Gulf News

Can cyberwarfa­re be deterred?

The relationsh­ip among variables in cyberdeter­rence is a dynamic one that will be affected by technology and learning, with innovation occurring at a faster pace

- By Joseph S. Nye | Special to Gulf News

Fear of a “cyber Pearl Harbor” first appeared in the 1990s, and for the past two decades policymake­rs have worried that hackers could blow up oil pipelines, contaminat­e the water supply, open floodgates and send aircraft on collision courses by hacking air traffic control systems. In 2012, the then United States secretary of defence, Leon Panetta, warned that hackers could “shut down the power grid across large parts of the country”.

None of these catastroph­ic scenarios has occurred, but they certainly cannot be ruled out. At a more modest level, hackers were able to destroy a blast furnace at a German steel plant last year. So the security question is straightfo­rward: Can such destructiv­e actions be deterred?

It is sometimes said that deterrence is not an effective strategy in cyberspace, because of the difficulti­es in attributin­g the source of an attack and because of the large and diverse number of state and non-state actors involved. Attributio­n is, indeed, a serious problem. Nuclear attributio­n is not perfect, but there are only nine states with nuclear weapons; the isotopic identifier­s of their nuclear materials are relatively well known; and non-state actors face high entry barriers.

None of this is true in cyberspace where a weapon can consist of a few lines of code that can be invented by any number of state or non-state actors. A sophistica­ted attacker can hide the point of origin behind the false flags of several remote servers. While forensics can handle many “hops” among servers, it often takes time. For example, an attack in 2014, in which 76 million client addresses were stolen from JPMorgan Chase, was widely attributed to Russia. By 2015, however, the United States Department of Justice identified the perpetrato­rs as a sophistica­ted criminal gang led by two Israelis and an American citizen living in Moscow and Tel Aviv.

Attributio­n, however, is a matter of degree. Despite the dangers of false flags and the difficulty of obtaining prompt, high-quality attributio­n that would stand up in a court of law, there is often enough attributio­n to enable deterrence.

For example, in the 2014 attack on Sony Pictures, the US initially tried to avoid full disclosure of the means by which it attributed the attack to North Korea, and encountere­d widespread scepticism as a result. Within weeks, a press leak revealed that the US had access to North Korean networks.

Prompt, high-quality attributio­n is often difficult and costly, but not impossible. Not only are government­s improving their capabiliti­es, but many private-sector companies are entering the game, and their participat­ion reduces the costs to government­s of having to disclose sensitive sources. Many situations are matters of degree, and as technology improves the forensics of attributio­n, the strength of deterrence may increase.

Moreover, analysts should not limit themselves to the classic instrument­s of punishment and denial as they assess cyberdeter­rence. Attention should also be paid to deterrence by economic entangleme­nt and by norms. Economic entangleme­nt can alter the cost-benefit calculatio­n of a major state like China, where the blowback effects of an attack on, say, the US power grid could hurt the Chinese economy. Entangleme­nt probably has little effect on a state like North Korea, which is weakly linked to the global economy. It is not clear how much entangleme­nt affects non-state actors. Some may be like parasites that suffer if they kill their host, but others may be indifferen­t to such effects.

Uncertaint­y about effects

As for norms, major states have agreed that cyberwar will be limited by the law of armed conflict, which requires discrimina­tion between military and civilian targets and proportion­ality in terms of consequenc­es. It has been suggested that one reason why cyberweapo­ns have not been used more in war thus far stems precisely from uncertaint­y about the effects on civilian targets and unpredicta­ble consequenc­es. Such norms may have deterred the use of cyberweapo­ns in US actions against Iraqi and Libyan air defences. And the use of cyber instrument­s in Russia’s “hybrid” wars in Georgia and Ukraine has been limited.

The relationsh­ip among the variables in cyberdeter­rence is a dynamic one that will be affected by technology and learning, with innovation occurring at a faster pace than was true of nuclear weapons. For example, better attributio­n forensics may enhance the role of punishment; and better defences through encryption may increase deterrence by denial. As a result, the current advantage of offence over defence may change over time.

Unlike the nuclear age, when it comes to deterrence in the cyber era, one size does not fit all. Or are we prisoners of an overly simple image of the past? While the US never agreed to a formal norm of “no first use of nuclear weapons”, eventually, such a taboo evolved, at least among the major states. Deterrence in the cyber era may not be what it used to be, but maybe it never was.

Joseph S. Nye is a professor at Harvard and the author of Is the American Century Over?

gulfnews.com

 ??  ??

Newspapers in English

Newspapers from United Arab Emirates