Homepage / Technology / What a cyberwar looks like — and what it doesn't
test Due Diligence Blog Digital Data Rooms for the Netherlands Board Room Apps Secure Board Management With Secure Board Portals What Happens at Board of Directors Meetings? Board Room Software Review How to Prepare Board Rooms for Effective Board Meetings Board Room Software Boosts Performance and Communication Selecting a Secure Data Room Review Local Data Room Service Review How to Find the Best Virtual Data Room Review What to Look for in a Data Room uk Provider Document Storage and Distribution Software Everything About VDRs Corporate Software Advantages How to Choose a Virtual Data Room Provider The Most Secure Way to Transfer Files How to Manage Online Board Meetings Benefits Virtual Data Room Solutions – Must-Haves for M&A and Due Diligence Best Data Room Functions for the Different Types of Industries How to Choose a VDR Software Provider How to Choose an Online Board Portal The Benefits of a Boardroom Review Board Room Online Solutions – How to Get the Most Out of Your Board Meetings Why You Need a Board Room How a Board Room Blog Can Transform Your Business Choosing the Best Board Room Format How to Have Productive and Engaging Board Directors Meetings Choosing the Right Virtual Data Room How to Keep Safe Documents Storage Teaching Kids About Online Safety Avoid Costly Mistakes With Free Data Room Services Corporate Virtual Data Secure Online Data Rooms Solutions How to Keep Share, Edit and Delete Your Data Safe Virtual Data Room Software Secrets for M&A Due Diligence What to Look For in Boardroom Providers Board of Directors Blog Posts How to Deliver Value at Your Board Meetings How to Have Effective Board Meetings Responsibilities of Board Members Deal Management – How to Effectively Manage a Complex Sales Pipeline Data Rooms For Mergers And Acquisitions How to Have a Successful Board Room Meeting Choosing a Board Room Service Provider What is a Board Room Service? Board Room Software Review – Choosing the Best Portal for Mother Board Meetings Why a Board Room Providers Review Is Important What Is a Board Room Review? Venture Software for VC Firms What Is an Assessment Report? The Importance of a Tech Audit Popular Business Applications What to Look For in a Data Room App What Are Business Applications? How to Choose a Virtual Data Room How to Plan a Data Room Review Coronavirus Guide What is a Virtual Data Room? What Is Data Science? What Is an Operating System? Turbotax Small Business Review How Online VDRs Are Used in M&A Deals Why Choose VDR Software? The Power of Business Software The Benefits of a Software Board Online Data Room Review The Importance of Tech Knowledge Improving Accuracy of Financial Data Online Business Records – How to Keep Your Online Business Records Accurate and Secure What is a Board Portal De? DealRoom Review – A Review of VDR Software M&A Due Diligence for Private Companies The Virtual Data Room Review Why Companies Use a Data Room Review to Facilitate M&A Transactions The Best File Sharing Services How Online VDRs Are Used in M&A Deals Best Virtual Data Room How to Choose a Best Board Room Provider Choosing a Data Room for Due Diligence What Is a Data Room Business Software? Best Data Room Providers Review Data Room Providers Review Mostbet Tr Resmî Web Sitesinde Giriş Ve Kayıt Olm Kumar Oynamak Için En Iyi Yerdir The Benefits of Cloud Data Services for Enterprises Online Data Room and SSL How to Build a Diverse Board of Directors Best Virtual Data Review A Data Room Service Review How Runn Makes Project Data Accessible, Accurate and Shareable Five Pillars of Information Protection The Importance of Online Business Reports Benefits of Colocation Services Virtual Data Rooms Guide Choosing a Business Virtual Data Room Choosing the Right VDR Service Review How to Conduct a Virtual Data Room Review Glory Online Casino Türkiye En Iyi Oyunları Ve Bahisleri Olan Kumarhane

Technology

What a cyberwar looks like — and what it doesn't

Governments are attacking civilians in a time of peace.

President and Chief Legal Officer Brad Smith of Microsoft in April told the RSA cybersecurity conference about attacks that don’t involve tanks and warplanes, but bytes and bots. And they are aimed at our energy grids, our infrastructure, and even our private financial information.

We’ve increasingly seen reports of cyber incursions, attributed to nation-states, into critical infrastructure and financial systems. We’ve seen further attempts to affect countries’ internal political institutions. Nations are reportedly stockpiling software and network vulnerabilities, to use for espionage or in the event of an internet-enabled conflict.

Even if some claims of cyberwar are overblown — and notions of a looming “cyber-geddon” almost certainly are — the rapid adoption of new technologies as a mechanism of statecraft create ambiguity and give rise to risks that we need to understand. The first step is to be clear about what cyberwar may look like and what governments, institutions, companies and citizens can do about it.

The reason the idea of cyberwar has led to such alarm is that it’s new — and ambiguous. As with many new technologies, it leaves us without norms and accepted definitions that clarify intentions, actions and consequences. There is even significant controversy among leading nations regarding whether the law of armed conflict should be applied to activities on the internet.

Muddying the waters further, espionage, crime, and hactivism have been lumped together, in a way that they are almost never combined in the physical world. All are sometimes defined as cyber war either out of semantic lassitude or as a way to magnify the supposed threat.

In order to take the threat of cyber war seriously, we should recognize that not all detrimental activity online should be called “cyberwar” just as not all actions between states are defined as “war.” A reasonable definition must take into account specific forms of aggression and intended results — “cyberwar” is not crime, it is not espionage, it is not propaganda and it is not terrorism.

Thanks to ambiguity in this area, definitions of cyberwar tend to be vague descriptions of “damage to computers or networks” — another way of saying “things we’d prefer not be done on networked space.” Those notions lack sufficient rigor to be of help. A more specific definition of the aggressive action we seek to avoid is necessary.

The term “cyberwar,” therefore, is best understood to refer to an act of aggression, committed through a digital network, meant to cause damage in the real world, either to civilian or military targets, in order to force a sovereign state to act or refrain from acting.

As a corollary, the actor here must be another state, since similar actions by an individual would likely be called cyber terrorism in the same way that a non-state actor who attacks a nation’s physical assets is termed a terrorist, regardless of the weapon used.

It helps to examine instances of aggression in the digital space to put cyberwar into context. The most successful cyberattacks we know of were Stuxnet, used against Iran, and the NotPetya attack on Ukraine.

Stuxnet, a computer worm, was the first widely-known example of malicious code actually causing real-world damage (albeit minor). Unlike the previous instances of digital incursions, Stuxnet was actually meant to have an effect similar to what a nation would once have used kinetic warfare to do: knock out an enemy’s infrastructure or weapon-making capacity.

Because of the sophistication of the malware and its clearly geopolitical, rather than criminal, purpose, the attack has been attributed to a nation-state (or multiple nations acting together).

Another example of warlike code is the NotPetya “mock ransomware” attack that devastated Ukrainian businesses. At first, that attack seemed to be a sophisticated ransomware operation — where criminals take control of an organization’s network and threaten to erase or encrypt critical data unless they receive a pay-off. However, because NotPetya went straight to damaging systems and deleting data, rather than waiting for a pay-out or stealing data, the malware is viewed by most researchers as a weapon in the ongoing war in Ukraine.

Other famous instances that recur in the cyberwar conversation, like the 2007 cyber attacks against Estonia that were attributed to Russia, or alleged Chinese intellectual property theft in the United States, are really more akin to vandalism and espionage in their methods and effects.

While all those cyberwar and potential-cyberwar examples may seem minor compared with traditional warfare, they are signals of a troubling turn in nations’ cyber-statecraft.

First, those attacks — hard to attribute, borderless, and sudden — show how cyber threats erode sovereign power. After all, from the Treaty of Westphalia to the digital age, sovereigns have held some very basic, unchanging attributes. At the very least, those attributes include the ability to secure a nation’s borders and to have some modicum of control of the activities within those borders. When an aggressor has the ability to use borderless networks to launch attacks that can’t be intercepted or prevented, those attributes and therefore sovereignty itself are called into question.

Second, the use of digital networks to carry out attacks significantly threatens innovation. After all, the internet has been an unparalleled engine for growth. But real or imagined cyber threats use those same networks. The temptation, then, is to limit connectivity or to set up networks of walled gardens in an attempt to ensure better control or security.

First, it is important to have some perspective on the risk itself — most of the attacks that hurt ordinary people, companies and organizations are motivated by crime, not geopolitics. Therefore, supporting a trusted and safe internet goes a long way toward alleviating the worst and most common risks.

Additionally, the same governance and best practices are effective against most threats, regardless of the actor — whether in a time of war or a time of peace, one must close his door and avoid inviting thieves in.

The World Economic Forum’s Global Centre for Cybersecurity is dedicated to building the partnerships, tools, and capabilities necessary to meet cyber threats. The Centre will act against cybercrime especially, and provide a shared space to understand new areas of threat, such as the internet of things or artificial intelligence. The Centre is also neutral platform for governments to work with the private sector to shape cybersecurity governance.

Importantly, there are a host of efforts to create a culture of security and trust and to bolster or develop norms against cyberattacks that have so far been lacking. It is important for all actors — governments, companies and citizens — to take part in shaping our shared digital culture together.

After all, digital spaces, lacking borders and with guarantees of anonymity, are rife with the potential for misunderstandings, especially between adversaries who may not be fully apprised of what other countries’ secret hackers are up to.

The more we can do to improve security generally, to stop cybercrime and thereby decrease the signal-to-noise ratio for attribution, and to work together to shape norms against using digital networks as arenas of combat, the less likely cyberwar will be.

Commentary by Daniel Dobrygowski, head of Governance and Policy, Global Centre for Cybersecurity at the World Economic Forum. Dobrygowski is an attorney whose practice and research includes privacy, security, intellectual property, and regulatory and competition law.

For more insight from CNBC contributors, follow @CNBCopinion on Twitter.

Source: Tech CNBC
What a cyberwar looks like — and what it doesn't

Comments are closed.