Welcome!

Government Cloud Authors: Elizabeth White, Liz McMillan, Gopala Krishna Behara, Raju Myadam, Kevin Jackson

Related Topics: Government Cloud

Government Cloud: Blog Feed Post

Cyber War and the Expanding Definition of War

Engaging with cybersecurity challenges is essential to ensuring war remains a continuation of politics by other means

Editor’s note: This post by  provides context on cyber conflict, an area of interest at the nexus of national security and technology. – bg

Recently, Dr. Thomas Rid of the War Studies department of King’s College in London published an article in the Journal of Strategic Studies titled, “Cyber War Will Not Take Place.” Rid’s essay relies upon a definition of war taken from the work of Carl von Clausewitz to assess whether cyber attacks can be accurately described as “stand-alone” acts of war. His conclusion is that we have yet to see any cyber attacks that, on their own, meet Clausewitz’s definition. What’s more, he predicts that we are unlikely to see stand-alone acts of cyber war in the future. Nonetheless, he does acknowledge that cyber threats are real and that various cyber tools and techniques are becoming increasingly important in international conflict, including those used for sabotage, espionage, and subversion.

At a time of increasing concern over prospective cyber threats, it is not surprising that Rid’s essay has added fuel to the ongoing debate between cyber security proponents and the so-called “cyber skeptics.” For example, cyber war expert, author, and CEO Jeffrey Carr has written a spirited response to Rid’s essay. In this post, I argue that Carr’s response misses a key component of Rid’s argument, that the debate between Rid and Carr is exemplary of an emerging debate over the definition of “war” more generally, and that the complexities of cyber conflict demand that we move beyond the kind of binary thinking exhibited in this debate.

First, Carr provides three examples of cyber attacks that he says meet the Clausewitzian definition of war provided by Rid because all three are “lethal, instrumental, and political.” His three examples:

  1. Kyrgyz Intelligence assassinates Gennady Pavlyuk. Kyrgyz intelligence cracked Pavlyuk’s email account and used the information they obtained to lure him out of the country under false pretenses resulting in his murder.
  2. Mossad assassinates Mahmoud Al-Mabhouh. Israel’s Mossad mounts an operation to assassinate Hamas leader Mahmoud Al-Mabhouh which includes infecting Al-Mabhouh’s computer with a trojan horse virus.
  3. Iran’s IRGC arrests 30 dissidents after cracking U.S. hosted webservers.

None of these are acts of war in the conventional sense of the term. These are 1) subterfuge in support of assassination, 2) espionage in support of assassination, and 3) espionage in support of political repression. In the first case, Kyrgyz intelligence supposedly assassinated one of its own citizens. That is not war as we typically understand it. In the third case, espionage was used to aid in carrying out an act of political repression. But neither of those acts by themselves (espionage nor arresting one’s own citizens) are war. The only example that might be considered war is the second case. But even here, given the ongoing state of violent conflict between the Israelis and Palestinians, which has included many assassinations, it is hard to see this event as somehow distinct.

But more importantly, Carr’s response misses a key component of Rid’s argument, namely, that it was about whether stand-alone cyber attacks have been or will be acts of war. Not only is it questionable whether any of Carr’s counter examples in their totality are “acts of war,” it is clear that in none of them can the cyber attack components be seen as stand-alone acts of war. The cyber attacks in each example were not the direct causes of the ultimate outcomes. Email hacking did not directly kill Gennady Pavlyuk. The trojan horse did not kill Mahmoud Al-Mabhoud. Cracked servers did not directly arrest those Iranian protestors. All of those actions (assassinations and arrests of political dissidents) have occurred, do occur, and will continue to occur without the aid of cyber attacks. The use of cyber attack tools and techniques in support of them in these cases does not make them nor the use of cyber tools and techniques “acts of war.”

Second, the debate between Thomas Rid and Jeffrey Carr is exemplary of an emerging debate that is less about the definition of “cyber war” and more about the definition of “war” in general. There is an emerging debate between expansionists and traditionalists. Expansionists argue that current definitions of “war,” either from the classic theorists like Clausewitz or the law of war, are inadequate and should be expanded to include a wide range of acts that traditionally would not be considered war. The traditionalists argue that existing definitions of war are more than adequate, that while the practice of war might change (including weapons and tactics) the fundamental nature of war does not: it is still about damage, destruction, injury, or death inflicted for political purposes, usually by state actors.

In this instance, Carr makes an expansionist argument when he claims that “traditional thinking about warfare has been made obsolete by our dependence upon cyber-space-time.” In a previous essay, he citedNATO study of the legal lessons learned as a result of the 2008 cyber attacks against the country of Georgia. That report concluded that the cyber attacks, by themselves, did not count as “armed attack” (the legal term for what we colloquially call an “act of war”) under current definitions in the law of war. In response, the authors proposed that “new approaches to traditional law of war principles need to be developed.” Therefore, they advocated that the advent of “new bloodless types of warfare” like cyber war mean that “the definition of ‘attack’ should not be strictly connected with established meanings of death, injury, damage and destruction” (p. 30). Because the cyber attack on Georgia (and practically all other cyber attacks to date) do not come close to meeting traditional definitions of war from law of war, theorists like Clausewitz, or even common understandings of the term, the response has been to call for the redefinition of war itself to include a whole host of “bloodless” acts.

Of course, Rid is taking a traditionalist approach in this debate. He is arguing that the fundamental nature of war has not changed and is using the work of a widely-cited, well-respected classic theorist to support his argument. Others, such as Maj. Gen. Charles Dunlap, Jr. (ret) have also taken the traditionalist position. Dunlap has argued convincingly that the law of war definitions of “armed attack” are more than adequate for evaluating cyber attacks. In doing so, he is following closely the analysis provided by Michael Schmitt more than a decade ago, which is the foundation for the “effects-based” approach to determining when a cyber attack rises to the level of armed attack, when it is war. In the traditionalist view, there are no “bloodless” acts of war. Violence, death, destruction, damage, injury are required. Even then, not every act of this sort is armed attack or war (see examples 1 and 3 above).

My own views are more in line with those of the traditionalists than the expansionists. I believe that it is dangerous (for many reasons that I will not elaborate here) to expand definitions of armed attack and war. I merely wish to call attention to the fact that the debate over the definition of cyber war is becoming a debate over the definition of war in general. This is an important distinction. The outcomes of this debate will have profound impacts on the future of politics, economics, security, and individual liberties.

Finally, because the outcomes of this debate will be so important, it is all the more disappointing that issues of cyber security are so often framed in such binary terms. For example, because Rid does not accept that all malicious cyber activity is “war,” Carr lumps him into the category of cyber war “skeptics.” He made a similar move with the authors of a recent OECD report that claimed that cyber attacks do not have the ability to cause systemic shocks that are global in scope. Nonetheless, in each case, Rid and the authors of the OECD report make it clear that they take cyber threats seriously. They merely seek to be more realistic in their assessments of the impacts of cyber attacks and more precise in their categorization of the varying types of malicious actions in/through cyberspace. To be fair, though Rid’s position is more nuanced than Carr admits in his response, Rid nonetheless invites Carr’s application of a binary, proponent/skeptic categorization because his essay largely framed cyber war as a yes/no question.

Effectively addressing the complex challenges of cyber security in a globalized world demand that the public debate about cyber security move beyond such framings. Are cyber attacks war? There needs to be room for answers like, “Maybe, it depends” and “No, but there are still serious challenges.” The truth will likely lie somewhere in the gray, muddled middle between yes and no, black and white. Engaging with the messy complexity of cybersecurity challenges is essential to ensuring that war remains a continuation of politics by other means instead of politics (and every other aspect of daily life) becoming a continuation of war by other means.

[Cross-posted from Forbes.com.]

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
Founded in 2000, Chetu Inc. is a global provider of customized software development solutions and IT staff augmentation services for software technology providers. By providing clients with unparalleled niche technology expertise and industry experience, Chetu has become the premiere long-term, back-end software development partner for start-ups, SMBs, and Fortune 500 companies. Chetu is headquartered in Plantation, Florida, with thirteen offices throughout the U.S. and abroad.
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
From 2013, NTT Communications has been providing cPaaS service, SkyWay. Its customer’s expectations for leveraging WebRTC technology are not only typical real-time communication use cases such as Web conference, remote education, but also IoT use cases such as remote camera monitoring, smart-glass, and robotic. Because of this, NTT Communications has numerous IoT business use-cases that its customers are developing on top of PaaS. WebRTC will lead IoT businesses to be more innovative and address...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
Michael Maximilien, better known as max or Dr. Max, is a computer scientist with IBM. At IBM Research Triangle Park, he was a principal engineer for the worldwide industry point-of-sale standard: JavaPOS. At IBM Research, some highlights include pioneering research on semantic Web services, mashups, and cloud computing, and platform-as-a-service. He joined the IBM Cloud Labs in 2014 and works closely with Pivotal Inc., to help make the Cloud Found the best PaaS.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
"Evatronix provides design services to companies that need to integrate the IoT technology in their products but they don't necessarily have the expertise, knowledge and design team to do so," explained Adam Morawiec, VP of Business Development at Evatronix, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Archi...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...