
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
About this book
Cyber-War provides a critical assessment of current debates around the likelihood and impact of cyber warfare. Approaching the subject from a socio-political angle, it argues that destructive cyber war has not yet been seen, but could be a feature of future conflict.
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weâve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere â even offline. Perfect for commutes or when youâre on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Cyber-War by J. Richards in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & International Relations. We have over one million books available in our catalogue for you to explore.
Information
1
Introduction: The Cyber Landscape
Abstract: The opening chapter introduces the key debates in the sometimes confused realm of cyber security and cyber warfare. It identifies that a normative narrative is developing that the threat of major cyber warfare is a real and present danger. At the same time, a number of scholars cast doubt on the level and likelihood of the threat, not least because of legal ambiguities over what constitutes an act of war. Debate is complicated by the heavy involvement of military, security and commercial actors in the discussion. An argument is presented that, while cyber-related threats are present in and around modern warfare, the more catastrophic risks of attack may be unlikely at the present time.
Richards, Julian. Cyber-War: The Anatomy of the Global Security Threat. Basingstoke: Palgrave Macmillan, 2014. DOI: 10.1057/9781137399625.0003.
In November 2011, an event occurred in the normally peaceful location of Springfield, Illinois, which soon caused a considerable stir in the worldâs media. The story was triggered by the failure of a pump at a public water plant, which caused a number of homes in the Springfield area to find themselves without mains water. On investigation, the pump was found to have had a fault in which it had been turning itself off and on again inexplicably, eventually failing. Analysis of the fault traced the problem back to five months previously when evidence was discovered of traffic between a Russian internet protocol (IP) address and the Illinois plantâs Supervisory Control and Data Acquisition (SCADA) system â essentially the plantâs control network, which can be accessed in certain circumstances over the internet to effect remote controls. The fault in the pump seemed to have developed after this initially unidentified connection over the internet from Russia.
The story gained legs when a security commentator, Joe Weiss, who works for a commercial organisation advising utility companies in the US on how to protect themselves from cyber security threats, mentioned in a blog article that the FBI and Department for Homeland Security (DHS) had been investigating the incident and viewed it as a suspicious cyber attack emanating from Russia.
This was enough for media outlets across the world to pick up the story and present it as one of the first verified examples of cyber techniques being used to attack and disable civilian utility networks. Some of the less circumspect news organisations were unequivocal in their analysis. This was clearly an attack by âRussian cyber criminalsâ, and represented a worrying precedent. When a DHS spokesman said there was no apparent threat to the integrity of public utilities or to public safety, an anonymous online hacker disagreed and claimed to have hacked into the SCADA network of a second public utility in South Houston, Texas.1
The problem with the story, as was reported reasonably widely a few weeks later, albeit with slightly less attention, was that its whole premise turned out to be erroneous. A contractor at the Illinois plant in question, Jim Mimlitz, revealed that he had watched the hacking story unfold with incredulity. He explained that the origin of the original online traffic from Russia to the water plantâs network was himself. While holidaying in Russia, Mimlitz had been asked to check something at the plant and had done so over an internet connection, inadvertently causing the fault.2
The mystery was solved, but the incident, and more importantly the way in which it had been reported, said a great deal about the way in which potentially destructive cyber attacks are conceptualised and articulated in Western national security discourse.
A couple of years prior to the Illinois incident, the President of the United States, Barack Obama, had delivered an address at the White House on the question of âsecuring our nationâs infrastructureâ. He painted a bleak picture about the cyber security threats that were emerging, and the need to establish a sound strategy to mitigate them. One of the particularly interesting assertions he made, on which the cyber security expert Kenneth Geers picked up, was that cyber attackers âhave plunged entire cities into darknessâ.3 This was a bold statement: not only did cyber attackers have the capability to probe and interfere with public utilities, but they had actually carried out attacks which had affected entire cities. This is important because it means the threat is not just theoretical or apocryphal, as many of the critics of the cyber security debate would argue, but is proven and present with us today, if the president is to be believed. If we were to adopt a constructivist security perspective on this situation, we could say that President Obamaâs words were a classic securitizing âspeech actâ4 that elevated a particular threat to a higher plane and thus justified extraordinary national security expenditure and action.
Again, however, further analysis reveals that the claims are based on less-than-solid foundations. It appears that the specific episodes to which President Obama referred had occurred in Brazil in the state of Espirito Santo in 2007 and in Rio de Janeiro in 2005. Here, widespread urban electricity failures had been blamed by many media outlets on cyber attackers hacking into Brazilian utility networks. A few months after President Obamaâs address, in November 2009, Brazil experienced a further wave of power blackouts in a number of urban centres, and these were also blamed on hackers. By coincidence, these latest problems had occurred just a few days after a CBS 60 Minutes television report had been aired in the US, which had made the connection between the Brazilian power outages and cyber attackers, citing unnamed sources.5 However, it is reported that the Brazilian energy ministry chief of staff, JosĂ© Coimbra, had claimed that investigations had pinpointed the earlier outages as being due to short circuits on certain high-voltage lines in the Sao Paulo area. Meanwhile, the then director of Homeland Security Information and Security in Brazil, Mandarino, revealed that there had indeed been cyber intrusions into the energy companyâs networks in 2005 from criminals making an attempt at extortion. The attack had caused a minor loss of data from an administrative computer and had been quickly resolved. There was widespread debate in the Brazilian government which had come to the conclusion that the two incidents were not connected, and that the power outages could not have been caused by cyber attacks.6
The Illinois story had broken about a year after the effects of the Stuxnet attacks in Iran had been revealed (which is discussed later). Stuxnet has been described by many analysts as the first real military-grade cyber weapon worthy of the name.7 These stories illustrate a number of important facets of the debates around cyber security and cyber warfare in the second decade of the twenty-first century. Firstly, there is clearly a high degree of anxiety and discomfort about the possibility of major cyber attacks on critical infrastructure and the level of effect they could have on civilian populations. Such attacks are considered to be the weapons and techniques that would be used in a full-scale cyber war, or substantial cyber terrorist attack. This anxiety appears to be causing a tendency to leap on incidents before full analysis has been made, and to herald them as examples of destructive cyber capability being put into action. The commentators making these connections and assertions vary from media outlets to cyber security industry âexpertsâ, and sometimes all the way up to political leaders at the highest level of influence.
At the same time, it is clear that the veracity of the claims and the scoping of these threats are, at the time of writing, subject to a high degree of ambiguity and confusion. Incidents which are heralded as attacks are often found to be either not attacks at all or to have so much doubt and obscurity around them as to be highly dubious affairs about which very little can be said with any certainty.
These are the issues at the heart of the debate on cyber war which this book aims to explore. It does so by identifying and unravelling two spectra at the heart of the contemporary narrative on cyber war. First is the spectrum of cyber threats in which the potential of cyber war is found. This is important as âcyberâ has become something of an all-pervasive term which can be applied to almost any human endeavour. Outside of the security-threat environment we might now talk about cyber bullying, cyber romance, cybernetics, and a mysterious realm called cyber space, to name but a few. The origins of the âcyberâ label can be traced to ancient Greek. One of the first writers to use the term extensively was Norman Wiener, whose 1948 book Cybernetics explored the potential connection between animals and machines.8 In the security sphere, much as it is semantically possible to have a âwarâ on just about anything (obesity, drugs, cancer) so can all threats have a potentially cyber dimension to them, now that we live in an inexorably networked world. Thus, cyber security means security against a range of threats including crime, espionage, vandalism, activism, and terrorism, as well as actual war and warfare-related activities.
Cyber war is very much at the extreme end of the cyber security-threat environment, much as is the case with traditional war and conflict. One of the key questions about cyber security is how we prioritise the range of threats, in the traditional risk-assessment sense of calculating both likelihood and impact. It may be the case, for example, that an act of war using cyber mechanisms is unlikely, and would not be very damaging if it were to happen. (Indeed, as I will discuss, it could even be seen as strangely virtuous in some circumstances.) At the same time, cyber crime such as online fraud or credit card skimming is probably a much more immediate and serious threat at the present time. Perhaps we should not be worrying so much about cities going dark and planes falling out of the sky, and direct more of our attention at fairly low-level and routine online fraud. For these reasons, this book will consider the question of cyber war very much within the wider context of cyber threats and cyber security across the spectrum.
The second key spectrum in the cyber war debate is that covering the range of views about how much of a threat cyber war really is, and how damaging it could be. This book will aim to uncover and discuss the range of views being put forward, and the relevant merits of each. At one end of the spectrum are the Cassandrist doom-mongers, who will say that the threat of cyber war is not only very real but is happening today, whether it is in the shape of electricity or water plants being disrupted, or computer worms knocking out nuclear weapons facilities. In 1993, Arquilla and Ronfeldt warned us that cyber war was coming.9 Just over 15 years later, a former director of the National Security Agency (NSA), Mike McConnell, told us that it had arrived, and we were losing.10
At the other end of the spectrum there is a range of critical commentators who cast doubt over such assertions. These cover a breadth of views, from those who say that activities that could reasonably be called cyber war will never be seen (as Thomas Rid argues11) to those who do not necessarily rule it out completely in the future but claim that it has not arrived yet (such as George Lucas Jr.12). The reasons for such analysts taking critical views will vary from those noting, as do the opening paragraphs of this book, that there is some degree of hyperbole over recent events that have been equated with cyber war and we need to be more careful about ascribing such a label to these events; to those who frame their critique in terms of a conspiracy theory, suggesting that the militaryâindustrial complex has good reason to exaggerate the threat of cyber war since it will...
Table of contents
- Cover
- Title
- 1Â Â Introduction: The Cyber Landscape
- 2Â Â Cyber and the Changing Nature of Conflict
- 3Â Â Has Cyber War Happened?
- 4Â Â A New Cold War? Russia, China, the US and Cyber War
- 5Â Â Responses to the Threat: National Cyber Security Planning
- 6Â Â Conclusions: A Pathway through the Forest
- Bibliography
- Index