April 14, 2010

Has the Cyber-War Begun?

A battle rages over the definition of war – war in cyberspace, that is.

A definition matters because the stakes are already enormous in this “new geography of warfare.”

Everyone agrees The First Great Cyber-War (a decisive struggle over the Internet and within the Internet) has not been fought – yet. Cyber-skirmishing, however, is frequent and fierce, a second-by-second form of digital probing and parrying that is cyberspace’s combat equivalent.

Computers store and share vast quantities of data – economic, military, intelligence, communications and politically sensitive information are obvious targets for spies, thieves, vandals, competitors and enemies. Digital systems control key infrastructure, like electrical grids. Zap a central computer with digital viruses, and the grid is damaged until the viruses are identified and removed. Repairing generators and power lines after an aerial bomb attack is an analog. The viruses, however, don’t leave high-explosive craters.

And there’s the rub. Is a cyber-intrusion that disrupts and destroys an “armed attack,” which under international law would permit armed retaliation? Technology and techniques have once again outpaced political adaptation, rendered military doctrine obsolete, and are decades ahead of formal law.

Strategists, lawyers and warriors are struggling with these complex, multidimensional issues. James Andrew Lewis, in an essay titled “The Cyber War Has Not Begun” (published in March by the Center for Strategic and International Studies), believes focusing on cyber-security (protecting digital systems) “is a good thing.” However, Lewis argues, “We are not in a ‘cyber war.’ War is the use of military force to attack another nation and damage or destroy its capability and will to resist. Cyber war would involve an effort by another nation or a politically motivated group to use cyber attacks to attain political ends. No nation has launched a cyber attack or cyber war against the United States.”

Lewis provides a reasonable definition of an act of war and its goals. Cyber-like attacks have been used in warfare. Militaries are familiar with “cyber war in support of a conventional war” (acronym CWSC). In the guise of “electronic warfare,” this type of “cyber support operation” has been going on since World War II. However, with the Internet now a major part of the planet’s commercial infrastructure, “electronic warfare” has moved to another level. CWSC can now attack strategic targets (e.g., international lending and trading systems), not just the electronic weapons and communications of the combat forces.

Lewis recognizes a non-state actor (“politically motivated group”) can wage cyber-war. He also asserts no nation (i.e., a nation-state) has launched a cyber-attack on the U.S., allowing the possibility of attempts to wage cyber-war by terrorists. Lewis argues that no nation-state has waged cyber-war or even launched a cyber-attack “to attain political ends” because the U.S. can trace these attacks to their source.

Guaranteed exposure is a deterrent because the attacker would risk retaliation of some sort – political, economic, military or, presumably, cyber. I hope he is right, though even the most informed speculations in this field are haunted by the “unknown unknowns” that time and actual warfare inevitably reveal at high cost.

Lewis discusses four types of cyber-threats and warns against conflating them: 1) economic espionage (theft of proprietary business and economic data, and intellectual property); 2) political and military espionage (traditional spying carried into cyberspace); 3) cyber crime (e.g., theft of money from bank accounts); and 4) cyber war. In Lewis’ view, cyber-attacks in cyber-war are “just another weapons system” for hitting targets.

The categories suggest structural responses. Police, trade and legal institutions, linked to international agreements, become the mechanisms for addressing economic espionage and cyber-crime. Defense and diplomatic organizations address cyber-espionage and cyber-warfare. Lewis advocates creating international “norms” and understandings for what constitutes an attack, and “an international framework” to establish “potential consequences for differing levels of hostile action.”

However, determining levels of hostility as a crisis emerges and escalates is a very stiff requirement. History is riddled with surprise attacks whose devastating effects took time to assess. The categories are really not so discrete.

In “real space” crime and terror, and crime and rebellion all too easily mesh. Separating criminal from rebel is often a tough judgment call. In my own view, skirmishing is warfare. In cyber-space we are witnessing the potshots by light cavalry prior to a larger clash, where opponents, at a calculated pace, probe for vulnerabilities and seek decisive advantage.

COPYRIGHT 2010 CREATORS.COM

Who We Are

The Patriot Post is a highly acclaimed weekday digest of news analysis, policy and opinion written from the heartland — as opposed to the MSM’s ubiquitous Beltway echo chambers — for grassroots leaders nationwide. More

What We Offer

On the Web

We provide solid conservative perspective on the most important issues, including analysis, opinion columns, headline summaries, memes, cartoons and much more.

Via Email

Choose our full-length Digest or our quick-reading Snapshot for a summary of important news. We also offer Cartoons & Memes on Monday and Alexander’s column on Wednesday.

Our Mission

The Patriot Post is steadfast in our mission to extend the endowment of Liberty to the next generation by advocating for individual rights and responsibilities, supporting the restoration of constitutional limits on government and the judiciary, and promoting free enterprise, national defense and traditional American values. We are a rock-solid conservative touchstone for the expanding ranks of grassroots Americans Patriots from all walks of life. Our mission and operation budgets are not financed by any political or special interest groups, and to protect our editorial integrity, we accept no advertising. We are sustained solely by you. Please support The Patriot Fund today!


The Patriot Post and Patriot Foundation Trust, in keeping with our Military Mission of Service to our uniformed service members and veterans, are proud to support and promote the National Medal of Honor Heritage Center, the Congressional Medal of Honor Society, both the Honoring the Sacrifice and Warrior Freedom Service Dogs aiding wounded veterans, the National Veterans Entrepreneurship Program, the Folds of Honor outreach, and Officer Christian Fellowship, the Air University Foundation, and Naval War College Foundation, and the Naval Aviation Museum Foundation. "Greater love has no one than this, to lay down one's life for his friends." (John 15:13)

★ PUBLIUS ★

“Our cause is noble; it is the cause of mankind!” —George Washington

Please join us in prayer for our nation — that righteous leaders would rise and prevail and we would be united as Americans. Pray also for the protection of our Military Patriots, Veterans, First Responders, and their families. Please lift up your Patriot team and our mission to support and defend our Republic's Founding Principle of Liberty, that the fires of freedom would be ignited in the hearts and minds of our countrymen.

The Patriot Post is protected speech, as enumerated in the First Amendment and enforced by the Second Amendment of the Constitution of the United States of America, in accordance with the endowed and unalienable Rights of All Mankind.

Copyright © 2024 The Patriot Post. All Rights Reserved.

The Patriot Post does not support Internet Explorer. We recommend installing the latest version of Microsoft Edge, Mozilla Firefox, or Google Chrome.