HOMEStrategies for building awareness for the potential of peace education in Cameroon Ben Oru Mforndip
Has Democracy Enhanced Development in Africa? Conrad John Masabo
Permanent Emergency Powers in France: The ‘Law to Strengthen Internal Security and the Fight Against Terrorism’ and the Protection of Human Rights Lena Muhs
Women’s Political Representation in Sri Lanka: Leading towards Prosperity or Peril Pujika Rathnayake
Lack of empathy as a threat to peace Victoria Scheyer
The death of democracy in Honduras Daniel Bagheri S.
Berta Vive Daniel Bagheri Sarvestani
The Persons Who Changed the Lives of Terrorists and Criminals Surya Nath Prasad
RECENT ARTICLES Teaching Peace from Tales of the City: Peace Education through the Memoryscapes of Nagasaki Patporn Phoothong
Reflections of Refugees in Africa Wyclife Ong'eta Mose
Challenges and prospects of AU to implement the Ezulwini Consensus: The case of collective security and the use of force Tunamsifu Shirambere Philippe
The Right to Food Shant Melkonian
Freedom of Expression Under Threat in Zambia Mariateresa Garrido
Douglas Janoff on LGBTQIA Human Rights Luciana Téllez
Common Things: Communication, Community, Communal Peacebuilding Lina Patricia Forero Martínez
The political Crisis of the 2017 Honduran Election Daniel Bagheri S.
Water Security in the Sixaola River Basin Adrián Martinez Blanco and Diana Ubico Durán
Reborn Arunima Chouguley
An Open Letter to the American People: Political Responsibility in the Nuclear Age Richard Falk, David Krieger, and Robert Laney
Past Special Report
Is Cyberwar Really War?
Thomas Wagner-Nagy and Ross Ryan
February 19, 2015
Is cyberwar inevitable? Is it even war? What about cyberpeace? This article reviews the ongoing cyber debate among security analysts.
While US-President Barack Obama was giving a lecture on nuclear threats during his June 2013 visit to Germany, Chancellor Angela Merkel made a remarkable comment on a different kind of peril to democracy and peace:
"The internet is virgin territory ("Neuland") for us all. And, of course, it also provides enemies and opponents of our democratic basic order with new tools and opportunities to threaten our way of life." The surprising part of her statement was not that she finally acknowledged the potential threat behind cyber operations in the light of the 2013 global surveillance disclosures but rather the fact that she referred to the internet as virgin territory in the year of its 30th anniversary.
The inhabitants of this virgin territory, especially those of the social networks, were quick to respond with an online mockery campaign. As the hashtag #Neuland went viral and the ridicule spread to the mainstream press, Merkel's spokesman, tried to clarify her comment stating "[...] that the internet is new legal and political territory, as we sense daily in political dealings". The incident not only exposed the scale of confusion, uncertainty, and lack of expertise on cyberspace at the highest government levels, it also sparked a public debate on how to deal with the internet as a medium many are using, yet very few are understand.
Cyberspace - or rather control over it - has become an important aspect of international relations. But just how dangerous is our ever intensifying dependence on the digital and virtual world? Some scholars argue that cyberwar is one of the new major threats to international peace. Others state that the harmful potential of cyber operations is being overestimated, and still others hold that they can be beneficial in preventing physical violence in conflict situations. The purpose of this paper is therefore to assess the scale of threats that a so-called cyber warfare with its various subcategories can pose to national and international security.
The quest for hidden information
The nature of warfare has evolved from one-on-one sword fights to high precision long range missiles that are capable of hitting a target on the opposite side of the world at the push of a button. Violent confrontation has expanded from land to the depths of the sea and the heights of airspace. While all of these spheres still require the physical presence of soldiers or at least weapons, cyberspace represents a new kind of territory with new kinds of weapons. As William Lynn states in a 2010 Foreign Affairs article: "Although cyberspace is a man-made domain, it has become just as critical to military operations as land, sea, air, and space". This has led to a situation in which "[a]ccess to sensitive data no longer requires physical proximity. The benefits [...] are balanced by the knowledge that information is more accessible and less protected than ever before", writes Mark Doll (et al.), a realization that has led him to search for ways of "defending the digital frontier" in his book of the same title.
• Interception: Data is siphoned from the system
• Interruption: Networks and internet access are rendered unusable in a denial-of-service attack
• Modification: Authorization or access codes are changed
• Fabrication: False information is inserted into a system
These four ways of intervention constitute the gateway to cyber operations that - as some experts argue - have the potential to cause a virtual war among nations and countries. But what does the term "cyberwar" actually mean?
In a 2001 interview, Arquilla was asked what he thinks about the fact that the term cyberwar was becoming a buzzword being used by authorities and the media to describe any larger hacker intrusion. He took the chance to clarify what he and his colleague were refering to when talking about cyberwar: "Both David and I believe very strongly that what we have called cyberwar has something to do with technology, but just as much -- if not even more -- to do with organization and military doctrine. And what we realized ten years ago is that if you can control information flows, an opposing military cannot function [...] We saw this in the Gulf War and we've seen it in a variety of actual events as well as in advanced military experiments. So, our notion of cyberwar was intended to refer basically to military interaction. Hacking today, that is conflated with cyberwar, is a small part of it. But it can be the part that strikes directly at a country's infrastructures."
In Doll's view, it is a misperception that "[s]ecurity technology will solve security needs". Cordesman expresses similar concerns and uses the U.S. as an example to highlight a lack of effective countermeasures and identifies a general pattern with "a clear disconnect between the efforts in the U.S. to plan offensive cyber warfare and efforts at cyber defense". This means that while the U.S. might be able to carry out sophisticated cyber operations their capability of responding to the latter is relatively poor. Or as Clarke and Knake put it: "The biggest secret in the world about cyber war may be that at the very same time the U.S. prepares for offensive cyber war, it is continuing policies that make it impossible to defend the nation effectively from cyber attack." The assumption that this disconnect applies even more strongly to the vast majority of countries that are not as technologically advanced as the U.S. does not seem farfetched.
In February 2011, then-Central Intelligence Agency Director Leon Panetta warned the House Permanent Select Committee on Intelligence of the possibility of a "Cyber Pearl Harbor" and has reiterated this alert since. Other experts like Anthony Cordesman are more cautious about predicting such nightmare scenarios, but are warning about the uncertainties that cyber attacks bring along. With regard to "an [...] electronic Pearl Harbor," Cordesman states that "[i]t is far from clear that this level of potential damage from cyber attack is likely or even possible. [...] Resolving this very uncertainty is one of the most critical priorities in improving the U.S. effort in critical infrastructure protection."
Cyber attacks on Estonia - a foretaste of the future of warfare?
In 2007, the world was able get a glimpse at how such a virtual operation targeting a state's critical infrastructure might look like: The government of Estonia had decided to move a memorial statue honoring Soviet World War II war dead from the central square of Tallinn to a cemetery on the city’s outskirts, which made Russians in and outside the country express their anger in demonstrations that turned violent. Simultaneously, distributed denial-of-service (DDoS) attacks began against Estonian computers. The Baltic country was hit by a series of cyber attacks that targeted websites of national organizations, including the parliament, banks, ministries, newspapers and broadcasters. "Estonia, although small [...], is a remarkably web-dependent country, with widespread internet access, digital identity cards, an 80-percent usage rate for online banking, electronic tax collection, and remote medical monitoring."
Estonia accused Russia of orchestrating the attack claiming the DDoS attacks could be traced to IP addresses in Moscow owned by the Russian government. Outside experts, however, found the evidence of official government involvement weak. Lesk estimates that the cyber attacks against Estonia might have cost in the neighborhood of $100,000 and concludes that "the size of the attack doesn’t imply government involvement. The amount of money needed to launch the attacks is easily within the capacity of a group of middle-class terrorists".
Estonian authorities were, in the end, unable to effectively counter the attack. The country cut its Internet connections to the outside world so that people within Estonia could continue to use their conventional services. This, for example, made it difficult for people with Estonian bank cards to use ATMs in other countries.
While Lesk lists a number of additional examples of cyber attacks between Israel and Palestine, China and Taiwan as well as China and the US, he emphasizes that "[a]ll of these incidents, however, involved attempts to overwrite websites with embarrassing and childish messages; they don’t seem to be something that governments would waste their effort on. Most seemed to be the actions of uncoordinated agents". Nonetheless, in his view "the Estonian cyberwar ought to be a wake-up call [as] producing so much disruption for so little money has to be attractive to many groups".
Real threats vs scaremongering
As opposed to the scholars and politicians mentioned above, Thomas Rid argues that "cyberwar will not take place" in his 2011 paper of the same title. Rid dismantles the idea of a large-scale cyberwar in three steps, arguing that what he defines as cyber war has never happened in the past, does not take place in the present and "that it is unlikely that cyber war will occur in the future".
Referring to Clausewitz's concept of war in his book Vom Kriege, Rid notes that an offensive act has to meet at least three criteria simultaneously in order to qualify as an act of war: "Any act of war has to have the potential to be lethal; it has to be instrumental; and it has to be political." After applying these criteria to several examples of cyber offenses, Rid concludes that "[n]ot one single past cyber offense, neither a minor nor a major one, constitutes an act of war on its own. He emphasizes the lack of force in all past cyber operations and deduces that "[i]f the use of force in war is violent, instrumental, and political, then there is no cyber offense that meets all three criteria."
Even if one accepts Rid's line of argument, the fact that no cyber operation to date can be classified as an act of war does not mean that this can not happen in the future. Clarke & Knake give a vivid description of how a Chinese cyber attack on the United States homeland in case of a political crisis may look like. According to them, the Chinese could black out a major city by activating so-called logic-bombs that were pre-installed in America’s electricity grid. The attack could derail trains, cut communication in air traffic systems and target control systems of nuclear power stations with fatal consequences. Many people could be injured or killed as a result. Rid refers to this scenario and acknowledges that "[s]uch mediated destruction caused by a cyber offense could, without doubt, be an act of war, even if the means were not violent, only the consequences". Since he would not call it war in that case either, Rid offers a more nuanced terminology to come to terms with cyber attacks.
Rid goes even one step further by highlighting possible benefits of cyber operations. In his recent Foreign Affairs article, he claims that hacking can reduce real-world violence as opposed to amplifying it and indeed make the world more peaceful: "Cyberattacks diminish rather than accentuate political violence by making it easier for states, groups, and individuals to engage in two kinds of aggression that do not rise to the level of war: sabotage and espionage. Weaponized computer code and computer-based sabotage operations make it possible to carry out highly targeted attacks on an adversary’s technical systems without directly and physically harming human operators and managers."
Four main conclusions regarding the danger of cyber operations can be drawn from this brief review of the literature:
• If one applies Clausewitz's criteria for warfare strictly to past cases of cyber operations, none of them constitutes an act of war and should therefore not be referred to as cyberwar.
• Politicians, authorities and media alike tend to use the term "cyberwar" to describe any bigger hacking operation. This frivolous use bears some scaremongering potential and forms an obstacle to a more differentiated discourse. Since Rid discusses the issue terminology in depth, his approach might be helpful in restoring the credibility of the term.
• The cyber attacks that have been recorded to date have proven that virtual operations have the potential to inflict a relatively high economic damage in proportion to their low costs.
• While experts are split over the extent of damage that can be caused by virtual operations, they agree on the fact that governments have failed to boost efforts to effectively defend their nations from large-scale cyber attacks.
Due to the partly contradictory literature on the threats posed by cyber operations it seems farfetched to assume that they have become the strongest weapons of war over the years. Chances are that they are not - at least not yet, if one considers that to our knowledge no or hardly any people died of the consequences of cyber attacks. Their full destructive potential, however, can only be assessed from the day when somebody decides to push it to its limits, as it is the case with many other warlike threats. It is hard to predict when and how this will happen. The literature that arises from the 2013 global surveillance disclosures might provide a deeper insight into the status quo and reveal if and how the general tone when addressing security and warfare in cyberspace has changed after the debate that followed Edward Snowden's revelations.
Frau Merkel entdeckt das Internet! Historische Rede - #Neuland [Video file]. (2013, June 19). Retrieved from http://www.youtube.com/watch?v=-VkLbiDAouM
Strange, H. (2013, June 20). Angela Merkel refers to internet as 'virgin territory'. The Telegraph. Retrieved from http://www.telegraph.co.uk/news/worldnews/europe/germany/10133039/Angela-Merkel-refers-to-internet-as-virgin-territory.html
Lynn, W. J. (2010). Defending a New Domain. Foreign Affairs, 89(5), 101.
Doll, M. W., Rai, S., & Granado, J. (2003). Defending the digital frontier: A security agenda, 19. Hoboken, N.J: Wiley.
Doll (2003), 20.
Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is Coming! Comparative Strategy, 12(2), 141-165.
Krempl, S. (2001, February 13). Be Prepared: Cyberwar is Coming - Or Maybe Not. Telepolis. Retrieved from http://www.heise.de/tp/artikel/7/7122/1.html
Doll (2003), 22.
Cordesman, A. H., Cordesman, J. G., & Center for Strategic and International Studies (Washington, D.C.) (2002). Cyber-threats, information warfare, and critical infrastructure protection: Defending the U.S. homeland, Westport, Conn: Praeger.
Clarke, R. A., & Knake, R. K. (2012). Cyber war: The next threat to national security and what to do about it (2nd ed.), 6. Ecco.
Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 35(1), 6.
Cordesman, (2002), 2f.
Lesk, M. (2007). The New Front Line: Estonia under Cyberassault. IEEE Security & Privacy, 5(4), 1.
Lesk (2007), 2.
Lesk (2007), 3.
Lesk (2007), 2f.
Lesk (2007), 3f.
Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 35(1), 5.
Rid (2012), 6.
Rid (2012), 10.
Clarke, R. A., & Knake, R. K. (2012). Cyber war: The next threat to national security and what to do about it
(2nd ed.). Introduction XI ff. Ecco
Rid (2012), 9.
Rid (2012), 5f.
Rid, T. (2013, October 15). Forget The Hype about Cyberwar: Hacking Makes the World More Peaceful | Foreign Affairs. Retrieved from http://www.foreignaffairs.com/articles/140160/thomas-rid/cyberwar-and-peace
Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is Coming! Comparative Strategy, 12(2), 141-165.
Clarke, R. A., & Knake, R. K. (2012). Cyber war: The next threat to national security and what to do about it (2nd ed.). Ecco.
Cordesman, A. H., Cordesman, J. G., & Center for Strategic and International Studies (Washington, D.C.) (2002). Cyber-threats, information warfare, and critical infrastructure protection: Defending the U.S. homeland. Westport, Conn: Praeger.
Doll, M. W., Rai, S., & Granado, J. (2003). Defending the digital frontier: A security agenda. Hoboken, N.J: Wiley.
Krempl, S. (2001, February 13). Be Prepared: Cyberwar is Coming - Or Maybe Not | Telepolis. Retrieved from http://www.heise.de/tp/artikel/7/7122/1.html
Lesk, M. (2007). The New Front Line: Estonia under Cyberassault. IEEE Security & Privacy, 5(4), 76-79. doi:10.1109/MSP.2007.98
Thomas Wagner-Nagy is a freelance journalist currently based in Germany. He holds a BA in Science Journalism with a minor in Biomedical Sciences from the University of Dortmund. Born in Transylvania/Romania and raised in Germany, his work has taken him to France, Cameroon and Costa Rica. He graduated from the United Nations-mandated University for Peace in June 2014 with an MA in Media, Peace and Conflict Studies. Thomas is currently working to establish his own NGO which aims to provide schooling and a leisure program for children in refugee camps. Ross Ryan is a UPEACE faculty member who teaches in the Media and Peace Studies programme.