Can Cyberattacks Lead to a Real War? Depends On What Nations Consider Crossing a Digital Red Line

In the words of US President Joe Biden: “If we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence”.

Can Cyberattacks Lead to a Real War? Depends On What Nations Consider Crossing a Digital Red Line

Unlike nuclear arms, cyberweapons can't easily be quantified, verified, and limited in treaties

Highlights
  • The US and other NATO members have threatened crippling sanctions
  • Cyberspace is exceptionally unruly
  • No arms control treaties exist to put guard rails on state-backed hacking
Advertisement

President Joe Biden couldn't have been more blunt about the risks of cyberattacks spinning out of control. “If we end up in a war, a real shooting war with a major power, it's going to be as a consequence of a cyber breach of great consequence,” he told his intelligence brain trust in July.

Now tensions are soaring over Ukraine with Western officials warning about the danger of Russia launching damaging cyberattacks against Ukraine's NATO allies. While no one is suggesting that could lead to a full-blown war between nuclear-armed rivals, the risk of escalation is serious.

The danger is in the uncertainty about what crosses a digital red line. Cyberattacks, including those that cripple critical infrastructure with ransomware, have been on the rise for years and often go unpunished. It's unclear how grave a malicious cyber operation by a state actor would have to be to cross the threshold to an act of war.

“The rules are fuzzy,” said Max Smeets, director of the European Cyber Conflict Research Initiative. “It's not clear what is allowed, what isn't allowed.”

The United States and other NATO members have threatened crippling sanctions against Russia if it sends troops into Ukraine. Less clear is whether such sanctions, whose secondary effects could also hurt Europe, would be imposed if Russia were to seriously damage Ukrainian critical infrastructure — power, telecommunications, finance, railways — with cyberattacks in lieu of invading.

If the West were to respond harshly to Russian aggression, Moscow could retaliate against NATO nations in cyberspace with an intensity and on a scale previously unseen. A major cyberattack on US targets would almost certainly unleash a muscular response. But what of lesser cyberattacks? Or if Russian President Vladimir Putin restricted them to a NATO member in Europe?

Under Article 5 of the organisation's treaty, an attack on any of its 30 members is considered an attack on all. But unclear is what it would take to unleash full-scale cyber retaliation. Or how bad an attack would have to be to trigger retaliation from NATO's most potent cyber military forces, led by the US and Britain.

Cyberspace is exceptionally unruly. No arms control treaties exist to put guard rails on state-backed hacking, which is often shielded by plausible deniability as it's often difficult to quickly attribute cyberattacks and intelligence-gathering intrusions. The technology is cheap and criminals can act as proxies, further muddying attribution. Freelancers and hacktivists compound the problem.

In 2015, the major powers and others agreed on a set of 11 voluntary norms of international cyber behavior at the United Nations. But they are routinely ignored. Russia helped craft them only to knock Ukraine's power grid offline that winter and set in motion its hack-and-leak operation to interfere in the 2016 US presidential election.

Hacking is now a core component of great power conflict. In 2016, NATO formally designated cyberspace a “domain” of conflict, alongside land, sea and air.

Nowhere has the militarisation of cyberspace been more clear than in Putin's bid to return Ukraine to Moscow's orbit.

To Serhii Demediuk, the No. 2 official on Ukraine's National Security and Defense Council, a noisy cyberattack last month was “part of a full-scale Russian operation directed at destabilising the situation in Ukraine, aimed at exploding our Euro-Atlantic integration and seizing power.”

The attack damaged servers at the State Emergency Service and at the Motor Transport Insurance Bureau with a malicious “wiper” cloaked as ransomware. The damage proved minimal, but a message posted simultaneously on dozens of defaced government websites said: “Be afraid and expect the worst.”

Such attacks are apt to continue as Putin tries to “degrade” and “delegitimise” trust in Ukrainian institutions, the cybersecurity firm CrowdStrike said in a blog on Russian military cyber wreckage in the former Soviet republic: Winter attacks on the power grid in 2015 and 2016 were followed by NotPetya, which exacted more than $10 billion (roughly Rs. 75,330 crore) in damage globally.

Michele Markoff, the US State Department's deputy coordinator for cyber issues, thinks “muscular diplomacy” is the only way to end such “immoral, unethical and destabilising behavior.”

But how? Unlike nuclear arms, cyberweapons can't easily be quantified, verified, and limited in treaties. Nor are violators apt to be held accountable in the United Nations, not with Russia and China wielding veto power on its Security Council.

“We've wallowed kind of in a quagmire for years now on making transgressors accountable,” said Duncan Hollis, a Temple Law professor and former State Department legal adviser.

Members endorsed in May an update to the 2015 UN norm s that further delineates what should be out of bounds: including hospitals, energy, water and sanitation, education, and financial services. That has hardly deterred Russian-speaking ransomware crooks, who are at the very least tolerated by the Kremlin. Nor have US indictments of Russian and Chinese state hackers and the blacklisting of tech companies accused of aiding them helped much.

Under a new policy NATO adopted last year after US lobbying, an accumulation of lower-level cyberattacks — far below, say, blacking out the US East Coast — could be enough to trigger Article 5. But NATO is vague on what a tipping point might be.

NATO's doctrinal shift followed a pair of seismic cyberespionage shocks — the highly targeted 2020 SolarWinds supply chain hack by Russia that badly rattled Washington and the reckless March 2021 Microsoft Exchange hack attributed to Chinese state security that set off a criminal hacking free-for-all.

A cluster of wholesale data pilfering in the mid-2010s attributed to China — from the US Office of Personnel Management, United Airlines, Marriott hotels, and the health insurer Anthem — inflicted a deep national security wound. US officials have worried for more than a decade about rivals — Russia especially — quietly “pre-positioning” enough malware in US critical infrastructure including the energy sector to cause considerable chaos in an armed conflict.

In response, US Cyber Command developed a strategy in 2018 it calls “persistent engagement” to counter rivals who “operate continuously below the threshold of armed conflict to weaken institutions and gain strategic advantages.”

The aim: deny foes the chance to breach US systems by operating “across the interconnected battlespace, globally, as close as possible to adversaries,” Cybercom commander Gen. Paul Nakasone wrote.

That has sometimes meant penetrating not just adversaries' networks but also those of allies — without asking permission, said Smeets, the European cyber conflict analyst.

Disinformation campaigns have also muddied the definition of a “cyber threat.” No longer do they merely encompass malware like NotPetya or the the Stuxnet virus that wrecked Iranian nuclear centrifuges, an operation widely attributed to the US and Israel and discovered in 2010.

During the 2018 US midterm elections, Cybercom temporarily knocked offline a key Russian disinformation mill.

Most major powers have the equivalent of a US Cyber Command for both offense and defense.

Also active are terrorists, criminals working as state proxies, begrudged freelancers and hacktivists like the Cyber Partisans of Belarus.

Hollis compares the current messy cyber moment to the early 19th century when US and European navies were so small they often relied on privateers — we know them now as pirates— for high-seas dirty work.

The US and other NATO partners are, meantime, helping Ukraine stand up a separate cyber military unit, said Demediuk, the Ukrainian security official. Since Russia seized Crimea in 2014, NATO has closely and systematically coordinating cyber actions with Ukraine, including joint missions, he said.

In November, Ukraine exposed an eight-year espionage operation by agents of Russia's FSB in Crimea involving more than 5,000 attempted hacks. The main goal: to gain control over critical infrastructure, including power plants, heating and water supply systems, Ukraine's state news agency said.

This month, Microsoft said the operation, dubbed Armageddon, persists with attempts to penetrate Ukraine's military, judiciary and law enforcement. Microsoft detected no damage, but that doesn't mean Russian cyber operators haven't gained undetected footholds.

That's where hackers hide until they are ready to pounce.
 


Do Samsung's Galaxy S22 and Tab S8 series have any Android competition? We discuss this on Orbital, the Gadgets 360 podcast. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
Comments

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Joe Biden, Cyberattack
Tesla Accused of Exaggerating Mileage of Its Electric Cars, South Korea to Investigate
Share on Facebook Gadgets360 Twitter Share Tweet Snapchat Share Reddit Comment google-newsGoogle News
 
 

Advertisement

Follow Us

Advertisement

© Copyright Red Pixels Ventures Limited 2024. All rights reserved.
Trending Products »
Latest Tech News »