<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Zócalo Public Squarecyber warfare &#8211; Zócalo Public Square</title>
	<atom:link href="https://legacy.zocalopublicsquare.org/tag/cyber-warfare/feed/" rel="self" type="application/rss+xml" />
	<link>https://legacy.zocalopublicsquare.org</link>
	<description>Ideas Journalism With a Head and a Heart</description>
	<lastBuildDate>Mon, 21 Oct 2024 07:01:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
		<item>
		<title>The Cyber Age Demands a New Understanding of War—but We’d Better Hurry</title>
		<link>https://legacy.zocalopublicsquare.org/2017/03/29/cyber-age-demands-new-understanding-war-wed-better-hurry/ideas/nexus/</link>
		<comments>https://legacy.zocalopublicsquare.org/2017/03/29/cyber-age-demands-new-understanding-war-wed-better-hurry/ideas/nexus/#respond</comments>
		<pubDate>Wed, 29 Mar 2017 07:01:15 +0000</pubDate>
		<dc:creator>By James Der Derian</dc:creator>
				<category><![CDATA[Essay]]></category>
		<category><![CDATA[Nexus]]></category>
		<category><![CDATA[Berggruen Institute]]></category>
		<category><![CDATA[cyber age]]></category>
		<category><![CDATA[cyber warfare]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[war]]></category>
		<category><![CDATA[what does war look like in the cyber age?]]></category>

		<guid isPermaLink="false">https://legacy.zocalopublicsquare.org/?p=84503</guid>
		<description><![CDATA[<p>It seems highly reckless to prod into flight Hegel’s Owl of Minerva—the goddess of wisdom <i>and</i> war—for an assessment of war in a cyber age that is barely 30 years old.</p>
<p>You will not find it in the <i>Oxford English Dictionary</i>, but “cyberwar” made its first inauspicious appearance in 1987 when an anonymous editor from <i>Omni</i>—Bob Guccione’s other magazine—attached the neologism as a title for an article by Owen Davies, an <i>Omni</i> editor. Although he never used the word or developed the idea of cyberwar, Davies pretty much nailed the coming of robotic warfare. </p>
<p>But something was in the air. In 1987 and <i>avant la lettre</i>, cyberwar in the narrow sense of an attack by malicious code on a computer system, communications network, or critical infrastructure, had a more plausible debut as the “Jerusalem virus” aka the “PLO virus,” a logic bomb that would pop up on </p>
<p>The post <a rel="nofollow" href="https://legacy.zocalopublicsquare.org/2017/03/29/cyber-age-demands-new-understanding-war-wed-better-hurry/ideas/nexus/">The Cyber Age Demands a New Understanding of War—but We’d Better Hurry</a> appeared first on <a rel="nofollow" href="https://legacy.zocalopublicsquare.org">Zócalo Public Square</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>It seems highly reckless to prod into flight Hegel’s Owl of Minerva—the goddess of wisdom <i>and</i> war—for an assessment of war in a cyber age that is barely 30 years old.</p>
<p>You will not find it in the <i>Oxford English Dictionary</i>, but “cyberwar” made its first inauspicious appearance in 1987 when an anonymous editor from <i>Omni</i>—<a href=https://en.wikipedia.org/wiki/Bob_Guccione>Bob Guccione’s other magazine</a>—attached the neologism as a title for an article by Owen Davies, an <i>Omni</i> editor. Although he never used the word or developed the idea of cyberwar, Davies pretty much nailed the coming of robotic warfare. </p>
<p>But something was in the air. In 1987 and <i>avant la lettre</i>, cyberwar in the narrow sense of an attack by malicious code on a computer system, communications network, or critical infrastructure, had a more plausible debut as the “Jerusalem virus” aka the “PLO virus,” a logic bomb that would pop up on any given Friday the 13th.  Top that, Jason.</p>
<p>The next recorded use of “cyberwar” was in 1991. A young academic steeped in too much William Gibson and Bruce Sterling, after watching way too much of the 24/7 coverage of the first Iraq war, delivered a paper at the Second Annual Cyberspace Conference in Santa Cruz California: “Cyberwar, Videogames and the Gulf War.” Shortly afterward he was asked by the short-lived PBS television show <i>Late City</i> to distill the 100-hour TV war into a two-minute video buzz clip (set to <i>Sweet Bird of Truth</i> by The The).  He gave the concept its first definition: “a new virtual and consensual reality, the first <i>cyberwar</i>, in the sense of a technologically generated, televisually linked and strategically gamed form of violence.”</p>
<p>Both were promptly forgotten. I took some solace in Nietzsche, who said only that which has no history can be defined.  </p>
<p>But then history responded with a vengeance:  Just about every major war since Iraq had a cyber edge to it. To be sure, acts of primal if not always organized violence would continue—all too often in the name of creation myths that would not be out of place in the Stone or Bronze ages—on a daily basis by and against tribes, nations, and superpowers.  </p>
<p>Many of these acts of organized violence continue to fit the classical definitions presented early in the 19th century by the Prussian Carl von Clausewitz, who variously defined war as a duel on a larger scale, a forceful act to compel others to do our will, and a continuation of politics by other means. The contemporary landscape of world politics is littered with <i>casus belli</i> that would not be unfamiliar to Clausewitz, or for that matter, to his eminent precursors like Machiavelli and Hobbes, who identified <i>wars of gain</i> (produced by imperial, economic, and military struggles for dominance), <i>wars of fear</i>  (prompted by perceptions of a rising power or threatening evil), and <i>wars of doctrine</i>  (caused by the clash of monolithic faiths and universalist ideologies). </p>
<p>But Al Qaeda, ISIS, and other non- and wannabe-state actors keep crashing the <a href=https://en.wikipedia.org/wiki/Westphalian_sovereignty>Westphalian system</a>. Today’s new warriors intent on challenging the state’s monopoly on violence—like the insurgent, jihadist, or private militia—are not that far removed from their earlier counterparts, like the pirate, mercenary, and holy crusader. Even the <i>guerre du jour</i> of “hybrid war,” the corrosive mix of private criminality, public bellicosity, and authoritarian politics that scars the residual borders of the Cold War, has more than a hint of the medieval in the interplay of overlapping sovereignties, polymorphous combatants, and clashing cosmologies. </p>
<div class="pullquote"> As everything and everyone becomes connected, it’s very hard to confine cyberwar to a discrete place or bounded time. A few clicks, several thousand shares, and an incident escalates from a local to regional to international crisis. </div>
<p>As long as global violence remains a viable, sometimes the only option in the face of intractable political differences, social injustices, and cultural struggles for recognition, war in one form or another will find a way. States, democratic or not, might be less inclined to initiate violence, but non-, para-, and anti-state actors have proven to be willing as well as able to use networked technology to wage asymmetric warfare—which in turn prompts over-reactions by states and furthers cycles of mimetic violence.</p>
<p>Classical war persists, as does the effort by new actors to offset disadvantages through new technologies. Even Clausewitz, ever the dialectician, acknowledged that “every age had its own peculiar forms of war, its own restrictive conditions, and its own prejudices.”</p>
<p>What is most <i>peculiar</i> about war in a “cyber age?” Depending on whether one goes back to the Greek (<i>kubernētēs</i> or “steersman”), Norbert Weiner (“cybernetics,” 1948), or William Gibson (“cyberspace,” 1984), “cyber” suggests everything from a control system with a feedback capacity, to a technologically-induced consensual hallucination, to a 400-pound hacker (<i>pace</i> Trump) subverting the U.S. elections. </p>
<p>Dating the cyber <i>age</i> is no easier. Someday archeologists will sift through the ruins of Bell Labs, find wire etchings in germanium and silicon and declare 1947, give or take a year, as point zero, from which microprocessors, packet switches, and fiber optics as well as digital code, information theory, and networked systems soon followed.  </p>
<p>However, science will not capture the ghost in the machine. For that, we best go back to the originating myths. Cyber is, literally, as old as the Bible and other holy texts in which gods “steer” or “govern” the universe. In the Judeo-Christian version, those “who have no direction (<i>kubernēsis</i>) fall like leaves” (Proverbs 11:14); those who prosper understand that “with strategic planning (<i>meta kubernēseōs</i>) war is conducted&#8221; (Proverbs 24:6). Leaping a millennia or two forward, our techno-deities might not be as omniscient or omnipotent as past gods; but, weaponized and sanctioned by national security, they deter, disrupt, and if necessary destroy our enemies with relative impunity to us. Obama got religion, ordering 10 times the number of drone attacks executed by Bush; barely two months in office, President Trump increased them by another 432% over Obama.</p>
<p>Perhaps the most peculiar characteristic of war in a cyber age is how well it resists the traditional <i>restrictions</i> of warfare. As everything and everyone becomes connected, it’s very hard to confine cyberwar to a discrete place or bounded time. A few clicks, several thousand shares, and an incident escalates from a local to regional to international crisis. This is the force-multiplier effect of the cyber age, with 9/11 as the most seminal and inspirational example. Access to the internet and flight simulators made it possible for Osama bin Laden and 19 kamikaze fanatics to topple the World Trade Center, hit the Pentagon, kill nearly 3,000 people, and cause billions of dollars in damages (trillions if we include second-order effects, like the Iraq War and the rise of ISIS).</p>
<p>If there is a <i>prejudice</i> to war in the cyber age, it can be found in the conceit that virtualization makes war more virtuous. Rather than resorting to the convention of bombs, the United States and Israel inserted the Stuxnet virus to degrade the Iranian nuclear weapon program; no matter that the virus proved to be less than a precise munition and rapidly spread to non-targeted industrial platforms. Wikileaks hacked thousands of embassy cables to make U.S. diplomacy more transparent and democratic; no matter the collateral damage done to alliances and coalition efforts to restrain anti-democratic regimes. Drones pursue a cleaner kill; no matter the virtual terror induced upon whole populations.</p>
<p>Thirty years on, I think it is safe to say that we have not seen the worst of war in the cyber age. With so many networked actors operating simultaneously across multiple levels of power, prediction, pre-emption, or restriction of cyberwar is exceptionally difficult. Distinguishing intentional from accidental acts is hard. Knock-on effects will grow.</p>
<p>The cyber advantage might now go to the most technologically advanced powers, but the law of uneven development gives latecomers the edge. Which is why we should be asking now, before rather than after the Owl of Minerva takes flight at dusk, what war will look like in the <a href=https://projectqsydney.com/><i>quantum age</i></a>.</p>
<p>The post <a rel="nofollow" href="https://legacy.zocalopublicsquare.org/2017/03/29/cyber-age-demands-new-understanding-war-wed-better-hurry/ideas/nexus/">The Cyber Age Demands a New Understanding of War—but We’d Better Hurry</a> appeared first on <a rel="nofollow" href="https://legacy.zocalopublicsquare.org">Zócalo Public Square</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://legacy.zocalopublicsquare.org/2017/03/29/cyber-age-demands-new-understanding-war-wed-better-hurry/ideas/nexus/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Why Didn&#8217;t the U.S. React More Forcefully to the DNC Hacking?</title>
		<link>https://legacy.zocalopublicsquare.org/2017/03/29/why-didnt-us-react-more-forcefully-to-dnc-hacking/ideas/nexus/</link>
		<comments>https://legacy.zocalopublicsquare.org/2017/03/29/why-didnt-us-react-more-forcefully-to-dnc-hacking/ideas/nexus/#comments</comments>
		<pubDate>Wed, 29 Mar 2017 07:01:05 +0000</pubDate>
		<dc:creator>By Max Boot</dc:creator>
				<category><![CDATA[Essay]]></category>
		<category><![CDATA[Nexus]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Berggruen Institute]]></category>
		<category><![CDATA[cyber warfare]]></category>
		<category><![CDATA[DNC]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[war]]></category>
		<category><![CDATA[what does war look like in the cyber age?]]></category>

		<guid isPermaLink="false">https://legacy.zocalopublicsquare.org/?p=84483</guid>
		<description><![CDATA[<p>Last year, Russian intelligence mounted an unprecedented attack on the integrity of the U.S. election. Russian hackers broke into the email of the Democratic National Committee and of John Podesta, Hillary Clinton’s campaign manager, and released the stolen documents strategically via the website WikiLeaks to help Donald Trump. Or so the U.S. intelligence community found in a “high confidence” assessment that was partly declassified in early January.</p>
<p>While Donald Trump at first denied that the Russian intervention had occurred at all and still denies that it had any impact on the election, its significance can be judged from the fact that during the last month of the campaign he mentioned WikiLeaks at virtually every stop. In an election decided by just 70,000 votes in three states, it is hard to dismiss the possibility that the Russian intervention could, in fact, have tilted the outcome. That would make this the most </p>
<p>The post <a rel="nofollow" href="https://legacy.zocalopublicsquare.org/2017/03/29/why-didnt-us-react-more-forcefully-to-dnc-hacking/ideas/nexus/">Why Didn&#8217;t the U.S. React More Forcefully to the DNC Hacking?</a> appeared first on <a rel="nofollow" href="https://legacy.zocalopublicsquare.org">Zócalo Public Square</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Last year, Russian intelligence mounted an unprecedented attack on the integrity of the U.S. election. Russian hackers broke into the email of the Democratic National Committee and of John Podesta, Hillary Clinton’s campaign manager, and released the stolen documents strategically via the website WikiLeaks to help Donald Trump. Or so the U.S. intelligence community found in a “high confidence” <a href=https://www.intelligence.senate.gov/sites/default/files/documents/ICA_2017_01.pdf>assessment</a> that was partly declassified in early January.</p>
<p>While Donald Trump at first denied that the Russian intervention had occurred at all and still denies that it had any impact on the election, its significance can be judged from the fact that during the last month of the campaign he <a href=https://thinkprogress.org/trump-mentioned-wikileaks-164-times-in-last-month-of-election-now-claims-it-didnt-impact-one-40aa62ea5002#.m0a2cqwwx>mentioned</a> WikiLeaks at virtually every stop. In an election decided by just 70,000 votes in three states, it is hard to dismiss the possibility that the Russian intervention could, in fact, have tilted the outcome. That would make this the most consequential computer hack in history, but was it an act of war?</p>
<p>Certainly not in the classic sense. The Kremlin did not, after all, transgress America’s borders or the borders of an ally the United States is pledged to protect. It did not shoot down an American aircraft or sink an American ship. Those are the classic kinds of casus belli that have traditionally sparked hostilities. But such old-fashioned definitions of aggression do not seem fully adequate to deal with the cyber age, in which computers can be a far more potent weapon of war than a machine gun or a mortar.</p>
<div id="attachment_84490" style="width: 610px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-84490" src="https://legacy.zocalopublicsquare.org/wp-content/uploads/2017/03/Boot-on-Cyberwar-ART-600x369.jpg" alt="Protesters stand around the statue of a Red Army soldier to prevent the Estonian government&#039;s plan to move the Soviet-era monument honoring in Tallinn, April 22, 2007. The statue was subsequently removed, and Russian hackers are suspected of having temporarily disabled Estonia’s access to the internet with denial-of-service attacks in retaliation. Photo by NIPA, Timur Nisametdinov/Associated Press." width="600" height="369" class="size-large wp-image-84490" /><p id="caption-attachment-84490" class="wp-caption-text">Protesters stand around the statue of a Red Army soldier to prevent the Estonian government&#8217;s plan to move the Soviet-era monument honoring in Tallinn, April 22, 2007. The statue was subsequently removed, and Russian hackers are suspected of having temporarily disabled Estonia’s access to the internet with denial-of-service attacks in retaliation. <span>Photo by NIPA, Timur Nisametdinov/Associated Press.</span></p></div>
<p>How should one treat incidents such as the one that occurred in 2007 when Russian hackers are suspected of having temporarily disabled Estonia’s access to the Internet with denial-of-service attacks in retaliation for the removal of a statue in Tallinn honoring World War II Soviet soldiers? Or the 2010 <a href=https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/>Stuxnet virus</a> used by Israeli and U.S. intelligence to disable a thousand Iranian centrifuges? Or the 2012 attack, blamed on Iran, which disabled 30,000 computers belonging to the Saudi state oil company? Or the 2014 North Korean attack on Sony Pictures in retaliation for the release of a movie parodying North Korea? As the Harvard strategist Joseph Nye <a href=http://www.mitpressjournals.org/doi/pdfplus/10.1162/ISEC_a_00266>notes</a> in the journal <i>International Security</i>, these events, and others like them, do not fall neatly into “the classic duality between war and peace,” occurring instead in a “gray zone” that defies an easy definition or response.</p>
<p>It is possible, to be sure, to imagine more severe cyberattacks that would more easily cross the threshold of open hostilities. “Talk of a ‘cyber Pearl Harbor’ first appeared in the 1990s,” Nye notes. “Since then, there have been warnings that hackers could contaminate the water supply, disrupt the financial system, and send airplanes on collision courses. In 2012 Secretary of Defense Leon Panetta cautioned that attackers could ‘shut down the power grid across large parts of the country.’” If such a massive attack were to occur—and if responsibility for it could be attributed with a high degree of certainty—one could imagine treating that as a casus belli requiring a response not just with computer viruses but with actual firepower.</p>
<p>But attacks such as Putin’s hacking of the 2016 election fall below that threshold, which is part of what makes them so attractive to relatively weak states such as Russia or North Korea: It allows them to maximize their ability to disrupt their enemies while minimizing the backlash. In fact, what consequence has Russia suffered for intervening in the U.S. election? Nothing beyond the <a href=https://www.theguardian.com/us-news/2016/dec/29/barack-obama-sanctions-russia-election-hack>expulsion</a> of a few diplomats, which is hardly enough to make Putin rethink the efficacy of these tactics. Indeed, even the impact of those last-minute Obama sanctions was probably undermined by the conversations that Michael Flynn, Trump’s first national security adviser, secretly had with the Russian ambassador prior to the inauguration—talks in which he is suspected to have asked Putin to hold off on any retaliation in the expectation that once Trump became president he would ease tensions. Flynn subsequently had to resign after lying about those conversations. But even the growing Kremlin-gate scandal has not been enough to dissuade Putin from <a href=http://www.telegraph.co.uk/news/2017/01/24/russia-targetting-european-elections-fake-news-eu-task-force/>meddling</a> in similar fashion in the Dutch, French, and German elections to support pro-Russian and anti-EU candidates.</p>
<div class="pullquote"> It is possible, to be sure, to imagine more severe cyberattacks that would more easily cross the threshold of open hostilities—a &#8216;cyber Pearl Harbor.&#8217; </div>
<p>While no one is suggesting that the U.S. should have started World War III over the Russian interference in our election, a more serious response was in order. It’s not hard to think of a range of appropriate responses: As I have suggested <a href=https://www.commentarymagazine.com/foreign-policy/europe/russia/obamas-pathetic-response-russia/>before</a>, Obama could have asked the NSA to disclose embarrassing communications between Putin and his aides or details about all of the billions they are suspected of looting. Or he could have simply asked the NSA to fry Kremlin computer networks. A range of non-cyber responses could also have been entertained, such as providing arms to Ukraine to defend itself from Russian aggression or ratcheting up sanctions on Russia by kicking it out of the SWIFT system of inter-bank transfers. Of course now that Trump is president, there is scant hope of any response at all; the only issue is whether Trump will lift existing sanctions on Russia.</p>
<p>Obama hesitated to do more against Putin because every action carried the risk of unintended consequences and of sparking greater hostilities. But the greatest risk of all is relative inaction. By failing to respond more strongly to Russia’s election intervention, the U.S. risks legitimizing such “gray zone” attacks. Thus we can expect more of them in the future. They may not exactly be “acts of war,” but they can cause more damage than many kinetic attacks—and it can be much harder to know how to respond. Figuring out a doctrine of cyber war that includes everything from such low-level strikes to “cyber Pearl Harbors” will be one of the signal challenges for military and intelligence strategists in the 21st century.</p>
<p>The post <a rel="nofollow" href="https://legacy.zocalopublicsquare.org/2017/03/29/why-didnt-us-react-more-forcefully-to-dnc-hacking/ideas/nexus/">Why Didn&#8217;t the U.S. React More Forcefully to the DNC Hacking?</a> appeared first on <a rel="nofollow" href="https://legacy.zocalopublicsquare.org">Zócalo Public Square</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://legacy.zocalopublicsquare.org/2017/03/29/why-didnt-us-react-more-forcefully-to-dnc-hacking/ideas/nexus/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
