The Limits Of Cyber Warfare

Future wars might be waged online, but evidence from recent fighting between Russia and Ukraine suggests it won't be that simple.

Russian-backed troops had the greatest capability for shutting down Ukraine's electronic systems, but neither side has done much cyber fighting, according to a report compiled by NATO researchers in Estonia.

Calculations about military strategy come down to costs and rewards, said Martin Libicki, a cyber security expert at Rand Corp. He is a chapter contributor to the report, “Cyber War in Perspective: Russian Aggression Against Ukraine.”

“Maybe this cyber stuff isn't all it's cracked up to be,” Libicki told the Trib. “It might be that it's more difficult and that there's less reward from carrying out a cyber-attack than we ever assumed.”

Many reasons exist for the lack of online conflict between Russia and Ukraine, experts said, and the incident provides some direction for American military leaders. The United States still must prepare for a complete wartime shutdown of systems for energy, communications, utilities and more — but it also should plan for more nuanced incidents.

“Modern war is a messy affair, not a clean and glittery Hollywood movie,” Sven Sakkov, director of the NATO Cooperative Cyber Defense Center of Excellence, wrote in the report's introduction. “The emergence of cyber as a separate domain of war-fighting does not necessarily offer magic solutions and miraculous short-cuts to achieve strategic goals.”

Cyber presents some unique advantages, but it's just one weapon in a military's arsenal, said Jim Lewis, director of the Strategic Technologies Program at the Center for Strategic & International Studies, a Washington think tank.

“People sit back and calculate, ‘What's the benefit to me of doing this?' said Lewis, who contributed a chapter. “The Russians also didn't do aerial bombardment or shoot cruise missiles. Cyber is another weapon, and they chose not to use it.”

NATO created a cyber defense centre of excellence in Estonia after 2007 cyber-attacks that overwhelmed banking and communications systems there. The attacks, which some have attributed to Russian hackers, caused widespread panic but no real damage.

The fallout drove Estonia closer to NATO and provided little military advantage, Libicki said. It's possible that Russia learned from that experience and did not want to repeat it in Ukraine, he said.

It's also possible that Russia feared crossing some undefined line that would have provoked the United States to retaliate, he said, or Russia did not want to appear to be more involved in the conflict than it was. In addition, Russia had much to gain from leaving the systems intact, the NATO report says. Russia likely uses the networks for spreading propaganda and collecting espionage.

TribLive:   

NATO Tools Up For Cybewar:               Cyberwar: The Smart Person's Guide:

 

 

« WikiLeaks Wants A Database To Verify Twitter Users
One Insurer Plans To Replace Humans With AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

National Authority for Electronic Certification and Cyber Security (AKCESK)

National Authority for Electronic Certification and Cyber Security (AKCESK)

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

The Citadel Department of Defense Cyber Institute (CDCI)

The Citadel Department of Defense Cyber Institute (CDCI)

CDCI is established to address the critical national security needed for a skilled cybersecurity workforce.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Grove Group

Grove Group

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

RunReveal

RunReveal

RunReveal's mission is to make sure no breach goes undetected. That means having a product that is accessible and effective for companies of all sizes.

Pacific Certifications

Pacific Certifications

Pacific Certifications provide accredited certification, training and support services to help you improve processes, performance and products and services.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.

Cylerian

Cylerian

Cylerian is a Next Generation SaaS Security Platform - One unified cloud platform to achieve your security, compliance, and operational objectives.