You are on page 1of 15

Article

Cyberwar: Clausewitzian Encounters

Marco Cepik, Diego Rafael Canabarro, and Thiago Borne Ferreira


As Clausewitz’s masterpiece suggests, language matters for how states conceptualize and plan for war.
‘Cyberwar’, now on the lips of nearly every national security policymaker, may turn out to be a
misnomer.

The Digital Era and the spread of cyberspace as an integral part of the political and
contemporary information and communication strategic realms, not as a completely separated
technologies (ICT) bring about different domain. Second, it aims at the importance of
challenges for national and international security careful evaluate propositions about the
policymaking, heating up academic and political securitization of cyberspace.
debate over the scope and the implications of an
upcoming cyberwar.1 This article evaluates three WHAT IS CYBERWAR?
well-known assertions related to this highly The book chapter entitled Cyberwar is
controversial issue. The first section defines the coming! by John Arquilla and David Ronfeldt
concept of cyberwar according to its original (1997) is directly responsible for the formal
employment. The second section presents each incorporation of cyber to the lexicon of Security
controversial assertion synthesized from and Strategic Studies. According to the authors, “a
qualitative content analysis of selected academic case [existed] for using the prefix [from the Greek
publications, landmark documents, and news root kybernan, meaning to steer or govern, and a
accounts. The three of them are, respectively: (a) related word kybernetes, meaning pilot, governor,
cyberspace is a new operational domain for war; or helmsman] in that it bridges the fields of
(b) cyber warfare can be as severe as conventional information and governance better than does any
warfare; and (c) cyber warfare can be waged both other available prefix or term,” such as, for
by state and non-state actors. In the third section instance, information warfare (Arquilla; Ronfeldt,
we evaluate them collectively through theoretical 1997:57).
and empirical lenses. The final section
consolidates findings, indicating paths for further Information warfare should be treated as a
inquiry and policy caveats. subfield of larger information operations, which
“comprise actions taken to affect adversary
This text deliberately evokes an idea employed in information and information systems while
the past by other accounts of the phenomenon defending one’s own information and information
(Tennant, 2009; Morozov, 2009; Greenemeier, systems.” Information warfare is a more
2011; Valeriano; Maness, 2012). The reference restrictive concept: it refers “to those information
has two justifications. First, it seeks to reconnect operations conducted during times of crisis or
the concept of cyber warfare to its Clausewitzian conflict intended to affect specific results against
roots, highlighting the ambiguous role of a particular opponent” (Schmitt, 1999:07).
information in war and the need to treat
The broad concept of information operations
1
Marco Cepik is Associate Professor, Federal includes electronic warfare (EW), psychological
University of Rio Grande do Sul (UFRGS); Diego operations (PSYOPS), computer network
Rafael Canabarro, Ph.D., is Special Advisor to the operations (CNO), military deception, and
Brazilian Internet Steering Committee (CGI.br); operations security (Zimet; Barry, 2009:291).
Thiago Borne Ferreira, is a Ph.D. candidate in Because of the ambiguous role of information in
International Strategic Studies, Federal University of
war (Clausewitz, 2007, Book I, Chapter VI),
Rio Grande do Sul (UFRGS).
“information operations have been recognized as a
Cepik, Canabarro, Ferreira / Cyber War 20

distinct form of warfare meeting its own separate also introduced the broad concept of netwar: a sort
doctrine, policy, and tactics,” (Schmitt, 1999:32)2. of non-military information-related
multidimensional conflict, that could be waged by
Therefore the use of the prefix “cyber” in this state and non-state actors with a wide range of
context was intended to comprise both the role of available tools (public diplomacy, propaganda,
digital computers and computerized networks interference with local media, the control of
from a technological perspective as well as the computer networks and databases, etc.), with the
organizational and institutional consequences of purpose of “trying to disrupt, damage, or modify
their application on information gathering, what a target population knows or thinks it knows
processing and sharing. The authors allegedly about itself and the world around it” (Arquilla;
tried to catch-up with “some visionaries and Ronfeldt, 1997:28). According to Arquilla and
technologists who [were] seeking new concepts Ronfeldt’s framework, despite being non-military
related to the information revolution” (Arquilla; in essence, netwar campaigns may deal with
Ronfeldt, 1997:59). military issues such as nuclear weapons, terrorism,
etc. Netwars may also escalate to the level of
Basically, we agree with a conceptual definition cyberwars when they affect military targets.
of cyberwar that refers to the control of Moreover, they can be employed in parallel to
information-related factors in the preparation and both conventional and cyber war.
waging of war. Cyberwar is conducted through
the development and deployment of different More than twenty years later, cyber has become
technologies (increasingly robotic and digital in increasingly identified with the pervasiveness of
nature), as well as through the implementation of cyberspace: “an operational domain whose
changes in military organization and doctrine. In distinctive and unique character is framed by the
this sense, “cyberwar is about organization as use of electronics and the electromagnetic
much as [it is about] technology” in order to “turn spectrum to create, store, modify, exchange and
knowledge into capability” (Arquilla; Ronfeldt, exploit information via interconnected
1997:30). The same is valid today, with proper information-communication technology (ICT)
qualifications and caveats. based systems and their associated infrastructures”
(Kuehl, 2009:28)4.
Highlighting the societal implications of the
information revolution3, Arquilla and Ronfeldt In the military, information and intelligence
operations, routine administrative functions, and a
2
Schmitt affirms that the terms information and wide array of everyday jobs have been
information systems “shall be understood very increasingly developed and transformed with the
expansively [...] The United States military defines support of interconnected electro-electronic
information as ‘facts, data, or instructions in any devices (Zimet; Barry, 2009; Libicki, 2012; Rid,
medium or form' and an information system as the 2012a). The same applies to the civilian sector
'entire infrastructure, organization, personnel, and (Blumenthal; Clark, 2009; Kurbalija; Gelbstein,
components that collect, process, store, transmit,
display, disseminate, and act on information” (Schmitt,
1999:07). military phenomena as “war” can also lead to
3
The whole field of Digital Era studies was influenced unjustified events of securitization (Hansen;
by The Rise of the Network Society (1996), where Nissenbaum, 2009).
4
Manuel Castells first recognized that the "ability to use It is interesting to note that cyberspace was not a
advanced information and communication technologies defining character of cyberwars to Arquilla and
[…] requires an entire reorganization of society” to Ronfeldt. According to them cyberspace is “another
cope with the decentralized character of networks that new term that some visionaries and practitioners have
give shape to societies in an information age (Castells, begun using” to refer “to the new realm of electronic
1999:03). Both cyberwars and netwars are founded knowledge, information, and communications – parts
upon the premise that ICTs entail networked forms of of which exist in the hardware and software at specific
organization: the first category referring specifically to sites, other parts in the transmissions flowing through
the military sector; the latter to the civilian sector at cables or through air and space” (Arquilla; Ronfeldt,
large. Nonetheless, the labeling of inherently non- 1997:59).
21 Space & Defense

2005). In the last two decades cyberspace has of “cyber” as something identified with the
been greatly enlarged mainly as a result of the technical and tactical exploitation of cyberspace.
steady growth and spread of the Internet and As a detailed survey of the database compiled by
interrelated technologies (Joint Chiefs of Staff, Harvard’s Berkman Center for Internet and
2013:v). Currently, the Internet is the main entry Society (The Berkman Cybesecurity Wiki) reveals,
door for cyberspace, mainly because the the bulk of intellectual background for policy and
convergence of “all modes of communication – legal development has been mainly produced by
voice, data, video, etc. – on the Internet platform” security related governmental agencies and IT
(Mueller, 2010:129) has gradually blurred the corporations. Of course, we have no feud against
lines between cyberspace and the Internet. government or the private sector getting involved
in public debates about cyber warfare. Our point
In this sense, the first decades of the 21st Century here is to stress the need to take a broader,
are defined by the growing importance of the theoretically oriented, political and societal
technological and organizational aspects of perspective when trying to assess the meaning of
cyberspace politics. Consequently, cyber-related cyberspace for national and international security
issues increasingly permeate the agenda of policymaking.
national and international security (Weimann,
2004; O’Harrow, 2005; Nissenbaum, 2005; More specifically, critical debate on basic
Eriksson; Giacomello, 2007; Kramer; Starr, 2009). concepts is crucial to avoid analogies without real
As examples, one could just mention the public theoretical or empirical grounds (Libicki, 2012).
debate around increasing reliance of criminal and Therefore, it is a good sign that scholars recently
terrorist organizations on Internet-based began advancing more rigorous and consistent
applications (e.g. the Web, electronic mail, chat analyses of publicly known cyber events (Rid,
servers, social networks); the major assaults on 2013; Deibert, 2013; Gray, 2013; Demchak, 2012).
Estonia (2007) and Georgia (2008) carried Their works question taken-for-granted normative
through Internet-based technologies and propositions on cyberwar. At the same time, they
applications; the spread of malicious computer delve into the severity and the sophistication of
codes with unprecedented characteristics and contemporary cyber operations of all sorts.
outcomes, such as Stuxnet, Flame, and Gauss
(2012); some alleged State-sponsored violations THREE CONTROVERSIAL CLAIMS
of sensitive political and economic databases, as ABOUT CYBERWAR
well as public social networks profiles, such as the In order to contribute to a more balanced
attacks reported by CitizenLab to computers account of cyberwar, the following paragraphs
associated with Dalai Lama (2008), the stealing of summarize three common assertions related to the
Sony movies and classified documents (2014), phenomenon. These three were selected from
and the US Cyber Command Twitter account academic publications, landmark documents and
breach (2015); the Snowden affairs (2014), which news accounts covering the years 2012 and 2013.5
publicized documented details of mass-
surveillance programs developed mainly by the 5
The main sources were: (1) the digital database of the
US National Security Agency; and the actions of Center for International Studies on Government
civil society organizations such as Wikileaks and (CEGOV), compiled mainly through the CAPES
Openleaks, as well as hacktivists groups that Foundation Portal, as well as the physical libraries at
employ Internet applications as means for political UFRGS; (2) the physical and digital inventories of the
activism, such as Anonymous and Lulzsec. University of Massachusetts, Amherst; and (3) the
Cybersecurity Wiki maintained by the Berkman Center
Because of the need for promptly tackling these for Internet and Society of Harvard Law School, which
different perceived threats from a practical consists of “a set of evolving resources on
perspective, the theoretical notion of “cyber” as cybersecurity, broadly defined, and includes an
annotated list of relevant articles and literature”. It is
something related to the complex interactions available at:
between technology and networked governance http://cyber.law.harvard.edu/cybersecurity/Main_Page
has become subordinated to a narrow conception (accessed August 18, 2014).
Cepik, Canabarro, Ferreira / Cyber War 22

Our goal in debating them is not to dismiss them Libya’s air defences but not destroyed them. For
or prove them entirely false, but to call for a that job, conventional weapons were faster, and
better-established scope of validity. After more potent. Had the debate gone forward, there
presenting each of them separately in this section, also would have been the question of collateral
we shall discuss them collectively in the next damage. Damaging air defence systems might
section. have, for example, required interrupting power
sources, raising the prospect of the cyber weapon
“Cyberspace is a new operational domain for accidentally infecting other systems reliant on
war” electricity, such as those in hospitals” (Nakashima,
Referring to cyber-related incidents as 2011).
warfare in the fifth domain has become a standard
expression over the last ten years. “Cyberspace is One year later the same newspaper stated that
a new theater of operations,” says the 2005 US “over the past decade, instances have been
National Defense Strategy. “As a doctrinal matter, reported in which cyber tools were contemplated
the Pentagon has formally recognized cyberspace but not used because of concern they would result
as a new domain of warfare […] just as critical to in collateral damage […] There is the danger of
military operations as land, sea, air, and space,” collateral damage to civilian systems, such as
wrote the former US Deputy Secretary of Defense disrupting a power supply to a hospital”
William Lynn (2010) in Foreign Affairs. “Warfare (Washington Post, 2012).
has entered the fifth domain: cyberspace,” alerted
The Economist in the same year (The Economist, The already mentioned Argentinean DEF
2010). Indeed, comparable claims have been Magazine also suggested in 2012 that “a new sort
widely spread in the past years, and the idea has of conflict is dominating the world stage:
reached politicians, intellectuals, the military, and cyberwar. It doesn’t matter the size and the
the media all around the globe. available resources of the opponents. With an
adequate IT capacity, the aftermath can be lethal
In 2012, the popular Argentinean DEF Magazine and irreparable” (Noro, 2012).
defined cyberspace as “a new battlefield” (Lucas,
2012). The idea was reaffirmed by an Argentinean “Cyber warfare can be waged both by state and
official in the same year: “electronic warfare non-state actors”
relates to more traditional domains of conflict: The 2003 US National Strategy to Secure
land, sea, and air. Cyberwar is undertaken in a Cyberspace alerts: “because of the increasing
new domain of hostility among nation-states” sophistication of computer attack tools, an
(Uzal, 2012). increasing number of actors are capable of
launching nationally significant assaults against
“Cyber warfare can be as severe as conventional our infrastructures and cyberspace.” This notion is
warfare” further developed by the 2012 DoD Priorities for
According to the 2010 Brazilian Green 21st Century Defense: “both state and non-state
Book on Information Security, “natural threats actors possess the capability and intent to conduct
(posed by forces of nature) or intentional ones cyber espionage and, potentially, cyber attacks on
(sabotage, crime, terrorism, and war) acquire a the United States, with possible severe effects on
greater dimension when the use of cyberspace is both our military operations and our homeland”.
involved”. During the III International Seminar on
Cyber Defense held in Brasilia in 2012, the Harvard Law School Professor, Jack Goldsmith,
Brazilian Minister of Defense reaffirmed the idea, summarizes these perceptions as follows:
urging Brazil and other countries to get ready to
face a new cyber-related threat capable of “Taken together, these factors – our
bringing harmful consequences to society at large. intimate and growing reliance on
computer systems, the inherent
In 2011 the Washington Post reported: “a cyber vulnerability of these systems, the
attack against Libya […] could have disrupted network’s global nature and capacity for
23 Space & Defense

near instant communication (and thus beyond the scope of this article. However, in order
attack), the territorial limits on police to better define their scope of validity and the
power, the very high threshold for risks involved in accepting them as unqualified
military action abroad, the anonymity that truth, we shall evaluate them collectively from the
the Internet confers on bad actors, and the standpoint of a scientific research program such as
difficulty anonymity poses for any Clausewitz's theory of war.
response to a cyber attack or cyber
exploitation – make it much easier than TOWARDS A CLAUSEWIZIAN CONCEPT
ever for people outside one country to OF CYBERWAR
commit very bad acts against computer We shall depart from Betz’s perception
systems and all that they support inside that cyberwar is a “portmanteau of two concepts”:
another country. On the Internet, states “cyberspace and war, which are themselves
and their agents, criminals and criminal undefined and equivocal; it takes one complex
organizations, hackers and terrorists are non-linear system and layers it on another
empowered to impose significant harm on complex non-linear system […] As a result, it
computers anywhere in the world with a does not clarify understanding of the state of war
very low probability of detection” today; it muddies waters that were not very
(Goldsmith, 2010). transparent to start with” (2012:692). Hence we
need to clearly define each concept before
On the other hand, Dorothy Denning, Professor at integrating them, starting with cyberspace.
the Naval Postgraduate School, is more doubtful.
She contends that: Allow us to recall Kuehl’s (2009) definition
presented in the first section: cyberspace is
“There are several factors that contribute “framed by the use of electronics and the
to a sense that the barriers to entry for electromagnetic spectrum.” It is employed “to
cyber operations are lower than for other create, store, modify, exchange and exploit
domains. These include remote execution, information via interconnected information-
cheap and available weapons, easy-to-use communication technology (ICT) based systems
weapons, low infrastructure costs, low and their associated infrastructures.” Despite
risk to personnel, and perceived one’s natural impetus to interpret interconnected
harmlessness. [...] Cyber weapons are ICTs as synonymous with Internet, cyberspace is
cheap and plentiful. Indeed, many are free, a much more complex environment composed by
and most can be downloaded from the many different systems. “At the very least yours,
Web. Some cost money, but even then the theirs, and everyone else’s”, says Libicki
price is likely to be well under (2012:326).
US$ 100,000. By comparison, many
kinetic weapons, for example, fighter jets, Considering hypothetical actors A and B, this idea
aircraft carriers, and submarines, can run can be represented in graphical terms, as in
into the millions or even billions of Figure 1.
dollars. Again, however, there are
exceptions. Custom-built software can Both actors own closed (air-gapped) information
cost millions of dollars and take years to systems (represented on circles A.1 and B.1); they
develop, while kinetic weapons such as also own systems (circles A.2 and B.2) that more
matches, knives, and spray paint are or less overlap with global open communications
cheap and readily available” (Denning, backbones (GOBC) such as telecom lines, the
2009). radio spectrum, the Internet, etc. (represented on
circle GOBC.3). Naturally, A and B can also have
As core propositions in the current debate overlapping systems between themselves and/or
regarding cyberwar, the three claims just between each one and other actors (circles A.3,
presented cannot either be accepted or dismissed B.3, and C.3). These systems can also be more or
without strong empirical and logical tests, both
Cepik, Canabarro, Ferreira / Cyber War 24

less connected to global open communications when war reaches cyberspace. As Martin Libicki
backbones (in this case, directly through B.3). said regarding his conceptual framework for
offensive and defensive cyber capabilities:
All of these systems – mounted over a variable set
of infrastructure, logical, and application layers – “The more these tasks require correct
can be some way or another interconnected. The working of the systems, the greater the
interconnection can be permanent and potential for disruption or corruption that
synchronous (such as in the case of Internet-based can be wreaked by others. Similarly, the
connections), as well as intermittent and more widely connected the information
asynchronous (such as in the case of software systems, the larger the population of those
updating or in the use of a flash drive to exchange who can access such systems to wreak
information between computers). Even when there such havoc. Conversely, the tighter the
are no digital bridges that allow access to a control of information going into or
specific system, the isolation “can be defeated by leaving information systems, the lower
those willing to penetrate physical security the risk from the threat” (Libicki,
perimeters or by the insertion of rogue 2012:323).
components. But efforts to penetrate air-gapped
systems are costly and do not scale well” (Libicki, Following this idea, offensive actions in
2012:326). cyberspace aim at exploiting systems’ flaws and
vulnerabilities to “interfere with the ability of
As stated before, society relies on the correct their victims to carry out military or other tasks,
performance of information systems for a myriad such as production” (Libicki, 2012:323). It is in
of more or less vital purposes. As man-made essence a matter of reconnaissance, exploration,
creations, information systems, and consequently and exploitation of an opponent’s entire
cyberspace, have inherent flaws and infrastructure, organization, personnel, and
vulnerabilities (Stamp, 2011; Kim; Solomon, components that collect, process, store, transmit,
2010). Thus, the more one relies on them, the display, disseminate, and act on information.
more it is potentially threatened by the eventual
exploitation of the systems’ vulnerabilities. Defense, on the other hand, involves a complex
set of preventive and reactive actions in order to
Nonetheless, we agree with Martin Libicki (2012) secure the systems (Clark; Levin, 2009). They
in highlighting that cyberspace is not a domain comprise engineering and organizational decisions
that can be isolated from others exactly due its related to the situational environment, the set of
pervasiveness to all human activities. In this sense, technologies employed, and the degree of
cyberspace can be treated as a separated connectivity (to other systems) and openness (to a
warfighting domain only for logistical and range of users) of a specific system. They also
command and control purposes, and even this involve the permanent monitoring of the
trend could be argued against. However, it is more information flowing through the system, and its
important to accurately communicate to the armed operation and functioning according to given
forces and the citizens that physical and logical parameters.
realities of cyberspace are much harder to separate
from land, water, air, and outer space than each of To be effective, the exploration/infiltration phase
these other four domains can be separated from of a given attack has to be supplemented by the
each other. Moreover, the whole concept of development of other code-based tools for
jointness depends, to become reality, on disrupting the infiltrated system. However, the
acknowledging the pervasiveness of cyberspace. window of opportunity for infiltration and
disruption is generally very narrow after
Since it is not correct to fully equate Internet with vulnerability is discovered. Once an attack is
cyberspace, or treat cyberspace as something that detected, the target system can be adapted to
can be isolated from the whole contemporary tackle the threat. The number of different
social fabric, there are operational implications information systems and their potential lack of
25 Space & Defense

structural uniformity (shown in Figure 1) mean


that the strategic preponderance of defense over When it comes to offense, the development of
offense is not easily overturned. In other words, general-purpose capabilities also needs to be
there are so many engineering options available balanced against the political and economic costs
for information systems’ designers that the of exploiting (physically and digitally) the bulk of
development of cyber offense capabilities might other actors’ systems, as highlighted by the
be way too expensive and ineffective to be Snowden affair and the following diplomatic
translated into a strategic advantage. chorus of disapproval. This is not to say that
cyberspace is not relevant for security and defense
In this sense, most offensive cyber actions are policymaking. On the contrary, it is a way to mind
hard to repeat in patterned operational fashion: the fact that a large amount of resources might
“once the target understands what has happened to have been applied to suboptimal alternatives for
its system in the wake of an attack, the target can ensuring national security – due to the hubris
often understand how its system was penetrated involved in treating as a self-contained operational
and close the hole that let the attack happen” domain something as ubiquitous and pervasive as
(Libicki, 2012:323). Furthermore, as sensitive ICT cyberspace. That trend might be even more severe
systems generally entail great amounts of during times of economic or political distress, and
customization, the development of ready-made, might have negative outcomes if great powers
mass-produced cyber weapons might be useful develop a preemptive approach towards each
only for a few publicly open interoperable other and third countries.
systems. The development of custom cyber
weapons not only demands great amounts of Regarding the second claim, that cyberwar can be
resources (intelligence, funding, working-hours, as severe as conventional warfare; we first need to
etc.), but also means that the more customized the define the concept of war. According to
cyber weapon, the narrower its scope of Clausewitz, (1) war is never an isolated act, (2)
application (Rid, 2013). war does not consist of a single blow, and (3) in
war the result is never final (Clausewitz, 2007:17-
On the other hand, one might still affirm that the 19). Furthermore, as Clausewitz (2007:13) also
greater the Internet reliance, the greater the reminds us, “war is […] an act of force to compel
homogeneity of IT solutions and the greater the our enemy to do our will”. The ultimate
risks inherent to interconnectivity. Despite the consequence of this prerogative is that war is
suggestion that interconnectivity can lead to necessarily violent. Potential or actual use of force,
systemic hazardous events, vital information in Clausewitz’s thinking, is the fundamental
systems tend to be – and are increasingly aspect of all war. Actually, violence plays a
becoming – more and more redundant and central role in his 'wondrous trinity' (wunderliche
resilient (Sommer; Brown, 2011). Dreifaltigkeit), which is made up of reason,
natural force, and chance. The unifying concept of
Actually, there is no such thing as a static war in Clausewitz encompasses singular motives
cyberspace, neither in physical (infrastructure) nor and dynamics that yet form an indivisible whole
in virtual (code) terms. To borrow a Clausewitzian (Echevarria, 2007:69-70).
term, cyberspace is a chameleon: its mutations
depend on the decisions taken by individual From a material point of view, every act of war is
information systems’ owners. Therefore, calling always instrumental to its ends. There has to be a
cyberspace an operational domain without proper means – physical violence or the threat of force –
qualification entails the risk of overshadowing the and there has to be an end – to impose one’s will
inherent malleability of its components and on the enemy. To achieve the end of war “the
consequently stresses the need of deploying opponent has to be brought into a position, against
permanent and vigilant tools for “perimeter” his will, where any change of that position
monitoring instead of making safety and security brought about by the continued use of arms would
engineering/governance a priority when it comes bring only more disadvantages for him, at least in
to defense. that opponent’s view” (Rid, 2012a:08). In this
Cepik, Canabarro, Ferreira / Cyber War 26

sense, actual violence in actual wars does not psychological risk inherent to the consequences of
easily escalate towards the logically possible having governmental and banking web servers
extreme because of its instrumental and shutdown; personal and financial data stolen from
interactive nature. cloud computing providers; SCADA systems
unexpectedly operating anomalously without
Denial of service attacks such as those perpetrated proper technical explanation as they did in the
by groups like Anonymous to take down or deface Stuxnet event; things from satellites to webcams
websites tend to be easily remedied or and computer speakers turning on and off
counteracted by the victims. And the bulk of randomly and without direct user control, etc.
scams that have been happening in the last years
through ICT systems do not aim at exercising As Thomas Rid recognizes: “Cyber attacks, both
political power over an enemy, but only to exploit non-violent as well as violent ones, have a
information for illegal commercial purposes. significant utility in undermining social trust in
Intelligence related operations through cyberspace established institutions, be they governments,
are obviously related to power struggles, but they companies, or broader social norms. Cyber attacks
are not warfare. In short, no testified cyber attack are more precise than more conventional political
has ever caused a single casualty, injured a person, violence: they do not necessarily undermine the
or severely damaged physical infrastructure. state’s monopoly of force in a wholesale fashion.
Taking this very characteristic alone before Instead they can be tailored to specific companies
analyzing Clausewitz’s prerogatives further, it or public sector or organizations and used to
seems exaggerated (or at least precipitate) to treat undermine their authority selectively” (Rid,
code-triggered consequences as equal to kinetic 2013:26).
violence. “Violence in cyberspace is always
indirect”, says Rid (2012b). The reiteration and persistence of non-violent
cyber attacks (in isolation or in combination with
It means that ICT systems first have to be other offensive activities short of war), coupled
weaponized in order to produce physical and with the ever going preparation for responding to
functional damage to people, infrastructure, and and retaliating cyber attacks in different political
organizations. One could arguably say that code playing fields could escalate tensions up to the
weaponizing is exactly what is happening right point of full-blown violent conflict. This
now in the realm of international security; possibility, as logical as it may be, has to be
physical harm would be only a matter of time or reconciled with some empirical corroboration
disclosure about what is going on. Maybe, but before any government or armed force start to
empirical public evidence so far does not treat cyber incidents as equivalent of using kinetic
corroborate the second claim.6 or direct-energy weapons.

Besides, it is hard to sustain at this point that any Finally, there is the risk of treating “the cyber” as
cyber attack reported so far has irrefutably forced another technological tool that would easily give
the target to accept the offender’s will. the offensive a brutal advantage in war.
Nonetheless, that might not be the case if one “Technology has always driven war, and been
considers the potential massive social- driven by it [...] and yet the quest for
technological superiority is eternal”, explains Van
6
To be fair, Thomas C. Reed’s memoir book At the Creveld (2007). For instance, in the 1930s and
Abyss (2005) describes how an American covert 1940s, air force superiority was thought to be the
operation allegedly used malicious software to cause an decisive feature for winning a war. In the 1990s,
explosion in Russia’s Urengoy–Surgut–Chelyabinsk air force superiority was coupled with
pipeline back in 1982. The incident might have caused microelectronics in the development of precision-
casualties, even though there are no media reports, guided ammo, which would avoid the excessive
official documents, or similar accounts to confirm
Reed’s allegation. Also, it is not settled whether the
loss of money and lives in war. The development
Stuxnet attack caused destruction to the Iranian nuclear of unmanned aerial vehicles (UAVs) follows that
centrifuges, or if it only rendered them inoperative. trend. “The problem is that when [people] talk of
27 Space & Defense

‘stand-alone’ cyberwars they are arguing a theory individual American politicians, like Gov. Sarah
of a new form of war in which decisive results are Palin or Sen. Joseph Lieberman. That operation
achieved without triggering the thorny problem of escalated to “Operation Avenge Assange” and
escalation” – says Betz (2012:696). started targeting the different companies and
governments involved in the financial siege
Against the idea of a “cyber silver bullet” stands imposed on Wikileaks and the criminal
Clausewitz’s third fundamental element of war: its prosecution unleashed against Julian Assange.
political and interactive nature. According to him, The operations comprised website defacements,
warfare is “the continuation of politics by other distributed denial of services attacks, leaks of
means” (Clausewitz, 2007:28) because politics is classified information, and so on.
the ever-open interaction of wills among
individuals and political entities with potential But they have not been translated into violent acts
contradictory ends, whatever constitutional form of any nature. Also, it is hard to establish the real
such polities may have. Individuals, groups, and cohesion and political power of these groups, for
polities have intentions (or emotional desires) to they seem to lack much common ground, put
be transmitted to (and understood by) the aside an ideological identity, for their activities.
adversary at some point during the conflict. According to Betz (2012:706), “the means for
them to exert noteworthy power – to compel, or
In contrast, Richard Clarke (2010:67-68), for attempt to compel, their enemies to do their will
instance, describes a hypothetical overwhelming are available and growing in scale and
cyber attack on the United States “without a single sophistication. […] [Nonetheless] no networked
terrorist or soldier ever appearing”. Addressing social movements as of yet have attached existing,
Stuxnet, Michael Gross wrote for Vanity Fair in albeit new, ways and means to an end compelling
April 2011: “[this] is the new face of 21st-century enough to mass mobilize.” A clear example of
warfare: invisible, anonymous, and devastating”. that lack of critical mass and political cohesion is
This brings us back to the problem of attribution reflected in the generally known rivalry and
and to the third controversy, regarding state and competition between Anonymous and LulzSec
non-state actors alike being able to wage cyber (Fogarty, 2011), which became dramatic after a
warfare. leader of the first (and probably founder of the
second) was arrested by the FBI and turned in a
There is no doubt some cyber incidents are hard to lot of “Anons” in exchange for clemency and
publicly attribute to a specific actor, even if many legal benefits (Roberts, 2012; Biddle, 2012).
have been increasingly political in nature or
indirectly connected to political events. The Web It is reasonable to argue that it is difficult to
War in Estonia is allegedly related to the sustain the idea that such groups match state-like
government’s discretionary removal of a Soviet- capabilities. It is also hard to establish the level of
era statue from downtown Tallinn. The cyber allegiance, competence, and cohesion (esprit de
attacks against Georgian official websites corps) among their ranks. Even so, there is scant
preceded the 2008 Russia-Georgia War. Some if any evidence that actors other than states - for
other attacks present political motivation, having now at least - do have capabilities to harm and
been carried on by groups such as Anonymous, continuously cause havoc through digital means.
LulzSec, and others. The “Operation Payback”, so As it will be shown below, treating the actions
far the largest operation coordinated by perpetrated by such groups as military operations,
Anonymous, was aimed at disrupting online or even as terrorist activities in cyberspace might
services of organizations that work in favor of be dangerous for democracy without allowing
copyright and anti-piracy policies, such as the clear improvement in security levels.
Swedish Prosecution Authority, the Motion
Pictures Association of America (MPAA), the Sure, even non-state actors could employ cyber
International Federation of Phonographic Industry attacks as part of a larger operation also involving
(IFPI), the Recording Industry Association of direct political violence. However, such actions
America, a large number of Law Firms, as well as might be best captured by terms such as sabotage,
Cepik, Canabarro, Ferreira / Cyber War 28

espionage, subversion, or even terrorism in a more debates, it demands more than heat and loudness
extreme possibility (Rid, 2013). The notion that to call for the attention it deserves. Democracy
non-state actors can wage cyberwar properly and security can only be preserved and nurtured
defined resemble the once popular notion that by serious consideration of the consequences and
non-state actors were capable of developing and proper scope of political concepts, along with
using weapons of mass destruction in a sustained their policy implications.
confrontation against states. One can imagine a
scenario where a highly organized, rich, secretive Childress (2001:181), for example, provides an
and skilled non-state actor could acquire one such interesting view on the morality of using the
weapon and use it, but even that is not the same as language of warfare in social policy debates: “in
waging chemical, biological, or nuclear war. In debating social policy through the language of
short, Clausewitzian criteria provide a better war, we often forget the moral reality of war.
framework to assess cyber events and actors and Among other lapses, we forget important moral
decide if they are instantiations of war or limits in real war – both limited objectives and
something else. The Clausewitzean scientific limited means”. Childress however is not
research program is capable of incorporating and suggesting that one should avoid metaphors at all.
explaining such heuristic novelty represented by However, the loose use of the metaphor of
the concept of cyberwar in the 21st Century. cyberwar, for instance, might not only lead to the
aforementioned conceptual stretching, but also to
CONCLUSION improper or ineffective responses.
The controversies explored above not
only encompass conceptual aspects of warfare, Consider for instance two widely adopted
but also delve into some practical implications categorizations of cyber threats and cyber
that are relevant for the overarching policy cycle conflicts. The first one categorizes cyber terror,
in different countries. In sum, they highlight the hacktivism, black hat hacking, cyber crime, cyber
political, economic, and societal trade-offs that are espionage, and information war on the bases of
involved thereon. This article argues for a more motivation, target, and method (Lachow,
precise and circumscribed concept of cyberwar 2009:439). The second one deals mainly with the
that is better for addressing the phenomenon at purposes of hacktivism, cyber crime, cyber
various levels of concern and planning, related to espionage, cyber sabotage, cyber terror, and cyber
both national and international security. war (displayed from the lower to the higher level
of potential damage, and from the higher to the
As Collier and Mahon (1993:845) remind us, lower level of potential probability) (Cavelty,
“stable concepts and a shared understanding of 2012:116).
categories are routinely viewed as a foundation of
any research community. Yet ambiguity, Both classifications are very abstract and treat the
confusion, and disputes about categories are same events with different labels. For Lachow
common in the social sciences”. The perpetual (2009:440) Estonia was just a case of hacktivism,
quest for generalization and the effort to achieve while for Cavelty (2012:109) Estonia should be
broader knowledge generate what Sartori (1970; understood as one of the “main incidents dubbed
1984) called conceptual traveling (the application as cyber war”. Why do those differences matter?
of concepts to new cases), but also may cause Mainly because depending on the framing of a
conceptual stretching (the distortion that occurs problem, the ensuing political responses will vary.
when concepts do not fit the new cases). The more securitized a social event is, the more
According to him, understanding the proper scope exceptional and extreme can be the governmental
of validity of a concept (the set of entities in the responses to it (Buzan, Waever, et. al., 1998).
world to which it refers) as well as its intention
(the set of meanings or attributes that define the Treating activism, criminal activities, terrorism,
category and determine membership) is essential and acts of war interchangeably undermines the
in order to avoid overstretching. While the use of state capability to adequately respond to a specific
cyberwar is a recurrent rhetorical trope in public threat or conflict. Equally important, by throwing
29 Space & Defense

different categories of actors under the same For the purposes at hand, however, the
umbrella, it poses real threats to the civil liberties significant thing about Stuxnet (which in
and political rights of individuals all around the historical perspective may be seen as the
world, despite the type of political regime they Zeppelin bomber of its day – more
live under. For as Betz (2012:694-695) reminds us, important as a harbinger of what is to
cyberspace come than for its material contribution to
the conflict at hand) is that it was not the
“[…] Extended a number of command, work of hackers alone but of a deep-
control, communications and intelligence pocketed team which had both excellent
capabilities [to non-state actors] which technical skills and high-grade
only the richest states could afford two intelligence on the Iranian program.”
decades ago; but the best picture is rather
different with the state use of cyberspace In sum, asking the right questions while assessing
as a means of war. For one thing, as the anything “cyber” is thus necessary to avoid either
Stuxnet virus, which targeted the Iranian trivializing real wars that might come or
nuclear program, demonstrates very well, undermining civil and political rights when
such capabilities do not come cheap […] treating all cyber conflicts as war.
Cepik, Canabarro, Ferreira / Cyber War 30

Figure 1. Simplified Graphical Representation of Cyberspace

The illustration does not intend to represent the different sizes and individual characteristics of each system.
Adapted from Zimet; Barry (2009:288) and Libicki (2012:326).
31 Space & Defense

REFERENCES Ficarrota. West Lafayette: Purdue


University Press.
Arquilla, J. and D. Ronfeldt (1997). In Athena's
Clark, W. K. and P. L. Levin (2009). “Securing
Camp: Preparing for Conflict in the
the Information Highway: How to
Information Age. Santa Monica: Rand
Enhance the United States' Electronic
Publishing.
Defenses.” Foreign Affairs, 88:6
Betz, D. (2012). “Cyberpower in Strategic (November/December 2009).
Affairs: Neither Unthinkable nor Blessed.” http://www.foreignaffairs.com/articles/65
Journal of Strategic Studies, 35:5, 689- 499/wesley-k-clark-and-peter-l-
711. levin/securing-the-information-highway
Biddle, S. (2012). “LulzSec Leader Betrays All (accessed March 27, 2015).
of Anonymous.” Gizmodo. Clarke, R. and R. Knake (2010). Cyber War:
http://gizmodo.com/5890825/lulzsec- The Next Threat to National Security and
leader-betrays-all-of-anonymous What to Do About It. New York: Ecco
(accessed August 8, 2014). Press.
Blumenthal, M. and D. Clark (2009). “The Clausewitz, Carl von. (2007). On War. Oxford:
Future of the Internet and Cyberpower.” Oxford University Press.
In Cyberpower and National Security. F.
Collier D. and J. Mahon (1993). “Conceptual
Kramer, S. Starr and L. Wentz.
‘Stretching’ Revisited: Adapting
Washington, D.C.: National Defense
Categories in Comparative Analysis.” The
University Press.
American Political Science Review, 87:4,
Buzan, B. and O. Waever, et al. (1998). 845-855.
Security: A New Framework for Analysis.
Colombia.com (2012). “Expertos Creen que
Boulder: Lynne Rienner Publishers.
Estamos Frente a una Guerra
Castells, M. (1996). The Rise of the Network ‘Cibernética’.” Colombia.com.
Society. Oxford: Blackwell. http://www.colombia.com/tecnologia/actu
Castells, M. (1999). Information Technology, alidad/sdi/31440/expertos-creen-que-
Globalization and Social Development. estamos-frente-a-una-guerra-cibernetica
Geneva, Switzerland: United Nations (accessed August 8, 2014).
Research Institute for Social Development. Demchak, C. (2012). “Cybered Conflict, Cyber
http://www.unrisd.org/unrisd/website/doc Power, and Security Resilience as
ument.nsf/ab82a6805797760f80256b4f00 Strategy.” In Cyberspace and National
5da1ab/f270e0c066f3de7780256b67005b Security: Threats, Opportunities, and
728c/$file/dp114.pdf (accessed August 8, Power in a Virtual World. D. S. Reveron.
2014). Washington, D.C.: Georgetown
Cavelty, M. D. (2012). “The Militarisation of University Press.
Cyber Security as a Source of Global Denning, D. E. (2009). “Barriers to Entry: Are
Tension.” In Strategic Trends 2012: Key They Lower for Cyber Warfare?” IO
Developments in Global Affairs. D. Journal, 1:1, 6-10.
Möckly. Zurich: Center for Security
Echevarria II, A. J. (2007). Clausewitz and
Studies (CSS), ETH Zurich.
Contemporary War. Oxford: Oxford
http://www.css.ethz.ch/publications/Strate
University Press.
gic_Trends_EN (accessed August 8,
2014). Eriksson, J. and G. Giacomello (2007).
International Relations and Security in
Childress, J. F. (2001). “The War Metaphor in
the Digital Age. New York: Routledge.
Public Policy: Some Moral Reflections.”
In The Leader's Imperative: Ethics,
Integrity, and Responsibility. J. C.
Cepik, Canabarro, Ferreira / Cyber War 32

Fogarty, K. (2011). “LulzSec vs. Anonymous: Libicki, M. C. (2012). “Cyberspace Is Not a


Doing Hacktivism Wrong.” IT World. Warfighting Domain.” I/S: A Journal of
http://www.itworld.com/security/174917/l Law and Policy, 8:2, 325-340.
ulzsec-vs-anonymous-doing-hactivism- Lucas, M. (2012). “Matrix, o el Nuevo Campo
wrong (accessed August 8, 2014). de Batalla.” Revista DEF.
Gray, C. (2013). Making Strategic Sense of http://www.defonline.com.ar/?p=8935
Cyber Power: Why the Sky is Not Falling. (accessed August 8, 2014).
Carlisle Barracks, PA: Strategic Studies Lynn, W. F. (2010). “Defending a New Domain:
Institute. The Pentagon’s New Cyberstrategy.”
http://www.strategicstudiesinstitute.army. Foreign Affairs 89:5 (September/October
mil/pdffiles/PUB1147.pdf (accessed 2010).
March 27. 2015). http://www.defense.gov/home/features/20
Goldsmith, J. (2010). “The New Vulnerability.” 10/0410_cybersec/lynn-article1.aspx
The New Republic (June 24, 2010). (accessed August 8, 2014).
http://www.tnr.com/article/books-and- Mueller, M. (2010). Networks and States: The
arts/75262/the-new-vulnerability Global Politics of Internet Governance.
(accessed August 8, 2014). Cambridge, MA: The MIT Press.
Hansen, L. and H. Nissenbaum (2009). “Digital Nakashima, E. (2011). “U.S. Cyberweapons Had
Disaster, Cyber Security, and the Been Considered to Disrupt Gaddafi’s Air
Copenhagen School.” International Defenses.” The Washington Post (October
Studies Quarterly, 53, 1155-1175. 17, 2001).
Joint Chiefs of Staff (2013). "Cyberspace http://articles.washingtonpost.com/2011-
Operations". Joint Publication 3-12(R). 10-17/world/35276890_1_cyberattack-air-
http://www.dtic.mil/doctrine/new_pubs/jp defenses-operation-odyssey-dawn
3_12R.pdf. (accessed December 12, 2014). (accessed August 8, 2014).
Kim, D. and M. G. Solomon (2010). Nissenbaum, H. (2005). “Where Computer
Fundamentals of Information Systems Security Meets National Security.” Ethics
Security. Burlington: Jones & Bartlett and Information Technology, 7, 61-73.
Learning. Noro, L. (2012). “Cyber War: La Guerra Silente.”
Kramer, F. and S. Starr and L. Wentz. (2009). Revista DEF.
Cyberpower and National Security. http://www.defonline.com.ar/?p=9064
Washington, D.C.: National Defense (accessed August 8, 2014).
University Press. O'Harrow, R. (2006). No Place to Hide. New
Kuehl, D. (2009). “From Cyberspace to York: Free Press.
Cyberpower: Defining the Problem.” In Reed, T. (2005). At the Abyss: An Insider's
Cyberpower and National Security. F. History of the Cold War. New York:
Kramer, S. Starr and L. Wentz. Random House Publishing Group.
Washington, D.C.: National Defense
Rid, T. (2012a). “Cyber War Will Not Take
University Press.
Place.” Journal of Strategic Studies, 35:1,
Kurbalija, J. and E. Gelbstein (2005). 5-32.
Gobernanza de Internet: Asuntos, Actores
Rid, T. (2012b). “What War in the Fifth
y Brechas. Geneva: Diplo Foundation.
Domain?” Kings of War (9 August, 2012).
Lachow, I. (2009). “Cyberterrorism: Menace or http://kingsofwar.org.uk/2012/08/what-
Myth.” In Cyberpower and National war-in-the-fifth-domain/ (accessed August
Security. F. Kramer, S. Starr and L. Wentz. 8, 2014).
Washington, D.C.: National Defense
Rid, T. (2013) Cyber War Will Not Take Place.
University Press.
London: Oxford University Press.
33 Space & Defense

Roberts, P. (2012). “LulzSec informant Sabu Uzal, R. (2012). “¿Es la Guerra Cibernética el
Rewarded with Six Months Freedom for Desafío más Relevante de la Defensa
Helping Feds.” Naked Security (August Nacional?” Mochila Virtual - Infantería
23, 2012). Argentina (December 5, 2012).
http://nakedsecurity.sophos.com/2012/08/ http://www.mochiladelinfante.com.ar/defe
23/sabu-lulzsec-freedom/ (accessed nsa/89-yies-la-guerra-cibernytica-el-
August 8, 2014). desafno-mbs-relevante-de-la-defensa-
Sartori, G. (1970). “Concept Misinformation in nacional.html (accessed August 8, 2014).
Comparative Politics.” American Political Van Creveld, M. (2007). “War and Technology.”
Science Review, 64, 1033-1053. Foreign Policy Research Institute
Schmitt, M. N. (1999). “Computer Network Footnotes, 12:25.
Attack and the Use of Force in http://www.fpri.org/articles/2007/10/war-
International Law: Thoughts on a and-technology (accessed March 27,
Normative Framework.” The Columbia 2015).
Journal of Transnational Law, 37, 885- Washington Post (2012). “U.S. Accelerating
937. Cyberweapon Research.” The Washington
Sommer, P. and I. Brown (2011). Reducing Post (March 13, 2012).
Systemic Cybersecurity Risk. Organisation http://www.washingtonpost.com/world/na
for Economic Cooperation and tional-security/us-accelerating-
Development Working Paper No. cyberweapon-
IFP/WKP/FGS(2011)3. research/2012/03/13/gIQAMRGVLS_stor
http://eprints.lse.ac.uk/31964/ (accessed y_1.html (accessed August 8, 2014).
August 8, 2014). Weimann, G. (2004). Cyberterrorism: How Real
Stamp, M. (2011). Information Security: Is the Threat? Washington, D.C.: United
Principles and Practices. Hoboken: Wiley. States Institute of Peace.
http://www.usip.org/files/resources/sr119.
The Economist (2010). “War in the Fifth
pdf (accessed August 8, 2014).
Domain.” The Economist (July 1, 2010)
http://www.economist.com/node/1647879 World Internet Users and Populations (2012).
2 (accessed August 8, 2014). “Internet Usage Statistics – The Internet
Big Picture.”
USA (2005). “U.S. National Defense Strategy.”
http://www.internetworldstats.com/stats.ht
http://www.defense.gov/news/mar2005/d2
m (accessed August 8, 2014).
0050318nds1.pdf (accessed August 8,
2014). Zimet, E. and C. L. Barry (2009). “Military
Service Overview.” In Cyberpower and
USA (2012). “Sustaining US Global Leadership:
National Security. F. Kramer, S. Starr,
Priorities for 21st Century
and L. Wentz. Washington, D.C.:
Defense.”http://www.defense.gov/news/d
National Defense University Press.
efense_strategic_guidance.pdf (accessed
August 8, 2014).

You might also like