Abstract
In security circles, an ongoing debate on the nature of war revolves around the influence of cyberspace. Many security experts warn of a cyber “Pearl Harbor” that has the potential to cripple critical infrastructure of a targeted state. However, the history of cyber attacks suggests that this warning is overstated and that political interests will limit the extent of operations in the cyber domain just as war in the terrestrial domain. Counter to predictions, given the heavy reliance on cyber capabilities by modern economies, instances of cyber war and cyber warfare are relatively rare. Cyber experts and intelligence officials seem to be inflating the threat when evaluating the national security threats from cyberspace. This chapter will analyze cyber war from a war theory perspective and show that by ignoring the political goals of state action, many cyber theorists and security experts fail to understand the political goals of a cyber operation and therefore overestimate the risk to a given threat. Although the cyber domain is unique, the threats from the domain do not fundamentally change the nature of war. Military forces can effectively plan and execute operations in cyberspace using the same strategy and doctrine already used in the physical domains. Thus, cyberspace operations can be part of the tools of national power already used by states to influence other states.
Similar content being viewed by others
References
Albright, D., Brannan, P., & Walrond, C. (2011). Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 report (ISIS Report). Institute for Science and International Security, Washington, DC. http://isis-online.org/uploads/isis-reports/documents/stuxnet_update_15Feb2011.pdf. Accessed 22 Feb 2017.
Associated Press. (2008, March 11). Russia’s NATO envoy says offering Georgia membership track would bolster separatists. International Herald Tribune. http://www.iht.com/articles/ap/2008/03/11/europe/EU-GEN-Russia-NATO.php. Accessed 11 Feb 2017.
Bennett, B. (2015, February 26). Cyberattacks pose growing threat to U.S., Intelligence Chief says. Los Angeles Times. Los Angeles. http://www.latimes.com/nation/la-na-intel-cyber-20150226-story.html. Accessed 3 Mar 2017.
Bonner, E. L. (2014). Cyber power in 21st-century joint warfare. Joint Force Quarterly, 74(3), 102–109.
Bowen, W. Q., & Brewer, J. (2011). Iran’s nuclear challenge: Nine year and counting. International Affairs (Royal Institute of International Affairs), 87(4), 923–943.
Brenner, S. W. (2009). Cyberthreats: The emerging fault lines of the nation state. Oxford: Oxford University Press.
Bronk, C. (2016). Cyber threat: The rise of information geopolitics in U.S. National Security. Santa Barbara: Praeger.
Bumgarner, J. (2009). Overview by the US-CCU of the Cyber Campaign against Georgia in August of 2008. U.S. Cyber Consequences Unit. http://www.registan.net/wp-content/uploads/2009/08/US-CCU-Georgia-Cyber-Campaign-Overview.pdf. Accessed 11 Feb 2017.
Bumiller, E., & Shanker, T. (2012, October 11). Panetta Warns of Dire Threat of Cyberattack on U.S. The New York Times. http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html. Accessed 16 Nov 2016.
Bussing, J. (2013). The degrees of force exercised in the cyber Battlespace. Connections, 12(4), 1–13.
Chivers, C. J., & Shanker, T. (2008, September 2). Georgia eager to rebuild its defeated armed forces. The New York Times. http://www.nytimes.com/2008/09/03/world/europe/03georgia.html. Accessed 22 Feb 2017.
Clarke, R. A., & Knake, R. (2011). Cyber war: The next threat to National Security and what to do about it (Reprint ed.). New York: Ecco.
von Clausewitz, C. (1989). On War, Indexed Edition. (M. E. Howard & P. Paret, Trans.) (Reprint ed.). Princeton: Princeton University Press.
Davis, J. (2007, August 21). Hackers take down the most wired country in Europe. https://www.wired.com/2007/08/ff-estonia/. Accessed 3 Mar 2017.
Department of Homeland Security. (2009). National Infrastucture Protection Plan. Department of Homeland Security: Washington, DC.
Echavarria, A., II. (2007). Clausewitz and contemporary war. Oxford: Oxford University Press.
European Parliament. (2008). European Parliament resolution of 5 June 2008 on the situation in Georgia. European Parliament. http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+TA+P6-TA-2008-0253+0+DOC+XML+V0//EN&language=EN. Accessed 11 Feb 2017.
Farwell, J. P., & Rohozinski, R. (2012). The new reality of cyber war. Survival, 54(4), 107–120.
Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security, 38(2), 41–73.
Giles, K. (2016). Handbook of russian information warfare (Fellowship monograph no. 9) (p. 90). NATO Defence College. http://www.ndc.nato.int/news/news.php?icode=995. Accessed 3 Mar 2017.
Hollis, D. (2011). Cyberwar case study: Georgia 2008. Small Wars Journal. http://smallwarsjournal.com/jrnl/art/cyberwar-case-study-georgia-2008. Accessed 11 Feb 2017.
Howard, M. (1989). The influence of Clausewitz. In P. Paret (Trans.), On war, indexed edition (Reprint edition, pp. 27–44). Princeton: Princeton University Press.
Johnson, D. E., Mueller, K., & Taft, W. H. (2003). Conventional coercion across the Spectrum of operations: The utility of U.S. military forces in the emerging security environment. Santa Monica: RAND Corporation.
Katznelson, I. (2013). Baltic investment programme: Twenty years of joint Nordic financial and technical assistance to the three Baltic countries. Copenhagen: Nordic Council of Ministers.
Kerr, P. K. (2016). Iran’s nuclear program: Tehran’s compliance with international obligations (No. R40094). Congressional Research Service, Washington, DC. https://fas.org/sgp/crs/nuke/R40094.pdf. Accessed 18 Feb 2017.
Korns, S. W., & Kastenberg, J. E. (2009). Georgia’s cyber left hook. Parameters, 38(Winter 2008–09), 60–76.
Kozlowski, A. (2014). Comparative analysis of cyberattacks on Estonia, Georgia and Kyrgyzstan. European Scientific Journal, Special Edition, 3, 237–245.
Kushner, D. (2013). The real story of Stuxnet. IEEE Spectrum, 50(3), 48–53.
Libicki, M. C. (2014). Why cyber war will not and should not have its grand strategist. Strategic Studies Quarterly, 8(1), 23–39.
Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365–404. doi:10.1080/09636412.2013.816122.
Markoff, J. (2008, August 12). Before the Gunfire, Cyberattacks. The New York Times. http://www.nytimes.com/2008/08/13/technology/13cyber.html. Accessed 13 Feb 2017.
Mgaloblishvili, G. (2017, February 1). Phone interview.
Myers, S. L. (2007, April 27). Russia rebukes Estonia for moving Soviet statue. The New York Times. http://www.nytimes.com/2007/04/27/world/europe/27cnd-estonia.html. Accessed 5 Mar 2017.
Nakashima, E., & Warrick, J. (2012, June 2). Stuxnet was work of U.S. and Israeli experts, officials say. Washington Post. https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html. Accessed 6 Mar 2017.
Nuclear Threat Initiative. (2016). Iran: Nuclear. Nuclear Threat Initiative. Retrieved from http://www.nti.org/learn/countries/iran/nuclear/. Accessed 22 Feb 2017.
Nye, J. S. (2010). Cyber Power. Cambridge, MA: Belfer Center for Science and International Affairs.
Palmer, G., D’Orazio, V., Kenwick, M., & Lane, M. (2015). The MID4 data set: Procedures, coding rules, and description. Conflict Management and Peace Science, 32(2), 222–242.
Patel, T. (2011, April 21). Was INSAT-4B victim of malicious malware Stuxnet? Indian Defence Review. http://www.indiandefencereview.com/news/was-insat-4b-victim-of-malicious-malware-stuxnet/. Accessed 1 Mar 2017.
Pukk, P. (2011). Goods in transit over the last decade. Quarterly Bulletin of Statistics Estonia, 104–112.
Richards, J. (2009). Denial-of-service: The Estonian cyberwar and its implications for U.S. National Security. International Affairs Review, 18(2.) http://www.iar-gwu.org/node/65. Accessed 3 Feb 2017.
Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5–32. doi:10.1080/01402390.2011.608939.
Russell, A. L. (2014). The Georgia-Russia war. In Cyber Blockades (pp. 96–127). Washington, DC: Georgetown University Press.
Sale, R. (2012, April 11). Stuxnet Loaded by Iran Double Agents. isssource.com. http://www.isssource.com/stuxnet-loaded-by-iran-double-agents/. Accessed 22 Feb 2017.
Sanger, D. E. (2012, June 1). Obama order sped up wave of cyberattacks against Iran. The New York Times. http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html. Accessed 21 Feb 2017.
Springer, P. J. (2015). Cyber Warfare. Santa Barbara: Springer.
Stone, J. (2013). Cyber war will take place! Journal of Strategic Studies, 36(1), 101–108. doi:10.1080/01402390.2012.730485.
Swaine, B. J. (2008, August 11). Georgia: Russia “conducting cyber war.” The Telegraph. http://www.telegraph.co.uk/news/worldnews/europe/georgia/2539157/Georgia-Russia-conducting-cyber-war.html. Accessed 14 Feb 2017.
Tagliavini, H. (2009a). Independent International Fact-Finding Mission on the Conflict in Georgia. Volume II. Council of the European Union. www.mpil.de/files/pdf4/IIFFMCG_Volume_II1.pdf. Accessed 11 Feb 2017.
Tagliavini, H. (2009b). The Independent International Fact-Finding Mission on the Conflict in Georgia. Volume I. Council of the European Union. http://www.mpil.de/files/pdf4/IIFFMCG_Volume_I1.pdf. Accessed 11 Feb 2017.
Tikk, E., Kaska, K., Rünnimeri, K., Kert, M., Talihärm, A.-M., & Vihul, L. (2008, November). Cyber attacks against Georgia: Legal lessons identified. Cooperative Cyber Defence Centre of Excellence. http://www.ismlab.usf.edu/isec/files/Georgia-Cyber-Attack-NATO-Aug-2008.pdf. Accessed 12 Feb 2017.
Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford: Oxford University Press.
Wagstyl, S. (2007, May 3). Russia rail move to hit Estonian supply line. Financial Times. http://www.ft.com/cms/s/0/414f92b0-f928-11db-a940-000b5df10621.html?ft_site=falcon&desktop=true#axzz4aTcWvyMe. Accessed 5 Mar 2017.
Weinstein, D. (2014). Snowden and U.S. cyber power. Georgetown Journal of International Affairs, International Engagement on Cyber, IV, 4–11.
Williams, B. T. (2014). The joint force Commander’s guide to cyberspace operations. Joint Force Quarterly, 73, 12–19.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this entry
Cite this entry
Baltrusaits, D.F. (2017). Cyber War: Do We Have the Right Mindset?. In: Carayannis, E., Campbell, D., Efthymiopoulos, M. (eds) Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, Cham. https://doi.org/10.1007/978-3-319-06091-0_24-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-06091-0_24-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06091-0
Online ISBN: 978-3-319-06091-0
eBook Packages: Springer Reference Economics and FinanceReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences