The Limits Of Cyber Warfare

Future wars might be waged online, but evidence from recent fighting between Russia and Ukraine suggests it won't be that simple.

Russian-backed troops had the greatest capability for shutting down Ukraine's electronic systems, but neither side has done much cyber fighting, according to a report compiled by NATO researchers in Estonia.

Calculations about military strategy come down to costs and rewards, said Martin Libicki, a cyber security expert at Rand Corp. He is a chapter contributor to the report, “Cyber War in Perspective: Russian Aggression Against Ukraine.”

“Maybe this cyber stuff isn't all it's cracked up to be,” Libicki told the Trib. “It might be that it's more difficult and that there's less reward from carrying out a cyber-attack than we ever assumed.”

Many reasons exist for the lack of online conflict between Russia and Ukraine, experts said, and the incident provides some direction for American military leaders. The United States still must prepare for a complete wartime shutdown of systems for energy, communications, utilities and more — but it also should plan for more nuanced incidents.

“Modern war is a messy affair, not a clean and glittery Hollywood movie,” Sven Sakkov, director of the NATO Cooperative Cyber Defense Center of Excellence, wrote in the report's introduction. “The emergence of cyber as a separate domain of war-fighting does not necessarily offer magic solutions and miraculous short-cuts to achieve strategic goals.”

Cyber presents some unique advantages, but it's just one weapon in a military's arsenal, said Jim Lewis, director of the Strategic Technologies Program at the Center for Strategic & International Studies, a Washington think tank.

“People sit back and calculate, ‘What's the benefit to me of doing this?' said Lewis, who contributed a chapter. “The Russians also didn't do aerial bombardment or shoot cruise missiles. Cyber is another weapon, and they chose not to use it.”

NATO created a cyber defense centre of excellence in Estonia after 2007 cyber-attacks that overwhelmed banking and communications systems there. The attacks, which some have attributed to Russian hackers, caused widespread panic but no real damage.

The fallout drove Estonia closer to NATO and provided little military advantage, Libicki said. It's possible that Russia learned from that experience and did not want to repeat it in Ukraine, he said.

It's also possible that Russia feared crossing some undefined line that would have provoked the United States to retaliate, he said, or Russia did not want to appear to be more involved in the conflict than it was. In addition, Russia had much to gain from leaving the systems intact, the NATO report says. Russia likely uses the networks for spreading propaganda and collecting espionage.

TribLive:   

NATO Tools Up For Cybewar:               Cyberwar: The Smart Person's Guide:

 

 

« WikiLeaks Wants A Database To Verify Twitter Users
One Insurer Plans To Replace Humans With AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

National Trading Standards eCrime Team (NTSeCT)

National Trading Standards eCrime Team (NTSeCT)

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

Professional Information Security Association (PISA)

Professional Information Security Association (PISA)

PISA is an independent and not-for-profit organization for information security professionals, with the primary objective of promoting information security awareness and best practice.

CloudPassage

CloudPassage

CloudPassage, a cloud security and compliance pioneer, safeguards cloud infrastructure for the world’s best-recognized brands.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

Inspirria Cloudtech

Inspirria Cloudtech

Inspirria Cloudtech is a specialized Cloud Technologies Services provider and Cloud Aggregator focused on executing cloud models for clients.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Crayon

Crayon

Crayon is a customer-centric innovation and IT services company. We provide guidance on the best solutions for our clients’ business needs and budget with software, cloud, AI and big data.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

HTL Support

HTL Support

HTL Support, your trusted partner for comprehensive IT support in London. We specialize in delivering top-tier IT solutions tailored to both large enterprises and small businesses.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.