Cyber Warfare
Cyber Warfare
ABSTRACT
“The Supreme art of war of is to subdue enemy without fighting” said by Sun Tzu.
INTRODUCTION
The traditional view of war has gone into paradigm shift emerging new landscape of threats.
Advancements in technological arenas have created cyberspace as a medium of target to
technologies. Possible cyber threats to financial institutions, military infrastructure, key
public infrastructures like power, water, transport etc.
There is ongoing debate over how cyberwarfare should be defined, and no absolute definition
is widely agreed upon. 'Cyberwarfare' is used in a broad context to denote interstate use of
technological force within computer networks in which information is stored, shared, or
communicated online1. According to this perspective, the notion of cyber warfare brings a
new paradigm into military doctrine. Paulo Shakarian and colleagues put forward the
following definition of "cyber war" in 2013, drawing on Clausewitz's definition of war: "War
is the continuation of politics by other means". Cyber war is an extension of policy by actions
1
Cyber warfare: a multidisciplinary analysis. Green, James A., 1981-. London. 7 November 2016. ISBN
9780415787079.a
1
taken in cyber space by state or nonstate actors that constitute a serious threat to a nation's
security or are conducted in response to a perceived threat against a nation's security.2
CYBER SPACE
CYBERWARFARE
Cyberwarfare refers to use of digital technologies viz. tools, soft wares, information etc to
conduct act of war and conflicts in the cyberspace domain. It can be carried out by
government, military or other non-state entities. Some types of attacks that are prevalent, are
malware attacks, Denial of Service attacks (DOS), Phishing, Advanced persistent threats
(APTS). The attackers target critical Infrastructure, Military system, Government network,
Private Sector. Attribution challenges that pose a threat to the cyberspace like masking of IP
address, employs proxies and hacking tools to using of brute forces to find loopholes to target
the vulnerable are of the grave concerns. International efforts like Tallinn manual are of less
significance as it lacks binding effect. Also, it’s difficult to reach a consensus over such
issues which every nation wants to exploit for its own interest and gain leverages especially
the technologically advanced first world countries.
Dynamic nature of cyberspace with rapidly developing technology makes the space more
vulnerable to attacks without a comprehensive legal framework. New methods and tools are
constantly developed to increase owns interest and gain leverage over the free lawless,
uncontrolled and unregulated cyberspace. This requires players of cyberspace or their
governments to rapidly adapt to the dynamics of cyberspace.
2
dispute mechanism through arbitration or mediation, countries may treat violation of their
cyberspace as an attack and may or may not without conclusive proof declare war on the
attacking nation. Retaliation of cyberattacks through brute physical force of the armed forces
will result into loss of innocent life and massive destruction of property.
GLOBAL CONCERN
Technological advancements led to the emergence of cyber space which in turn created room
for new strategies, possibilities, threats inter alia. Increasing media coverage made
governments aware about the seriousness of the situation. The US President Barack Obama
declared “Americas digital infrastructure as national asset” thereby including it in the
definition of terrorism, sovereignty and territorial integrity. This declaration made clear that
the United States of America reserves right to respond militarily in case of cyber-attack
disproportionately using its military force. The US government in 2013 formed ‘Cybercom’ a
division inside Pentagon for specific assignments relating to cyberwarfare.
The United Kingdom invested significantly in its National Cyber Security programme after
its officials warned “lack of preparedness in Cyber warfare may cost the nation heavily”.
The NATO released Tallin Manual stating international laws are applicable to the domain of
Cyberwarfare. It advised all the nations to legally operate in this new domain of fight. Above
evidence makes it clear that issue of Cyber Warfare is a global concern of 21st century.
TALINN MANUAL
The Tallinn Manual identifies international law principles applicable to cyber-warfare and
enumerates ninety-five “black-letter rules” governing such conflicts. Between 2009 and 2012,
the Tallinn Manual was written at the invitation of the Tallinn-based NATO Cooperative
Cyber Defence Centre of Excellence by an international group of approximately twenty
experts. In April 2013, the manual was published by Cambridge University Press.3
In late 2009, the Cooperative Cyber Defence Centre of Excellence convened an international
group of legal scholars and practitioners to draft a manual addressing the issue of how to
interpret international law in the context of cyber operations and cyber-warfare 4. As such, it
was the first effort to analyse this topic comprehensively and authoritatively and to bring
some degree of clarity to the associated complex legal issues5.
3
"The Tallinn Manual". Ccdcoe.org. Archived from the original on 2013-04-24. Retrieved 2013-04-20.
4
https://link.springer.com/chapter/10.1007/978-3-031-14264-2_3/last visited on 30/01/2024
5
Schmitt, Michael N (Gen. ed.) (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare.
New York, United States of America: Cambridge University Press
3
Three organisations were represented by observers throughout the drafting
process: NATO through its Allied Command Transformation due to the relationship of the
NATO Cooperative Cyber Defence Centre of Excellence with NATO, the International
Committee of the Red Cross because of its “guardian” role of international humanitarian law,
and United States Cyber Command due to its ability to provide the perspective of an
operationally mature entity6.
CASE STUDY
To understand the growing landscape of cyberwarfare its crucial to understand the historical
glimpses, following are the case views of major cyberwarfare cases that have surfaced in the
past four decades,
Hackers attacked public computer system in USA, considered as first public cyber-attack.
However, no threats are present today as computers are immune to the Morris code. This
attack inspired the generations of hackers to hack the public computers.
The USA and UK hacked Israeli Air surveillance system under the operation, video
footage of IAFs attack in middle east was released later which confirmed this cyber
espionage by the state.
Before the Persian Gulf War, two teenagers Netherlands hacked US Department of
Defence’s new logistical system and gained control over it.
Israel carried out strikes on nuclear facilities In Syria using its electronic warfare
capabilities. The IAF Electronic Warfare capabilities took over the Syrian Air defence
system, feeder false Sky pictures for the entire period its fighter jets needed to cross and
bomb the facilities.
6
NATO – Topic: Centres of Excellence". Nato.int. 2012-07-30. Retrieved 2013-04-20.
4
A massive cyber-espionage campaign targeted the Japanese, South Korean, United States
and European Companies for a period of 8 years. By 2015, the operation shifted its target
towards critical government infrastructures like electricity grids, finance networks,
communication lines transport networks among others.
A Benign 3-year-old worm named “agent btz.” Began targeting the US military network
via thumb drives soon the major headache was resolved via encryption and strict
guidelines to not use the thumb drives in storage of information.
7) Kosovo War
During the war, non-state actors attempted to disrupt the Military operations through
hacking.
8) Operation Aurora
9) 2011: Duqu
A computer worm in 2011 a relative version of the Stuxnet worm disrupted Iraq’s nuclear
program. It is alleged that the attack was sponsored by the Israeli efforts.
The Russian actors associated with the Russian military intelligence (GRU), hacked email
accounts and misused the social media to spread disinformation to serve its geopolitical
interest. The impacts of such meddling were the deterioration in the US-Russian
relationship, the USA sanctioned the Russia also expelled its diplomat causing further
strains in the diplomatic relationship.
On its invasion in Ukraine in 2015 the Russian authorities carried out the Cyber-attacks
on the Ukrainian power grid. Recently, in 2022 Russian Invasion of the Ukraine Russia
carried out multiple cyber-attacks on the Ukrainian government sites.
THREAT ACTORS
5
NON-STATE ACTOR GROUP
They are Hacktivist and cyber-criminals usually funded by the State to serve their
Economic, Political, Geopolitical Interests. Some of the groups are as follows,7
a) Anonymous
b) Lizard Squad
c) APT28 (Fancy Bear) / APT29 (Cozy Bear) a state sponsored espionage Russian state
Interest.
d) FIN27 (Cabrakan)
e) AyyIldiz Tim a Turkish Nationalist cyber attacker.
f) Dark Overlord
g) The Equation Group alleged to have the links with the USA(NSA) carrying out the
cyber espionage to gather the intelligence at its orders.
h) APT33 (Elfin) alleged to have links with the Iranians targets the aerospace and energy
sectors primarily located in Israel.
The State engages in the cyber warfare activities for the intelligence, strategic advances
and disruptive purpose among others.
a) USA – The NSA and its cyber command (USCYBERCOM). The advanced
capabilities to carry out the cyber espionage, intelligence gathering and cyber
operations among others.
b) Russia – GRU and its Federal Security Service (FSB) are the agency cyber espionage
and Influence Operations in its political Interests. APT28/APT29 are state associated
groups.
c) China – The PLA UNIT 61398 along with the Ministry of State (MSS) targets the
Intellectual Property Rights of various western companies for cloning their product
manufacturing in their country. Also, it was alleged by the USA for tapping the
privileged diplomatic communications through the APT 10/41 (the Chinese associated
threat groups)
d) North Korea – Reconnaissance General Bureau (RGB) and financial gain (Wanna
Cry) ransomware.
7
Gazula, M.B., 2017. Cyber warfare conflict analysis and case studies (Doctoral dissertation, Massachusetts
Institute of Technology).
6
e) Iran – Islamic revolutionary guard corps (IRGC), Ministry of Intelligence and security
(MOIS) APT33 targets critical infrastructure of Israel.
f) Israel – Unit 8200 (Israel Intel corps) advanced cyber capability focus intelligence
gather and on security operations.
PROBABLE THREATS
Prospect of cyber-attacks voiced across International Community made threats of the
weaponry system visible. Assaults aimed at sabotaging and incapacitating the
systems, computers, programs that controls weaponry typically through malwares and
viruses infiltrate to gain leverages. Such remote access capabilities of attackers
provide with the leverages to self-destruct missiles, disable defence mechanisms and
may in turn have catastrophic ramifications. Hacked weapons may fire at the instance
of the attackers may prove to be disastrous.
Another aspect of the probable threat is of targeting the critical infrastructure. Cyber
assailants’ assault on strategic corridors, communication channels, logistics network
Inter alia may prove a to strategic defeat for the target nation. Transportation routes
for military and defence supply movement are critical classified strategically crucial
information, whose access may give attackers a strategic leverage.
Other Infrastructures of public importance like highways, railways, airports are
dependent on their high technologies for its functioning and operations. As increasing
technological dependence may invite risks of cyber threats is a major issue of
concern.
Hypothetical situations of cyber strikes on vital transport hub or a power grid system
is past historical events as happened in the Ukraine Russian war pose serios
consequences like significant transport congestions and power supply shortages
respectively. Above all challenges, fundamental responsibilities of the government to
protect its Sovereignty and Integrity and maintaining security of state might be
questioned.
Another Hypothetical situation might be an attack on “Just in Time” logistics system
which can’t be underestimated as its based on the accurate timing, which if
compromised can be disruptive for the entire supply chain movement.
MITIGATION
7
A comprehensive cyber strategy policy of a nation is required to protect and maintain
the integrity of its cyberspace. Also, to gain strategic leverage in event of the
cyberwarfare. Some measures of mitigation that may be part the above document are
as follows,
1) Cyberthreat Intelligence
To counter cyber threats nations must share cyber threat intelligence with their
allies and partners through cooperative agreements like MOU. Nations also must
cooperate with the Cybersecurity organisations and Intelligence agencies to have
expert reliance over the project of their cyber space to avoid any probable attacks.
Collaborative attempts may further extend to threat hunting. Threat hunting is a
concept wherein nations invite individuals and organisations to actively scout and
attack their systems by brute forces to check vulnerabilities present in their
systems. Such attempts indicate the robustness of the cyber security system
towards cyber threats over its system and networks. Such techniques access and
neutralize the risks before the actual damage. USCYBERCOM carries such
practices withs its allies so as China and Russia cooperate to eliminate such
threats present in their systems.
2) Artificial Intelligence
3) Command Cyberoperations
India is the classic and recent examples of establishing in the year 2023 a separate
command within the Indian Army with the support wings from multi public private
sectors to meet its cyberwarfare operational readiness needs. A need for such
command aroused in 2020 when several official apprised the importance of having a
8
strategy for future cyberwarfare and conflicts as it can’t be ignored in the wake of
China which has Cyber offensive warfare strategy. This Unit has been
operationalised, several niche technologies have been integrated viz. swarm drones,
loitering weapon system, anti-drone gears etc.
4) Cybersecurity strategy
Strategy of cyberwarfare and conflicts shall be the part of the whole defence policy of
the Nations in wake of changing modern warfare landscape. India has significantly
progressed since 2020 framing and adopting its cyberwarfare strategy to combat data
breaches, incursions of malwares and viruses in the public computers to gain access to
Information’s. The Indian government created a national threat of intelligence
Exchange to develop malware responsibilities, conducting baseline audits, organizing
awareness events like “Cyber weeks”.
CONCLUSION
1) Nations must maintain a strategic document inclusive of its real position in case of
cyberattacks and its current position of readiness for cyberwarfare. The
cumulative assessment of such position will help to plan a strategy and device a
future to secure a comprehensive strategic document.
2) A comprehensive national cybersecurity strategy may not be enough given the
dynamic nature of the cyberspace. Nations must continuously assess its position
and world dynamic to amend the strategies.
3) Cybersecurity demands robust defence mechanism, international collaborations
and skilled cybersecurity professional to support the defence policy and its
execution. An executive professional body part of the relevant departments of the
ministry under the government will support planning and execution of the
9
strategy. Also, the professional body may time to time advice the government
regarding steps to be taken in this regard.
Authored By-
1) Akash Yogendra Singh
10
BBA.LL.B 3rd Year
New Law College, Pune
Bharati Vidyapeeth [Deemed to be University], Pune.
11