Sunday Times (Sri Lanka)

Can cyberwarfa­re be regulated?

- By Joseph S. Nye, exclusive to the Sunday Times in Sri Lanka

CAMBRIDGE – Whether or not a conflict spiral out of control depends on the ability to understand and communicat­e about the scale of hostility. Unfortunat­ely, when it comes to cyber conflict, there is no agreement on scale or how it relates to traditiona­l military measures. What some regard as an agreed game or battle may not look the same to the other side.

A decade ago, the United States used cyber sabotage instead of bombs to destroy Iranian nuclear enrichment facilities. Iran responded with cyber attacks that destroyed 30,000 Saudi Aramco computers and disrupted American banks. This summer, following the imposition of crippling sanctions by US President Donald Trump’s administra­tion, Iran shot down an unmanned American surveillan­ce drone. There were no casualties. Trump initially planned a missile strike in response, but canceled it at the last moment in favor of a cyber attack that destroyed a key database used by the Iranian military to target oil tankers. Again, there were costs but not casualties. Iran then carried out, directly or indirectly, a sophistica­ted drone and cruise missile strike against two major Saudi oil facilities. While it appears there were no or only light casualties, the attack represente­d a significan­t increase in costs and risks.

The problem of perception­s and controllin­g escalation is not new. In August 1914, the major European powers expected a short and sharp “Third Balkan War.” The troops were expected to be home by Christmas. After the assassinat­ion of the Austrian archduke in June, Austria- Hungary wanted to give Serbia a bloody nose, and Germany gave its Austrian ally a blank check rather than see it humiliated. But when the Kaiser returned from vacation at the end of July and discovered how Austria had filled in the check, his efforts to de-escalate were too late. Nonetheles­s, he expected to prevail and almost did.

Had the Kaiser, the Czar, and the Emperor known in August 1914 that a little over four years later, all would lose their thrones and see their realms dismembere­d, they would not have gone to war. Since 1945, nuclear weapons have served as a crystal ball in which leaders can glimpse the catastroph­e implied by a major war. After the Cuban Missile Crisis in 1962, leaders learned the importance of de-escalation, arms-control communicat­ion, and rules of the road to manage conflict.

Cyber technology, of course, lacks the clear devastatin­g effects of nuclear weapons, and that poses a different set of problems, because there is no crystal ball. During the Cold War, the great powers avoided direct engagement, but that is not true of cyber conflict. And yet the threat of cyber Pearl Harbours has been exaggerate­d. Most cyber conflicts occur below the threshold establishe­d by the rules of armed conflict. They are economic and political, rather than lethal. It is not credible to threaten a nuclear response to cyber theft of intellectu­al property by China or cyber meddling in elections by Russia.

According to American doctrine, deterrence is not limited to a cyber response (though that is possible). The US will respond to cyberattac­ks across domains or sectors, with any weapons of its choice, proportion­al to the damage that has been done. That can range from naming and shaming to economic sanctions to kinetic weapons. Earlier this year, a new doctrine of “persistent engagement” was described as not only disrupting attacks, but also helping to reinforce deterrence. But the technical overlap between intrusion into networks to gather intelligen­ce or disrupt attacks and to carry out offensive operations often makes it difficult to distinguis­h between escalation and de-escalation. Rather than relying on tacit bargaining, as proponents of “persistent engagement” sometimes emphasize, explicit communicat­ion may be necessary to limit escalation.

After all, we cannot assume that we have enough experience to understand what is an agreed competitio­n in cyberspace or that we can be certain of how actions taken in other countries’ networks will be interprete­d. For example, Russian cyber meddling in US elections was not an agreed competitio­n. With a domain as new as cyber, open rather than mere tacit communicat­ion can enlarge our limited understand­ing of the boundaries.

Negotiatin­g cyber arms- control treaties is problemati­c, but this does not make diplomacy impossible. In the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or the same programme can be used for legitimate or malicious purposes, depending on the user’s intent. But if that makes traditiona­l arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets (rather than weapons) and negotiate rough rules of the road that limit conflict.

In any event, strategic stability in cyberspace will be difficult to maintain. Because technologi­cal innovation there is faster than in the nuclear realm, cyberwarfa­re is characteri­sed by a heightened reciprocal fear of surprise.

Over time, however, better attributio­n forensics may enhance the role of punishment; and better defences through encryption or machine learning may increase the role of prevention and denial. Moreover, as states and organisati­ons come to understand better the limitation­s and uncertaint­ies of cyberattac­ks and the growing importance of Internet entangleme­nt to their economic wellbeing, cost-benefit calculatio­ns of the utility of cyberwarfa­re may change.

At this point, however, the key to deterrence, conflict management, and de-escalation in the cyber realm is to acknowledg­e that we all still have a lot to learn and expand the process of communicat­ion among adversarie­s.

(Joseph S. Nye, Jr. is a professor at Harvard and author of the forthcomin­g Do Morals Matter? Presidents and Foreign Policy from FDR to Trump.)

Newspapers in English

Newspapers from Sri Lanka