The Limits Of Cyber Warfare

Future wars might be waged online, but evidence from recent fighting between Russia and Ukraine suggests it won't be that simple.

Russian-backed troops had the greatest capability for shutting down Ukraine's electronic systems, but neither side has done much cyber fighting, according to a report compiled by NATO researchers in Estonia.

Calculations about military strategy come down to costs and rewards, said Martin Libicki, a cyber security expert at Rand Corp. He is a chapter contributor to the report, “Cyber War in Perspective: Russian Aggression Against Ukraine.”

“Maybe this cyber stuff isn't all it's cracked up to be,” Libicki told the Trib. “It might be that it's more difficult and that there's less reward from carrying out a cyber-attack than we ever assumed.”

Many reasons exist for the lack of online conflict between Russia and Ukraine, experts said, and the incident provides some direction for American military leaders. The United States still must prepare for a complete wartime shutdown of systems for energy, communications, utilities and more — but it also should plan for more nuanced incidents.

“Modern war is a messy affair, not a clean and glittery Hollywood movie,” Sven Sakkov, director of the NATO Cooperative Cyber Defense Center of Excellence, wrote in the report's introduction. “The emergence of cyber as a separate domain of war-fighting does not necessarily offer magic solutions and miraculous short-cuts to achieve strategic goals.”

Cyber presents some unique advantages, but it's just one weapon in a military's arsenal, said Jim Lewis, director of the Strategic Technologies Program at the Center for Strategic & International Studies, a Washington think tank.

“People sit back and calculate, ‘What's the benefit to me of doing this?' said Lewis, who contributed a chapter. “The Russians also didn't do aerial bombardment or shoot cruise missiles. Cyber is another weapon, and they chose not to use it.”

NATO created a cyber defense centre of excellence in Estonia after 2007 cyber-attacks that overwhelmed banking and communications systems there. The attacks, which some have attributed to Russian hackers, caused widespread panic but no real damage.

The fallout drove Estonia closer to NATO and provided little military advantage, Libicki said. It's possible that Russia learned from that experience and did not want to repeat it in Ukraine, he said.

It's also possible that Russia feared crossing some undefined line that would have provoked the United States to retaliate, he said, or Russia did not want to appear to be more involved in the conflict than it was. In addition, Russia had much to gain from leaving the systems intact, the NATO report says. Russia likely uses the networks for spreading propaganda and collecting espionage.

TribLive:   

NATO Tools Up For Cybewar:               Cyberwar: The Smart Person's Guide:

 

 

« WikiLeaks Wants A Database To Verify Twitter Users
One Insurer Plans To Replace Humans With AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Immersive Labs

Immersive Labs

Immersive Labs have created a kinesthetic learning platform which identifies gaps in your teams cyber skills.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Cyber Security Authority (CSA) - Ghana

Cyber Security Authority (CSA) - Ghana

The Cyber Security Authority has been established to regulate cybersecurity activities in Ghana.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

Binalyze

Binalyze

Binalyze is the world's fastest and most comprehensive enterprise forensics solution. Our software helps you to collaborate and complete incident response investigations quickly.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.

Digital & Intelligence Service (DIS)

Digital & Intelligence Service (DIS)

DIS is the fourth Service of the SAF, here to defend and dominate in the digital domain, and achieve peace and security for our land.

X-PHY

X-PHY

X-PHY is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core.

Soteria LLC

Soteria LLC

Soteria LLC are a client-focused organization providing expert advisory, consulting services, and tailored solutions to prevent, detect, and respond to cybersecurity incidents.