SlideShare a Scribd company logo
1 of 4
Download to read offline
Policy Brief • January 2014

Quarterly Journal: International Security

Making Sense of Cyberwar
BOTTOM LINES
•	 Differentiate means from ends: There are many ways to cause harm, cyber or otherwise. The real issue
is whether (and how) perpetrators of cyberattacks can convert virtual harm into tangible benefits for
themselves.
•	 Cyberwar is not “war.” By itself, internet conflict typically cannot achieve the objectives that are commonly associated with threats or uses of traditional military force.
•	 Cyberwar benefits the strong. Rather than serving to undermine the status quo, internet aggression
further advantages those with traditional military and economic power.
•	 Cyberwar does not destabilize. Even if the offense dominates in cyberspace, advantages do not translate into incentives to attack unless actors are also capable in other domains.

By Erik Gartzke
This policy brief is based on “The Myth of Cyberwar:
Bringing War in Cyberspace Back Down to Earth,”
which appears in the Fall 2013 issue of International
Security.
U.S. Defense Secretary Leon Panetta’s warning that
“the next Pearl Harbor” might arrive via the internet
has captured considerable attention. The internet
is said to be revolutionary because it is a leveler—
reducing Western military advantages—and because
dependence on the internet makes developed
countries more vulnerable to attack. The conviction
that the internet is an Achilles’ heel for the existing
world order is based on narrow conceptions of the
potential for harm. The internet cannot perform
functions traditionally assigned to military force. To
the contrary, cyberwar creates another advantage for
powerful status quo nations and interests.

DIFFERENTIATE MEANS FROM ENDS
The ability to harm is ubiquitous. Anyone passing on
the street could punch you in the face. Still, violence is

relatively rare in large part because most uses of force,
while feasible, are probably not effectual. Perpetrators
must ask themselves not just “what harm can I inflict?”
but “how can I benefit by inflicting harm?” Cyberwar,
like any behavior, requires a logic of consequences.
States, groups, and individuals threaten violence to
conquer, to compel others to cooperate, or to deter
aggression. Actors can also exercise violence to alter
the balance of power. If the damage violence inflicts is
temporary, however, then the initial act of aggression
must be followed up with other actions, or an attack
serves no purpose. Actions like the Pearl Harbor
attack create “a window of opportunity,” a temporary
change in the balance of power, but aggression that
does temporary damage is only useful if it is followed
with a plan to exploit the opportunity.
War is a political process, not a separate and isolated
exercise, as Karl von Clausewitz sought to make clear.
Even the loser in a confrontation typically retains
some capacity to harm. Cyberwar thus requires an
explanation of how one side can conquer or compel
over the internet, something that appears surprisingly
January 2014

difficult to construct. A morbid fear of being sucker
punched may be misplaced if it is only based on
capabilities, just as concern about cyberwar can be
exaggerated if there is no evidence or reason to suggest
how internet aggression achieves objectives useful to
potential perpetrators.

CYBERWAR IS NOT WAR
The internet is a poor venue for achieving objectives
typically pursued through the threat or use of
military violence. Traditional military capabilities are
observable. Armies appear near city gates. Missiles
can be spotted in firing positions ready for launch.
Military capabilities coerce because their effects can
be anticipated. A city does not need to be stormed
for the inhabitants to imagine the feasibility and
consequences of an attack. Cyber coercion is more
problematic in this regard because capabilities are
difficult to communicate without degrading the
potency of an attack. Targets cannot accurately assess
credibility without information about key details of
a planned cyberattack. At the same time, attackers
cannot share this information with defenders without
weakening the effectiveness of their potential attacks.
Furthermore, if a defender accedes to unverified
threats, then it invites a multitude of false claims.
Harm inflicted can be used to threaten future harm,
but only if one act of harming serves as a good
indicator of the effectiveness of future attacks. This
works pretty well when attacks involve infantry
brigades, war elephants, or high-speed penetrating
bombers, whose capability may not be much affected
by whether the enemy knows they exist. The success
of cyber aggression, however, usually relies heavily
on conditions of surprise. Past performance is also
difficult to use to coerce; even an internet attacker
that has succeeded in the past will be tempted to bluff.
The bigger issue with internet attacks, however, is that
their effects are temporary. Unlike a rocket strike on
an oil refinery or destruction of elements of a nation’s
military, cyberwar generally involves “soft kills,”
temporary incapacitation that can be reversed quickly
and at moderate cost. Without a direct or lasting effect

on the balance of power, internet aggression serves
as either an irritant or as an adjunct to other, more
traditional, forms of military force.
Imagine that some unspecified cyberattack disables
communication or transportation nodes in a target
country. What then? While inconvenienced, the
target will eventually get the lights back on and
vehicles running. The target will then attempt to
retaliate. Permanent harm inflicted over the internet
could weaken an opponent and might well serve as
a motive for aggression. Such an attack could even
be made anonymously, though anonymity would
mean forfeiting the potential for coercion. However,
internet attacks typically involve temporary damage,
not permanent harm.
The Japanese attack on Pearl Harbor did considerable
damage to the U.S. Pacific Fleet, but it failed to force
the United States to the bargaining table, a critical
component of Japan’s grand strategy. Although
Japan’s leaders knew that total war with the United
States would result in their defeat, they hoped for a
limited contest. Cyberwar with no follow-on strategy
is much more foolish than the Japanese plan in 1941,
because the effects of a cyberattack can be repaired
more quickly. Any attack over the internet must either
convert short-term advantages into long-term effects
or wager that the enemy will acquiesce to defeat in
cyberspace, something particularly unlikely if damage
is superficial or of short duration. A cyber Pearl
Harbor has no military role unless it is accompanied
by a terrestrial attack, precisely because the target
can and will respond to any serious attack with a
vigorous reprisal. If the target is unlikely to succumb
to traditional forms of aggression, then cyberattack
makes little sense, either. Being vulnerable on
the internet is then much like being vulnerable to
passersby on the street. An attack is certainly possible,
but it serves no logical purpose and can be deterred in
most circumstances by the threat of retaliation.

CYBERWAR BENEFITS THE STRONG
The few examples of cyberwar to date involve capable
nations attacking much weaker countries. Incidents

For more from International Security, please visit http://belfercenter.org/IS
January 2014

like Stuxnet and the denial of service attacks in Estonia
and Georgia suggest that cyberwar works best when
the attacker can deter reprisal in kind with other forms
of violence or when the internet is used in conjunction
with more traditional applications of force. As such,
cyberwar is really an adjunct to modern warfare, not a
replacement or even a particularly important modifier.
Its presence is evolutionary rather than revolutionary.
This is because cyber attacks by themselves can neither
conquer nor effectively compel. Internet aggression
can harm and may even expose an opponent to further
attack, but it does not physically subdue. Without
access to this final arbiter of conflict, practitioners
of cyberwar must assume that opponents will not
escalate, either because they are permanently unable
to do so, or because they cannot be bothered to carry
out retaliation. Unless cyberwar can serve as a final
arbiter of conflict, there is no reason to believe that
warfare on the internet will remain on the internet,
unless both sides prefer this. Keeping conflict on
the internet, however, implies that the stakes are not
(yet) very high. Traditional forms of power create the
discretion to escalate or to contain cyberwar, meaning
that internet warfare is subordinate.
States with capable conventional militaries or
considerable economic clout are best positioned to
exploit windows of opportunity created by internet
conflict. These same countries are also the ones best
equipped to deter or defend against cyberattack
through asymmetric threats and uses of force.

Although many might be able to imagine a cyberattack
on the United States, few will find it plausible to
speculate about physical invasion of U.S. territory.
It is far less difficult to imagine powerful countries
invading weaker states. The internet age thus increases
the options available to powerful states, augmenting
rather than undermining, existing hierarchies.

CYBERWAR DOES NOT DESTABILIZE
Another assumption widely applied to cyberwar is that
it is offense dominant. Nations and other actors will
use the internet to attack each other, thus destabilizing
world affairs. Yet, for the same reasons discussed
above, it does not follow that incentives to strike in
cyberspace equal a call to open warfare. Winning
war on the internet could be a problem for countries
unable to defend themselves from more traditional
forms of warfare. Internet offense dominance might
even lead to a decline in non-internet aggression,
as powerful nations reconsider the use of force for
fear that it will lead to reprisal. Further, details are
available in the longer published version of this study.
• • •
Statements and views expressed in this policy brief are
solely those of the author and do not imply endorsement
by Harvard University, the Harvard Kennedy School, or
the Belfer Center for Science and International Affairs.

RELATED RESOURCES
Biddle, Stephen. Military Power: Explaining Victory and Defeat in Modern Battle (Princeton, N.J.: Princeton
University Press, 2004).
Blainey, Geoffrey. The Causes of War (New York: Free Press, 1973).
Lindsay, Jon. “Stuxnet and the Limits of Cyber Warfare,” Security Studies, Vol. 22, No. 3 (August 2013),
pp. 365–404.
Mao Zedong. On Guerrilla Warfare (New York: Praeger, 1961).
Rid, Thomas. “Cyber War Will Not Take Place,” Journal of Strategic Studies, Vol. 35, No. 1 (February 2012),
pp. 5–32.

For more from International Security, please visit http://belfercenter.org/IS
January 2014

ABOUT THE BELFER CENTER

ABOUT THE AUTHOR

The Belfer Center is the hub of the Harvard
Kennedy School’s research, teaching, and training
in international security affairs, environmental
and resource issues, and science and technology
policy. The Center has a dual mission: (1) to provide
leadership in advancing policy-relevant knowledge
about the most important challenges of international
security and other critical issues where science,
technology, environmental policy, and international
affairs intersect; and (2) to prepare future generations
of leaders for these arenas. Center researchers not
only conduct scholarly research, but also develop
prescriptions for policy reform. Faculty and fellows
analyze global challenges from nuclear proliferation
and terrorism to climate change and energy policy.

Erik Gartzke is Professor of Government at the University of Essex and Associate Professor of Political
Science at the University of California, San Diego.

ABOUT INTERNATIONAL SECURITY
International Security is America’s leading peerreviewed journal of security affairs. It provides
sophisticated analyses of contemporary, theoretical,
and historical security issues. International Security is
edited at Harvard Kennedy School’s Belfer Center for
Science and International Affairs and is published by
The MIT Press.
For more information about this publication, please
contact the International Security editorial assistant
at 617-495-1914.

For Academic Citation:
Gartzke, Erik. “Making Sense of Cyberwar.” Policy
Brief, Belfer Center for Science and International
Affairs, Harvard Kennedy School, January 2014.

More Related Content

What's hot

Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Kate Neal
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Kate Neal
 
What Does the CFAA Mean and Why Should I Care? A Primer on the Computer Fraud...
What Does the CFAA Mean and Why Should I Care? A Primer on the Computer Fraud...What Does the CFAA Mean and Why Should I Care? A Primer on the Computer Fraud...
What Does the CFAA Mean and Why Should I Care? A Primer on the Computer Fraud...Shawn Tuma
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?Melissa Andrews
 
The rise of cyberpower
The rise of cyberpowerThe rise of cyberpower
The rise of cyberpowerNoelle Cowling
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Coercion in War, by Professor Joel Hayward
Coercion in War, by Professor Joel HaywardCoercion in War, by Professor Joel Hayward
Coercion in War, by Professor Joel HaywardProfessor Joel Hayward
 
Responsibility of the State and the Media in Time of Global Terrorism
Responsibility of the State and the Media in Time of Global TerrorismResponsibility of the State and the Media in Time of Global Terrorism
Responsibility of the State and the Media in Time of Global TerrorismParliamentary Exchange and Dialogue
 
Toward a Strategy of Public Warning
Toward a Strategy of Public WarningToward a Strategy of Public Warning
Toward a Strategy of Public WarningJohn Fenzel
 
War and Strategy: An Introduction, by Professor Joel Hayward
War and Strategy: An Introduction, by Professor Joel HaywardWar and Strategy: An Introduction, by Professor Joel Hayward
War and Strategy: An Introduction, by Professor Joel HaywardProfessor Joel Hayward
 
Lecture 19 changeconflictcrisis 3 war on terror
Lecture 19 changeconflictcrisis 3 war on terrorLecture 19 changeconflictcrisis 3 war on terror
Lecture 19 changeconflictcrisis 3 war on terrordavid roberts
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019BluePayProcessing
 
Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillMotorola Solutions
 

What's hot (19)

Cross Domain Deterrence
Cross Domain DeterrenceCross Domain Deterrence
Cross Domain Deterrence
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
 
Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2Katherine Neal_Written Brief 2
Katherine Neal_Written Brief 2
 
What Does the CFAA Mean and Why Should I Care? A Primer on the Computer Fraud...
What Does the CFAA Mean and Why Should I Care? A Primer on the Computer Fraud...What Does the CFAA Mean and Why Should I Care? A Primer on the Computer Fraud...
What Does the CFAA Mean and Why Should I Care? A Primer on the Computer Fraud...
 
Has the Cyber War Begun?
Has the Cyber War Begun?Has the Cyber War Begun?
Has the Cyber War Begun?
 
The rise of cyberpower
The rise of cyberpowerThe rise of cyberpower
The rise of cyberpower
 
program-statement
program-statementprogram-statement
program-statement
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Coercion in War, by Professor Joel Hayward
Coercion in War, by Professor Joel HaywardCoercion in War, by Professor Joel Hayward
Coercion in War, by Professor Joel Hayward
 
Responsibility of the State and the Media in Time of Global Terrorism
Responsibility of the State and the Media in Time of Global TerrorismResponsibility of the State and the Media in Time of Global Terrorism
Responsibility of the State and the Media in Time of Global Terrorism
 
Toward a Strategy of Public Warning
Toward a Strategy of Public WarningToward a Strategy of Public Warning
Toward a Strategy of Public Warning
 
War and Strategy: An Introduction, by Professor Joel Hayward
War and Strategy: An Introduction, by Professor Joel HaywardWar and Strategy: An Introduction, by Professor Joel Hayward
War and Strategy: An Introduction, by Professor Joel Hayward
 
Lecture 19 changeconflictcrisis 3 war on terror
Lecture 19 changeconflictcrisis 3 war on terrorLecture 19 changeconflictcrisis 3 war on terror
Lecture 19 changeconflictcrisis 3 war on terror
 
managing_info
managing_infomanaging_info
managing_info
 
Drones in Discourse
Drones in DiscourseDrones in Discourse
Drones in Discourse
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019
 
Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands Still
 
Gene sharp
Gene sharpGene sharp
Gene sharp
 

Similar to Making Sense of Cyberwar 2014

HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...ijsptm
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...CODE BLUE
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinAFCEA International
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGLillian Ekwosi-Egbulem
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxShiraPrater50
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxadkinspaige22
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
David J Williams on the Future Of War
David J Williams on the Future Of WarDavid J Williams on the Future Of War
David J Williams on the Future Of WarEric Garland
 
Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To YouRonald E. Laub Jr
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMADavid Sweigert
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxglendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxtodd581
 
Reply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docxReply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docxscuttsginette
 
Cyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docxCyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docxdorishigh
 

Similar to Making Sense of Cyberwar 2014 (20)

HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKINGUNITED STATES AND CHINA 2001: PATRIOTIC HACKING
UNITED STATES AND CHINA 2001: PATRIOTIC HACKING
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
David J Williams on the Future Of War
David J Williams on the Future Of WarDavid J Williams on the Future Of War
David J Williams on the Future Of War
 
Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To You
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Reply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docxReply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docx
 
Cyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docxCyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docx
 
114-116
114-116114-116
114-116
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Making Sense of Cyberwar 2014

  • 1. Policy Brief • January 2014 Quarterly Journal: International Security Making Sense of Cyberwar BOTTOM LINES • Differentiate means from ends: There are many ways to cause harm, cyber or otherwise. The real issue is whether (and how) perpetrators of cyberattacks can convert virtual harm into tangible benefits for themselves. • Cyberwar is not “war.” By itself, internet conflict typically cannot achieve the objectives that are commonly associated with threats or uses of traditional military force. • Cyberwar benefits the strong. Rather than serving to undermine the status quo, internet aggression further advantages those with traditional military and economic power. • Cyberwar does not destabilize. Even if the offense dominates in cyberspace, advantages do not translate into incentives to attack unless actors are also capable in other domains. By Erik Gartzke This policy brief is based on “The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth,” which appears in the Fall 2013 issue of International Security. U.S. Defense Secretary Leon Panetta’s warning that “the next Pearl Harbor” might arrive via the internet has captured considerable attention. The internet is said to be revolutionary because it is a leveler— reducing Western military advantages—and because dependence on the internet makes developed countries more vulnerable to attack. The conviction that the internet is an Achilles’ heel for the existing world order is based on narrow conceptions of the potential for harm. The internet cannot perform functions traditionally assigned to military force. To the contrary, cyberwar creates another advantage for powerful status quo nations and interests. DIFFERENTIATE MEANS FROM ENDS The ability to harm is ubiquitous. Anyone passing on the street could punch you in the face. Still, violence is relatively rare in large part because most uses of force, while feasible, are probably not effectual. Perpetrators must ask themselves not just “what harm can I inflict?” but “how can I benefit by inflicting harm?” Cyberwar, like any behavior, requires a logic of consequences. States, groups, and individuals threaten violence to conquer, to compel others to cooperate, or to deter aggression. Actors can also exercise violence to alter the balance of power. If the damage violence inflicts is temporary, however, then the initial act of aggression must be followed up with other actions, or an attack serves no purpose. Actions like the Pearl Harbor attack create “a window of opportunity,” a temporary change in the balance of power, but aggression that does temporary damage is only useful if it is followed with a plan to exploit the opportunity. War is a political process, not a separate and isolated exercise, as Karl von Clausewitz sought to make clear. Even the loser in a confrontation typically retains some capacity to harm. Cyberwar thus requires an explanation of how one side can conquer or compel over the internet, something that appears surprisingly
  • 2. January 2014 difficult to construct. A morbid fear of being sucker punched may be misplaced if it is only based on capabilities, just as concern about cyberwar can be exaggerated if there is no evidence or reason to suggest how internet aggression achieves objectives useful to potential perpetrators. CYBERWAR IS NOT WAR The internet is a poor venue for achieving objectives typically pursued through the threat or use of military violence. Traditional military capabilities are observable. Armies appear near city gates. Missiles can be spotted in firing positions ready for launch. Military capabilities coerce because their effects can be anticipated. A city does not need to be stormed for the inhabitants to imagine the feasibility and consequences of an attack. Cyber coercion is more problematic in this regard because capabilities are difficult to communicate without degrading the potency of an attack. Targets cannot accurately assess credibility without information about key details of a planned cyberattack. At the same time, attackers cannot share this information with defenders without weakening the effectiveness of their potential attacks. Furthermore, if a defender accedes to unverified threats, then it invites a multitude of false claims. Harm inflicted can be used to threaten future harm, but only if one act of harming serves as a good indicator of the effectiveness of future attacks. This works pretty well when attacks involve infantry brigades, war elephants, or high-speed penetrating bombers, whose capability may not be much affected by whether the enemy knows they exist. The success of cyber aggression, however, usually relies heavily on conditions of surprise. Past performance is also difficult to use to coerce; even an internet attacker that has succeeded in the past will be tempted to bluff. The bigger issue with internet attacks, however, is that their effects are temporary. Unlike a rocket strike on an oil refinery or destruction of elements of a nation’s military, cyberwar generally involves “soft kills,” temporary incapacitation that can be reversed quickly and at moderate cost. Without a direct or lasting effect on the balance of power, internet aggression serves as either an irritant or as an adjunct to other, more traditional, forms of military force. Imagine that some unspecified cyberattack disables communication or transportation nodes in a target country. What then? While inconvenienced, the target will eventually get the lights back on and vehicles running. The target will then attempt to retaliate. Permanent harm inflicted over the internet could weaken an opponent and might well serve as a motive for aggression. Such an attack could even be made anonymously, though anonymity would mean forfeiting the potential for coercion. However, internet attacks typically involve temporary damage, not permanent harm. The Japanese attack on Pearl Harbor did considerable damage to the U.S. Pacific Fleet, but it failed to force the United States to the bargaining table, a critical component of Japan’s grand strategy. Although Japan’s leaders knew that total war with the United States would result in their defeat, they hoped for a limited contest. Cyberwar with no follow-on strategy is much more foolish than the Japanese plan in 1941, because the effects of a cyberattack can be repaired more quickly. Any attack over the internet must either convert short-term advantages into long-term effects or wager that the enemy will acquiesce to defeat in cyberspace, something particularly unlikely if damage is superficial or of short duration. A cyber Pearl Harbor has no military role unless it is accompanied by a terrestrial attack, precisely because the target can and will respond to any serious attack with a vigorous reprisal. If the target is unlikely to succumb to traditional forms of aggression, then cyberattack makes little sense, either. Being vulnerable on the internet is then much like being vulnerable to passersby on the street. An attack is certainly possible, but it serves no logical purpose and can be deterred in most circumstances by the threat of retaliation. CYBERWAR BENEFITS THE STRONG The few examples of cyberwar to date involve capable nations attacking much weaker countries. Incidents For more from International Security, please visit http://belfercenter.org/IS
  • 3. January 2014 like Stuxnet and the denial of service attacks in Estonia and Georgia suggest that cyberwar works best when the attacker can deter reprisal in kind with other forms of violence or when the internet is used in conjunction with more traditional applications of force. As such, cyberwar is really an adjunct to modern warfare, not a replacement or even a particularly important modifier. Its presence is evolutionary rather than revolutionary. This is because cyber attacks by themselves can neither conquer nor effectively compel. Internet aggression can harm and may even expose an opponent to further attack, but it does not physically subdue. Without access to this final arbiter of conflict, practitioners of cyberwar must assume that opponents will not escalate, either because they are permanently unable to do so, or because they cannot be bothered to carry out retaliation. Unless cyberwar can serve as a final arbiter of conflict, there is no reason to believe that warfare on the internet will remain on the internet, unless both sides prefer this. Keeping conflict on the internet, however, implies that the stakes are not (yet) very high. Traditional forms of power create the discretion to escalate or to contain cyberwar, meaning that internet warfare is subordinate. States with capable conventional militaries or considerable economic clout are best positioned to exploit windows of opportunity created by internet conflict. These same countries are also the ones best equipped to deter or defend against cyberattack through asymmetric threats and uses of force. Although many might be able to imagine a cyberattack on the United States, few will find it plausible to speculate about physical invasion of U.S. territory. It is far less difficult to imagine powerful countries invading weaker states. The internet age thus increases the options available to powerful states, augmenting rather than undermining, existing hierarchies. CYBERWAR DOES NOT DESTABILIZE Another assumption widely applied to cyberwar is that it is offense dominant. Nations and other actors will use the internet to attack each other, thus destabilizing world affairs. Yet, for the same reasons discussed above, it does not follow that incentives to strike in cyberspace equal a call to open warfare. Winning war on the internet could be a problem for countries unable to defend themselves from more traditional forms of warfare. Internet offense dominance might even lead to a decline in non-internet aggression, as powerful nations reconsider the use of force for fear that it will lead to reprisal. Further, details are available in the longer published version of this study. • • • Statements and views expressed in this policy brief are solely those of the author and do not imply endorsement by Harvard University, the Harvard Kennedy School, or the Belfer Center for Science and International Affairs. RELATED RESOURCES Biddle, Stephen. Military Power: Explaining Victory and Defeat in Modern Battle (Princeton, N.J.: Princeton University Press, 2004). Blainey, Geoffrey. The Causes of War (New York: Free Press, 1973). Lindsay, Jon. “Stuxnet and the Limits of Cyber Warfare,” Security Studies, Vol. 22, No. 3 (August 2013), pp. 365–404. Mao Zedong. On Guerrilla Warfare (New York: Praeger, 1961). Rid, Thomas. “Cyber War Will Not Take Place,” Journal of Strategic Studies, Vol. 35, No. 1 (February 2012), pp. 5–32. For more from International Security, please visit http://belfercenter.org/IS
  • 4. January 2014 ABOUT THE BELFER CENTER ABOUT THE AUTHOR The Belfer Center is the hub of the Harvard Kennedy School’s research, teaching, and training in international security affairs, environmental and resource issues, and science and technology policy. The Center has a dual mission: (1) to provide leadership in advancing policy-relevant knowledge about the most important challenges of international security and other critical issues where science, technology, environmental policy, and international affairs intersect; and (2) to prepare future generations of leaders for these arenas. Center researchers not only conduct scholarly research, but also develop prescriptions for policy reform. Faculty and fellows analyze global challenges from nuclear proliferation and terrorism to climate change and energy policy. Erik Gartzke is Professor of Government at the University of Essex and Associate Professor of Political Science at the University of California, San Diego. ABOUT INTERNATIONAL SECURITY International Security is America’s leading peerreviewed journal of security affairs. It provides sophisticated analyses of contemporary, theoretical, and historical security issues. International Security is edited at Harvard Kennedy School’s Belfer Center for Science and International Affairs and is published by The MIT Press. For more information about this publication, please contact the International Security editorial assistant at 617-495-1914. For Academic Citation: Gartzke, Erik. “Making Sense of Cyberwar.” Policy Brief, Belfer Center for Science and International Affairs, Harvard Kennedy School, January 2014.