The Current State of CyberWar in the World

by | Nov 30, 2015 | Uncategorized

Drama. Drama is the touchstone for reporting. We have to look well around this particular stone in order to catch a realistic impression of the virtual. We have to look around it even to understand what CyberWar is or how it is defined.

When talking about cyberwar, hyperbole & metaphor are the rule rather than the exception. Cyberthis, cyberthat – you may have noticed that the virtual world is inhabited by nouns and verbs taken from the material world, and that images of cyberthings in the news tend to have dramatic pictures of physical things rather than the electrons that make up the cyberworld. Images of coins inhabit stories of purely virtual cryptocurrency, such as BitCoin. Perhaps Physics journals, where readers actually are interested in the electrons and the math of the cyberrealm, are the exception to this rule.

But when we read stories of cyberwar, we see pictures of soldiers, firearms and materiel accompanying the story. When we read of the people sitting at desks and computers to figure out how to hack and not be hacked, we call them CyberWarriors and pictures of men in flak jackets and helmets accompany these stories. I wonder what CyberItem will be accompanied by pictures of tanks and bombers.

Aside from the dramatic illustrations and photos, what is CyberWar? In 2010, Richard Clarke, former Special Advisor to the President on cybersecurity defined cyberwarfare as “actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption.” The salient point being that a nation-state must be identified as the offender. If this is true, then we have apparently been already involved in years-long cyberwars, with attacks both from and to/on China, Russia, the USA, Israel, Georgia, Ukraine, the Koreas, Syria, Iran, Estonia and more. And though countries always deny it, there have been clear indicators, tantamount to proof, that these countries have set their digital attackers on one another’s networks, computers, and data. Damage to said networks, computers, and data has ensued.

So certainly, there have been cyberattacks on and by states. But is it CyberWar? Dr. Thomas Rid, Professor of Security Studies at King’s College says that there is no Cyberwar. He tends to define cyberwar in terms of physical infrastructure catastrophes – scenarios where water stops “flowing, the lights go out, trains derail, banks lose our financial records, the roads descend into chaos, elevators fail, and planes fall from the sky.” And he says it not going to happen. In fact, he has a 2013 book named, “Cyber War Will Not Take Place”.

Others are not so sanguine about the subject and possibilities. In the United States, amidst falling government spending in most areas, the Cyber Command budget is skyrocketing. It has nearly doubled year-over-year: $118 Million in 2012, $212 Million in 2013 and $447 million in 2014. That buys a lot of electrons, a lot of code, and a lot of cyberwarriors (sans flak jackets). These increases are leading to similar, albeit not as dramatic inflation of cyberbudgets in other countries.

With all the cybertools at hand and those being created, won’t someone be tempted to use them? Is CyberWar inevitable, or is there a way out? It’s a question that ethicists are taking seriously. Big thinkers like Patrick Lin, Fritz Alhoff and Neil C. Rowe have coauthored several articles, such as Is It Possible to Wage a Just Cyber War? and War 2.0: Cyberweapons and Ethics to explore alternatives. There exist laws of (conventional) war and there must exist similar guidelines for cyberconflicts. Yesterday is not too soon to begin looking seriously at these issues.

When we try to answer the phrase that is the title of this article, it must needs be all over the map, because the definition of cyberwar is, like this article, all over the map. It is actually and literally all over the globe. The definition of cyberwar differs from country to country and from organization to organization. An article entitled (full metaphors flying), The Wild West of Cyberwarfare attempts to seriously denote such differing ideas on the subject, its title notwithstanding. Its discussion is useful, but its conclusion is necessarily amorphous.

Well then, what is the best answer we can give to the state of CyberWar in the world? Cyberattacks are rife, worldwide. They are carried on by multiple state actors and by stateless ones. They are carried on by state actors who pass the blame off on other states and on stateless actors over whom they claim to have no control or input, but who are nevertheless politically aligned. They are carried on by hacktivists, who seek political change through disabling or defacing sites, networks, and information. They are carried on by those with a pure profit motive. And they are carried on by ne’er-do-wells who just find joy in minor mayhem.

All such attacks are increasing, although the great majority remain relatively unsophisticated acts such as Distributed Denial of Service (DDoS). However, there is little evidence that much in the way of physical infrastructure is affected. There is little evidence that people are being physically harmed through such attacks. It is unknown whether such events will actually come to pass.

Dr. Rid says they won’t. Drs. Lin, Alhoff and Rowe are pointing the way to avoiding such harm. Richard Clarke and former Secretary of Defense, Leon Panetta, say it’s inevitable and we must prepare – to the tune of hundreds of millions of dollars.

Albert Einstein famously said, “You cannot simultaneously prevent and prepare for war.” Let us hope that in the case of Cyber war, he was incorrect.

Subscribe to our free and informative weekly forensics newsletter!

 

Related Posts

Email spoofing, scamming, and hacking

Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at stake, we have had a number of cases involving phishing and spoofing in the past few years and into the present where...

AT&T Data Breach and Hack: What Does it Mean to Me?

AT&T Data Breach and Hack: What Does it Mean to Me? copyright 2024, Steven Burgess It was ginormous. It included almost all wireless customers from 2022. Did you have an AT&T phone or other account in 2022? You’re one of 110 million (gasp). You be hacked, my...

Somebody deleted stuff off my phone (I swear it wasn’t me!). Can I get it back?

- Copyright Steve Burgess 2024 Your phone is suddenly losing text, videos, photos. What’s happening? Are they gone forever? Have I been hacked? How do I avoid this in the future? What’s happening? Of course, it’s hard to tell without some history of the phone’s use,...

CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

The Stories are true; the names and places have been changed to protect the potentially guilty. It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of...

Email as a signed contract vs. fraudulent emails

Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as a legal contract? And that sometimes, emails are fraudulent? Both are true. The Statute of Frauds Although email didn’t...

El Salvador Adopts BitCoin

El Salvador Adopts BitCoin copyright Steve Burgess, 2021 El Salvador just passed a law to make BitCoin (BTC) legal tender and is the first country to do so. It did something similar back in 2001, when it made the US Dollar the official currency, replacing the...

Keeping Your Bitcoin Safe

BitCoin. Everybody wants some. But what’s the best way to keep it safe once you’ve got it? And how to get it? First things first – you get BitCoin (and Etherium, and DogeCoin) from a cryptocurrency exchange, like you would from a “regular” currency exchange to turn...

Cyberbullying and Covid-19: 2021 Update

California defines a cyberbully as anyone who sends any online communication to deliberately frighten, embarrass, harass, or otherwise target another. The Cyberbullying Research Center defines it as “willful and repeated harm inflicted through the use of computers,...

Cybersecurity & Covid-19: Vulnerability and What to Do About It

Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of us working from home (close to 90% of American corporations are encouraging or requiring employees to do so) and having...

Indian Summer Lovin’ – Tech Tips For a Warm Autumn

by Natalie Miller, 2019 With Indian Summer temperatures rising, here are some tips to help you make sure your devices are ready to conquer these warm days of Fall like you are. Check Those Pockets! Taking a dip in the pool, going for a paddle in a kayak, and jumping...

Pin It on Pinterest

Share This