Digital Conflict

By Kevin Coleman

Blog archive

What constitutes an act of cyber war?

Can a country be held accountable for hacking groups that operate within its borders? That is a question that is currently being played out on the world stage. India and Pakistan have been exchanging cyber fire on and off for more than a decade. Some say these cyber hostilities date back to 1998, and the latest volley of cyber fire is just a continuation in the hostilities. The exchange of digital fire has focused on taking down (i.e., making unavailable) websites in both countries. So who is winning? That depends on who you ask. In the latest exchange, cyber battle damage was assessed at approximately 40 Pakistani websites taken down and the defacement of more than 250 Indian websites.

Is this really a cyber war? Hardly, but absent an agreed upon definition, who can object. One security intelligence analyst I spoke with put it like this: “This is more like children behaving badly than it is about a true military exchange in the cyber domain.” I would have to agree. You could put this in the same classification of cyber hostilities as those WikiLeaks supporters that have launched cyber attacks to protest actions against WikiLeaks’ founder Julian Assange.

However, this does point to a serious problem that has been around for some years now. The problem of defining what constitutes an act of cyber war. I wrote a definition for cyber terrorism in 2004 that was picked up and referenced in the Deputy Chief of Staff for Intelligence’s Cyber Operations and Cyber Terrorism Handbook but did not address the definition of what constitutes an act of cyber war due to the complexities. Homeland Security Secretary Michael Chertoff posed the question about cyber war in 2008. To this day we still do not have an answer to that fundamental question much less a definition that is accepted by all NATO countries or by the United Nations. With the frequency of cyber hostilities increasing, don’t you think we should at least define what constitutes an act of cyber war before one really happens?

Posted by Kevin Coleman on Dec 30, 2010 at 12:12 PM


Featured

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.