SlideShare uma empresa Scribd logo
1 de 12
1 Gus T. Rankin
‘Cyberwar will not take place.’ Discuss
‘Known knowns,therearethingswe know thatweknow.We also know there are known unknowns,
thatis to say thereare somethingsthat wedo notknow.Butthere are also unknown unknowns,the
oneswe don’tknowwedon’tknow’
– DonaldRumsfeld –US Secretaryof Defence.1
To beginwe muststate that there are differingviewssurroundingcyberwarwithmostof them
of a hypothetical nature.DonaldRumsfeld’squotationon ‘knownunknowns’ resonateswiththe
hypothetical nature of these arguments.Thus,inanera of Moore’sLaw - and therefore increasing
‘knownunknowns’ and‘unknownunknowns’ –the argumentswe are presentingare thatmuchmore
fallible. Aswe will see, some argue thatcyberwarisalreadytakingplace,butthe majorityof thisessay
will be outliningthe twoprevailingarguments: thatcyberwarwill come,andthatcyberwaris
overhyped.We willlargelyassessthe realistperspective inThomasRid’s‘Don’tfearthedigital
bogeyman’,alongside MyriamDunnCavelty’s Cyber-Security and ThreatPolitics, alongside her‘A likely
as a visitfromE.T.’. Onthe contrary,we will assessRichardClark’scatastrophicperspective,with,in
tangentthe worksof JohnArquillaandJamesMcGregor.Thisessayis therefore artificiallycreatingtwo
sidesof the debate inorderto clarifyananswerto the clear-cutpresumptionsof the question. From
this,we will analyse the argumentsputforwardastwopropositions,andcritique themaccordingto
otheracademicsviewontheirviability. Before we starttoassesswhethercyberwarwillorwill nottake
place,we mustaccept that eachacademichas theirowndefinitionof whatcyberwarcanbe definedas.
Whetheryoucan define cyberwarwhenusedalongside physical militaryequipmentinaidof military
gain,or for economicmeans;orwhetheryoucan merelydefine cyberwarwithinthe parametersof
cyberspace,these are discussionthatwe will assessonce all argumentshave beenconsidered.
1
P.W.SingerandAllanFriedman, Cybersecurity and Cyberwar:Whateveryoneneedsto know (New
York, 2014) p255
2 Gus T. Rankin
To begin,we can lookat RichardClarke’scatastrophistview,thatcyberwarhasbeguninhis
workon ‘Who Was Behind the StuxnetAttack’.Clarke statesthatsince the Stuxnet’svirus,weaponised
malware can be obtainedonlinebyanybody,stating ‘itwasgiven the worldforfree’.2
Followingon
fromthis,Clarke believeshe hasgoodevidence forthistobe the case, as we will explore late; he is
suggestingthatany‘whizkid’couldcreate theirown‘Stuxnet’.A trulyterrifyingthought,thatsucha
weapon, whichcaused suchdivertactionas‘seizingthe control of the machinesrunningcentrifuges
and… desynchronizethe speedsatwhichthe centrifugesspin,causingnearlyathousandof themto
seize up,crashand otherwise self-destruct’.3
Clarkeisstatingthatthismalware isnow accessible to
anybody;howeverwithsuchanarrow perception,Clarke asacatastrophistonlyseestrouble ahead.
Thisis notwhat trulyworriesClarke,whatworrieshimisthisideaof a‘deathof a thousandcuts’,4
where he describesthe theft of Americanresearchanddevelopmentasaway of removingtheir
competitiveness;butalsothe impactthiscouldhave uponopeningmilitaryequipmentto Chinese
cyberintervention.Clarketherefore believesthe UnitedStatesmilitarytobe inadequate when
weaponizedmalware suchasStuxnetcanbe usedina waythat providesmilitaryequipmentuseless,or
evencounter-productive. ThisisfurtheremphasisedbyPeterSinger andAllanFriedmanintheirbook
on Cybersecurityand Cyberwarfare,wheretheystate thatthe U.S.has 8,000 PredatorandReaper
drones,all controlledfrommilitaryroboticprograms,whichinturnallowsthemtobe opentoattack.5
Again,we mustbearin mindthat thisisof the catastrophicperspectivewhichfundamentallyfailsto
see the humanrace as one of cooperation.Which tosome extentislegitimisedwhenlookingatactions
takenby the Chinese state,andthe thenrecognitionbythe U.S.governmentof thisthreat;itishere
2
Rosenbaum,Ron,featuringRichardClarke, Richard Clarkeon Who WasBehind theStuxnetAttack,
The Smithsonian: http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was-
Behind-the-Stuxnet-Attack.html?c=y&story=fullstory p6
3
Rosenbaum,Ron,featuringRichardClarke, Richard Clarkeon Who WasBehind theStuxnetAttack,
The Smithsonian: http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was-
Behind-the-Stuxnet-Attack.html?c=y&story=fullstoryp2
4
Rosenbaum,Ron,featuringRichardClarke, Richard Clarkeon Who WasBehind theStuxnetAttack,
The Smithsonian: http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was-
Behind-the-Stuxnet-Attack.html?c=y&story=fullstory p6
5
P.W.SingerandAllanFriedman,CybersecurityandCyberwar:Whateveryone needstoknow (New
York, 2014) p130
3 Gus T. Rankin
where we can ascertainthe problemsof cybersecurity,and putClarke’sviewintoperspective. We see
some recognitionof Chinese economicespionage, demonstratedbyMichigan’s8th
District
representative Michael Rogers, whenhe stated,‘China’seconomicespionagehasreachedan
intolerablelevel andIbelieve thatthe UnitedStatesandouralliesinEurope andAsiahave an
obligationtoconfrontBeijinganddemandthattheyputa stopto thispiracy’.6
Thisstatement
recognisesthatChinaare indeedcoercinginsuchactivities,butona widernote givessome perspective
to the catastrophicworldinwhichClarke describes. The opposingside of the argument,the realist,
woulddismissChineseespionageasone thatis overhyped,andwoulddefine theirperceptionsof ‘war’,
or potential future ‘war’,alongthe parametersof death;whichtheywouldargue,cyberwarhasfailed
to deliveron. Nevertheless,beforedismissingClarkes view,we willdelve deeperintoChinese actions,
assessingwhetherClarke’sview iswarranted.
We see fromnumeroussourcesthatChinahack for the purpose of espionage,andalthough
thisessayisnot basedaroundwhetherornot Chinahack the UnitedStates,itgoessomewayto
validatingRichardClarke’snotionthatcyberwarisinfact takingplace,or rather,isa possibility.Firstwe
see fromexamplesinJamesMcGregor’swork,thatJoe Stewart,directorof malware atDell
SecureWorks,state that‘Chinese spieshave rentedorhackedforthe purpose of espionage’;7
which
withthe verydefinitionof ‘espionage’servestoindicate alevel of militarythreat.Fromthiswe cango
on to state that Mandiant,a private cybersecuritycompany,foundthe same results,havingtracedthe
‘the mostprolificcyberespionagegroupsintermsof sheerquantityof informationstolen’.8
According
to Mandiant,the companieswhere the datawasstolen,matcheddirectlythe ‘industriesthatChinahas
6
Mike Rogers, “Mike Rogers,Statementtothe U.S.House,PermanentSelectCommittee on
Intelligence,OpenHearing:CyberThreats andOngoingEffortstoProtectthe Nation,Hearing,October
4, 2011,
http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/100411CyberHearingRoger
s. pdf accessedFebruary6, 2013
7
JamesMcgregor,The Atlantic,April 27th
2013: ‘Is thespecter of a cyber cold war real?’
http://www.theatlantic.com/china/archive/2013/04/is-the-specter-of-a-cyber-cold-war-real/275352/
8
JamesMcgregor,The Atlantic,April 27th
2013: ‘Is thespecter of a cyber cold war real?’
http://www.theatlantic.com/china/archive/2013/04/is-the-specter-of-a-cyber-cold-war-real/275352/
4 Gus T. Rankin
identifiedasstrategictotheirgrowth’,whichwasidentifiedwithinthe mostrecentChineseFive Year
Plan.9
Furthermore,withinanofficialdocumentissuedonbehalf of the DepartmentforHomeland
Securityandeighteenothernational bodies,the 2013 Data Breach InvestigationsReport,compiledby
Verizon’sRiskTeam,notedthat‘state-affiliatedactorstiedtoChinawasthe biggestmoverin2012,’
whowenton to state, ‘theireffortstosteal IPcomprise aboutone-fifthof all breachesinthisdataset’
and thiswasmerelyinIPaddresses.10
Whereasonawidernote,itwasstatedthat 96% of espionage
caseswere attributedtothreatactors in China,andthe remaining4% were unknown.11
Thistherefore,
go some way to suggestthere are claimsthat back upRichard Clarke’snotionthatChinaare stealing
U.S. data; yet,we can go no furtherinexplainingtheirtrue intentions,whichiswhatwill trulydeclare
whetherornot a cyberwarwill take place.Fora cyberwarto take place,the UnitedStatesmustmake a
perverse actiontorespond,somethingwhichClarke believesthe U.S.isunwilling/incapable todo.
Despite this,NickHopkinsof the Guardian,statesthe U.S.andChinahave beenreactingtoone-an-
other,statinginhisarticle on cybercrime,thatamidthe risingangeroverthe scale andaudacityof
Beijing-co-ordinatedcyberattacks,the USand Chinahave beenengagingin‘wargames’.12
Though,as
statedinHopkinsarticle,of the countriesactivelyinvolvedincyberespionage, Chinaisthe onlyone
likelytobe a militarycompetitortothe UnitedStates,13
thereforegoingsomewaytosuggestfor
9
JamesMcGregor, The Atlantic,April 27th
2013: ‘Isthe spectreof a cybercold warreal?’
http://www.theatlantic.com/china/archive/2013/04/is-the-specter-of-a-cyber-cold-war-real/275352/
10
VerizonEnterprise, 2013 Data Breach InvestigationsReport,2013,
http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-
2013_en_xg.pdf accessed03/12/2015
11
VerizonEnterprise, 2013 Data Breach InvestigationsReport,2013,
http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-
2013_en_xg.pdf accessed03/12/2015
12
NickHopkins, USand China engagein Cyber ‘wargames’,16th
April 2012,
http://www.theguardian.com/technology/2012/apr/16/us-china-cyber-war-gamesaccessed
27/11/2015
13
NickHopkins, USand China engagein Cyber ‘wargames’,16th
April 2012,
http://www.theguardian.com/technology/2012/apr/16/us-china-cyber-war-games accessed
01/12/2015
5 Gus T. Rankin
cyberwarto actuallytake place,there needstoajointthreatof bothmilitarilyandcyber,otherwise,as
Ridstates,it’sjustan inconvenience.14
To assessthe viewthatcyberwarwill infacttake place,we will lookatthe worksby David
RonfeldtandJohnArquilla,intheir Networks,Netwars,and theFightfortheFuture, 2001. Here they
presentthemselvesasrationalists,thatbelieveanevernetworkcentricworldcanbenefitthe world,
howevertheyhave reservationsjustlike PeterSingerandAllanFriedmanhave intheir Cybersecurity
and Cyberwar. The reservationsthatRonfeldtandArquillahold,lie inthe rise of networks andwhat
thismeansintermsof mitigatingpowertononstate actors;whichis alsoimpliedinSingersbookwhen
he usesthe metaphor,‘the nationsmostskilledatthrowingrockslive inthe biggestglasshouses’,15
referringtothe interconnectednature of nationstatessuchas the UnitedStates. The term‘netwar’
that RonfeldtandArquillacoinedin1993, is meanttocall attentiontothe prospectthat network-
basedconflictandcrime will become amajorphenomenoninthe decadesahead.16
Yet, althoughthey
have redefinedthisthreatonthe basisof non-state actorsintheir2001 work,thisdoesnot affectthe
basisof the argument,andthat still lieswiththe rejectionof the propositionthat‘cyberwarwill not
take place’.The ambivalentnature thatRonfeldtandArquillaprovide tothisdefinitionof ‘netwar’is
testamenttothe ambivalentnature of the evergrowingcapabilitiesof anopenlygrowingnetwork,
whichprovides,asRumsfeldindicates, evermore ‘unknownsunknowns’.Withthis,we canargue that
stateswill become factorsinthis‘netwar’thatRonfeldtandArquilladescribe,whethertheychose toor
not; therefore,we cancontradictthe question,andstate thatcyberwarwill take place –it’sisjust a
matterof whoit will be between,non-state orstate,andaccordingly,whetherornotphysical military
will be involved.
14
Thomas Rid, ‘ThinkAgain:CyberwarDon'tfearthe digital bogeyman.Virtualconflictis still more hype
than reality.’ ForeignPolicy,March/April 2012.
15
P.W.SingerandAllanFriedman, Cybersecurity and Cyberwar:Whateveryoneneedsto know (New
York, 2014) p152
16
DavidRonfeldtandJohnArquilla, Networks,Netwars,and theFightfortheFuture (RAND,2001)
Chapter10
6 Gus T. Rankin
Furtherto this,JohnArquillausesthe Russo-Georgianconflictin2008, as a way of
foreshadowingthe risingdominance of cyberwar;implyingthatitwill onlybecome more destructive
overtime.The evidence forthis,andthroughhisrebuttal of ThomasRid’shypothesisethatCyberwaris
all hype,comeswiththe notionthatphysical warwill still take place,andcyberwarwillbe afunction
towardsachievingmilitarygains –he callsthis Network-centricwarfare - 17
therefore,Arquillahasa
differingdefinitionof cyberwarthansayThomasRid.We can state thisbecause Ridacknowledgesthat
cyberwarwill playapart of alongside physical warfare,Rid’sonlyproblemishe doesn’tsee itasa
capable threat,whereasArquillaseesitonlyasa credible threatalongsidemilitaryequipment.Bothdo
not followthe argumentof RichardClarke,whosideswithothersinthe U.S.governmentlikeLeon
Panetta,the FormerDefense Secretary,whocoinedthe term‘CyberPearl Harbour’.18
SowhatIam
gettingat here,isthat, because Arquillastatesthatcyberwarisalreadyhere,itdoesnotmeanhe is far
away fromwhatRid issuggesting,rathertheyjusthave differingdefinitionsof cyberwar.Movingon,
we can see that there are those whobelieve cyberwarisathreat inand of itself,andwe have those
whobelieve itisathreatalongside physicalmilitaryequipment –bothof whichIam arguingare
cyberwarfare.Nevertheless,bothRidandArquillaare ondifferingsidesof the debate,asadirectresult
of theirownwording, asRiddoesnotdenythat cybersecuritywillnotbecome afactorwithinwarfare,
he is merelypointingoutitsthreathasbeenoverhyped,similarlytoMyriamDunnCavelty.Therefore,
it istheirperspectiveonhumannature thatsplitsup both Ridand Arquilla,forRidisquite obviouslya
realist,whereasArquilla,asstatedbyhimself,‘illuminatesthe potentialof cyberwar’.19
Something
whichMyriam DunnCaveltygoesonto criticisesheavilyinherbookon Cyber-Security and Threat
Politics, as we will assesslater.
17
Myriam Dunn Cavelty, Cyber-Security and ThreatPolitics (Routledge,2008) p69
18
Leon Panetta, Leon Panetta warnsof 'cyberPearlHarbour', 12th
October2012,
http://www.bbc.co.uk/news/technology-19923046 accessed01/12/2015
19
JohnArquilla,Rebuttal: Cyberwarisalready upon us,butcan it be controlled? ForeignPolicy,
March/April 2012
7 Gus T. Rankin
Anotherareathat islookedat byJohnArquillaalone inhisrebuttal of ThomasRid,ishow
destructive cyberwarwill becomeovertime.Here we cancontrastthe two differingexamplesboth
ArquillaandRiduse,andsee howtheypresenttheir argumentsaccordingultimatelydecidingwhois
the most convincing.Tobegin,we see Arquillause the example of the Russo-Georgianconflictof 2008,
statinghowtheirinvasionwas‘greatlyeasedbycyberattacksonTbilisi’scommand,control,and
communicationssystems’,20
effectivelywipingouttheirmilitaryoppositiontothe invasion. Arquilla
usesthisas a perfectindicatorasto where the future of warfare lies,he associatescyberwarfare with
‘aerial bombing’,indicatingthata warcannot be won single handedlybyaerial bombardment;
associatingthe Russo-Georgianconflict,directlywiththe SpanishCivil War75 yearsago.21
Addingto
this,It is Arquilla’sbelief that,‘engagingindisruptivecyberattacksalone ishardlyawayto winwars’.22
However,adirectcomparisontoArquilla’sworkanda realistswork,wouldbe the view takenonthe
Israeli airraidon the Osiraknuclearreactor 30 yearsago, whichPeterSingerstates,killed ‘eleven
soldiersandcivilians’.23
The presentdayswayof coercive action,Stuxnet, however, didnothurta
single personnevermindkill one,24
there wassimplynocollateral damage,anditishardto see there
everbeingsowitha weaponssuchas Stuxnetwhichhasone simple aim.ThomasRidalsomakesthese
points,yethe usesfarmore examplesrangingfromEstoniatoStuxnet,statingsimplythatneitherfulfil
the criteriainthe definitionof war.25
He refutesArquilla’snotionthatthere willbe anescalationof
these threats,throughthe ideathatas we become more interconnected,we alsobecomemore aware
to the threats,and shouldthe likesof a‘Stuxnet’infectacomputersystem, itisverylikelythatitwasa
20
JohnArquilla,Rebuttal: Cyberwarisalready upon us,butcan it be controlled? ForeignPolicy,
March/April 2012
21
JohnArquilla,Rebuttal: Cyberwarisalready upon us,butcan it be controlled? ForeignPolicy,
March/April 2012
22
JohnArquilla,Rebuttal: Cyberwarisalready upon us,butcan it be controlled? ForeignPolicy,
March/April 2012
23
P.W.SingerandAllanFriedman,Cybersecurity and Cyberwar:Whateveryoneneedsto know (New
York, 2014) p119
24
P.W.SingerandAllan Friedman, Cybersecurity and Cyberwar:Whateveryoneneedsto know (New
York, 2014) p119
25
Thomas Rid,‘ThinkAgain:CyberwarDon'tfearthe digital bogeyman.Virtualconflictis still more hype
than reality.’ ForeignPolicy,March/April 2012.
8 Gus T. Rankin
state-actordue to the sheercostand intelligence requiredtocreate one.Therefore,notonlyare
cyberattacks becominghardertoachieve,accordingtoRid,there isno evidence tosuggesttheyare
escalatingeither– forthe primarythreat to the U.S., as statedintheirmostrecentNational Security
Strategy,isthe threat of terrorism,Climate Change andthe spreadof Weaponsof Mass Destruction.26
Movingon fromthis,the realistMyriamDunn Caveltystatesthatthe ideaof a coming
cyberwarisnonsense.27
Inherbookon Cyber-Security and ThreatPolitics, she describesthe link
betweenperceivedthreatand vulnerabilities,andusesthe example of ‘rapiddevelopmentof
informationinfrastructure’asaprime example of this.28
Caveltystates,thatitisthe perceivedthreatof
the increasinglynetworkedglobal informationinfrastructure thatispartof the insecuritybehindthose
ingovernment,andthe reasonwhythe likesof RichardClarke argue that‘cyberwarhas already
begun’.29
Whatit seemsCaveltyissaying,isthatbecause governmentscannotcontrol the inherently
insecure nature of informationtechnology,theybelieve ittobe a threat,Caveltyreferstothisas an
‘unboundedsystem’.30
Inherarticle on‘A likelyasavisitfromE.T.’,she statesthat yeswe are
vulnerable,butthatdoesnotmeanit islikely,warningthatthe drive of resourcesawayfrom projects
that are ‘integral toourdefense andsafety’,iswhatisthe real threat. 31
Caveltygoessome wayto
dismissArquilla,andagreeingwithRid,bystatingthatthe ‘hackingof websitesisnotwar’,‘noteven
sabotaginganindustrial plantwithsophisticatedmalware iscyberwar’. 32
She goesfurtheragreeing
26
Presidentof the UnitedStates, NationalSecurity Strategy,February 2015
https://www.whitehouse.gov/sites/default/files/docs/2015_national_security_strategy.pdf accessed
02/12/2015
27
Myriam Dunn CaveltyThe European‘Aslikely asa visit fromE.T.’, Jan2011:
http://www.theeuropean-magazine.com/myriam-dunn-cavelty--2/6128-cyberwar-and-cyberfear
28
Myriam Dunn Cavelty, Cyber-Security and ThreatPolitics (Routledge,2008) Chapter4
29
Rosenbaum,Ron,featuringRichardClarke, Richard Clarkeon Who WasBehind theStuxnetAttack,
The Smithsonian: http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was-
Behind-the-Stuxnet-Attack.html?c=y&story=fullstory p1
30
Myriam Dunn Cavelty, Cyber-Security and ThreatPolitics (Routledge,2008) p67
31
Myriam Dunn CaveltyThe European‘Aslikely asa visit fromE.T.’, Jan2011
http://www.theeuropean-magazine.com/myriam-dunn-cavelty--2/6128-cyberwar-and-cyberfear
32
Myriam Dunn CaveltyThe European‘Aslikely asa visit fromE.T.’, Jan2011
http://www.theeuropean-magazine.com/myriam-dunn-cavelty--2/6128-cyberwar-and-cyberfear
9 Gus T. Rankin
withRid,bybelievingthata war still standsfor‘violence,destructionandsuffering’,somethingshe
believesisimpossible withcyberwarfare.Here however,Caveltyisseparatingconventional warfare
and cyberwar,withnoinclinationthatone couldassistthe other,whichisacriticismArquillahadfor
Rid,and thisissomethingwhichislackinginCavelty’scriticismof the future of cyberwar.Despite this,
Caveltyplaysdownthe importance of cyberwar,byrenouncingsome of the misconceptions - that
cyberwaris‘completelyunsuitableasa weaponforthe weak’due to the sheercostand intelligence
neededforaweaponof thiskind, whichwouldalsohave tobe tailoredtoa specificattack,makingit
impossible tohave anarsenal of such weapons.33
Sowe can state by the evidence provided,that
cyberwarisoverhypedbya wayof potential threatdue tothe ‘unboundednature’of cyberspace;but
we can criticise the realistswhosimplyignore the practicalitiesof cyberwarwithinconventional
warfare,sowhat we are reallydismissinghere,isthe realitiesthatthere will everbe aneventlike Leon
Panettastated,a ‘CyberPearl Harbour’.34
To conclude,tostate what the future of cyberwarlookslike istotreadinto what Rumsfeld
wouldcall the unknown.However, forthe assumptionsof thisessay,Iwill be usingthe following
definitionof cyberwartoconclude whetherornotit will take place.The parametersof cyberwarfall
short of what we wouldconsiderconventional warfare.However,cyberwarcould, andhas beenused
alongside conventional forces;cyberwarcould alsobe definedas gaininganeconomicadvantage,as
longas both sidesare practicing,toa pointwherebyphysical confrontationmaybe inevitable. With
thisknowledge, we canstate that itis JohnArquilla’sargumentwhichalignsitself withthisdefinitionof
cyberwar,whilstalsoholding upagainstthe realistcritiquesof ThomasRidand Myriam Dunn Cavelty;
Arquilla’sargumentalsoconvincinglydismissesRichardClarke’scatastrophicinterpretation.Arquilla’s
interpretationof cyberwarusescontemporary andhistorical examplesinaconvincingway,whichserve
33
Myriam Dunn CaveltyThe European ‘Aslikely asa visit fromE.T.’, Jan2011
http://www.theeuropean-magazine.com/myriam-dunn-cavelty--2/6128-cyberwar-and-cyberfear
34
Leon Panetta, Leon Panetta warnsof 'cyberPearl Harbour', 12th
October2012,
http://www.bbc.co.uk/news/technology-19923046 accessed01/12/2015
10 Gus T. Rankin
to convince thathisperceptionof humannature andhispredictionsoutweighthe opposingarguments.
Notonlydo Ridand Cavelty’sarguments dismissthe impactcyberwarcouldhave uponthe
conventional military,theydismissthe conventional exampleswhere the twotypesof warfare have
merged.AlthoughIrecognise Caveltyhasadifferinginterpretationof the definitionof war, whichis
one of ‘violence,destructionandsuffering’; Istill believethisdefinitionfitsArquilla’sargumentthat
‘cyberwaristakingplace’, andthus dismisses the premise of the question.Despite this,the fact
conventional warwill continue totake place asthe realistspointout,cyberwarcanand will continue to
assistinensuringthistakesplace;thuscontributingto,Cavelty’sdefinitionof war,which is‘violence,
destructionandsuffering’.ArquillaalsosuccessfullyarguesinhisworkwithDavidRonfeldt,through
the term netwar,thatwe are onlygoingto become more interconnected,more chaotic,therefore not
onlyare we inthe era of cyberwartoday,we will be inthe future,anditisonlygoingto get more
severe.
Word Count:3012
11 Gus T. Rankin
Bibliography:
Arnuk,Sal.and Saluzzi,Joseph., Broken Markets:How High Frequency Predatory Practiceson Wall
Street Are Destroying InvestorConfidenceand YourPortfolio (FTPress,2012)
Arquilla,John., Rebuttal:Cyberwarisalready upon us,butcan it be controlled? ForeignPolicy,
March/April 2012
Cavelty,MyriamDunn., Cyber-Security and ThreatPolitics (Routledge,2008)
Cavelty,MyriamDunn.,The European‘Aslikely as a visit fromE.T.’,Jan 2011 http://www.theeuropean-
magazine.com/myriam-dunn-cavelty--2/6128-cyberwar-and-cyberfear
Hopkins,Nick., USand China engagein Cyber‘wargames’,16th
April 2012,
http://www.theguardian.com/technology/2012/apr/16/us-china-cyber-war-games
McGregor, James.,The Atlantic,April 27th
2013: ‘Isthe spectreof a cybercold warreal?’
http://www.theatlantic.com/china/archive/2013/04/is-the-specter-of-a-cyber-cold-war-real/275352/
Panetta,Leon., Leon Panetta warnsof 'cyberPearl Harbour', 12th
October2012
http://www.bbc.co.uk/news/technology-19923046
Presidentof the UnitedStates,National SecurityStrategy, February 2015,
https://www.whitehouse.gov/sites/default/files/docs/2015_national_security_strategy.pdf
Rid,Thomas., ‘ThinkAgain:CyberwarDon'tfearthe digital bogeyman.Virtualconflictis still more hype
than reality.’ForeignPolicy,March/April 2012.
Rogers,Mike., Mike Rogers,Statementtothe U.S.House,PermanentSelectCommittee onIntelligence,
Open Hearing:Cyber Threatsand Ongoing Effortsto ProtecttheNation,Hearing,October4, 2011,
http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/100411CyberHearingRoger
s. pdf
Ronfeldt,David.,andArquilla,John., Networks,Netwars,and theFightfortheFuture (RAND,2001)
Rosenbaum,Ron., featuringRichardClarke, Richard Clarkeon Who Was Behind the StuxnetAttack, The
Smithsonian:http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was-
Behind-the-Stuxnet-Attack.html?c=y&story=fullstory
Singer,PeterW.andFriedman,Allan., Cybersecurity and Cyberwar:Whateveryoneneedsto know
(NewYork,2014)
12 Gus T. Rankin
VerizonEnterprise, 2013 Data Breach InvestigationsReport,2013,
http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-
2013_en_xg.pdf

Mais conteúdo relacionado

Destaque

Vaca esutdiosa "A"
Vaca esutdiosa "A"Vaca esutdiosa "A"
Vaca esutdiosa "A"bloglourdes
 
Uma aplicação da tecnologia de coleta de dados na gestão de materiais no seto...
Uma aplicação da tecnologia de coleta de dados na gestão de materiais no seto...Uma aplicação da tecnologia de coleta de dados na gestão de materiais no seto...
Uma aplicação da tecnologia de coleta de dados na gestão de materiais no seto...Alexandre Bento
 
Como fomentar a função estar na praça
Como fomentar a função estar na praçaComo fomentar a função estar na praça
Como fomentar a função estar na praçaJoana Lopes
 
Decoupage em tecido 3
Decoupage em  tecido 3Decoupage em  tecido 3
Decoupage em tecido 3Autonoma
 
Boletim Janeiro 2011
Boletim Janeiro 2011Boletim Janeiro 2011
Boletim Janeiro 2011cspego
 
Adivinha !!!
Adivinha !!!Adivinha !!!
Adivinha !!!... ...
 
Exercicios revisão para prova
Exercicios   revisão para provaExercicios   revisão para prova
Exercicios revisão para provaUniversal.org.mx
 
Arvore geradora mínima
Arvore geradora mínimaArvore geradora mínima
Arvore geradora mínimamicael
 
A ética deontológica de kant
A ética deontológica de kantA ética deontológica de kant
A ética deontológica de kantAnaKlein1
 
Cursos Polilab - Degradação e estabilização de polímeros aula 03
Cursos Polilab - Degradação e estabilização de polímeros aula 03Cursos Polilab - Degradação e estabilização de polímeros aula 03
Cursos Polilab - Degradação e estabilização de polímeros aula 03Fernando Jose Novaes
 

Destaque (20)

Vaca esutdiosa "A"
Vaca esutdiosa "A"Vaca esutdiosa "A"
Vaca esutdiosa "A"
 
Uma aplicação da tecnologia de coleta de dados na gestão de materiais no seto...
Uma aplicação da tecnologia de coleta de dados na gestão de materiais no seto...Uma aplicação da tecnologia de coleta de dados na gestão de materiais no seto...
Uma aplicação da tecnologia de coleta de dados na gestão de materiais no seto...
 
Magnetismo terrestre
Magnetismo terrestreMagnetismo terrestre
Magnetismo terrestre
 
Colombia
ColombiaColombia
Colombia
 
Tirocínio franciscano
Tirocínio franciscanoTirocínio franciscano
Tirocínio franciscano
 
La cpu
La cpuLa cpu
La cpu
 
Como fomentar a função estar na praça
Como fomentar a função estar na praçaComo fomentar a função estar na praça
Como fomentar a função estar na praça
 
Lectura miercoles
Lectura miercolesLectura miercoles
Lectura miercoles
 
Programa navidad 2010 2011
Programa navidad 2010 2011Programa navidad 2010 2011
Programa navidad 2010 2011
 
Decoupage em tecido 3
Decoupage em  tecido 3Decoupage em  tecido 3
Decoupage em tecido 3
 
Um olhar para os nossos jovens...roberto crema
Um olhar para os nossos jovens...roberto cremaUm olhar para os nossos jovens...roberto crema
Um olhar para os nossos jovens...roberto crema
 
Boletim Janeiro 2011
Boletim Janeiro 2011Boletim Janeiro 2011
Boletim Janeiro 2011
 
Adivinha !!!
Adivinha !!!Adivinha !!!
Adivinha !!!
 
Exercicios revisão para prova
Exercicios   revisão para provaExercicios   revisão para prova
Exercicios revisão para prova
 
Apresentação1
Apresentação1Apresentação1
Apresentação1
 
Arvore geradora mínima
Arvore geradora mínimaArvore geradora mínima
Arvore geradora mínima
 
A ética deontológica de kant
A ética deontológica de kantA ética deontológica de kant
A ética deontológica de kant
 
Tarefa 5
Tarefa 5Tarefa 5
Tarefa 5
 
Cursos Polilab - Degradação e estabilização de polímeros aula 03
Cursos Polilab - Degradação e estabilização de polímeros aula 03Cursos Polilab - Degradação e estabilização de polímeros aula 03
Cursos Polilab - Degradação e estabilização de polímeros aula 03
 
Wq Insetos
Wq InsetosWq Insetos
Wq Insetos
 

Semelhante a 'Cyberwar will not take place' Discuss

Double Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdfDouble Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdfCharlie
 
Annotated bibliography
Annotated bibliographyAnnotated bibliography
Annotated bibliographyJerica Knox
 
Digital fortress presentation
Digital fortress presentationDigital fortress presentation
Digital fortress presentationninners
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
germany chancellor
germany chancellorgermany chancellor
germany chancellorAli J
 
Journal of Physical Security 7(1)
Journal of Physical Security 7(1)Journal of Physical Security 7(1)
Journal of Physical Security 7(1)Roger Johnston
 
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...Strategic Latency and World Power: How Technology Is Changing Our Concepts of...
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...Lawrence Livermore National Laboratory
 
Foreign Affairs Review Winter Issue, 2013. Syria Edition
Foreign Affairs Review Winter Issue, 2013. Syria Edition Foreign Affairs Review Winter Issue, 2013. Syria Edition
Foreign Affairs Review Winter Issue, 2013. Syria Edition Nic Carter
 
Richard A. Clarke Review - Enderson
Richard A. Clarke Review - EndersonRichard A. Clarke Review - Enderson
Richard A. Clarke Review - EndersonErin Enderson
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTeresa Long
 
Journal of Physical Security 7(3)
Journal of Physical Security 7(3)Journal of Physical Security 7(3)
Journal of Physical Security 7(3)Roger Johnston
 
2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)Felipe Prado
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictionscentralohioissa
 
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docxaryan532920
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 

Semelhante a 'Cyberwar will not take place' Discuss (19)

Double Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdfDouble Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdf
 
Annotated bibliography
Annotated bibliographyAnnotated bibliography
Annotated bibliography
 
Digital fortress presentation
Digital fortress presentationDigital fortress presentation
Digital fortress presentation
 
GARRIE.REEVES.37.5
GARRIE.REEVES.37.5GARRIE.REEVES.37.5
GARRIE.REEVES.37.5
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
germany chancellor
germany chancellorgermany chancellor
germany chancellor
 
MRAP Program
MRAP ProgramMRAP Program
MRAP Program
 
Journal of Physical Security 7(1)
Journal of Physical Security 7(1)Journal of Physical Security 7(1)
Journal of Physical Security 7(1)
 
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...Strategic Latency and World Power: How Technology Is Changing Our Concepts of...
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...
 
Drones in Discourse
Drones in DiscourseDrones in Discourse
Drones in Discourse
 
Foreign Affairs Review Winter Issue, 2013. Syria Edition
Foreign Affairs Review Winter Issue, 2013. Syria Edition Foreign Affairs Review Winter Issue, 2013. Syria Edition
Foreign Affairs Review Winter Issue, 2013. Syria Edition
 
Richard A. Clarke Review - Enderson
Richard A. Clarke Review - EndersonRichard A. Clarke Review - Enderson
Richard A. Clarke Review - Enderson
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the Sky
 
Journal of Physical Security 7(3)
Journal of Physical Security 7(3)Journal of Physical Security 7(3)
Journal of Physical Security 7(3)
 
2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Kurnava+Book+Review (1)
Kurnava+Book+Review (1)Kurnava+Book+Review (1)
Kurnava+Book+Review (1)
 
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 

Último

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Último (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

'Cyberwar will not take place' Discuss

  • 1. 1 Gus T. Rankin ‘Cyberwar will not take place.’ Discuss ‘Known knowns,therearethingswe know thatweknow.We also know there are known unknowns, thatis to say thereare somethingsthat wedo notknow.Butthere are also unknown unknowns,the oneswe don’tknowwedon’tknow’ – DonaldRumsfeld –US Secretaryof Defence.1 To beginwe muststate that there are differingviewssurroundingcyberwarwithmostof them of a hypothetical nature.DonaldRumsfeld’squotationon ‘knownunknowns’ resonateswiththe hypothetical nature of these arguments.Thus,inanera of Moore’sLaw - and therefore increasing ‘knownunknowns’ and‘unknownunknowns’ –the argumentswe are presentingare thatmuchmore fallible. Aswe will see, some argue thatcyberwarisalreadytakingplace,butthe majorityof thisessay will be outliningthe twoprevailingarguments: thatcyberwarwill come,andthatcyberwaris overhyped.We willlargelyassessthe realistperspective inThomasRid’s‘Don’tfearthedigital bogeyman’,alongside MyriamDunnCavelty’s Cyber-Security and ThreatPolitics, alongside her‘A likely as a visitfromE.T.’. Onthe contrary,we will assessRichardClark’scatastrophicperspective,with,in tangentthe worksof JohnArquillaandJamesMcGregor.Thisessayis therefore artificiallycreatingtwo sidesof the debate inorderto clarifyananswerto the clear-cutpresumptionsof the question. From this,we will analyse the argumentsputforwardastwopropositions,andcritique themaccordingto otheracademicsviewontheirviability. Before we starttoassesswhethercyberwarwillorwill nottake place,we mustaccept that eachacademichas theirowndefinitionof whatcyberwarcanbe definedas. Whetheryoucan define cyberwarwhenusedalongside physical militaryequipmentinaidof military gain,or for economicmeans;orwhetheryoucan merelydefine cyberwarwithinthe parametersof cyberspace,these are discussionthatwe will assessonce all argumentshave beenconsidered. 1 P.W.SingerandAllanFriedman, Cybersecurity and Cyberwar:Whateveryoneneedsto know (New York, 2014) p255
  • 2. 2 Gus T. Rankin To begin,we can lookat RichardClarke’scatastrophistview,thatcyberwarhasbeguninhis workon ‘Who Was Behind the StuxnetAttack’.Clarke statesthatsince the Stuxnet’svirus,weaponised malware can be obtainedonlinebyanybody,stating ‘itwasgiven the worldforfree’.2 Followingon fromthis,Clarke believeshe hasgoodevidence forthistobe the case, as we will explore late; he is suggestingthatany‘whizkid’couldcreate theirown‘Stuxnet’.A trulyterrifyingthought,thatsucha weapon, whichcaused suchdivertactionas‘seizingthe control of the machinesrunningcentrifuges and… desynchronizethe speedsatwhichthe centrifugesspin,causingnearlyathousandof themto seize up,crashand otherwise self-destruct’.3 Clarkeisstatingthatthismalware isnow accessible to anybody;howeverwithsuchanarrow perception,Clarke asacatastrophistonlyseestrouble ahead. Thisis notwhat trulyworriesClarke,whatworrieshimisthisideaof a‘deathof a thousandcuts’,4 where he describesthe theft of Americanresearchanddevelopmentasaway of removingtheir competitiveness;butalsothe impactthiscouldhave uponopeningmilitaryequipmentto Chinese cyberintervention.Clarketherefore believesthe UnitedStatesmilitarytobe inadequate when weaponizedmalware suchasStuxnetcanbe usedina waythat providesmilitaryequipmentuseless,or evencounter-productive. ThisisfurtheremphasisedbyPeterSinger andAllanFriedmanintheirbook on Cybersecurityand Cyberwarfare,wheretheystate thatthe U.S.has 8,000 PredatorandReaper drones,all controlledfrommilitaryroboticprograms,whichinturnallowsthemtobe opentoattack.5 Again,we mustbearin mindthat thisisof the catastrophicperspectivewhichfundamentallyfailsto see the humanrace as one of cooperation.Which tosome extentislegitimisedwhenlookingatactions takenby the Chinese state,andthe thenrecognitionbythe U.S.governmentof thisthreat;itishere 2 Rosenbaum,Ron,featuringRichardClarke, Richard Clarkeon Who WasBehind theStuxnetAttack, The Smithsonian: http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was- Behind-the-Stuxnet-Attack.html?c=y&story=fullstory p6 3 Rosenbaum,Ron,featuringRichardClarke, Richard Clarkeon Who WasBehind theStuxnetAttack, The Smithsonian: http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was- Behind-the-Stuxnet-Attack.html?c=y&story=fullstoryp2 4 Rosenbaum,Ron,featuringRichardClarke, Richard Clarkeon Who WasBehind theStuxnetAttack, The Smithsonian: http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was- Behind-the-Stuxnet-Attack.html?c=y&story=fullstory p6 5 P.W.SingerandAllanFriedman,CybersecurityandCyberwar:Whateveryone needstoknow (New York, 2014) p130
  • 3. 3 Gus T. Rankin where we can ascertainthe problemsof cybersecurity,and putClarke’sviewintoperspective. We see some recognitionof Chinese economicespionage, demonstratedbyMichigan’s8th District representative Michael Rogers, whenhe stated,‘China’seconomicespionagehasreachedan intolerablelevel andIbelieve thatthe UnitedStatesandouralliesinEurope andAsiahave an obligationtoconfrontBeijinganddemandthattheyputa stopto thispiracy’.6 Thisstatement recognisesthatChinaare indeedcoercinginsuchactivities,butona widernote givessome perspective to the catastrophicworldinwhichClarke describes. The opposingside of the argument,the realist, woulddismissChineseespionageasone thatis overhyped,andwoulddefine theirperceptionsof ‘war’, or potential future ‘war’,alongthe parametersof death;whichtheywouldargue,cyberwarhasfailed to deliveron. Nevertheless,beforedismissingClarkes view,we willdelve deeperintoChinese actions, assessingwhetherClarke’sview iswarranted. We see fromnumeroussourcesthatChinahack for the purpose of espionage,andalthough thisessayisnot basedaroundwhetherornot Chinahack the UnitedStates,itgoessomewayto validatingRichardClarke’snotionthatcyberwarisinfact takingplace,or rather,isa possibility.Firstwe see fromexamplesinJamesMcGregor’swork,thatJoe Stewart,directorof malware atDell SecureWorks,state that‘Chinese spieshave rentedorhackedforthe purpose of espionage’;7 which withthe verydefinitionof ‘espionage’servestoindicate alevel of militarythreat.Fromthiswe cango on to state that Mandiant,a private cybersecuritycompany,foundthe same results,havingtracedthe ‘the mostprolificcyberespionagegroupsintermsof sheerquantityof informationstolen’.8 According to Mandiant,the companieswhere the datawasstolen,matcheddirectlythe ‘industriesthatChinahas 6 Mike Rogers, “Mike Rogers,Statementtothe U.S.House,PermanentSelectCommittee on Intelligence,OpenHearing:CyberThreats andOngoingEffortstoProtectthe Nation,Hearing,October 4, 2011, http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/100411CyberHearingRoger s. pdf accessedFebruary6, 2013 7 JamesMcgregor,The Atlantic,April 27th 2013: ‘Is thespecter of a cyber cold war real?’ http://www.theatlantic.com/china/archive/2013/04/is-the-specter-of-a-cyber-cold-war-real/275352/ 8 JamesMcgregor,The Atlantic,April 27th 2013: ‘Is thespecter of a cyber cold war real?’ http://www.theatlantic.com/china/archive/2013/04/is-the-specter-of-a-cyber-cold-war-real/275352/
  • 4. 4 Gus T. Rankin identifiedasstrategictotheirgrowth’,whichwasidentifiedwithinthe mostrecentChineseFive Year Plan.9 Furthermore,withinanofficialdocumentissuedonbehalf of the DepartmentforHomeland Securityandeighteenothernational bodies,the 2013 Data Breach InvestigationsReport,compiledby Verizon’sRiskTeam,notedthat‘state-affiliatedactorstiedtoChinawasthe biggestmoverin2012,’ whowenton to state, ‘theireffortstosteal IPcomprise aboutone-fifthof all breachesinthisdataset’ and thiswasmerelyinIPaddresses.10 Whereasonawidernote,itwasstatedthat 96% of espionage caseswere attributedtothreatactors in China,andthe remaining4% were unknown.11 Thistherefore, go some way to suggestthere are claimsthat back upRichard Clarke’snotionthatChinaare stealing U.S. data; yet,we can go no furtherinexplainingtheirtrue intentions,whichiswhatwill trulydeclare whetherornot a cyberwarwill take place.Fora cyberwarto take place,the UnitedStatesmustmake a perverse actiontorespond,somethingwhichClarke believesthe U.S.isunwilling/incapable todo. Despite this,NickHopkinsof the Guardian,statesthe U.S.andChinahave beenreactingtoone-an- other,statinginhisarticle on cybercrime,thatamidthe risingangeroverthe scale andaudacityof Beijing-co-ordinatedcyberattacks,the USand Chinahave beenengagingin‘wargames’.12 Though,as statedinHopkinsarticle,of the countriesactivelyinvolvedincyberespionage, Chinaisthe onlyone likelytobe a militarycompetitortothe UnitedStates,13 thereforegoingsomewaytosuggestfor 9 JamesMcGregor, The Atlantic,April 27th 2013: ‘Isthe spectreof a cybercold warreal?’ http://www.theatlantic.com/china/archive/2013/04/is-the-specter-of-a-cyber-cold-war-real/275352/ 10 VerizonEnterprise, 2013 Data Breach InvestigationsReport,2013, http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report- 2013_en_xg.pdf accessed03/12/2015 11 VerizonEnterprise, 2013 Data Breach InvestigationsReport,2013, http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report- 2013_en_xg.pdf accessed03/12/2015 12 NickHopkins, USand China engagein Cyber ‘wargames’,16th April 2012, http://www.theguardian.com/technology/2012/apr/16/us-china-cyber-war-gamesaccessed 27/11/2015 13 NickHopkins, USand China engagein Cyber ‘wargames’,16th April 2012, http://www.theguardian.com/technology/2012/apr/16/us-china-cyber-war-games accessed 01/12/2015
  • 5. 5 Gus T. Rankin cyberwarto actuallytake place,there needstoajointthreatof bothmilitarilyandcyber,otherwise,as Ridstates,it’sjustan inconvenience.14 To assessthe viewthatcyberwarwill infacttake place,we will lookatthe worksby David RonfeldtandJohnArquilla,intheir Networks,Netwars,and theFightfortheFuture, 2001. Here they presentthemselvesasrationalists,thatbelieveanevernetworkcentricworldcanbenefitthe world, howevertheyhave reservationsjustlike PeterSingerandAllanFriedmanhave intheir Cybersecurity and Cyberwar. The reservationsthatRonfeldtandArquillahold,lie inthe rise of networks andwhat thismeansintermsof mitigatingpowertononstate actors;whichis alsoimpliedinSingersbookwhen he usesthe metaphor,‘the nationsmostskilledatthrowingrockslive inthe biggestglasshouses’,15 referringtothe interconnectednature of nationstatessuchas the UnitedStates. The term‘netwar’ that RonfeldtandArquillacoinedin1993, is meanttocall attentiontothe prospectthat network- basedconflictandcrime will become amajorphenomenoninthe decadesahead.16 Yet, althoughthey have redefinedthisthreatonthe basisof non-state actorsintheir2001 work,thisdoesnot affectthe basisof the argument,andthat still lieswiththe rejectionof the propositionthat‘cyberwarwill not take place’.The ambivalentnature thatRonfeldtandArquillaprovide tothisdefinitionof ‘netwar’is testamenttothe ambivalentnature of the evergrowingcapabilitiesof anopenlygrowingnetwork, whichprovides,asRumsfeldindicates, evermore ‘unknownsunknowns’.Withthis,we canargue that stateswill become factorsinthis‘netwar’thatRonfeldtandArquilladescribe,whethertheychose toor not; therefore,we cancontradictthe question,andstate thatcyberwarwill take place –it’sisjust a matterof whoit will be between,non-state orstate,andaccordingly,whetherornotphysical military will be involved. 14 Thomas Rid, ‘ThinkAgain:CyberwarDon'tfearthe digital bogeyman.Virtualconflictis still more hype than reality.’ ForeignPolicy,March/April 2012. 15 P.W.SingerandAllanFriedman, Cybersecurity and Cyberwar:Whateveryoneneedsto know (New York, 2014) p152 16 DavidRonfeldtandJohnArquilla, Networks,Netwars,and theFightfortheFuture (RAND,2001) Chapter10
  • 6. 6 Gus T. Rankin Furtherto this,JohnArquillausesthe Russo-Georgianconflictin2008, as a way of foreshadowingthe risingdominance of cyberwar;implyingthatitwill onlybecome more destructive overtime.The evidence forthis,andthroughhisrebuttal of ThomasRid’shypothesisethatCyberwaris all hype,comeswiththe notionthatphysical warwill still take place,andcyberwarwillbe afunction towardsachievingmilitarygains –he callsthis Network-centricwarfare - 17 therefore,Arquillahasa differingdefinitionof cyberwarthansayThomasRid.We can state thisbecause Ridacknowledgesthat cyberwarwill playapart of alongside physical warfare,Rid’sonlyproblemishe doesn’tsee itasa capable threat,whereasArquillaseesitonlyasa credible threatalongsidemilitaryequipment.Bothdo not followthe argumentof RichardClarke,whosideswithothersinthe U.S.governmentlikeLeon Panetta,the FormerDefense Secretary,whocoinedthe term‘CyberPearl Harbour’.18 SowhatIam gettingat here,isthat, because Arquillastatesthatcyberwarisalreadyhere,itdoesnotmeanhe is far away fromwhatRid issuggesting,rathertheyjusthave differingdefinitionsof cyberwar.Movingon, we can see that there are those whobelieve cyberwarisathreat inand of itself,andwe have those whobelieve itisathreatalongside physicalmilitaryequipment –bothof whichIam arguingare cyberwarfare.Nevertheless,bothRidandArquillaare ondifferingsidesof the debate,asadirectresult of theirownwording, asRiddoesnotdenythat cybersecuritywillnotbecome afactorwithinwarfare, he is merelypointingoutitsthreathasbeenoverhyped,similarlytoMyriamDunnCavelty.Therefore, it istheirperspectiveonhumannature thatsplitsup both Ridand Arquilla,forRidisquite obviouslya realist,whereasArquilla,asstatedbyhimself,‘illuminatesthe potentialof cyberwar’.19 Something whichMyriam DunnCaveltygoesonto criticisesheavilyinherbookon Cyber-Security and Threat Politics, as we will assesslater. 17 Myriam Dunn Cavelty, Cyber-Security and ThreatPolitics (Routledge,2008) p69 18 Leon Panetta, Leon Panetta warnsof 'cyberPearlHarbour', 12th October2012, http://www.bbc.co.uk/news/technology-19923046 accessed01/12/2015 19 JohnArquilla,Rebuttal: Cyberwarisalready upon us,butcan it be controlled? ForeignPolicy, March/April 2012
  • 7. 7 Gus T. Rankin Anotherareathat islookedat byJohnArquillaalone inhisrebuttal of ThomasRid,ishow destructive cyberwarwill becomeovertime.Here we cancontrastthe two differingexamplesboth ArquillaandRiduse,andsee howtheypresenttheir argumentsaccordingultimatelydecidingwhois the most convincing.Tobegin,we see Arquillause the example of the Russo-Georgianconflictof 2008, statinghowtheirinvasionwas‘greatlyeasedbycyberattacksonTbilisi’scommand,control,and communicationssystems’,20 effectivelywipingouttheirmilitaryoppositiontothe invasion. Arquilla usesthisas a perfectindicatorasto where the future of warfare lies,he associatescyberwarfare with ‘aerial bombing’,indicatingthata warcannot be won single handedlybyaerial bombardment; associatingthe Russo-Georgianconflict,directlywiththe SpanishCivil War75 yearsago.21 Addingto this,It is Arquilla’sbelief that,‘engagingindisruptivecyberattacksalone ishardlyawayto winwars’.22 However,adirectcomparisontoArquilla’sworkanda realistswork,wouldbe the view takenonthe Israeli airraidon the Osiraknuclearreactor 30 yearsago, whichPeterSingerstates,killed ‘eleven soldiersandcivilians’.23 The presentdayswayof coercive action,Stuxnet, however, didnothurta single personnevermindkill one,24 there wassimplynocollateral damage,anditishardto see there everbeingsowitha weaponssuchas Stuxnetwhichhasone simple aim.ThomasRidalsomakesthese points,yethe usesfarmore examplesrangingfromEstoniatoStuxnet,statingsimplythatneitherfulfil the criteriainthe definitionof war.25 He refutesArquilla’snotionthatthere willbe anescalationof these threats,throughthe ideathatas we become more interconnected,we alsobecomemore aware to the threats,and shouldthe likesof a‘Stuxnet’infectacomputersystem, itisverylikelythatitwasa 20 JohnArquilla,Rebuttal: Cyberwarisalready upon us,butcan it be controlled? ForeignPolicy, March/April 2012 21 JohnArquilla,Rebuttal: Cyberwarisalready upon us,butcan it be controlled? ForeignPolicy, March/April 2012 22 JohnArquilla,Rebuttal: Cyberwarisalready upon us,butcan it be controlled? ForeignPolicy, March/April 2012 23 P.W.SingerandAllanFriedman,Cybersecurity and Cyberwar:Whateveryoneneedsto know (New York, 2014) p119 24 P.W.SingerandAllan Friedman, Cybersecurity and Cyberwar:Whateveryoneneedsto know (New York, 2014) p119 25 Thomas Rid,‘ThinkAgain:CyberwarDon'tfearthe digital bogeyman.Virtualconflictis still more hype than reality.’ ForeignPolicy,March/April 2012.
  • 8. 8 Gus T. Rankin state-actordue to the sheercostand intelligence requiredtocreate one.Therefore,notonlyare cyberattacks becominghardertoachieve,accordingtoRid,there isno evidence tosuggesttheyare escalatingeither– forthe primarythreat to the U.S., as statedintheirmostrecentNational Security Strategy,isthe threat of terrorism,Climate Change andthe spreadof Weaponsof Mass Destruction.26 Movingon fromthis,the realistMyriamDunn Caveltystatesthatthe ideaof a coming cyberwarisnonsense.27 Inherbookon Cyber-Security and ThreatPolitics, she describesthe link betweenperceivedthreatand vulnerabilities,andusesthe example of ‘rapiddevelopmentof informationinfrastructure’asaprime example of this.28 Caveltystates,thatitisthe perceivedthreatof the increasinglynetworkedglobal informationinfrastructure thatispartof the insecuritybehindthose ingovernment,andthe reasonwhythe likesof RichardClarke argue that‘cyberwarhas already begun’.29 Whatit seemsCaveltyissaying,isthatbecause governmentscannotcontrol the inherently insecure nature of informationtechnology,theybelieve ittobe a threat,Caveltyreferstothisas an ‘unboundedsystem’.30 Inherarticle on‘A likelyasavisitfromE.T.’,she statesthat yeswe are vulnerable,butthatdoesnotmeanit islikely,warningthatthe drive of resourcesawayfrom projects that are ‘integral toourdefense andsafety’,iswhatisthe real threat. 31 Caveltygoessome wayto dismissArquilla,andagreeingwithRid,bystatingthatthe ‘hackingof websitesisnotwar’,‘noteven sabotaginganindustrial plantwithsophisticatedmalware iscyberwar’. 32 She goesfurtheragreeing 26 Presidentof the UnitedStates, NationalSecurity Strategy,February 2015 https://www.whitehouse.gov/sites/default/files/docs/2015_national_security_strategy.pdf accessed 02/12/2015 27 Myriam Dunn CaveltyThe European‘Aslikely asa visit fromE.T.’, Jan2011: http://www.theeuropean-magazine.com/myriam-dunn-cavelty--2/6128-cyberwar-and-cyberfear 28 Myriam Dunn Cavelty, Cyber-Security and ThreatPolitics (Routledge,2008) Chapter4 29 Rosenbaum,Ron,featuringRichardClarke, Richard Clarkeon Who WasBehind theStuxnetAttack, The Smithsonian: http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was- Behind-the-Stuxnet-Attack.html?c=y&story=fullstory p1 30 Myriam Dunn Cavelty, Cyber-Security and ThreatPolitics (Routledge,2008) p67 31 Myriam Dunn CaveltyThe European‘Aslikely asa visit fromE.T.’, Jan2011 http://www.theeuropean-magazine.com/myriam-dunn-cavelty--2/6128-cyberwar-and-cyberfear 32 Myriam Dunn CaveltyThe European‘Aslikely asa visit fromE.T.’, Jan2011 http://www.theeuropean-magazine.com/myriam-dunn-cavelty--2/6128-cyberwar-and-cyberfear
  • 9. 9 Gus T. Rankin withRid,bybelievingthata war still standsfor‘violence,destructionandsuffering’,somethingshe believesisimpossible withcyberwarfare.Here however,Caveltyisseparatingconventional warfare and cyberwar,withnoinclinationthatone couldassistthe other,whichisacriticismArquillahadfor Rid,and thisissomethingwhichislackinginCavelty’scriticismof the future of cyberwar.Despite this, Caveltyplaysdownthe importance of cyberwar,byrenouncingsome of the misconceptions - that cyberwaris‘completelyunsuitableasa weaponforthe weak’due to the sheercostand intelligence neededforaweaponof thiskind, whichwouldalsohave tobe tailoredtoa specificattack,makingit impossible tohave anarsenal of such weapons.33 Sowe can state by the evidence provided,that cyberwarisoverhypedbya wayof potential threatdue tothe ‘unboundednature’of cyberspace;but we can criticise the realistswhosimplyignore the practicalitiesof cyberwarwithinconventional warfare,sowhat we are reallydismissinghere,isthe realitiesthatthere will everbe aneventlike Leon Panettastated,a ‘CyberPearl Harbour’.34 To conclude,tostate what the future of cyberwarlookslike istotreadinto what Rumsfeld wouldcall the unknown.However, forthe assumptionsof thisessay,Iwill be usingthe following definitionof cyberwartoconclude whetherornotit will take place.The parametersof cyberwarfall short of what we wouldconsiderconventional warfare.However,cyberwarcould, andhas beenused alongside conventional forces;cyberwarcould alsobe definedas gaininganeconomicadvantage,as longas both sidesare practicing,toa pointwherebyphysical confrontationmaybe inevitable. With thisknowledge, we canstate that itis JohnArquilla’sargumentwhichalignsitself withthisdefinitionof cyberwar,whilstalsoholding upagainstthe realistcritiquesof ThomasRidand Myriam Dunn Cavelty; Arquilla’sargumentalsoconvincinglydismissesRichardClarke’scatastrophicinterpretation.Arquilla’s interpretationof cyberwarusescontemporary andhistorical examplesinaconvincingway,whichserve 33 Myriam Dunn CaveltyThe European ‘Aslikely asa visit fromE.T.’, Jan2011 http://www.theeuropean-magazine.com/myriam-dunn-cavelty--2/6128-cyberwar-and-cyberfear 34 Leon Panetta, Leon Panetta warnsof 'cyberPearl Harbour', 12th October2012, http://www.bbc.co.uk/news/technology-19923046 accessed01/12/2015
  • 10. 10 Gus T. Rankin to convince thathisperceptionof humannature andhispredictionsoutweighthe opposingarguments. Notonlydo Ridand Cavelty’sarguments dismissthe impactcyberwarcouldhave uponthe conventional military,theydismissthe conventional exampleswhere the twotypesof warfare have merged.AlthoughIrecognise Caveltyhasadifferinginterpretationof the definitionof war, whichis one of ‘violence,destructionandsuffering’; Istill believethisdefinitionfitsArquilla’sargumentthat ‘cyberwaristakingplace’, andthus dismisses the premise of the question.Despite this,the fact conventional warwill continue totake place asthe realistspointout,cyberwarcanand will continue to assistinensuringthistakesplace;thuscontributingto,Cavelty’sdefinitionof war,which is‘violence, destructionandsuffering’.ArquillaalsosuccessfullyarguesinhisworkwithDavidRonfeldt,through the term netwar,thatwe are onlygoingto become more interconnected,more chaotic,therefore not onlyare we inthe era of cyberwartoday,we will be inthe future,anditisonlygoingto get more severe. Word Count:3012
  • 11. 11 Gus T. Rankin Bibliography: Arnuk,Sal.and Saluzzi,Joseph., Broken Markets:How High Frequency Predatory Practiceson Wall Street Are Destroying InvestorConfidenceand YourPortfolio (FTPress,2012) Arquilla,John., Rebuttal:Cyberwarisalready upon us,butcan it be controlled? ForeignPolicy, March/April 2012 Cavelty,MyriamDunn., Cyber-Security and ThreatPolitics (Routledge,2008) Cavelty,MyriamDunn.,The European‘Aslikely as a visit fromE.T.’,Jan 2011 http://www.theeuropean- magazine.com/myriam-dunn-cavelty--2/6128-cyberwar-and-cyberfear Hopkins,Nick., USand China engagein Cyber‘wargames’,16th April 2012, http://www.theguardian.com/technology/2012/apr/16/us-china-cyber-war-games McGregor, James.,The Atlantic,April 27th 2013: ‘Isthe spectreof a cybercold warreal?’ http://www.theatlantic.com/china/archive/2013/04/is-the-specter-of-a-cyber-cold-war-real/275352/ Panetta,Leon., Leon Panetta warnsof 'cyberPearl Harbour', 12th October2012 http://www.bbc.co.uk/news/technology-19923046 Presidentof the UnitedStates,National SecurityStrategy, February 2015, https://www.whitehouse.gov/sites/default/files/docs/2015_national_security_strategy.pdf Rid,Thomas., ‘ThinkAgain:CyberwarDon'tfearthe digital bogeyman.Virtualconflictis still more hype than reality.’ForeignPolicy,March/April 2012. Rogers,Mike., Mike Rogers,Statementtothe U.S.House,PermanentSelectCommittee onIntelligence, Open Hearing:Cyber Threatsand Ongoing Effortsto ProtecttheNation,Hearing,October4, 2011, http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/100411CyberHearingRoger s. pdf Ronfeldt,David.,andArquilla,John., Networks,Netwars,and theFightfortheFuture (RAND,2001) Rosenbaum,Ron., featuringRichardClarke, Richard Clarkeon Who Was Behind the StuxnetAttack, The Smithsonian:http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was- Behind-the-Stuxnet-Attack.html?c=y&story=fullstory Singer,PeterW.andFriedman,Allan., Cybersecurity and Cyberwar:Whateveryoneneedsto know (NewYork,2014)
  • 12. 12 Gus T. Rankin VerizonEnterprise, 2013 Data Breach InvestigationsReport,2013, http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report- 2013_en_xg.pdf