12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2 1. CYBER WARFARE: HERE AND NOWWhat is <strong>Cyber</strong> <strong>Warfare</strong>? Is it a credible threat? How should we study it? Before we start <strong>to</strong>present some case studies, we felt these questions need <strong>to</strong> be addressed first. Granted, ouranswers <strong>to</strong> these questions are only tentative: cyber warfare is and will be evolving. In thischapter, we attempt <strong>to</strong> define cyber war, discuss why it is important, and outline some techniquesthat can help us study it. We also address the issue of attribution and examine an informationassurance-based framework that helps <strong>to</strong> better grasp some of the more technical issues.WHAT IS CYBER WAR?Many have sought <strong>to</strong> answer this question during the last decade as the Internet emergedas a new battlefield in conflict. It is tempting <strong>to</strong> simply define cyber war as when a nation stateengages in cyber operations. However, a definition that restricts actions <strong>to</strong> a nation state islikely incomplete. As we note throughout the book, extra governmental organizations—fromthe more traditional ac<strong>to</strong>rs such as Hamas and Hezbollah <strong>to</strong> newer organizations such asAnonymous and LulzSec—continue <strong>to</strong> play an increased role in conflict. However, inextending the range of ac<strong>to</strong>rs in cyber warfare beyond nation states, where do we drawthe line? It would not make sense <strong>to</strong> include every two-bit criminal sending out spam e-mailsand high-school kids conducting Web defacements as cyber warriors. On the other hand, wecannot make an arbitrary decision based on the size of the organization conducting theattacks. This book is littered with examples of major cyber operations conducted by a handfulof individuals.Clearly, cyber war is difficult <strong>to</strong> pin down with a definition. In this book, we first takeon Clausewitz’s definition of war: “an extension of policy (or politics) by other means.” 1Based hereon, we can create a corollary for cyber war: “an extension of policy (orpolitics) by actions taken in cyber space.” But we also want <strong>to</strong> avoid considering everypolitically motivated Web site defacement as an act of cyber war. Perhaps we should also accountfor capability and add the condition that the actions pose a “serious threat” <strong>to</strong> nationalsecurity. However, we still cannot account for cases in which a state uses cyber operationsagainst nonstate ac<strong>to</strong>rs. Eventually, we resolved <strong>to</strong> use the following definition of cyber war:<strong>Cyber</strong> war is an extension of policy by actions taken in cyber space by state or nonstate ac<strong>to</strong>rs that eitherconstitute a serious threat <strong>to</strong> a nation’s security or are conducted in response <strong>to</strong> a perceived threat against anation’s security.Most certainly, the debate on what (does not) constitutes cyber war is far from over.However, we found the above-mentioned definition a helpful guidance for this book andthe case studies we present are good illustrations of the current state of cyber war.IS CYBER WAR A CREDIBLE THREAT?With our definition of cyber war, the reader may wonder if it is even possible for a cyberoperation <strong>to</strong> pose a serious threat <strong>to</strong> national security. Based on the s<strong>to</strong>ries in this book,we (the authors) are convinced that cyber warfare can pose a serious threat <strong>to</strong> national

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!