Top Banner
Shubra Bhattacharyya IS CYBER WARFARE A RELEVANT PART OF THE POLITICAL AGENDA OF INTERNATIONAL RELATIONS?
23

Cyberwar

Nov 28, 2014

Download

News & Politics

Is cyber warfare a relevant part of the political agenda of international relations?
With the growing importance of cyberspace and spurt in frequency of cyber-attacks it is gaining strategic value and is increasingly finding greater attention in various policies and planning of governments’ world over. With over two billion people using the internet and a 480% growth in the number since the year 2000 it is now relevant to relook at the previous assumptions and predictions made by academicians and experts and analyse how far have their studies been validated.
Moreover, due to the unique features that differentiate cyberspace and cyber-war from conventional political space and kinetic war, it will be useful to try and predict the future implications they will have on world politics.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyberwar

Shubra Bhattacharyya

IS CYBER WARFARE A RELEVANT PART OF THE POLITICAL AGENDA OF INTERNATIONAL RELATIONS?

Page 2: Cyberwar

INTRODUCTION• Cyber War – “Actions by a nation-state to penetrate another nation’s computers or

networks for the purpose of causing damage or disruption” - Richard Clarke , former special advisor to the US President

• Cyberspace is different

• Ability to mobilize users/netizens

• Ability to provide large quantity of information

• Ability to shrink distances

Page 3: Cyberwar

IS IT REALLY A PLACE?• “Governments of the Industrial World, you weary giants of flesh and steel, I come from

Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.”

–John Perry Barlow, a Declaration of the Independence of Cyberspace, 1996

Page 4: Cyberwar

CYBERLIBERALISM VS CYBERREALISM• Both acknowledge cyberspace as a new type of territory which is anarchic.

• However they differ in :

• Understanding of agent-structure debate

• Likelihood of regulating action within Cyber space

• Whether it represents ungoverned or merely unclaimed territory

Page 5: Cyberwar

THE LIBERAL VIEW• The two strands

• The Utopian and

• The Regulators

• Both are optimistic about:

• cyberspace’s democratizing and liberating potential

• The actor learning in a peaceful and progressive direction

• However, utopians see cyberspace’s development as an organic growth process, while regulators believe its happening due to international cooperation.

Page 6: Cyberwar

UTOPIAN VS. REGULATORS

UTOPIANS REGULATORS

Part of the “World we live in” Alternate Universe

Information as a free good

Information as a collective good.

Page 7: Cyberwar

THE REALIST VIEW• Cyberspace is a technological change in the existing international system—rather than a

new creation.

• Extension of battlefield as well as marketplace

• Not a revolutionary space.

• Cyberspace is capitalist , not socialist.

Page 8: Cyberwar

THE REALIST VIEW (CONTD..)• Advantages of the Cyberspace :

• Force Multiplier

• Enables the quest for strategic paralysis

• Cyberspace’s unique open, anarchic system is a danger rather than an opportunity.

Page 9: Cyberwar

CYBERWARFARE

• Stuxnet

• China – Taiwan, China – US Conflict

• Russian CW against Estonia

• Is CW a strategic weapon?

• Can CW be employed with the intent to achieve a strategic political agenda?

• Did the targeted nations concede a strategic political objective?

Page 10: Cyberwar

RUSSIAN CW AGAINST ESTONIA• Background

• Early 2007 Estonian Government decides to relocate a World War II Soviet War Memorial from the capital city of Tallinn to a military cemetery outside of the city.

• The Russian government as well as many Russia citizens are outraged at the perceived slight.

• It is generally accepted that this was the catalyst for the cyber attacks that occurred soon after the uproar over the war memorial

Page 11: Cyberwar

RUSSIAN CW AGAINST ESTONIA(CONTD.)• Conditions before the attack

• Diplomatic :

• Estonia adopted a look West policy

• Increases diplomatic relations with other Central European States.

• Starting in 2005 Estonia starts to diplomatically distance itself from Russia.

• Estonia wanted to interact with Russia as an equal nation.

Page 12: Cyberwar

RUSSIAN CW AGAINST ESTONIA(CONTD.)• Conditions before the attack

• Information

• Few countries in the world to allow voting to occur over the Internet

• Aggressively embraced the information age

• 90% of people aged between 12 – 24 use internet

• 58% of people aged between 24 – 49

• 95% Banking transactions conducted electronically

• Information security procedures were not capable of preventing the attacks, but once started they were able to respond effectively.

Page 13: Cyberwar

RUSSIAN CW AGAINST ESTONIA(CONTD.)• Conditions before the attack

• Military

• In 2006 – 2007 Estonia increased military spending as it wanted to become a contributing partner in EU and NATO.

• Wanted to distance itself from security reliance on Russia.

• Instead wanted to pursue a “Look West” military policy

Page 14: Cyberwar

RUSSIAN CW AGAINST ESTONIA(CONTD.)• Conditions before the attack

• Economic

• Baltic Economic Powerhouse in 2006

• Information Technology (IT) was among the most significant economic sectors

Page 15: Cyberwar

RUSSIAN CW AGAINST ESTONIA(CONTD.)• Summary of the Attack

• Primary target were government and government related internet sites.

• Civilian sites were also targeted but no military sites were attacked.

• The Internet security professionals were unable to defend their systems from attacks which initially were originating from .ru domain but then the attacks started originating from all across the world.

• A complete shut down of traffic coming into Estonia from the international community had to be enforced.

Page 16: Cyberwar

As per Martin Libicki CW can be used for

Espionage

Disruption Corruption Distraction

RUSSIAN CW AGAINST ESTONIA(CONTD.)

Page 17: Cyberwar

RUSSIAN CW AGAINST ESTONIA(CONTD.)• Conditions after the attack:

• Diplomatic

• Diplomatic stance towards Russia deteriorated.

• Ties with Western allies strengthened immediately as Western government went to Estonia’s aid.

• Assistant Secretary of State Daniel Ford said in 2007 the Baltic states, “will never be left alone again, whether threatened by old, new, or virtual threats. . . .”

Page 18: Cyberwar

RUSSIAN CW AGAINST ESTONIA(CONTD.)• Conditions after the attack:

• Information

• Estonia looked to NATO and the EU for increased protection of its information infrastructure

• In response NATO established a “Centre of Excellence” in Tallinn within one year of the attacks to conduct training and research into CW.

• Estonia developed sophisticated policies and strategies to safeguard its information infrastructure, specifically through published information security strategy doctrine (Cyber Security Strategy, Estonian Ministry of Defence 2008).

Page 19: Cyberwar

RUSSIAN CW AGAINST ESTONIA(CONTD.)• Conditions after the attack:

• Military

• Maintained all military and NATO military commitments and did not modify any domestic military programs.

• Published strategy for Cyber Security.

• Rather than avoid the potential dangers of CW as a result of the cyber attack, Estonia moved aggressively to develop measures to prevent CW within a year of the attacks.

Page 20: Cyberwar

RUSSIAN CW AGAINST ESTONIA(CONTD.)• Conditions after the attack:

• Economic

• Despite efforts by Russia to Estonian Economy, Estonia continued to perform well for the rest of 2007.

Page 21: Cyberwar

IS IT RELEVANT?• Is CW a strategic weapon?

• No, but future possibilities are there where it can be used as a strategic weapon. And this might lead to a security dilemma.

• Can CW be employed with the intent to achieve a strategic political agenda?

• Yes. The intent for causing changes in Diplomatic, Information and Economic power was there although Russia failed in its objectives.

• Did the targeted nation concede a strategic political objective?

• No, but the opposite happened. Estonia forged quick alliances and distanced itself from Russia.

Page 22: Cyberwar

POLITICAL IMPLICATIONS OF CW• Incidents in real world can lead to actions in cyberspace and vice versa.

• Identifying the true enemy could be a problem.

• Low costs of entry with potentially high returns on investment.

• Attractive tool for waging asymmetric war.

• Non Violent means of coercion.

Page 23: Cyberwar

BIBLIOGRAPHY• Ed Pilkington, “Washington moves to classify cyber-attacks as acts of war”, 31.05.2011, The

Guardian, accessed at http://www.guardian.co.uk/world/2011/may/31/washington-moves-to-classify-cyber-attacks

• Nicholas C. Rueter, Department of Political Science Duke University, The Cybersecurity Dilemma, 2011

• Stuart S. Malawer, Cyber Warfare:Law and Policy Proposals for U.S. and Global Governance, VIRGINIA LAWYER, February 2010, Vol. 58

• Mary McEvoy Manjikian, “From Global Village to Virtual Battlespace:The Colonizing of the Internet and the Extension of Realpolitik”, International Studies Quarterly (2010) 54, 381–401

• BRADLEY L. BOYD, CYBER WARFARE: ARMAGEDDON IN A TEACUP?, U.S. Army Command and General Staff College, Feb – Dec 2009

• Misha Glenny, “Cyber-weaponry, virtual battlefields and the changing face of global warfare”, 16.05.2011, The Guardian, accessed at http://www.guardian.co.uk/commentisfree/2011/may/16/cybercrime-warfare-stuxnet-weapons-hacking?INTCMP=ILCNETTXT3487

• Cyber Security Strategy, Cyber Security Strategy Committee, Ministry of Defence, Estonia, 2008