Katana VentraIP

Cyberwarfare

Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems.[1] Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare.

"Cyberwar" redirects here. For other uses, see Cyberwar (disambiguation).

There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists.[2] One view is that the term is a misnomer since no cyber attacks to date could be described as a war.[3] An alternative view is that it is a suitable label for cyber attacks which cause physical damage to people and objects in the real world.[4]


Many countries, including the United States, United Kingdom, Russia, China, Israel, Iran, and North Korea,[5][6][7][8] have active cyber capabilities for offensive and defensive operations. As states explore the use of cyber operations and combine capabilities, the likelihood of physical confrontation and violence playing out as a result of, or part of, a cyber operation is increased. However, meeting the scale and protracted nature of war is unlikely, thus ambiguity remains.[9]


The first instance of kinetic military action used in response to a cyber-attack resulting in the loss of human life was observed on 5 May 2019, when the Israel Defense Forces targeted and destroyed a building associated with an ongoing cyber-attack.[10][11]

on many countries, revealed by Edward Snowden.

Massive spying by the US

After the NSA's spying on Germany's Chancellor was revealed, the Chancellor compared the NSA with the Stasi.[38]

Angela Merkel

The NSA recording nearly every cell phone conversation in the Bahamas, without the Bahamian government's permission, and similar programs in , the Philippines, Mexico and Afghanistan.[39][40]

Kenya

The "" probes of American defense contractors computer systems since 2003.[41]

Titan Rain

The , in the US, widely attributed to China.[42][43]

Office of Personnel Management data breach

The security firm published details of a breach that compromised one of the European Union's diplomatic communication channels for three years.[44]

Area 1

Preparedness[edit]

A number of countries conduct exercise to increase preparedness and explore the strategy, tactics and operations involved in conducting and defending against cyber attacks against hostile states, this is typically done in the form of war games.[95]


The Cooperative Cyber Defence Centre of Excellence (CCDCE), part of the North Atlantic Treaty Organization (NATO), have conducted a yearly war game called Locked Shields since 2010 designed to test readiness and improve skills, strategy tactics and operational decision making of participating national organizations.[96][97] Locked Shields 2019 saw 1200 participants from 30 countries compete in a red team vs. blue team exercise. The war game involved a fictional country, Berylia, which was "experiencing a deteriorating security situation, where a number of hostile events coincide with coordinated cyber attacks against a major civilian internet service provider and maritime surveillance system. The attacks caused severe disruptions in the power generation and distribution, 4G communication systems, maritime surveillance, water purification plant and other critical infrastructure components". CCDCE describe the aim of the exercise was to "maintain the operation of various systems under intense pressure, the strategic part addresses the capability to understand the impact of decisions made at the strategic and policy level."[96][98] Ultimately, France was the winner of Locked Shields 2019.[99]


The European Union conducts cyber war game scenarios with member states and foreign partner states to improve readiness, skills and observe how strategic and tactical decisions may affect the scenario.[100]


As well as war games which serve a broader purpose to explore options and improve skills, cyber war games are targeted at preparing for specific threats. In 2018 the Sunday Times reported the UK government was conducting cyber war games which could "blackout Moscow".[101][102] These types of war games move beyond defensive preparedness, as previously described above and onto preparing offensive capabilities which can be used as deterrence, or for "war".[103]

On 7 April 2009, announced they spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems.[247]

The Pentagon

On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House cyber security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first time.

[248]

On 9 February 2009, the announced that it will conduct a review of the country's cyber security to ensure that the Federal government of the United States cyber security initiatives are appropriately integrated, resourced and coordinated with the United States Congress and the private sector.[249]

White House

In the wake of the , NATO established the Cooperative Cyber Defence Centre of Excellence (CCD CoE) in Tallinn, Estonia, in order to enhance the organization's cyber defence capability. The center was formally established on 14 May 2008, and it received full accreditation by NATO and attained the status of International Military Organization on 28 October 2008.[250] Since Estonia has led international efforts to fight cybercrime, the United States Federal Bureau of Investigation says it will permanently base a computer crime expert in Estonia in 2009 to help fight international threats against computer systems.[251]

2007 cyberwar waged against Estonia

In 2015, the Department of Defense released an updated cyber strategy memorandum detailing the present and future tactics deployed in the service of defense against cyberwarfare. In this memorandum, three cybermissions are laid out. The first cybermission seeks to arm and maintain existing capabilities in the area of cyberspace, the second cybermission focuses on prevention of cyberwarfare, and the third cybermission includes strategies for retaliation and preemption (as distinguished from prevention).

[252]

Cyber counter-intelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions.[246]


One of the hardest issues in cyber counterintelligence is the problem of attribution. Unlike conventional warfare, figuring out who is behind an attack can be very difficult.[253] However Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable".[254]

Doubts about existence[edit]

In October 2011 the Journal of Strategic Studies, a leading journal in that field, published an article by Thomas Rid, "Cyber War Will Not Take Place" which argued that all politically motivated cyber attacks are merely sophisticated versions of sabotage, espionage, or subversion – and that it is unlikely that cyber war will occur in the future.[255]

Legal perspective[edit]

NIST, a cybersecurity framework, was published in 2014 in the US.[256]


The Tallinn Manual, published in 2013, is an academic, non-binding study on how international law, in particular the jus ad bellum and international humanitarian law, apply to cyber conflicts and cyber warfare. It was written at the invitation of the Tallinn-based NATO Cooperative Cyber Defence Centre of Excellence by an international group of approximately twenty experts between 2009 and 2012.[257]


The Shanghai Cooperation Organisation (members of which include China and Russia) defines cyberwar to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other states". In September 2011, these countries proposed to the UN Secretary General a document called "International code of conduct for information security".[258]


In contrast, the United approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech. This difference of opinion has led to reluctance in the West to pursue global cyber arms control agreements.[259] However, American General Keith B. Alexander did endorse talks with Russia over a proposal to limit military attacks in cyberspace.[260] In June 2013, Barack Obama and Vladimir Putin agreed to install a secure Cyberwar-Hotline providing "a direct secure voice communications line between the US cybersecurity coordinator and the Russian deputy secretary of the security council, should there be a need to directly manage a crisis situation arising from an ICT security incident" (White House quote).[261]


A Ukrainian international law scholar, Alexander Merezhko, has developed a project called the International Convention on Prohibition of Cyberwar in Internet. According to this project, cyberwar is defined as the use of Internet and related technological means by one state against the political, economic, technological and information sovereignty and independence of another state. Professor Merezhko's project suggests that the Internet ought to remain free from warfare tactics and be treated as an international landmark. He states that the Internet (cyberspace) is a "common heritage of mankind".[262]


On the February 2017 RSA Conference Microsoft president Brad Smith suggested global rules – a "Digital Geneva Convention" – for cyber attacks that "ban the nation-state hacking of all the civilian aspects of our economic and political infrastructures". He also stated that an independent organization could investigate and publicly disclose evidence that attributes nation-state attacks to specific countries. Furthermore, he said that the technology sector should collectively and neutrally work together to protect Internet users and pledge to remain neutral in conflict and not aid governments in offensive activity and to adopt a coordinated disclosure process for software and hardware vulnerabilities.[263][264] A fact-binding body has also been proposed to regulate cyber operations.[265][266]

(1996)

Independence Day

(2003)

Terminator 3: Rise of the Machines

(2007)

Live Free or Die Hard

(2015)

Terminator Genisys

(2016)

Snowden

(2019)

Terminator: Dark Fate

Andress, Jason. Winterfeld, Steve. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress.  1-59749-637-5

ISBN

Bodmer, Kilger, Carpenter, & Jones (2012). . New York: McGraw-Hill Osborne Media. ISBN 0071772499, "ISBN 978-0071772495"

Reverse Deception: Organized Cyber Threat Counter-Exploitation

Brenner, S. (2009). Cyber Threats: The Emerging Fault Lines of the Nation State. Oxford University Press.  0-19-538501-2

ISBN

Carr, Jeffrey. (2010). Inside Cyber Warfare: Mapping the Cyber Underworld. O'Reilly.  978-0-596-80215-8

ISBN

Conti, Gregory. Raymond, David. (2017). On Cyber: Towards an Operational Art for Cyber Conflict. Kopidion Press.  978-0692911563

ISBN

Cordesman, Anthony H.; Cordesman, Justin G. (2002). . Greenwood Publishing Group. ISBN 978-0-275-97423-7.

Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland

Costigan, Sean S.; Perry, Jake (2012). Cyberspaces and global affairs. Farnham, Surrey: Ashgate.  9781409427544.

ISBN

Fritsch, Lothar & Fischer-Hübner, Simone (2019). . Journal of Information Warfare, 17(4), 72–87.

Implications of Privacy & Security Research for the Upcoming Battlefield of Things

Gaycken, Sandro. (2012). Cyberwar – Das Wettrüsten hat längst begonnen. Goldmann/Randomhouse.  978-3442157105

ISBN

Geers, Kenneth. (2011). Strategic Cyber Security. NATO Cyber Centre. , ISBN 978-9949-9040-7-5, 169 pages

Strategic Cyber Security

Halpern, Sue, "The Drums of Cyberwar" (review of , Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers, Doubleday, 2019, 348 pp.), The New York Review of Books, vol. LXVI, no. 20 (19 December 2019), pp. 14, 16, 20.

Andy Greenberg

Harris, Shane (2014). @War: The Rise of the Military-Internet Complex. Eamon Dolan/Houghton Mifflin Harcourt.  978-0544251793.

ISBN

Hunt, Edward (2012). . IEEE Annals of the History of Computing. 34 (3): 4–21. doi:10.1109/mahc.2011.82. S2CID 16367311.

"US Government Computer Penetration Programs and the Implications for Cyberwar"

Janczewski, Lech; Colarik, Andrew M. (2007). . Idea Group Inc (IGI). ISBN 978-1-59140-992-2.

Cyber Warfare and Cyber Terrorism

Rid, Thomas (2012). "Cyber War Will Not Take Place". Journal of Strategic Studies. 35: 5–32. :10.1080/01402390.2011.608939. S2CID 153828543.

doi

Woltag, Johann-Christoph: 'Cyber Warfare' in .

Rüdiger Wolfrum (Ed.) Max Planck Encyclopedia of Public International Law (Oxford University Press 2012)

Media related to Cyberwarfare at Wikimedia Commons

The Information Age at Wikibooks