Homepage / Technology / What a cyberwar looks like — and what it doesn't
Menyelami Dunia Slot Thailand: Keseruan dan Peluang Kemenangan Besar Menyelami Dunia Slot Thailand: Pengalaman Bermain yang Tak Terlupakan Get ready for the ultimate craigslist sex experience Stake Casino Russia официальный Сайт Для Онлайн Игр И Бонусов Welcome on ultimate dating platform for ssbbw lesbians Καζίνο Και Στοιχηματική Σε Έναν Ιστότοπο Get started on mature sex dating sites now “horseshoe Casino Baltimore Wikipedia Judi Online, Kenali Bahaya, Ciri-Ciri Kecanduan, dan Penanganannya Cassino Apresentando Bônus De Boas-vindas: Veja As Opções Disponíveis Casino Mostbet ᐈ Oficiální Stránky Online Kasin V České Republice Casino E Apostas Desportivas No Brasil Bônus 5000 Brl No Depósito Entrar Beginner’s Explained Casino Wagering: Tips & Strategies Beginner’s Explained Casino Wagering: Tips & Strategies Лучшие Букмекерские Конторы Онлайн Рейтинг Бк 2024 “Slot Machine Nedir? Türkiye’deki Çevrimiçi Slot Rehberi Keep Everything You Win At Usa No First Deposit Casinos “roleta Online Jogos De Roleta Virtual » Betfair Casino Лучшие Онлайн Казино Рейтинг Топ 10 Для Игры На 2024 день” 1xbet 보너스 사용법 알아보기 메인 계정과 보너스 계정의 차이 코리아벳 برنامج المراهنات الرياضية تحميل التطبيق العميل Eg 1xbet Com Коэффициенты Букмекеров%3A Что Такое же Как Рассчитать в Ставках На Спорт Лучшие Букмекерские Конторы Рейтинг Букмекеров Топ Бк 2024 Онлайн Ставки на Спорт Лучшие Букмекерские Конторы Рейтинг Букмекеров Топ Бк 2024 Онлайн Ставки на Спорт Mostbet Türkiye Çevrimiçi Kumarhane Mostbet Casino “топ Приложений Для Ставок На Спорт 2024%3A Букмекеры На Android И Ios “How To Play Roulette: Rules & Betting Как 1win Обзор Удовлетворяет Разнообразные Потребности Пользователей Os 15 Melhores Sites De Apostas Esportivas Gates of Olympus’ýn Slot Oyunlarýnda En Büyük ve Çarpýcý Ödüller Gates of Olympus ile En Ýyi, Karlý ve Avantajlý Kazanç Fýrsatlarý Gates of Olympus’ýn En Popüler ve Ödüllü Makineleri Největší Image Hazardu V Evropě: Proslulé Kasino Versus Monte Carlu Láká Na Neobyčejnou Atmosféru” Jak znaleźć legalne kasyno online? Mostbet Tr Resmî Net Sitesinde Giriş Empieza Kayıt Olm Our Cms Play 17, 800+ Totally Free Us Online Online Casino Games No Download” The Benefits of Learning a Second Language “australia’s #1 Online Gambling Establishment Guide 2024 Kde Sony Ericsson Natáčel Film On Line Casino Roya Leon Casino Έως 1 500 Ανά Κατάθεση! 6 Best Gay Online Dating Sites (2023) – Join 100% Totally Free LGBTQ+ Programs! 1win: Casino Ve Bahisçi Resmi Web Sitesi 2024, Online Spor Bahisleri, 1win Giriş” 4 Ways To Beat The Slots Лучшие Игровые Автоматы Онлайн%3A Играйте желающим В Казино Start your hookup journey with sugar mummies now Online Casino Sites that Accept PayPal: A Convenient and Secure Settlement Alternative The Advantages of Playing Online Casino Online Basics of the Free Casino Bonus Video Slots What You Must Know Discover the Excitements of Free Blackjack Online The Best Bitcoin Gambling Enterprises that Accept Bitcoins What Are Zaza Pills? A Comprehensive Overview Understanding Varicose Veins: Reasons, Symptoms, and Treatment Options Online Payday Loans in South Africa: Whatever You Need to Know The Ultimate Guide to Online Free Live Roulette Live Roulette Benefit: Whatever You Need to Know Top Bitcoin Gambling Enterprises Overview Todo lo que necesitas saber sobre los mini préstamos Online Live Roulette Bonus: A Guide to Optimizing Your Payouts Instant Play Online Gambling Establishment: The Ultimate Guide What You Need to Understand About Free Spins Benefits The Power of One Card Tarot Readings Unlocking the Mysteries of Card Analysis Tarot The Art of Tarot Card Card Reading: A Comprehensive Guide Tarot Card Cards Free Analysis: Opening the Mysteries of Your Future Best Totally Free Spins No Down Payment: A Guide to Winning Big Without Investing a Penny Mastercard in Online Gambling Enterprises: Your Guide to Safe and Secure Gambling Decreasing Your Cholesterol: A Comprehensive Overview to a Healthier Heart “Fairly Sweet Bonanzaana Sayfamıza Hoş Geldiniz! Eğlenceli Oyunlar Christian Counselor y mentor Nancy Pina Ayuda Consumidores plan Logro en Citas online y Vida “Durante İyi Slot Oyunları Ücretsiz Casino Oyunları” Top Twelve Online Gambling Canada Sites For Real Money In 2025 لعبة كراش Car Crash في 1xbet: الدليل الشامل موقع مراه Mostbet Registrace Z Česko Pokyny Pro Registraci A Ověření Účtu While 1win advertises 247 support response times can vary depending on the. About 1win gaming and situs 1win. Sports Covered Based on the provided text 1Wins sports betting platform includes. About 1win товары букмекер and site 1win é confiavel. Languages Supported While definitive confirmation of all supported languages requires direct verification. About how to use bonus casino in 1win online and 1win hacks. A. About 1win iphone скачать and تحميل 1win. Despite some negative feedback the overall user sentiment towards 1Win in Mozambique. About 1win 앱 안드로이드 and como recargar en 1win. The provided text mentions 247 support for 1win users in Bangladesh and. About jet 1win and 1win android app download. Seguridad de las Transacciones en 1Win 1Win utiliza protocolos de seguridad avanzados. About 1win mine hack and 1win register login app. In Bangladesh 1Wins operational legality stems from its Curaçao eGaming license 8048JAZ2018-040. About букмекер 1win and 1win dota team. What is the easiest way to get sluts around me? 1win Скачать На Андроид Бесплатное Приложение С официального Сайта Преимущества автоматизации рабочих процессов в букмекерские конторы “1win Uzbekistan ⬅️ Rasmiy Sayti Bukmekerlik Kompaniyasining” VDcasino’ýn Slot Oyunlarýnda En Büyük ve Çarpýcý Gelirler VDcasino’ýn En Popüler ve Tercih Edilen Makineleri “mostbet Com’da Oynamak Mı Istiyorsunuz? Buradan Giriş Yapın Sweet Bonanza Hangi Siteden Oynanır?” проем На Официальный Сайт Ставкибет Online Casino Sites Nationwide December 2024 Sweet Bonanza: Eğlenceli Slot Oyununun Detayları Sázková Kancelář On-line Sportovní Výsledky Some Sort Of Kasin En İyi Türkiye Online Casinolar 2024-top Çevrimiçi Casino Rehberi Making initial move: tips for approaching an asian girl How discover local mature sex partners Enjoy fun and flirty conversations along with other gay men 58 Jazz Musicians Were Photographed for Harlem 1958 ‘ Only One Remains. The New York Times Working with a cheating date | Futurescopes Zakłady Bukmacherskie Legalny Polski Bukmacher Online Free Slots No Download No Registration: Free Slot Machines Instant Play | page 12

Technology

What a cyberwar looks like — and what it doesn't

Governments are attacking civilians in a time of peace.

President and Chief Legal Officer Brad Smith of Microsoft in April told the RSA cybersecurity conference about attacks that don’t involve tanks and warplanes, but bytes and bots. And they are aimed at our energy grids, our infrastructure, and even our private financial information.

We’ve increasingly seen reports of cyber incursions, attributed to nation-states, into critical infrastructure and financial systems. We’ve seen further attempts to affect countries’ internal political institutions. Nations are reportedly stockpiling software and network vulnerabilities, to use for espionage or in the event of an internet-enabled conflict.

Even if some claims of cyberwar are overblown — and notions of a looming “cyber-geddon” almost certainly are — the rapid adoption of new technologies as a mechanism of statecraft create ambiguity and give rise to risks that we need to understand. The first step is to be clear about what cyberwar may look like and what governments, institutions, companies and citizens can do about it.

The reason the idea of cyberwar has led to such alarm is that it’s new — and ambiguous. As with many new technologies, it leaves us without norms and accepted definitions that clarify intentions, actions and consequences. There is even significant controversy among leading nations regarding whether the law of armed conflict should be applied to activities on the internet.

Muddying the waters further, espionage, crime, and hactivism have been lumped together, in a way that they are almost never combined in the physical world. All are sometimes defined as cyber war either out of semantic lassitude or as a way to magnify the supposed threat.

In order to take the threat of cyber war seriously, we should recognize that not all detrimental activity online should be called “cyberwar” just as not all actions between states are defined as “war.” A reasonable definition must take into account specific forms of aggression and intended results — “cyberwar” is not crime, it is not espionage, it is not propaganda and it is not terrorism.

Thanks to ambiguity in this area, definitions of cyberwar tend to be vague descriptions of “damage to computers or networks” — another way of saying “things we’d prefer not be done on networked space.” Those notions lack sufficient rigor to be of help. A more specific definition of the aggressive action we seek to avoid is necessary.

The term “cyberwar,” therefore, is best understood to refer to an act of aggression, committed through a digital network, meant to cause damage in the real world, either to civilian or military targets, in order to force a sovereign state to act or refrain from acting.

As a corollary, the actor here must be another state, since similar actions by an individual would likely be called cyber terrorism in the same way that a non-state actor who attacks a nation’s physical assets is termed a terrorist, regardless of the weapon used.

It helps to examine instances of aggression in the digital space to put cyberwar into context. The most successful cyberattacks we know of were Stuxnet, used against Iran, and the NotPetya attack on Ukraine.

Stuxnet, a computer worm, was the first widely-known example of malicious code actually causing real-world damage (albeit minor). Unlike the previous instances of digital incursions, Stuxnet was actually meant to have an effect similar to what a nation would once have used kinetic warfare to do: knock out an enemy’s infrastructure or weapon-making capacity.

Because of the sophistication of the malware and its clearly geopolitical, rather than criminal, purpose, the attack has been attributed to a nation-state (or multiple nations acting together).

Another example of warlike code is the NotPetya “mock ransomware” attack that devastated Ukrainian businesses. At first, that attack seemed to be a sophisticated ransomware operation — where criminals take control of an organization’s network and threaten to erase or encrypt critical data unless they receive a pay-off. However, because NotPetya went straight to damaging systems and deleting data, rather than waiting for a pay-out or stealing data, the malware is viewed by most researchers as a weapon in the ongoing war in Ukraine.

Other famous instances that recur in the cyberwar conversation, like the 2007 cyber attacks against Estonia that were attributed to Russia, or alleged Chinese intellectual property theft in the United States, are really more akin to vandalism and espionage in their methods and effects.

While all those cyberwar and potential-cyberwar examples may seem minor compared with traditional warfare, they are signals of a troubling turn in nations’ cyber-statecraft.

First, those attacks — hard to attribute, borderless, and sudden — show how cyber threats erode sovereign power. After all, from the Treaty of Westphalia to the digital age, sovereigns have held some very basic, unchanging attributes. At the very least, those attributes include the ability to secure a nation’s borders and to have some modicum of control of the activities within those borders. When an aggressor has the ability to use borderless networks to launch attacks that can’t be intercepted or prevented, those attributes and therefore sovereignty itself are called into question.

Second, the use of digital networks to carry out attacks significantly threatens innovation. After all, the internet has been an unparalleled engine for growth. But real or imagined cyber threats use those same networks. The temptation, then, is to limit connectivity or to set up networks of walled gardens in an attempt to ensure better control or security.

First, it is important to have some perspective on the risk itself — most of the attacks that hurt ordinary people, companies and organizations are motivated by crime, not geopolitics. Therefore, supporting a trusted and safe internet goes a long way toward alleviating the worst and most common risks.

Additionally, the same governance and best practices are effective against most threats, regardless of the actor — whether in a time of war or a time of peace, one must close his door and avoid inviting thieves in.

The World Economic Forum’s Global Centre for Cybersecurity is dedicated to building the partnerships, tools, and capabilities necessary to meet cyber threats. The Centre will act against cybercrime especially, and provide a shared space to understand new areas of threat, such as the internet of things or artificial intelligence. The Centre is also neutral platform for governments to work with the private sector to shape cybersecurity governance.

Importantly, there are a host of efforts to create a culture of security and trust and to bolster or develop norms against cyberattacks that have so far been lacking. It is important for all actors — governments, companies and citizens — to take part in shaping our shared digital culture together.

After all, digital spaces, lacking borders and with guarantees of anonymity, are rife with the potential for misunderstandings, especially between adversaries who may not be fully apprised of what other countries’ secret hackers are up to.

The more we can do to improve security generally, to stop cybercrime and thereby decrease the signal-to-noise ratio for attribution, and to work together to shape norms against using digital networks as arenas of combat, the less likely cyberwar will be.

Commentary by Daniel Dobrygowski, head of Governance and Policy, Global Centre for Cybersecurity at the World Economic Forum. Dobrygowski is an attorney whose practice and research includes privacy, security, intellectual property, and regulatory and competition law.

For more insight from CNBC contributors, follow @CNBCopinion on Twitter.

Source: Tech CNBC
What a cyberwar looks like — and what it doesn't

Comments are closed.