South Africa keeps rates unchanged after unpredictable vote    Israel's c.bank chief: IDF shouldn't get 'blank check'    Egypt's gold prices fall on May 30th    KOTRA organises Egypt-Korea cooperation seminar on electronics industry    MSMEDA encourages enterprise owners to shift to formal sector: Rahmi    Ancient Egyptians may have attempted early cancer treatment surgery    Indian rupee to slip on rising US yields, dollar    Egypt, China strengthen ties on 10th anniversary of strategic partnership    Israel takes control of Philadelphia Corridor along Gaza-Egypt border    Egypt reaffirms commitment to African cooperation at AfDB Meetings    Germany approves carbon transport, storage proposals    Thailand seeks entry into BRICS    Abdel Ghaffar discuss cooperation in health sector with General Electric Company    Grand Egyptian Museum opening: Madbouly reviews final preparations    Valu Partners with Magdi Yacoub Heart Foundation to streamline donations for New Cairo centre    Kremlin accuses NATO of direct involvement in Ukraine conflict as fighting intensifies    Madinaty's inaugural Skydiving event boosts sports tourism appeal    Tunisia's President Saied reshuffles cabinet amidst political tension    US Embassy in Cairo brings world-famous Harlem Globetrotters to Egypt    Instagram Celebrates African Women in 'Made by Africa, Loved by the World' 2024 Campaign    US Biogen agrees to acquire HI-Bio for $1.8b    Egypt to build 58 hospitals by '25    Giza Pyramids host Egypt's leg of global 'One Run' half-marathon    Madinaty to host "Fly Over Madinaty" skydiving event    World Bank assesses Cairo's major waste management project    Egyptian consortium nears completion of Tanzania's Julius Nyerere hydropower project    Sweilam highlights Egypt's water needs, cooperation efforts during Baghdad Conference    Swiss freeze on Russian assets dwindles to $6.36b in '23    Egyptian public, private sectors off on Apr 25 marking Sinai Liberation    Debt swaps could unlock $100b for climate action    Amal Al Ghad Magazine congratulates President Sisi on new office term    Financial literacy becomes extremely important – EGX official    Euro area annual inflation up to 2.9% – Eurostat    BYD، Brazil's Sigma Lithium JV likely    UNESCO celebrates World Arabic Language Day    Motaz Azaiza mural in Manchester tribute to Palestinian journalists    Russia says it's in sync with US, China, Pakistan on Taliban    It's a bit frustrating to draw at home: Real Madrid keeper after Villarreal game    Shoukry reviews with Guterres Egypt's efforts to achieve SDGs, promote human rights    Sudan says countries must cooperate on vaccines    Johnson & Johnson: Second shot boosts antibodies and protection against COVID-19    Egypt to tax bloggers, YouTubers    Egypt's FM asserts importance of stability in Libya, holding elections as scheduled    We mustn't lose touch: Muller after Bayern win in Bundesliga    Egypt records 36 new deaths from Covid-19, highest since mid June    Egypt sells $3 bln US-dollar dominated eurobonds    Gamal Hanafy's ceramic exhibition at Gezira Arts Centre is a must go    Italian Institute Director Davide Scalmani presents activities of the Cairo Institute for ITALIANA.IT platform    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Cyber war and peace
Published in Daily News Egypt on 12 - 04 - 2012

CAMBRIDGE: Two years ago, a piece of faulty computer code infected Iran's nuclear program and destroyed many of the centrifuges used to enrich uranium. Some observers declared this apparent sabotage to be the harbinger of a new form of warfare, and United States Secretary of Defense Leon Panetta has warned Americans of the danger of a “cyber Pearl Harbor” attack on the US. But what do we really know about cyber conflict?
The cyber domain of computers and related electronic activities is a complex man-made environment, and human adversaries are purposeful and intelligent. Mountains and oceans are hard to move, but portions of cyberspace can be turned on and off by throwing a switch. It is far cheaper and quicker to move electrons across the globe than to move large ships long distances.
The costs of developing those vessels — multiple carrier task forces and submarine fleets — create enormous barriers to entry, enabling US naval dominance. But the barriers to entry in the cyber domain are so low that non-state actors and small states can play a significant role at low cost.
In my book The Future of Power, I argue that the diffusion of power away from governments is one of this century's great political shifts. Cyberspace is a perfect example. Large countries like the US, Russia, Britain, France, and China have greater capacity than other states and non-state actors to control the sea, air, or space, but it makes little sense to speak of dominance in cyberspace. If anything, dependence on complex cyber systems for support of military and economic activities creates new vulnerabilities in large states that can be exploited by non-state actors.
Four decades ago, the US Department of Defense created the Internet; today, by most accounts, the US remains the leading country in terms of its military and societal use. But greater dependence on networked computers and communication leaves the US more vulnerable to attack than many other countries, and cyberspace has become a major source of insecurity, because, at this stage of technological development, offense prevails over defense there.
The term “cyber attack” covers a wide variety of actions, ranging from simple probes to defacing Web sites, denial of service, espionage, and destruction. Similarly, the term “cyber war” is used loosely to cover a wide range of behaviors, reflecting dictionary definitions of war that range from armed conflict to any hostile contest (for example, “war between the sexes” or “war on drugs”).
At the other extreme, some experts use a narrow definition of cyber war: a “bloodless war” among states that consists solely of electronic conflict in cyberspace. But this avoids the important interconnections between the physical and virtual layers of cyberspace. As the Stuxnet virus that infected Iran's nuclear program showed, software attacks can have very real physical effects.
A more useful definition of cyber war is hostile action in cyberspace whose effects amplify or are equivalent to major physical violence. In the physical world, governments have a near-monopoly on large-scale use of force, the defender has an intimate knowledge of the terrain, and attacks end because of attrition or exhaustion. Both resources and mobility are costly.
In the cyber world, by contrast, actors are diverse (and sometimes anonymous), physical distance is immaterial, and some forms of offense are cheap. Because the Internet was designed for ease of use rather than security, attackers currently have the advantage over defenders. Technological evolution, including efforts to “reengineer” some systems for greater security, might eventually change that, but, for now, it remains the case. The larger party has limited ability to disarm or destroy the enemy, occupy territory, or use counterforce strategies effectively.
Cyber war, though only incipient at this stage, is the most dramatic of the potential threats. Major states with elaborate technical and human resources could, in principle, create massive disruption and physical destruction through cyber attacks on military and civilian targets. Responses to cyber war include a form of interstate deterrence through denial and entanglement, offensive capabilities, and designs for rapid network and infrastructure recovery if deterrence fails. At some point, it may be possible to reinforce these steps with certain rudimentary norms and arms control, but the world is at an early stage in this process.
If one treats so-called “hacktivism” by ideological groups as mostly a disruptive nuisance at this stage, there remain four major categories of cyber threats to national security, each with a different time horizon: cyber war and economic espionage are largely associated with states, and cyber crime and cyber terrorism are mostly associated with non-state actors. For the US, the highest costs currently stem from espionage and crime, but over the next decade or so, war and terrorism could become greater threats than they are today.
Moreover, as alliances and tactics evolve, the categories may increasingly overlap. In the view of Admiral Mike McConnell, America's former director of national intelligence, “Sooner or later, terror groups will achieve cyber-sophistication. It's like nuclear proliferation, only far easier.”
The world is only just beginning to see glimpses of cyber war — in the denial-of-service attacks that accompanied the conventional war in Georgia in 2008, or the recent sabotage of Iranian centrifuges. States have the greatest capabilities, but non-state actors are more likely to initiate a catastrophic attack. A “cyber 9/11” may be more likely than the often-mentioned “cyber Pearl Harbor.” It is time for states to sit down and discuss how to limit this threat to world peace.
Joseph S. Nye, a former assistant US secretary of defense, is a professor at Harvard University and author, most recently, of The Future of Power. This commentary is published by DAILY NEWS EGYPT in collaboration with Project Syndicate (www.project-syndicate.org)


Clic here to read the story from its source.