Cyber Warfare: Technology backfires on the powerful.

Cyber warfare is fast becoming the most progressive military technology since the Second World War. This rapid progression raises the question of identifying which global actors benefit most from a new found cyber capability. The acquisition of offensive cyber warfare capability by apparently weaker states for use against states with stronger kinetic warfare capability gives a strategic advantage, enabling them to change the balance of power. 

Offensive cyber warfare capability is a strategic balancing factor that will be used by the rising state powers against each other and against more established powers.  The attraction of cyber warfare for the weaker state is its low cost of development & deployment and its low visibility during development & mobilization as a weapon. Plus the fact that stronger states are more highly dependent on their critical cyber infrastructure than weaker ones.

From a government, intelligence agency and a border police perspective the strategy required to deal with cyber has some historic similarities to the way in which piracy was used by nations, particularly parts of nations or groups/tribes that could attack international trade routes. This issue was eventually internationally contained and gradually significantly reduced but of course piracy still operates in many places around the globe. The global oceans and seas and the international shipping routes, trade and naval activities, which can be seen as similar to an earlier version of the Internet, have gone through so much damage, theft, destruction and life loss via piracy and privateering.

The reduction of piracy took centuries to achieve, finally significant aspects of it were outlawed by the Peace of Westphalia and put into international treaties by the Declaration of Paris in 1856. Cyber security needs a similar, but much faster, globally inter-related process to be agreed and established.

Understanding the effectiveness of the strategic culture and use of cyber warfare techniques will have consequences on national security doctrine for many countries. For the United States, one of the most wired states in the world, there is a large potential vulnerability against cyber-attacks. Globalization, fueled by technological advancement and expansion of cyber space, is a manifestation of new means through which power is exercised and distributed.

By the same token, such power comes with a vulnerability that states such as North Korea and China are trying to separate themselves from by isolating their critical infrastructure from the Internet.

It seems Cyber Warfare is a special case, where the more you have invested in your capabilities in cyberspace the  more vulnerable you become. It takes less economic, human and geo-political resources to develop cyber-attack capability than nuclear capability. This becomes a fundamental assumption in comparing nuclear capability and cyber war potential. The case that nuclear capability is the absolute form of military power that provides security for proliferated states may no longer hold.

Cyber warfare capability is a disruptive new phenomenon in strategic studies and will require an entirely new analysis of the technical and political elements to determine a new balance of power.

http://securityaffairs.co/wordpress/33448/cyber-warfare-2/cyber-warfare-balance-of-power.html

« US Cyber Intelligence Agency – Will it work?
Deep Dive: A Guide to the Deep-Web for Law Enforcement »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Fortinet

Fortinet

Fortinet is a provider of network security systems. Our products provide protection against dynamic security threats while simplifying the IT security infrastructure.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

Jacobs

Jacobs

Jacobs is at the forefront of the most important security issues today. We are inspired to be the best and deliver innovative, mission-focused outcomes that matter to our clients.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

Anch.AI

Anch.AI

Anch.AI is an Ethical AI Governance platform that helps you comply with EU regulations and avoid risks and penalties when developing and using AI as part of your business.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.