{"id":40465,"date":"2018-07-09T11:54:41","date_gmt":"2018-07-09T01:54:41","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=40465"},"modified":"2018-07-09T11:54:41","modified_gmt":"2018-07-09T01:54:41","slug":"is-cyber-the-perfect-weapon","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/","title":{"rendered":"Is cyber the perfect weapon?"},"content":{"rendered":"
<\/figure>\n

For years, political leaders such as former US Secretary of Defense Leon Panetta have warned<\/a> of the danger of a \u2018cyber Pearl Harbor\u2019. We have known for some time that potential adversaries have installed malicious software in our electricity grid. Suddenly the power could go out in large regions, causing economic disruption, havoc and death. Russia used such an attack in December 2015 in its hybrid warfare against Ukraine, though for only a few hours. Earlier, in 2008, Russia used cyberattacks to disrupt the government of Georgia\u2019s efforts to defend against Russian troops.<\/p>\n

Thus far, however, cyber weapons seem to be more useful for signalling or sowing confusion than for physical destruction\u2014more a support weapon than a means to clinch victory. Millions of intrusions into other countries\u2019 networks occur each year, but only a half-dozen or so have done significant physical (as opposed to economic and political) damage. As Robert Schmidle, Michael Sulmeyer and Ben Buchanan put it<\/a>, \u2018No one has ever been killed by a cyber capability.\u2019<\/p>\n

US doctrine is to respond to a cyberattack with any weapon, in proportion to the physical damage caused, based on the insistence that international law\u2014including the right to self-defence\u2014applies to cyber conflicts. Given that the lights have not gone out, maybe this deterrent posture has worked.<\/p>\n

Then again, maybe we are looking in the wrong place, and the real danger is not major physical damage but conflict in the grey zone of hostility below the threshold of conventional warfare. In 2013, Russian chief of the general staff Valery Gerasimov described a doctrine for hybrid warfare that blends conventional weapons, economic coercion, information operations and cyberattacks.<\/p>\n

The use of information to confuse and divide an enemy was widely practised during the Cold War. What is new is not the basic model, but the high speed and low cost of spreading disinformation. Electrons are faster, cheaper, safer and more deniable than spies carrying around bags of money and secrets.<\/p>\n

If Russian President Vladimir Putin sees his country as locked in a struggle with the United States but is deterred from using high levels of force by the risk of nuclear war, then perhaps cyber is the \u2018perfect weapon\u2019. That is the title of an important new book<\/a> by New York Times<\/em> reporter David Sanger, who argues that beyond being \u2018used to undermine more than banks, databases, and electrical grids\u2019, cyberattacks \u2018can be used to fray the civic threads that hold together democracy itself\u2019.<\/p>\n

Russia\u2019s cyber interference in the 2016 American presidential election was innovative. Not only did Russian intelligence agencies hack into the email of the Democratic National Committee and dribble out the results through WikiLeaks and other outlets to shape the American news agenda; they also used US-based social-media platforms to spread false news and galvanise opposing groups of Americans. Hacking is illegal, but using social media to sow confusion is not. The brilliance of the Russian innovation in information warfare was to combine existing technologies with a degree of deniability that remained just below the threshold of overt attack.<\/p>\n

US intelligence agencies alerted President Barack Obama of the Russian tactics, and he warned Putin of adverse consequences when the two met in September 2016. But Obama was reluctant to call out Russia publicly or to take strong actions for fear that Russia would escalate by attacking election machinery or voting rolls and jeopardise the expected victory of Hillary Clinton. After the election, Obama went public and expelled Russian spies and closed some diplomatic facilities, but the weakness of the US response undercut any deterrent effect. And because President Donald Trump has treated the issue as a political challenge to the legitimacy of his victory, his administration also failed to take strong steps.<\/p>\n

Countering this new weapon requires a strategy to organise a broad national response that includes all government agencies and emphasises more effective deterrence. Punishment can be meted out within the cyber domain by tailored reprisals, and across domains by applying stronger economic and personal sanctions. We also need deterrence by denial\u2014making the attacker\u2019s work more costly than the value of the benefits to be reaped.<\/p>\n

There are many ways to make the US a tougher and more resilient target. Steps include training state and local election officials; requiring a paper trail as a backup to electronic voting machines; encouraging campaigns and parties to improve basic cyber hygiene such as encryption and two-factor authentication; working with companies to exclude social-media bots; requiring identification of the sources of political advertisements (as now occurs on television); outlawing foreign political advertising; promoting independent fact-checking; and improving the public\u2019s media literacy. Such measures helped to limit the success of Russian intervention in the 2017 French presidential election.<\/p>\n

Diplomacy might also play a role. Even when the US and the Soviet Union were bitter ideological enemies during the Cold War, they were able to negotiate agreements. Given the authoritarian nature of the Russian political system, it could be meaningless to agree not to interfere in Russian elections. Nonetheless, it might be possible to establish rules that limit the intensity and frequency of information attacks. During the Cold War, the two sides did not kill each other\u2019s spies, and the Incidents at Sea Agreement limited the level of harassment involved in close naval surveillance. Today, such agreements seem unlikely, but they are worth exploring in the future.<\/p>\n

Above all, the US must demonstrate that cyberattacks and manipulation of social media will incur costs and thus not remain the perfect weapon for warfare below the level of armed conflict.<\/p>\n","protected":false},"excerpt":{"rendered":"

For years, political leaders such as former US Secretary of Defense Leon Panetta have warned of the danger of a \u2018cyber Pearl Harbor\u2019. We have known for some time that potential adversaries have installed malicious …<\/p>\n","protected":false},"author":500,"featured_media":40471,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[599,391,163],"class_list":["post-40465","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cold-war","tag-cyber","tag-russia"],"acf":[],"yoast_head":"\nIs cyber the perfect weapon? | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is cyber the perfect weapon? | The Strategist\" \/>\n<meta property=\"og:description\" content=\"For years, political leaders such as former US Secretary of Defense Leon Panetta have warned of the danger of a \u2018cyber Pearl Harbor\u2019. We have known for some time that potential adversaries have installed malicious ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-09T01:54:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/cybermap.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"636\" \/>\n\t<meta property=\"og:image:height\" content=\"358\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Joseph S. Nye, Jr.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joseph S. Nye, Jr.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/cybermap.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/cybermap.jpg\",\"width\":636,\"height\":358},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/\",\"name\":\"Is cyber the perfect weapon? | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/#primaryimage\"},\"datePublished\":\"2018-07-09T01:54:41+00:00\",\"dateModified\":\"2018-07-09T01:54:41+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/edb0a4c6105071db2b5d7d716d4d7eed\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is cyber the perfect weapon?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/edb0a4c6105071db2b5d7d716d4d7eed\",\"name\":\"Joseph S. Nye, Jr.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3e5157ecfa6b59807d2cf04084bc0ed9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3e5157ecfa6b59807d2cf04084bc0ed9?s=96&d=mm&r=g\",\"caption\":\"Joseph S. Nye, Jr.\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/joseph-s-nye-jr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is cyber the perfect weapon? | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/","og_locale":"en_US","og_type":"article","og_title":"Is cyber the perfect weapon? | The Strategist","og_description":"For years, political leaders such as former US Secretary of Defense Leon Panetta have warned of the danger of a \u2018cyber Pearl Harbor\u2019. We have known for some time that potential adversaries have installed malicious ...","og_url":"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2018-07-09T01:54:41+00:00","og_image":[{"width":636,"height":358,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/cybermap.jpg","type":"image\/jpeg"}],"author":"Joseph S. Nye, Jr.","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Joseph S. Nye, Jr.","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/cybermap.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/cybermap.jpg","width":636,"height":358},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/","url":"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/","name":"Is cyber the perfect weapon? | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/#primaryimage"},"datePublished":"2018-07-09T01:54:41+00:00","dateModified":"2018-07-09T01:54:41+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/edb0a4c6105071db2b5d7d716d4d7eed"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/is-cyber-the-perfect-weapon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Is cyber the perfect weapon?"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/edb0a4c6105071db2b5d7d716d4d7eed","name":"Joseph S. Nye, Jr.","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3e5157ecfa6b59807d2cf04084bc0ed9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3e5157ecfa6b59807d2cf04084bc0ed9?s=96&d=mm&r=g","caption":"Joseph S. Nye, Jr."},"url":"https:\/\/www.aspistrategist.ru\/author\/joseph-s-nye-jr\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/40465"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/500"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=40465"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/40465\/revisions"}],"predecessor-version":[{"id":40468,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/40465\/revisions\/40468"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/40471"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=40465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=40465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=40465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}