Homepage / Technology / What a cyberwar looks like — and what it doesn't
Find your perfect match: bi ladies seeking couples SLOT PULSA SITUS SLOT DEPOSIT PULSA 10 RIBU TANPA POTONGAN SEKALI SPIN MAXWIN Sports Betting Bet on Sports Online in South Africa Slot Entertainment Without Funding an Account in a Trusted Virtual Club Составление обзора казино в виртуальном формате Le Jeu en Ligne en France: Casinos en Ligne et leur Rфle dans l’Industrie Moderne des Jeux d’Argent Mostbet App A Convenient And Reliable Way To Place Bets Masjid Al-Huda Mranggen Demak Lemon Casino recenzja nowego polskiego kasyna Atrakcyjne bonusy i wysoki RTP! MostBet Bangladesh BD ᐉ Official Site Most Bet Casino and Sport Betting Lil Nas X calls out the BET Awards in his new single He has a point : NPR Most readily useful Adult Internet Dating Sites | FreeHookupsSites Unlocking the secrets of craigslist m4m green bay dating Just what comes in 66 sizes and vegan latex? Brand new generation of condoms | Sex | 8 Brands & Generics Human Growth Hormone HGH Injections Find local black hookups near you what’s ssbbw chat? About Japanese Dating society and also the west Guy who would like to Date a Japanese woman – MeetKing Blog 9 Guidelines On How To Hook-up On College Gameday (At Any College) Leading Live Casino Games Provider Leading Live Casino Games Provider Pin Up Slotlarýyla Eðlence ve Para Kazanma Bir Arada The core concept of digital entertainment hub AbeBet: signature points and groups Live-сессии с дилерами в онлайн-казино azino777 How Online Gambling Enterprises Operate Around the World Meet compatible single mothers and exchange ideas official site Play airplane online Ritalin: Jak legálně zakoupit bez receptu v České republice Connect with suitable asian singles in your area How-to Date A Pornstar While Making It Operate (The Ultimate Guide) Buy Bitcoin with Credit Card or Debit Card Instantly Buy Bitcoin How to buy BTC Finding trans girls near you – the simplest way to hookup Connect with like-minded singles on a mennonite dating website Assortment of in-demand games respected casino platform abe bet casino in cyberspace Connect with girls from round the world Alexander Gambling establishment: Dйcouvrez une Nouvelle Expйrience de Jeu en Ligne Le meilleur Extra casino en ligne pour jouer BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING The simplest way to get a local hookup what’s millionairess dating? Get prepared to connect to latinas whom share your interests Estonian Chat place – an ideal Place for Dating Estonian Singles Join our bisexual chat room now and commence connecting Discover the advantages of dating a mature mom latina How to discover the best bbw hookup app for you Title: Juega en 1Win Casino Argentina Bonos y Apuestas 5 Best BBW Lesbian Dating Apps/Sites In 2022 Online Gambling Review submissions dia govt.nz Разыгрываемые джекпоты в виртуальном клубе Вулкан казино 30 Of The Greatest Adult Sex Toys For Males | Men’s Room Health Mag Australian Continent Cazino 7 slots cyberspace: conditions and rules for betting with real cash 1Win: ¡el mejor lugar de casino y apuestas deportivas de Argentina! Aufcasino Kde zakoupit Stromectol online: Kompletní průvodce ????Mature Dating Evaluation 2023 – Whatever You Need To Know About It! ???? Take the first step towards fulfilling your ebony lesbian bbw match now Ideas on how to come-out: Tips to keep in mind > Taimi Meet your perfect match – granny hookup site Türkiye-Çin İşbirliği Derinleşiyor GuGi Mobil Yükleme Seçenekleri Hizmet İçi Eğitim Sona Erdi Dooball tv ดูบอล ออนไลน์ สด 66 ลิงค์ บนมือถือ ฟรี ภาพชัด HD ทั่วโลก Find your rich cougar date in the most useful dating site Find your dream fat girl hookup today Slot Thailand Daftar Link Situs Slot Gacor Maxwin x500 Terbaru Hari Ini Resmi Auto Jackpot! Konsultasi ke Dewan Pers, Komisi I DPRD Jambi Pertanyakan Indeks Kemerdekaan Pers Jambi yang Turun Akses News Cerita Korban Judol di Balikpapan yang Nekat Gelapkan Uang How to get local horney women in your area 3 Cara Hapus Akun Judi Online Slot : Okezone Economy SITUS TOTO > Sering Kalah Main Di Situs Slot Gacor Terbaru Mudah Maxwin Situs Slot Gacor Maxwin Main Tanpa Pola Modal 5ribu Terbaik Melhores cassinos online de Novembro 2024: Confira o top 10! Enjoy amazing gay sex experiences using the top sites on the web Make the absolute most of one’s big butt dating adventure here 9 circumstances this means when a person avoids eye contact with a lady – Hack Spirit Top Greatest M4M Personals Sites in 2022 ◉ BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING Лотерейные розыгрыши в kasino on-line Лев казино: условия осуществления и доступа Main features of playing in machines at online-club Karavan Connect with like-minded females making new friends Comment accéder à des jeux gratuits avec Space fortuna bonus ? PUCUK4D⭐ Bandar Toto Togel Online & Situs Toto 4d Terpercaya #1 Betting site Karavan bet Gates of Olympus internet-based: benefits of playing for real money Discover an environment of opportunities with lesbian and bisexual dating Aprovecha Los Códigos Promocionales De Bbrbet ¡más Bonos, Más Juegos 1xbet Giriş Yeni Adresi 2024 ⭐️ 1xbahis Güncel Adres » 1x Guess Mobil Casino How to get started with sext room BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING La Application De Bbrbet: Juegos Y Apuestas Approach Alcance De Tu Man Start your love story now – join our talk to gay strangers source today BLACK SEO LINKS, BACKLINKS, SOFTWARE FOR MASS BACKLINKING

Technology

What a cyberwar looks like — and what it doesn't

Governments are attacking civilians in a time of peace.

President and Chief Legal Officer Brad Smith of Microsoft in April told the RSA cybersecurity conference about attacks that don’t involve tanks and warplanes, but bytes and bots. And they are aimed at our energy grids, our infrastructure, and even our private financial information.

We’ve increasingly seen reports of cyber incursions, attributed to nation-states, into critical infrastructure and financial systems. We’ve seen further attempts to affect countries’ internal political institutions. Nations are reportedly stockpiling software and network vulnerabilities, to use for espionage or in the event of an internet-enabled conflict.

Even if some claims of cyberwar are overblown — and notions of a looming “cyber-geddon” almost certainly are — the rapid adoption of new technologies as a mechanism of statecraft create ambiguity and give rise to risks that we need to understand. The first step is to be clear about what cyberwar may look like and what governments, institutions, companies and citizens can do about it.

The reason the idea of cyberwar has led to such alarm is that it’s new — and ambiguous. As with many new technologies, it leaves us without norms and accepted definitions that clarify intentions, actions and consequences. There is even significant controversy among leading nations regarding whether the law of armed conflict should be applied to activities on the internet.

Muddying the waters further, espionage, crime, and hactivism have been lumped together, in a way that they are almost never combined in the physical world. All are sometimes defined as cyber war either out of semantic lassitude or as a way to magnify the supposed threat.

In order to take the threat of cyber war seriously, we should recognize that not all detrimental activity online should be called “cyberwar” just as not all actions between states are defined as “war.” A reasonable definition must take into account specific forms of aggression and intended results — “cyberwar” is not crime, it is not espionage, it is not propaganda and it is not terrorism.

Thanks to ambiguity in this area, definitions of cyberwar tend to be vague descriptions of “damage to computers or networks” — another way of saying “things we’d prefer not be done on networked space.” Those notions lack sufficient rigor to be of help. A more specific definition of the aggressive action we seek to avoid is necessary.

The term “cyberwar,” therefore, is best understood to refer to an act of aggression, committed through a digital network, meant to cause damage in the real world, either to civilian or military targets, in order to force a sovereign state to act or refrain from acting.

As a corollary, the actor here must be another state, since similar actions by an individual would likely be called cyber terrorism in the same way that a non-state actor who attacks a nation’s physical assets is termed a terrorist, regardless of the weapon used.

It helps to examine instances of aggression in the digital space to put cyberwar into context. The most successful cyberattacks we know of were Stuxnet, used against Iran, and the NotPetya attack on Ukraine.

Stuxnet, a computer worm, was the first widely-known example of malicious code actually causing real-world damage (albeit minor). Unlike the previous instances of digital incursions, Stuxnet was actually meant to have an effect similar to what a nation would once have used kinetic warfare to do: knock out an enemy’s infrastructure or weapon-making capacity.

Because of the sophistication of the malware and its clearly geopolitical, rather than criminal, purpose, the attack has been attributed to a nation-state (or multiple nations acting together).

Another example of warlike code is the NotPetya “mock ransomware” attack that devastated Ukrainian businesses. At first, that attack seemed to be a sophisticated ransomware operation — where criminals take control of an organization’s network and threaten to erase or encrypt critical data unless they receive a pay-off. However, because NotPetya went straight to damaging systems and deleting data, rather than waiting for a pay-out or stealing data, the malware is viewed by most researchers as a weapon in the ongoing war in Ukraine.

Other famous instances that recur in the cyberwar conversation, like the 2007 cyber attacks against Estonia that were attributed to Russia, or alleged Chinese intellectual property theft in the United States, are really more akin to vandalism and espionage in their methods and effects.

While all those cyberwar and potential-cyberwar examples may seem minor compared with traditional warfare, they are signals of a troubling turn in nations’ cyber-statecraft.

First, those attacks — hard to attribute, borderless, and sudden — show how cyber threats erode sovereign power. After all, from the Treaty of Westphalia to the digital age, sovereigns have held some very basic, unchanging attributes. At the very least, those attributes include the ability to secure a nation’s borders and to have some modicum of control of the activities within those borders. When an aggressor has the ability to use borderless networks to launch attacks that can’t be intercepted or prevented, those attributes and therefore sovereignty itself are called into question.

Second, the use of digital networks to carry out attacks significantly threatens innovation. After all, the internet has been an unparalleled engine for growth. But real or imagined cyber threats use those same networks. The temptation, then, is to limit connectivity or to set up networks of walled gardens in an attempt to ensure better control or security.

First, it is important to have some perspective on the risk itself — most of the attacks that hurt ordinary people, companies and organizations are motivated by crime, not geopolitics. Therefore, supporting a trusted and safe internet goes a long way toward alleviating the worst and most common risks.

Additionally, the same governance and best practices are effective against most threats, regardless of the actor — whether in a time of war or a time of peace, one must close his door and avoid inviting thieves in.

The World Economic Forum’s Global Centre for Cybersecurity is dedicated to building the partnerships, tools, and capabilities necessary to meet cyber threats. The Centre will act against cybercrime especially, and provide a shared space to understand new areas of threat, such as the internet of things or artificial intelligence. The Centre is also neutral platform for governments to work with the private sector to shape cybersecurity governance.

Importantly, there are a host of efforts to create a culture of security and trust and to bolster or develop norms against cyberattacks that have so far been lacking. It is important for all actors — governments, companies and citizens — to take part in shaping our shared digital culture together.

After all, digital spaces, lacking borders and with guarantees of anonymity, are rife with the potential for misunderstandings, especially between adversaries who may not be fully apprised of what other countries’ secret hackers are up to.

The more we can do to improve security generally, to stop cybercrime and thereby decrease the signal-to-noise ratio for attribution, and to work together to shape norms against using digital networks as arenas of combat, the less likely cyberwar will be.

Commentary by Daniel Dobrygowski, head of Governance and Policy, Global Centre for Cybersecurity at the World Economic Forum. Dobrygowski is an attorney whose practice and research includes privacy, security, intellectual property, and regulatory and competition law.

For more insight from CNBC contributors, follow @CNBCopinion on Twitter.

Source: Tech CNBC
What a cyberwar looks like — and what it doesn't

Comments are closed.