In-depth

Cyber war: Modern warfare 2.0

This is no game. Call it Modern Warfare 2.0 or call it cyber war, the reality is that everyone is talking about it. But what is cyber war, are we fighting one and how can businesses best protect themselves from the fallout?

Anyone with an interest in technology and politics would need to be living in a cave not to have noticed an alarming increase in cyber war rhetoric of late.

On one hand we have the House of Lords claiming the 'electronic defences' of the UK would survive a cyber attack, and on the other Baroness Neville-Jones, Shadow Security Minister and National Security Adviser to David Cameron, telling us "neither the government nor the private sector can completely control or protect the country's information infrastructure".

And things are just as confused in America where Michael McConnell, a former Director of National Intelligence reckons that the US is engaged in a cyber war it's losing while President Obama's new cyber security csar, Howard Schmidt, insists there's no cyber war and what's more it's a terrible concept to begin with.

No wonder the man on the street is confused if even the people who are supposedly closest to the front line cannot agree on anything.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Let's see if the experts can agree, at least, on the definition of cyber war.

Cyber what?

The Bipartisan Policy Centre simulated a full of cyber attack recently under the name of 'Cyber Shockwave' and as a result of that simulation some security experts have been calling on the government to establish firm definitions of cyber war so that a legally justifiable response can be considered.

Dr Prescott Winter, former chief technology officer (CTO) of the National Security Agency (NSA) and currently CTO for Public Sector at ArcSight, told us that cyber war has been extremely difficult to define, confiding that the US government has been wrestling with the problem for some time "without coming to a clear answer".

The problem, according to Dr Winter, is one of determining the ultimate origin of the hostile actions or their intent, of establishing unambiguous attribution.

"This is because an attack can be launched from computers other than those of the attacker, often with multiple levels of concealment," he explains, concluding that it makes it very difficult to determine if an act is criminal, espionage related or one of warfare.

Advertisement - Article continues below

Neil Fisher, vice president of global security solutions at Unisys and with a British Army background as well as having previously worked for a defence research organisation, goes further and argues that the term "cyber war" is nonsense from a legal perspective.

"To be in a legal state of war," Fisher told IT PRO "you must formally declare war."

A more accurate term would be cyber conflict perhaps, which is governed by the rule of law, not the law of war.

"Cyber conflict," Fisher continues, "is essentially the ability to affect the information flowing through the information infrastructure to cause damage to your adversary."

Featured Resources

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management

Download now

6 ways your business could suffer if you don’t backup Office 365

Office 365 makes it easy to lose valuable data regularly, unpredictably, unintentionally, and for good

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now

8 digital best practices for IT professionals

Don't leave anything to chance when going digital

Download now
Advertisement

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/operating-systems/27717/how-to-fix-a-stuck-windows-10-update
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020
Visit/security/cyber-security/354827/mcafee-researchers-trick-tesla-autopilot-with-a-strip-of-tape
cyber security

McAfee researchers trick Tesla autopilot with a strip of tape

21 Feb 2020
Visit/policy-legislation/data-protection/354814/google-to-shift-uk-user-data-to-the-us-post-brexit
data protection

Google to shift UK user data to the US post-Brexit

20 Feb 2020