The Limits Of Cyber Warfare

Future wars might be waged online, but evidence from recent fighting between Russia and Ukraine suggests it won't be that simple.

Russian-backed troops had the greatest capability for shutting down Ukraine's electronic systems, but neither side has done much cyber fighting, according to a report compiled by NATO researchers in Estonia.

Calculations about military strategy come down to costs and rewards, said Martin Libicki, a cyber security expert at Rand Corp. He is a chapter contributor to the report, “Cyber War in Perspective: Russian Aggression Against Ukraine.”

“Maybe this cyber stuff isn't all it's cracked up to be,” Libicki told the Trib. “It might be that it's more difficult and that there's less reward from carrying out a cyber-attack than we ever assumed.”

Many reasons exist for the lack of online conflict between Russia and Ukraine, experts said, and the incident provides some direction for American military leaders. The United States still must prepare for a complete wartime shutdown of systems for energy, communications, utilities and more — but it also should plan for more nuanced incidents.

“Modern war is a messy affair, not a clean and glittery Hollywood movie,” Sven Sakkov, director of the NATO Cooperative Cyber Defense Center of Excellence, wrote in the report's introduction. “The emergence of cyber as a separate domain of war-fighting does not necessarily offer magic solutions and miraculous short-cuts to achieve strategic goals.”

Cyber presents some unique advantages, but it's just one weapon in a military's arsenal, said Jim Lewis, director of the Strategic Technologies Program at the Center for Strategic & International Studies, a Washington think tank.

“People sit back and calculate, ‘What's the benefit to me of doing this?' said Lewis, who contributed a chapter. “The Russians also didn't do aerial bombardment or shoot cruise missiles. Cyber is another weapon, and they chose not to use it.”

NATO created a cyber defense centre of excellence in Estonia after 2007 cyber-attacks that overwhelmed banking and communications systems there. The attacks, which some have attributed to Russian hackers, caused widespread panic but no real damage.

The fallout drove Estonia closer to NATO and provided little military advantage, Libicki said. It's possible that Russia learned from that experience and did not want to repeat it in Ukraine, he said.

It's also possible that Russia feared crossing some undefined line that would have provoked the United States to retaliate, he said, or Russia did not want to appear to be more involved in the conflict than it was. In addition, Russia had much to gain from leaving the systems intact, the NATO report says. Russia likely uses the networks for spreading propaganda and collecting espionage.

TribLive:   

NATO Tools Up For Cybewar:               Cyberwar: The Smart Person's Guide:

 

 

« WikiLeaks Wants A Database To Verify Twitter Users
One Insurer Plans To Replace Humans With AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

RATEL (SRB-CERT)

RATEL (SRB-CERT)

RATEL has been appointed as the National Center for the Prevention of Security Risks in ICT systems of the Republic of Serbia (SRB-CERT).

PSYND

PSYND

PSYND is a Swiss consultancy company based in Geneva specialized in CyberSecurity and Identity & Access Management.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

Moore ClearComm

Moore ClearComm

Moore ClearComm is part of Moore Kingston Smith a leading UK firm of accountants and business advisers. Our services include Data Privacy, Cyber Security, Business Continuity and Information Security.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

Nexer

Nexer

Nexer is a modern tech company with expertise in strategy, technology and communication with a strong vision.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Aspiron Search

Aspiron Search

Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms.

Mother Technologies

Mother Technologies

From Datacentre to Desktop, Mother Technologies has been delivering IT Support, Telecoms, Cybersecurity and Connectivity services to businesses across Scotland and beyond since 2002.