War tends to have significant social impact. Even back in the days of civilized warfare (civilians from Washington, D.C., went to view the first battle of Bull Run a.k.a. Manassas; they were caught in the retreat of the Union forces), there were significant impacts on Society. In the recent issue of IEEE Technology and Society Magazine, authors Flowers and Zeadally outline the challenges faced from Cyberwar.
When is a Cyber Abuse an Act of War?
The abusers include script-kiddies, criminals, corporate/national espionage, civil protests, up to nation-state attacks sometimes accompanied by “kinetic” battles. Events may go undetected for extended periods, or may take out significant military or economic targets (such as the power grid). And identifying the source of an attack can be difficult, particularly if the attackers choose to make it difficult.
This paper outlines nation state attacks ranging back to 1982, when a Soviet pipeline was destroyed, up to fairly recent events. It also provides a country of origin count for attacks in 2013 — with Russia leading (1.15 million) then the U.S. (0.86 million). China comes in at #8 (0.25 million) after Germany, Taiwan, Bulgaria, Hungary, and Poland. Of course the source country does not mean it is a state sponsored attack, nor does it mean that it is directed at military objectives nor might it damage persons or objects.
The NATO Cyber Defense Center of Excellence have sought to define cyber warfare in the recently published Tallinn Manual on International Law Applicable in Cyberwarfare. But many potential “Perps” are unlikely to pay much attention to International Law, and of course the response to a given attack becomes problematic if the source or responsible parties cannot be identified “beyond a reasonable doubt.”
The paper concludes that cyber attacks are increasing. Which leads to the question of what might be done … by technologists, by citizens, or by nation states. What evils are creeping across your part of the web? What might we do about it?
Also see: Cyberwar, the What, When, Why and How .
Photo By Sgt. Stephanie Hargett [Public domain], via Wikimedia Commons.