Cyber Conflicts as a New Global Threat
Abstract
:1. Introduction
2. Results
2.1. Cyber Conflicts Research Problem
- Fast emergence. CCs have emerged very quickly and are rapidly changing together with ICT, seriously diminishing the application of the historical approach, which is the basic one for military studies. Historical methodology is still important, but only for the period relating to cyberspace. In addition, there are neither sufficient historical materials nor appropriate methodologies to understand the conflict’s history, which spans less than 30 years. It is also important that, for this period, no single wide-scale CC has taken place, but only “local” ones (limited to few nations and/or a certain region).
- Insufficient social basis. During the relatively short period of CCs’ existence, appropriate institutions and sufficient public knowledge to evaluate the potential of CCs and cope with its threats were not formed. Such a situation could lead to paradoxes, such as the idea that “malicious code has not, so far, generated sufficient harm or damage to warrant serious human rights attention” [11], only because the human right for secure cyberspace had not yet been declared.
- Dependence on the social sphere. CCs’ effects depend on the way and degree of integration of ICT into society.
- Complete mediation by cyberspace. This means that an operation is maintained in a totally new landscape existing without familiar time and space dimensions, instead having new “human” dimensions.
- CCs could almost be considered an “ideal conflict”, having blurred lines between peace and war, military and civilians, war and crime, and even war and the right for protest. This is leading to the massive weaponization of previously peaceful spheres of life.
- High potential for the broad involvement of non-state actors. Currently, sources needed for participation in CCs or the creation of MCCs are not monopolized by the state or any other social institution, and are not extremely expensive, which could affect their availability to a wide range of persons. Some transnational companies already compete with states for control over information and ICT services. Occurring simultaneously, the absence of both physical and serious technical barriers gives anyone the ability to use MCCs. Private persons are becoming not only combatants in cyber conflict, but targets as well. Previously, private entities were not primary targets in the conflicts, as they were “unreachable” behind the defense lines created by the state. Now, however, when private organizations are global and each one is reachable through the Internet, private entities are becoming one of the primary targets. As the role of the state in the protection of private person’s interests have significantly decreased, it is widely debated who should ensure the security of private information assets in cyberspace: private entities themselves, or the government. The state cannot ensure cyber security for all private persons, while still there is no reliable mechanism to ensure public interests exclusively through private actors. It makes the situation very uncertain. Who will be capable of coping and how will they cope with a serious cyber conflict or crisis in the future?
- Need for the provision of special resources. Unlike previous conflicts, in CCs, there is the need for intellectual, human, and computational resources which are hardly measurable and not yet well managed by the military.
- Complicated nature. Cyberspace as a battle domain does not only interact with physical battle spaces (such as physical battlefields interacting between each other). Cyberspace is deeply integrated with physical battlefields. Exactly for this reason, cyber commands function within Army, Fleet, Air Force, and Marine Forces in the USA [12]. CCs are also tightly linked to cyber-security in general, which means that there is the need for deep private–military cooperation in the sphere of once exclusively military competence. The complicated nature of CCs can be illustrated by the fact that often researchers are hampered in the differentiation of contiguous to CC kinds of warfare (information, hybrid, electronic warfare, etc.).
- Covert nature. CCs are unobservable to the general public, as MCCs could be operated exclusively remotely, and there may be no tangible evidence to prove the involvement of certain adversaries. The general public can only directly observe the effects of CCs, not the conflict itself, which gives wide potential for information manipulation.
2.2. Technical Elements of Cyber Conflicts
- Dynamic and changeable nature [13]. Technical MCCs are being developed and changed very quickly. Unlike any kind of weapon, they have not any common form and are limited by minimal constraints.
- Single or limited use [13]. If a technical MCC was used to attack the target, it is highly likely that its characteristics and mechanisms of attack would become known and would be used to build countermeasures, remove vulnerabilities, etc. Only the technical MCCs that are the most innovative and unknown to the adversary will be the most efficient. The longer a technical MCC is used, the lower efficiency it has, and the fewer targets it can hit. It is impossible to develop a universal virus worth billions of US dollars that could be efficiently “deployed” for a few decades to hit different targets. Even the successful use of advanced persistent threat (APT) against a single target for a long time does not guarantee that APT would not be removed tomorrow and that it could be used to hit other targets of high priority.
- High scalability. Technical MCCs could be applied to a target of any scale, from individual pacemakers to critical infrastructures of global significance.
- Unpredictability. Technical MCCs have far more attack vectors and malicious mechanisms to harm the target than conventional weapons. For example, a technical MCC or vulnerability could be deployed in an enemy system covertly and activated at H-hour.
- Unobvious nature of technical MCCs’ effect. Technical MCCs by nature do not inflict any direct damage to an object of an attack (e.g., destroy equipment, disrupt communication, etc.). They have their own interim target of influence: artificial data systems, the impact on which will cause damage to the target (whatever it is), information stored in the system or physical objects managed by the system.
- Exceptional nature of technical MCCs. At first glance, especially for the general public [14], the threats of technical MCCs are insignificant in comparison to previous generations of weapons, such as nuclear or space weapons. This makes technical MCCs almost an ideal instrument to use and an issue of serious concern.
- Further complications. Both technical MCCs and protection against them are actively evolving to become more resilient, mutable, adaptive, and smart. These trends also make technical MCCs more autonomous and potentially less controllable. Naturally, they could have only a limited scope of targets, like Stuxnet had. However, that does not exclude the potential application of broad-spectrum uncontrollable destructive technical MCCs, as such attacks have also shown their efficiency.
- Clandestine operation. Due to cyber battlespace peculiarities, the majority of technical MCCs are built to operate covertly. This means that not only the operation itself, but also its consequences could be unnoticed for a long time. That makes the “fog of cyber conflict” even more dense.
- Recoverability of damage and time-limited effect. Technical MCCs could disrupt, incapacitate, or destroy critical infrastructure, but in the most cases “homefield advantage” gives a defending party an opportunity to repair the damage and rebuild technical protection in the short term.
- Offensive nature [15]. In the case of nuclear weapons, their immense destructive power makes them offensive. As for technical MCCs, we can say that their offensive nature is rooted in unpredictability and their broad, unmanageable effect.
2.3. The Social Element of Cyber Conflict
3. Discussions
Conflicts of Interest
References
- U.S. Department of Defence. Joint Publication 3–12 (R) Cyberspace Operations; U.S. Department of Defence: Washington, DC, USA, 2013; pp. 1–2. Available online: http://www.dtic.mil/doctrine/new_pubs/jp3_12R.pdf (accessed on 1 May 2016).
- Carr, J. Inside Cyber Warfare: Mapping the Cyber Underworld; O’Reilly Media Inc.: Sebastopol, CA, USA, 2011; pp. 1–14. [Google Scholar]
- Rosenzweig, P. Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World; Praeger: Santa Barbara, CA, USA, 2013; pp. 15–73. [Google Scholar]
- Sutherland, B. Modern Warfare, Intelligence and Deterrence; John Wiley & Sons Inc.: Hoboken, NJ, USA, 2011; p. 320. [Google Scholar]
- Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B. Targeting: The Challenges of Modern Warfare; T.M.C. Press: The Hague, The Netherlands, 2015; p. 293. [Google Scholar]
- Zetter, K. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon; Crown Publishers: New York, NY, USA, 2014; p. 448. [Google Scholar]
- Schmitt, M. Classification of Cyber Conflict. J. Confl. Secur. Law 2012, 17, 245–260. [Google Scholar] [CrossRef]
- U.S. Department of Defense. The Department of Defense Cyber Strategy. 2015. Available online: http://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf (accessed on 1 May 2016). [Google Scholar]
- Libicki, M. Cyberdeterrence and Cyberwar; RAND Corporation: Santa Monica, CA, USA, 2009. [Google Scholar]
- Schmitt, M.N. Tallinn Manual on the International Law Applicable to Cyber Warfare; Schmitt, M.N., Ed.; Cambridge University Press: Cambridge, UK, 2013. [Google Scholar]
- Casey-Maslen, S. Weapons under International Human Rights Law; Cambridge University Press: Cambridge, UK, 2014; pp. 305–307. [Google Scholar]
- Stratcom.mil. U.S. Cyber Command—U.S. Strategic Command. 2016. Available online: https://www.stratcom.mil/factsheets/2/Cyber_Command/ (accessed on 1 May 2016).
- Denning, D. Assessing Cyber War. In Assessing War: The Challenge of Measuring Success and Failure; Blanken, L., Ed.; Georgetown University Press: Washington, DC, USA, 2015; pp. 266–284. [Google Scholar]
- Korwitts, K. Are Americans Worried about Their Cybersecurity? 2015. SurveyMonkey Blog. Available online: https://www.surveymonkey.com/blog/2015/02/05/americans-worried-cybersecurity/ (accessed on 1 May 2016).
- Ongstad, M. Cyber-Warfare: Offensive vs. Defensive Balance, 2015. Security Zap. Available online: http://securityzap.com/cyber-warfare-bounded-chaos/ (accessed on 1 May 2016).
- Sharma, A. Cyber Wars: A Paradigm Shift from Means to Ends. Strateg. Anal. 2010, 34, 70–71. [Google Scholar] [CrossRef]
- Taylor, S. Erosion of National Sovereignty by 21st Century Technology, 2003. International-Business-Center. Available online: http://international-business-center.com/international_business_resources/Sovereignty.pdf (accessed on 1 May 2016).
- Jaitner, M. Russian Information Warfare: Lessons from Ukraine. In Cyber War in Perspective: Russian Aggression against Ukraine; Kenneth, G., Ed.; NATO CCD COE Publications: Tallinn, Estonia, 2015; p. 89. [Google Scholar]
- Sherman, E. So, Why Does the Air Force Want Hundreds of Fake Online Identities on Social Media? [Update], 2011. Cbsnews. Available online: http://www.cbsnews.com/news/so-why-does-the-air-force-want-hundreds-of-fake-online-identities-on-social-media-update/ (accessed on 1 May 2016).
- Barabanov, I.; Safronov, I.; Chernenko, E. Intelligence by The Bot, 2012. Kommersant. Available online: http://www.kommersant.ru/doc/2009256 (accessed on 1 May 2016).
- Kramer, A.; Guillory, J.; Hancock, J. Experimental evidence of massive-scale emotional contagion through social networks. Proc. Natl. Acad. Sci. USA 2014, 111, 8788–8790. [Google Scholar] [CrossRef] [PubMed]
- Goolsby, R. On Cybersecurity, Crowdsourcing, and Social Cyber-Attack, 2013. Wilson Center. Available online: https://www.wilsoncenter.org/sites/default/files/127219170-On-Cybersecurity-Crowdsourcing-Cyber-Attack-Commons-Lab-Policy-Memo-Series-Vol-1.pdf (accessed on 1 May 2016).
Feature | Conventional Conflict | Cyber Conflict |
---|---|---|
Primary means | Coercive, destructive | Non-coercive, transformative |
Conflict structure | Centralized | Potentially ultra-decentralized |
Form | Fixed | Mutable |
Delimitation of war and peace | Present | Absent |
Dynamics | Medium | High |
Timeframe | Precise | Vague |
Involvement of private interests | Medium | High |
Participation of non-state actors | Medium | High |
Capability for differentiation of targets | Medium | Low |
Control of conflict means (in the case of massive strike) | High | Low |
Intelligence, adversary‘s capabilities assessment | Efficient | Hampered |
Military planning | Efficient | Hampered |
Deterrence mechanisms | Present | Absent |
Public perception of conflict | Direct | Mediated |
Potential for deception regarding the conflict | Low | High |
Existence of efficient social and legal mechanisms applicable to the conflict | Present | Absent |
Infliction of direct social effect | Absent | Present |
© 2016 by the author; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kosenkov, A. Cyber Conflicts as a New Global Threat. Future Internet 2016, 8, 45. https://doi.org/10.3390/fi8030045
Kosenkov A. Cyber Conflicts as a New Global Threat. Future Internet. 2016; 8(3):45. https://doi.org/10.3390/fi8030045
Chicago/Turabian StyleKosenkov, Alexander. 2016. "Cyber Conflicts as a New Global Threat" Future Internet 8, no. 3: 45. https://doi.org/10.3390/fi8030045
APA StyleKosenkov, A. (2016). Cyber Conflicts as a New Global Threat. Future Internet, 8(3), 45. https://doi.org/10.3390/fi8030045