The Cyber Age Demands New Rules Of War

united states currency seal - IMG_7366_web

united states currency seal – IMG_7366_web (Photo credit: kevindean)

A system to check covert violence is needed, writes Zbigniew Brzezinski
Financial Times
February 25, 2013
The two centuries since the Congress of Vienna have seen the gradual codification by the international community of the “rules of the game” for guiding interstate relations, even between unfriendly countries. Their basic premise has been the formula “don’t do to me what you don’t want me to do to you”. However, technological advances mean that today those rules are being dangerously undermined. The international system is at risk.
After the age of Metternich, Talleyrand and Castlereagh, elaborate understandings developed about the transition from formal peace to war. These involved carefully scripted exchanges of diplomats, rules about the treatment of prisoners of war and eventually even a shared definition of war crimes. Implicit in all this was the notion that while war and peace are fundamentally different conditions, both still need rules of conduct.
In more recent times, the use of nuclear weapons has made the distinction between the two more dramatic. The destructiveness of these weapons was without precedent but paradoxically that encouraged more cautious behaviour on the part of the states that possessed them. The existence of such weapons also created a new global hierarchy with a few nuclear states at the top and the rest below.
Today, the interstate rules of the game are degrading. Highly sophisticated capabilities for inflicting violence on remote targets, as well as cross-border, state-sponsored terrorism, are undermining the clear demarcation of what is permissible and what is not. Scientific advances have also increased the potential scope of acts whose perpetrators may not be easily identified and which may not be intercepted in a timely fashion.
Indeed, the world community is witnessing an increasing reliance by states on covert acts of violence without declarations of war. Leaders can now use long-distance air drones for lethal strikes across national borders against targeted individuals, occasionally killing civilians, too.
The sophisticated dissemination of computer viruses can disrupt the military industrial assets of rivals. States can commission unacknowledged assassinations of foreign leaders and of scientists engaged in weapons development. They may back hacking of foreign institutions for intelligence purposes as well as of private business entities to gain commercial advantages.
Some states are also experimenting with more comprehensive cyber warfare designed to disrupt the operational infrastructure of targeted states, as in the case of the assault on Estonia and its banking institutions in 2007. A rogue but technologically sophisticated state can now gain the capacity to launch a non-lethal but paralysing cyber attack on the socioeconomic system and the most important state institutions of a target country.
The dangers inherent in the degradation of the already vulnerable international system cannot be overstated. Social chaos, with paralysing fear magnified by uncertainty as to its origins, could spread. Making matters potentially even worse, such degradation is not the product of one or another particularly menacing state. Rather, it is the consequence of the rising vulnerability of the global system to cumulative pressures: technological innovation, massive and increasingly impatient populist upheavals and a shift in the distribution of geopolitical power.
In that volatile context, competing states tends to be subjective in judgments of their own conduct. There are lessons to be learnt from the onset of the nuclear weapons age. After the end of the second world war in 1945, the US wisely abstained from a pre-emptive attack that would have exploited its atomic monopoly but would probably have had monstrous consequences. But self-restraint ushered in a Soviet effort to gain first nuclear equality then superiority. America’s admirably consistent determination to prevent the latter, as well as probably also the rise of a nuclear-armed but increasingly anti-Soviet China, compelled the Soviet Union to settle eventually for verifiable nuclear weapons parity.
An open discussion of today’s novel risks to global stability might still help to avert unprecedented disasters. Responsible governments with a stake in global stability and technological capacity need to convene a process designed to set rules that inhibit the drift towards covert acts of aggression. As the world’s foremost innovator, the US should take the lead.
But to make that process productive, the US itself – while resisting the temptation to do to others what America condemns others for doing – must make certain that its vulnerabilities are not easily exploited by adversaries that are difficult to identify. It is perplexing that the US, which apparently is able to use computers to inject undetectable viruses into sensitive foreign targets, seems so vulnerable and so uninformed regarding foreign hacking into its assets.
Calm and determined deterrence – including intensified efforts credibly to identify perpetrators as well as readiness in effect to retaliate in kind – must be the point of departure for new and genuinely reciprocal rules of the game. The need for such rules is becoming urgent.
The writer was national security adviser to US president Jimmy Carter and is the author of ‘Strategic Vision: America and the Crisis of Global Power.’
To underscore the way the conventional wisdom has to change, a colleague who makes his living going from arms show to arms show, keeping track of who’s offering what for sale on the international market.  He recently told me about an Italian outfit called “The Hacking Team” that offers services to governments and law enforcement agencies.  The services it offers apparently include what you and I would call computer network exploitation and computer network attack.
 
A private company acting in a private capacity may soon be able to take actions that the targeted nation-state could perceive as acts of war. 
 
Here’s the Hacking Team’s website:  http://www.hackingteam.it/index.php/about-us

One comment

  1. Thank you ever so for you post.Much thanks again.buy viagra edinburgh

Leave a Reply

Your email address will not be published. Required fields are marked *