Lecture 13 & 14- Cyberwar Flashcards
War is…
War is
- intrinsically violent
- Instrumental
- Fought by states
War is “war is sustained combat, involving organized armed forces, resulting in a minimum 1,000 battle related fatalities in a 12-month period.”
Where does a states power depend on and where does a state compete over?
States are believed to fight over the sources of national power, that could be material or non-material.
- A states power depends on:
o Geography; if you have a favorable geographical location
o National resources
o Industrial capacity
o Military preparedness
o Population
o National character
o Morale
o Quality of diplomacy
- States compete over:
o Status/Standing/Prestige
o Territorial and sovereign claims
o Values and ideology
o Rules, norms, and international institutions
What are the Five dimensions of warfare?
Fifth dimension of warfare
1. Maritime
2. Land
3. Air
4. Space
5. Cyber
What are the Layers of Cyberspace?
Cyberspace is made up of different layers:
- Social layer
o 1. Persona
o 2. Cyber persona
- Logical layer
o 3. Logical layer
- Physical layer
o 4. Physical network
o 5. Geographic
What are examples of threat actors and threat vectors?
- Ex Threat actors are:
o Nation-states- both for conflict and for intelligence-gathering
o Business- corporate spying
o Organized Crime
o Terrorists
o Hacktivist
o Black-hat hackers - Ex Threat vectors are
o User error or negligence
o Supply chains-third party
o Wifi
o USB
o Insider
Is cyberconflict war?
With cyberspace we are moving away from the binary system of war and peace, towards a greyzone, where states are competing in cyberspace under the thresholds of war. This means that cyber operations among states almost always happen between the two ends of cooperation and conflict.
What is Cyberwar?
Cyberwar is war conducted in and from computers and the networks connecting them, waged by states or their proxies against other states.
What are the challenges of war in cyberspace?
- Cyberspace is a human construction, meaning its highly malleable and the underlying cyber infrastructure is always changing. But this also means that it can be manipulated, adapted and abused more easily.
- Cyberspace spans the physical and digital world.
- No international agreement on territoriality.
- Fairly low cost of entry, meaning there is a multitude of different actors (including criminals) operating in the the same environment.
- Attribution is challenging and time consuming, it is often difficult to determine where an attack came from.
- Cyberspace is interconnected.
What is the problem for fighting cyberwars?
- There is no safezone is cybersecurity
o Everywhere that you operate can be attacked.
o A vector for attack may even be outside of your control. - This also means there is no clear distinction between civilians and combatants.
In short, cyberspace is a domain of persistent threat where achieving security is an everyday challenge.
What is the Endemic Vulnerability of Cyberspace?
Cyberspace contains endemic vulnerability, meaning that vulnerability is inherent to cyberspace.
- Modern operating systems and applications are extremely complex programs.
o Certain flaws in the program, called exploits, can be used by hackers as entry points.
- Zero day attacks
o A zero day is a vulnerability in a piece of software that is unknown by software developers
- Delayed patching and updating
o Even when an exploit is known -patches need to be created and computers need to be updated. But, installing updates are often delayed allowing known exploits to be used successfully
What are the characteristics of offensive cyberspace operations?
Usually involve intrusion or unauthorized access.
Usually involve external control of the network over the internet.
Can be combined with a range of other techniques (including social engineering, human sources) to gain access.
At the beginning of cybersecurity vulnerability was seen as present in every system, ready to be exploited by adversaries.
- This is still kind of true. The number of potential entry points is simply too high to be completely impervious.
However, there are exaggerations in the threat perception of cyberwar. Research shows that the threat has been overstated. Part of this is that there are commercial and institutional incentives to hype the threat up, as organizations can then offer solutions that they profit from
Most of cyber incidents to date do not result in physical damage or loss of life.
What is the relation of military law to cyberspace?
- Use of Force
a. Refers to conventional military means and is an infringement of sovereignty. Prohibition on the use of force: UN Charter Article 2(4). - States have a right to self-defense (a responsice use of force) only if subject to an ‘armed attack’ or helping another state (’collective self-defense’) - UN Charter Article 51.
a. But do cyber operations ever reach the threshold of use of force or armed attack? - An ‘ armed attack’ is more severe than a use of force. So an unlawful use of force, short of an armed attack, would not allow self-defense.
- An armed attack must have certain ‘ scale and effects’, which are unclear.
What is the Tallinn Manual 2.0
offers the criteria for determining whether a certain cyber event constitutes a use of force
1. Severity
a. How many people were killed? How large an area was attacked? How much damage was done within this area?
2. Immediacy
a. How soon were the effects of the cyber operation felt? How quickly did its effects abate?
3. Directness
a. Was the action the proximate cause of the effects? Were there contributing causes giving rise to those effects?
4. Invasiveness
a. Did the action involve penetrating a cyber network intended to be secure? Was the locus of the action within the target country?
5. Measurability
a. How can the effects of the action be quantified? Are the effects of the action distinct from the results of parallel or competing actions? How certain is the calculation of the effects?
6. Military character
a. Did the military conduct the cyber operation? Were the armed forces the target of the cyber operation?
7. State involvement
a. Is the State directly or indirectly involved in the act in question? But for the acting State’s sake, would the action have occurred?
8. Presumptive legality
a. Has this category of action been generally characterized as a use of force, or characterized as one that is not? Are the means qualitatively similar to others presumed legitimate under international law?
What are the difficulties of responding to cyber incidents as a state?
- Cyberspace is a complex adaptive system
a. This makes it difficult to attribute attacks and responding can cause collateral damage, unintented effects, and ‘blowback’ - Diversity of relevant actors
a. Difficult to attribute attacks. - Ease of capability proliferation
a. This makes it difficult to attribute attacks and responding can cause collateral damage, unintented effects, and ‘blowback’.
What are examples of intent of attackers (cyberwar)?
- Public Attribution
a. Establishing the identity of the initiator
b. Technical attribution
c. Political attribution - Economic Sanctions
a. Asset freezes and barring business transactions.
b. Debated purpose and effectiveness - Legal Indictment
a. Formal charging of a crime
b. Use of domestic criminal law
c. Providing evidence that would stand up in court - Cyber Response
a. Respond using cyber means
b. Effective signaling?
c. Potential for escalation?