Cyber Warfare: Technology backfires on the powerful.

Cyber warfare is fast becoming the most progressive military technology since the Second World War. This rapid progression raises the question of identifying which global actors benefit most from a new found cyber capability. The acquisition of offensive cyber warfare capability by apparently weaker states for use against states with stronger kinetic warfare capability gives a strategic advantage, enabling them to change the balance of power. 

Offensive cyber warfare capability is a strategic balancing factor that will be used by the rising state powers against each other and against more established powers.  The attraction of cyber warfare for the weaker state is its low cost of development & deployment and its low visibility during development & mobilization as a weapon. Plus the fact that stronger states are more highly dependent on their critical cyber infrastructure than weaker ones.

From a government, intelligence agency and a border police perspective the strategy required to deal with cyber has some historic similarities to the way in which piracy was used by nations, particularly parts of nations or groups/tribes that could attack international trade routes. This issue was eventually internationally contained and gradually significantly reduced but of course piracy still operates in many places around the globe. The global oceans and seas and the international shipping routes, trade and naval activities, which can be seen as similar to an earlier version of the Internet, have gone through so much damage, theft, destruction and life loss via piracy and privateering.

The reduction of piracy took centuries to achieve, finally significant aspects of it were outlawed by the Peace of Westphalia and put into international treaties by the Declaration of Paris in 1856. Cyber security needs a similar, but much faster, globally inter-related process to be agreed and established.

Understanding the effectiveness of the strategic culture and use of cyber warfare techniques will have consequences on national security doctrine for many countries. For the United States, one of the most wired states in the world, there is a large potential vulnerability against cyber-attacks. Globalization, fueled by technological advancement and expansion of cyber space, is a manifestation of new means through which power is exercised and distributed.

By the same token, such power comes with a vulnerability that states such as North Korea and China are trying to separate themselves from by isolating their critical infrastructure from the Internet.

It seems Cyber Warfare is a special case, where the more you have invested in your capabilities in cyberspace the  more vulnerable you become. It takes less economic, human and geo-political resources to develop cyber-attack capability than nuclear capability. This becomes a fundamental assumption in comparing nuclear capability and cyber war potential. The case that nuclear capability is the absolute form of military power that provides security for proliferated states may no longer hold.

Cyber warfare capability is a disruptive new phenomenon in strategic studies and will require an entirely new analysis of the technical and political elements to determine a new balance of power.

http://securityaffairs.co/wordpress/33448/cyber-warfare-2/cyber-warfare-balance-of-power.html

« US Cyber Intelligence Agency – Will it work?
Deep Dive: A Guide to the Deep-Web for Law Enforcement »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DNV

DNV

DNV are the independent expert in assurance and risk management. We deliver world-renowned testing, certification and technical advisory services.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Cyber Discovery

Cyber Discovery

Cyber Discovery, the UK Government's Cyber Schools Programme, is a learning programme designed to give young people the opportunity to learn the skills needed to enter the cyber security profession.

Maximus Consulting (MX)

Maximus Consulting (MX)

Maximus designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

General Informatics

General Informatics

General Informatics is a team of technology enthusiasts with one mission: to make our clients even more successful through the best use of technology.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Intellinexus

Intellinexus

Intellinexus turns data into actionable insights to revolutionise decision-making in your business.

RedArx Cyber Group

RedArx Cyber Group

At RedArx Cyber Group, our vision is to empower businesses with cutting-edge, proactive security solutions that safeguard their digital landscapes.