Cyber Warfare Research Report
Cyber Warfare Research Report
Research Report
Introduction
Cyber warfare is one of the most modern types of warfare in our society. Cyber
warfare is Internet-based conflict involving politically motivated attacks an enemy's
computer and information systems. Cyber attacks can be detrimental to a governments
national privacy, and a menace to the security of civilians. These attacks can disable or
disrupt official websites, networks, services and steal or amend classified data among
countless other possibilities. With the possession of such private data, an opponent can
see enemys war tactics, military possessions and allocations, and can create defections
in military equipment such as aircraft.
Cyber warfare can involve various attack methods such as sabotage or espionage
and/or security breach. When speaking of sabotage, the military and financial computer
systems are at risk for the disruption of normal operations and equipment, such as
communications, fuel, power and transportation infrastructures. When speaking of
espionage and/or security breaches, illegal exploitation methods are used to disable
networks, software, computers or the Internet to steal or acquire classified information
from rival institutions or individuals for military, political or financial gain. 1.
The United Nations have been involved in trying to resolve the issue of cyber warfare
since 1998. For instance, the First Committee (GA1) has been actively examining the
Developments in the Field of Information and Telecommunications in the Context of
International Security for years. 2. Numerous resolution have been put forward in the past
regarding cyber warfare and cyber attacks, most of which came from the Russian
Federation. Most of these resolutions passed with a majority vote in favor, with the
exception of the USA and various other Western nations who voted against them. It has
become clear over the past years that two main diverse opinions have emerged as a
result of the issue of cyber warfare. One thing that is certain is that cyber security has
become one of the major national security priorities over the past years, but is an issue
that still remains active.
History
The UN began discussing the issue of cyber warfare in 1998, where resolutions
concerning this topic were proposed. The Russian Federation proposed a resolution, which
was later adopted as resolution 53/70 in January of 1999. Its main points were:
recognition of the military potential of information and communication technology for the first
time as well as an expression of concern about the use of such technology inconsistent with
the objectives of maintaining international stability and security;
clarifying the need to prevent cyber-crime and cyber terrorism;
inviting all member states to propose their opinion towards this topic.
The Russian Federation further proposed resolutions to specify the generality of resolution
53/70. The resolution proposed in 2005 was largely popular on behalf of member states, and
the USA was the only state to vote against it.
The USA and other western states were generally against the passing of resolutions
regarding cyber warfare, as they believed employing censorship on websites to protect
national security would thwart the liberty of the internet. However, other states believe that
censorship is the only effective way of combating cyber warfare and attacks. These two
different points of view have created big debate within the UN, and a final decision has not yet
been agreed upon on behalf of the member states.
Key Issues
Cyber warfare can both inflict upon nations sovereign rights and security, and can be
detrimental towards the security and civil liberties of civilians. Primarily, cyber warfare can
target both civilian and military resources. For instance, if the US national power grid were to
be attacked, not only would this impede factories from continuing their military developments,
but also it would inflict upon peoples lives and could cause severe accidents.
It is often hard to determine who launched certain cyber attacks, meaning governments
cannot be help accountable for any attacks. If governments cannot be held accountable for
cyber attacks, it can become very difficult to mutually come to an agreement to stop all form
of cyber attacks on behalf of member states.
United Kingdom
A cyber-warfare operation was launched by MI6 and GCHQ in an attempt to
disrupt efforts by al-Qaeda in the Arabian Peninsular. On 12 November 2013, financial
organisations in London conducted cyber war games dubbed 'Waking Shark 2 to
simulate massive internet-based attacks against bank and other financial organisations.
United States
The USA uses cyber warfare as a form warfare and military strategy. In 2010 the
Pentagon formally recognized cyberspace as a new domain in warfare, which has become
just as critical to military operations as land, sea, air, and space, according to William J. Lynn,
U.S. Deputy Secretary of Defense. The United States used cyber attacks for tactical
advantage in Afghanistan. In fact, on the official NSA website (https://www.nsa.gov/) they
state that their mission is to gather foreign intelligence and to defend U.S. government
information systems. Communications have evolved from the past. Today, the IT
infrastructure is digital from start to finish. America's national security information depends on
technology as never before.
India
India has often been a victim of minor cyber breaches in the past. A high-profile cyber
attack on 12 July 2012 breached the email accounts of about 12,000 people, including those
of officials from the Ministry of External Affairs, Ministry of Home Affairs amongst others. India
recently recognized that it was imperative for them to put in place a cyber security system.
India, to date, has no cyber warfare policy.
South Korea
In March 2013, South Korea's major banks Shinhan Bank, Woori Bank and
NongHyup Bank as well as many broadcasting stations KBS, YTN and MBC were
hacked and more than 30,000 computers were affected. Claims were made that it was North
Korea who performed these cyber attacks on South Korea.
South Korea recently claimed that they would attempt to improve cyber security in the hopes
of preparing itself for a possible cyber attack.
Relevant events
(There are more events regarding cyber attacks than those listen bellow)
March 1998
April 2007
September 2007
4th December
2010
July 2011
Possible Solutions
Finding a measure to combat cyber warfare is truly a difficult task for it is difficult to
Part of the root of the issue surrounding cyber warfare is the misconception of the
definition of the term, and the different interpretations of what a cyber attack is. As a form to
advance the measures to combat cyber warfare, a universal definition of cyber warfare could
be adopted. Once a universal definition has been put in place, it is easier to pin point when a
cyber attack has occurred, and factionary measures can then be taken.
Furthermore, an organization could be created with the purpose of overseeing and
monitoring international computer systems to control possible cyber attacks. This organization
would also play a big role in the solving of cases of cyber attacks between two or more
parties. This organization could track the activities of the parties involved and trace the attack
back to the perpetrator. Some member states may be in favor of the emplacement of such
organization, and may argue that putting an end to cyber warfare is crucial for the security of
civilians and for the privacy of governments, others may be against it, and may argue that it
would be an infringement upon national sovereign rights and national and civil privacy.
However, it must be kept in mind that even with the aid of an organization, it is difficult to hold
the government accountable for an attack, as it is impossible to know if a regular civilian or a
government official performed the attack.
Bibliography
Merriam-Webster. Merriam-Webster, n.d. Web. 21 Feb. 2015.
"Data Breach." Wikipedia. Wikimedia Foundation, n.d. Web. 21 Feb. 2015.
http://en.wikipedia.org/wiki/Data_breach
"DoS Attack - Denial of Service Attack." What Is Denial of Service (DoS) Attack? Webopedia.
N.p., n.d. Web. 20 Feb. 2015.
Wikipedia. Wikimedia Foundation, n.d. Web. 21 Feb. 2015.
http://en.wikipedia.org/wiki/Cyberwarfare
"Site-wide Navigation." Cyber Warfare. N.p., n.d. Web. 19 Feb. 2015.
http://searchsecurity.techtarget.com/definition/cyberwarfare
"How Does Cyber Warfare Work?" Forbes. Forbes Magazine, n.d. Web. 21 Feb. 2015
http://www.forbes.com/sites/quora/2013/07/18/how-does-cyber-warfare-work/
"Here's How Cyber-Warfare Started And Where It's Going." Business Insider. N.p., n.d. Web.
21 Feb. 2015.
www.webopedia.com
"Arms Control Today." The UN Takes a Big Step Forward on Cybersecurity. N.p., n.d. Web. 21
Feb. 2015.
www.armscontrol.org