![]() Responses to cyber war include a form of interstate deterrence through denial and entanglement, offensive capabilities, and designs for rapid network and infrastructure recovery if deterrence fails. Major states with elaborate technical and human resources could, in principle, create massive disruption and physical destruction through cyber attacks on military and civilian targets. The larger party has limited ability to disarm or destroy the enemy, occupy territory, or use counterforce strategies effectively.Ĭyber war, though only incipient at this stage, is the most dramatic of the potential threats. ![]() Technological evolution, including efforts to “reengineer” some systems for greater security, might eventually change that, but, for now, it remains the case. Because the Internet was designed for ease of use rather than security, attackers currently have the advantage over defenders. In the cyber world, by contrast, actors are diverse (and sometimes anonymous), physical distance is immaterial, and some forms of offense are cheap. In the physical world, governments have a near-monopoly on large-scale use of force, the defender has an intimate knowledge of the terrain, and attacks end because of attrition or exhaustion. As the Stuxnet virus that infected Iran’s nuclear program showed, software attacks can have very real physical effects.Ī more useful definition of cyber war is hostile action in cyberspace whose effects amplify or are equivalent to major physical violence. But this avoids the important interconnections between the physical and virtual layers of cyberspace. Similarly, the term “cyber war” is used loosely to cover a wide range of behaviors, reflecting dictionary definitions of war that range from armed conflict to any hostile contest (for example, “war between the sexes” or “war on drugs”).Īt the other extreme, some experts use a narrow definition of cyber war: a “bloodless war” among states that consists solely of electronic conflict in cyberspace. The term “cyber attack” covers a wide variety of actions, ranging from simple probes to defacing Web sites, denial of service, espionage, and destruction. But greater dependence on networked computers and communication leaves the US more vulnerable to attack than many other countries, and cyberspace has become a major source of insecurity, because, at this stage of technological development, offense prevails over defense there. If anything, dependence on complex cyber systems for support of military and economic activities creates new vulnerabilities in large states that can be exploited by non-state actors.įour decades ago, the US Department of Defense created the Internet today, by most accounts, the US remains the leading country in terms of its military and societal use. Large countries like the US, Russia, Britain, France, and China have greater capacity than other states and non-state actors to control the sea, air, or space, but it makes little sense to speak of dominance in cyberspace. In my book The Future of Power, I argue that the diffusion of power away from governments is one of this century’s great political shifts. But the barriers to entry in the cyber domain are so low that non-state actors and small states can play a significant role at low cost. The costs of developing those vessels – multiple carrier task forces and submarine fleets – create enormous barriers to entry, enabling US naval dominance. It is far cheaper and quicker to move electrons across the globe than to move large ships long distances. Mountains and oceans are hard to move, but portions of cyberspace can be turned on and off by throwing a switch. The cyber domain of computers and related electronic activities is a complex man-made environment, and human adversaries are purposeful and intelligent. But what do we really know about cyber conflict? Some observers declared this apparent sabotage to be the harbinger of a new form of warfare, and United States Secretary of Defense Leon Panetta has warned Americans of the danger of a “cyber Pearl Harbor” attack on the US. ![]() CAMBRIDGE – Two years ago, a piece of faulty computer code infected Iran’s nuclear program and destroyed many of the centrifuges used to enrich uranium.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |