drive Wireless Technology eWaste Solutions Start Menu Computer Care Downloads Excel Integration Vulnerability Downtime Chromebook Images 101 Drones Safety HIPAA Display Automobile Software as a Service Data Protection Virtual Desktop Virtual Assistant How To Experience Employees Avoiding Downtime Microchip Flexibility Holidays Cooperation Hack Disaster Identity Theft Processor Video Conferencing Tech Terms Notifications PowerPoint Unified Communications Managed IT Administration Virtual Machines Google Docs Lithium-ion battery Computer Repair Digital Bluetooth Presentation Professional Services Distributed Denial of Service Specifications Office Tips Taxes Multi-factor Authentication IT Consultant Private Cloud Processors Memory Customer Relationship Management Microsoft Excel Flash File Sharing Financial Data Wireless Headphones Going Green IT Point of Sale Business Cards Redundancy Telephone Systems Tech Risk Management Business Growth Computer Accessories Cache Google Apps Error Unified Threat Management Workers Bookmark Telework Shortcuts Download Communitications Piracy Microsoft 365 Banking Public Speaking Term Smartwatch Google Wallet Deep Learning CCTV Procurement HTML Printing Streaming Media Messenger Touchscreen Keyboard Browsers FinTech Nanotechnology Be Proactive Computer Malfunction Upload IT Assessment Software License Emergency Business Metrics Hard Drives Google Play CES Hosted Solution Vendor Mangement intranet Social Network Supply Chain Management Value Books Wireless Language Troubleshooting Samsung Shortcut Data Analysis Organization Society Screen Reader Cyber security Workplace Strategies Webcam Environment Trends Smart Devices Mobile Technology Uninterrupted Power Supply Heating/Cooling Security Cameras Business Mangement Monitors Social Networking Customer Resource management Remote Working Visible Light Communication Devices Windows XP Reading Tip of the week Tablets Fileless Malware AI Windows 8 Trend Micro Gamification Electronic Health Records Company Culture Transportation Digital Security Cameras Displays Supercomputer Telephone System Advertising Regulations Wasting Time Google Calendar Relocation Smart Technology Modem Virus Work/Life Balance Business Owner Directions Tech Support Backup and Disaster Recovery eCommerce Motion Sickness Content Surveillance Desktop Videos Google Drive Electronic Medical Records Accountants Managing Costs Comparison SSID In Internet of Things Staffing Database Development Employer/Employee Relationships Knowledge Hacks Corporate Profile IP Address Media Network Congestion Reliable Computing Telephony Writing Employer Employee Relationship Health IT Equifax Virtual Machine Television Supply Chain Hard Drive Disposal Inbound Marketing Cabling Reviews Tactics Optimization G Suite Username Teamwork Tablet 2FA Scalability VoIP Tracking Data Storage Startup Hypervisor Freedom of Information Mouse Workplace email scam Medical IT Administrator Recovery Text Messaging Competition Navigation Shopping Proactive IT Addiction Paperless Web Server Mobile Security SQL Server Bring Your Own Device Electronic Payment LiFi Digital Payment Entrepreneur User Tip PCI DSS Legislation Licensing News SharePoint Network Management Humor Scams Documents Worker Application Evernote Gig Economy Music Business Communications Phone System Business Intelligence Internet Service Provider Azure Access Fake News Time Management Public Cloud Proxy Server Regulations Compliance Emails Managed IT Service Service Level Agreement Memes Cables Computing Infrastructure Botnet Securty Spyware Domains Human Resources Micrsooft Management Net Neutrality Device security Audit Rental Service

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?