Are we in a cyberwar? (original) (raw)

Proportional Response to Cyberattacks

Analysis in recent years demonstrates that government responses to cyberattacks vary widely. Although there has been significant political pressure to " do something, " past experiences illustrate that most policy responses are ad hoc. This indicates that 1) response to cyberattacks is still an exceedingly untested phenomenon; 2) cyber domain is a relatively new arena of conflict—especially for the policymakers—and, therefore, special attention should be directed towards it; and 3) more research is needed to understand how nation-states could best respond to cyber hostilities and which instruments should be used. This article analyzes comprehensively how cyberattacks should be treated as a political question and provides a rough framework upon which policymakers can build. The article presents five variables that policymakers need to consider when evaluating appropriate responses to cyber hostilities. Combining incident impact, policy options, and other variables, the framework outlines the different levers of cyberpolitics that can be applied in response to the escalating levels of cyber incidents. The response framework is also an integral part of the state's cyber deterrence. , , cyber warfare, , politics,, response,

Israel and Cyberspace: Unique Threat and Response

This article provides insights into the dangers and opportunities that the cyber realm poses to states by conducting the first comprehensive case study on Israeli use of cyberspace. Israel faces a constant barrage of cyberattacks from actors ranging from states to hacker groups to individuals. This has forced Israel to develop highly advanced capabilities. Israel has not just faced cyberattacks but has also been a leader in using the cyber realm for offense. Although the threats to Israel are severe, they are not unique; thus, Israel can serve as a model for what other states can do to effectively use cyberspace both defensively and offensively. This article offers policy recommendations as to how states can improve their cyber defenses.

Four Big " Ds " and a Little " r " : A New Model for Cyber Defense

As with all emerging threats, the cyber realm represents new dangers, which will be difficult to address. This article argues that cyberthreats are not fundamentally different from other asymmetric threats, and it provides a conceptual model for developing a response by drawing on classic principles of military strategy, the " four Ds " — Detection, Deterrence, Defense, and Defeat—as well as resilience (the little " r "). We offer a model for how countries can create policies addressing each of these principles that will enhance the security of national cyber systems. The proposed framework will allow for the development of detailed strategies and plans to address the specific demands posed by cyberthreats, whether state-based, or by non-state actors, or individuals.

Cyberwar (in: George Kassimeris and John Buckley (eds), The Ashgate Research Companion to Modern Warfare (Ashgate 2010), pp. 123-144)

This chapter starts off with a short overview of the relevant literature available to any scholar delving into the issue of cyberwar. This issue warrants special attention in the context of this research compendium because there are a couple of difficulties involved: The specialist literature is mostly policy-oriented, and only very rarely informed by theory, whether from the IR discipline or any other field. The second section looks at definitional issues in more depth and will trace how meaning of ‘cyberwar’ evolved from the narrow conception referring exclusively to military interaction to its broad meaning, which has become detached from ‘war’ and encompasses almost every activity linked to the aggressive use of computers. The third section investigates four cases between 1999 and 2007 that have been labelled ‘cyberwar’ by a variety of actors. In the fourth section, a reality check based on these cases is performed. We see that while cyber-vandalism is an everyday reality, cyberwar is not. After speculating on possible restraints for the use of cyberwar tools in the future, the chapter concludes with thoughts on the danger inherent in cyberwar ideas due to the realities of a globalised, interdependent, and networked world.

Why the World Needs an International Cyberwar Convention

Philosophy & Technology, 2017

States’ capacity for using modern information and communication technology to inflict grave harm on enemies has been amply demonstrated in recent years, with many countries reporting large-scale cyberattacks against their military defense systems, water supply, and other critical infrastructure. Currently, no agreed-upon international rules or norms exist to govern international conflict in cyberspace. Many governments prefer to keep it that way. They argue that difficulties of verifiability and challenges posed by rapid technological change rule out agreement on an international cyber convention. Instead, they prefer to rely on informal cooperation and strategic deterrence to limit direct conflict. In this article, I seek to rebut some of themain objections to seeking an international convention on the use of cyber weapons. While there are significant obstacles to achieving effective arms control in the cyber domain, historical experience from other areas of international arms control suggests that none of these obstacles are insurmountable. Furthermore, while most critics of cyberarms control assume that cyberspace favors offensive strategies, closer inspection reveals the dominance of cyber-defensive strategies. This in turn improves prospects for striking an effective international agreement on cyberarms control.