palgrave^pivot DETERRING CYBER WARFARE Bolstering Strategic Stability in Cyberspace Brian M. Mazanec and Bradley A. Thayer Introduction 3 1 Introduction Abstract: This chapter explains the central question, central argument, limitations, and significance of the book. The major question addressed is: in light of the challenges of applying deterrence theory to cyber warfare, how can the United States and its allies successfully deter major cyber attacks? While deterrence theory faces major challenges when applied to cyber warfare due to the unique aspect of cyber technology, there are three specific efforts that can help mitigate this challenge, which we explore in this study. First, cultivating beneficial norms for strategic stability; second, continuing efforts in the area of improving cyber forensics and defenses, including regarding lower evidentiary standards for attributing cyber attacks and addressing harboring "independent" attackers; and finally, developing and communicating a clear declaratory policy and credible options for deterrence-in-kind so as to make escalation unavoidable and costly. Keywords: Computer Network Attack; cyber security; cyber warfare; deterrence Mazanec, Brian M., and Bradley A. Thayer. Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace. Basingstoke: Palgrave Macmillan, 2015. doi: 10.1057/9781137476180.0004. Introduction As deterrence of attack has a long history in human affairs, dating to pre-history, so too does the interplay between the rise of new technologies and the resultant need to find a countervailing strategy or weapon for deterrence to obtain once again.1 The endless race between the development of a new weapon, its application, a defensive response to it, and the adjustment of deterrence theory to address or manage the threat has entered a new chapter with the rise of cyber warfare.2 Cyber warfare presents a new and challenging threat to international relations, and the situation is becoming worse as cyber capabilities and attacks are proliferating. This is acknowledged at the highest levels of the US government. At his confirmation hearing, Secretary of Defense Chuck Hagel expressed his confidence that at this time, it appears that the United States has successfully deterred major cyber attacks' but went on to explain that he expects deterring such major attacks to be a continued key challenge for the United States.3 As Secretary Hagel recognized, deterrence in this area is challenging because deterrence theory was developed for deterrence of kinetic attacks: deterring the application of force by the armies, air forces, and navies of ones enemies, and in the nuclear era, the enemy's strategic forces. However, with respect to deterrence, cyber warfare is in many respects unlike what has come before - it is not inherently kinetic. Accordingly, deterrence theorists and practitioners must adapt existing concepts and pursue tailored strategies to help achieve deterrence of cyber warfare with the goal that the result will be an increase in strategic stability in cyberspace. Indeed, there is a reasoned assumption among scholars such as Martin Libicki, who have highlighted the concern that cyber deterrence may not work as well as nuclear deterrence, that if this is the case, it illustrates the need for additional focus on this pressing challenge." The major question we address in this study is: in light of the challenges of applying deterrence theory to cyber warfare, how can the United States and its allies successfully deter major cyber attacks? Our central argument is that while deterrence theory faces major challenges when applied to cyber warfare due to the unique aspect of cyber technology, investments and efforts in three specific areas can help mitigate this challenge. Specifically, we recommend cultivating beneficial norms for strategic stability; continuing efforts in the area of improving cyber doi: 10.1057/9781137476180.0004 doi: 10.1057/9781137476180.0004 4 Deterring Cyber Warfare Introduction 5 forensics and defenses, including regarding lower evidentiary standards for attributing cyber attacks and addressing harboring 'independent' attackers; and developing and communicating a clear declaratory policy and credible options for deterrence-in-kind so as to make escalation unavoidable and costly. The challenges to applying deterrence theory to cyber warfare relate to pronounced uncertainty with respect to, first, awareness and attribution of an attack and, second, the uncertain effects of any attack. The difficulties surrounding attribution and control of its effects make deterrence of cyber warfare uniquely difficult. In some cases, lack of control makes the application of the weapon both enticing for the attacker but also risky due to blowback onto his own interests, his own society and economy, and those of his allies, and the risk of escalation by the defender, if, indeed, he is able to determine the attacker. Peter Singer of the Brookings Institution and others have identified this lack of attribution as the key factor that prohibits the direct and immediate application of deterrence theory to the cyber realm.5 If an attack is attributable, then traditional deterrence applies, including the possibility of a kinetic response. If an attack is not attributable, or the attacker believes it will be falsely attributed, it may be so enticing a weapon as to be irresistible. This is an old problem - if you could do something bad and get away with it, would you? This issue has been considered in various guises by philosophers and political leaders throughout history In Republic, Plato provides the example of Gyges' Ring, which made its wearer invisible.6 Would a man wearing Gyges' Ring be righteous; alas, no, he concluded. The temptation of being able to get away with something malicious without attribution would be too great, and even a moral man would be corrupted by such power. Cyber weapons give a state a Gyges' Ring, and increasingly, we witness the consequences. The implications of this uncertainty illustrate the need to develop a tailored approach to improve the ability to apply deterrence to cyber warfare. The three efforts we identify in this book will help manage these challenges. Importance of deterring cyber warfare The arguments of our study are significant for three reasons. First, the United States needs to deter cyber warfare and, given the empirical evidence publicly available, the United States has not done this well enough. This study calls attention to this danger and serves as a contribution to help US decision-makers better understand and apply the logic and the difficulties of deterrence of cyber attack. It provides a foundation for such discussions by introducing cyber warfare and then explaining the challenges associated with applying deterrence theory to this emerging form of warfare. Second, the study offers a unique contribution by identifying a specific series of efforts that can be initiated or strengthened in order to improve the deterrence of cyber attacks. These solutions are drawn from lessons from fields such as biology as well as prior experiences dealing with threats such as terrorism and nuclear weapons. For example, microbial forensics provides important and useful examples for answering the critical 'who did it?' question. We argue that policymakers can learn from experiences in other areas, such as biological weapons and forensics, and in doing so develop an effective package of responses to improve deterrence of cyber warfare. Third, cyber warfare is a major avenue of attack against the United States and has done significant damage to its national security interests, to the interests of allies, as well as to other states in international politics. Our study will help the United States address this growing and significant threat by improving its ability to deter cyber warfare. Cyber warfare is here to stay. It presents a growing challenge to the security of states and other international actors and is increasingly an element of conflict. Indeed, it should be considered as a component of conflict as any other arrow in the quiver of states. Its appeal is heightened because of the difficulty of attribution and the fact that it is widely usable as the norms for cyber warfare have not yet been firmly established. For example, in 2014, during the political crisis in Ukraine, a sophisticated cyber weapon known as 'Snake' or 'Ouroboros' was discovered.7 Snake is suspected to be of Russian origin and gives attackers full remote access to compromised Ukrainian systems. Threats such as this have led the Director of Intelligence James Clapper to identify cyber weapons as a major avenue of attack against the United States.8 An unfortunate fact of modern life is that there is a significant daily drumbeat of espionage-style cyber attacks against major military, intelligence, and civilian targets. The Norton Cybercrime Report puts the direct costs of cybercrime at $113 billion annually, with the United States' costs coming in at $38 billion. Further, the Ponemon Institute estimates that the average annualized total cost - direct and indirect doi: 10.1057/978113747618^.0004 doi: 10.1057/9781137476180.0004 6 Deterring Cyber Warfare - of cyber attacks in the United States among 60 key companies was $11.6 million. In 2012, this cost was estimated to be $8.9 million for these same companies, showing how the threat is growing with a large 26 per cent increase year over year.9 McAfee has offered an even more ominous estimate, reporting that the global Internet-based economy generates between $2-3 trillion with cybercrime extracting between 15 and 20 per cent of this figure.10 Even accounting for the fact that these figures may be inflated or have a wide margin of error, the costs of these attacks are enormous. Beyond a pure economic impact, cyber attacks have done significant damage to US national security, including the theft of critical information about the F-35 and other advanced US weaponry, as well as the weaponry of allies. A major cyber threat was revealed in February 2013 when the US cyber security firm Mandiant released a study detailing extensive and systematic cyber attacks, originating from Chinese military facilities, of at least 141 separate US-affiliated commercial and government targets." Mandiant went on to identify the primarily Chinese actor as 'Unit 61398' located within the 2nd Bureau of the Peoples Liberation Army General Staff Department's 3rd department.11 These attacks have led the US Department of Defense (DOD) to classify China as 'the world's most active and persistent perpetrators of economic espionage and claim that they are also 'looking at ways to use cyber for offensive operations'13 Chinese cyber espionage is so severe that in March 2013, Thomas Donilon, National Security Advisor to President Obama, called out Chinas egregious record of 'waging a campaign of cyber espionage against U.S. companies' which threatened the Sino-American relationship.14 While this cyber threat is considerable, the much more significant threat of destruction via cyber warfare, as opposed to cyber espionage, poses the greatest risk. With the proliferation of cyber capabilities this greater risk is becoming increasingly more likely. Cyberspace operations are the employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace.15 Hostile operations can come in the form of Computer Network Exploitation (CNE), like the espionage-style attacks mentioned earlier, as well as true Computer Network Attack (CNA).16 CNA is the use of computer networks to disrupt, deny, degrade, or destroy either the information resident in enemy computers and computer networks, or the computers and networks themselves. This understanding of Introduction 7 cyber warfare, focused on CNA between state actors - directly or through plausibly deniable non-state clients - will be the focus of this book rather than the more-frequent CNE attacks, which uses computer networks to gather intelligence on an adversary.17 However, as might be expected, there is a blurred line between CNA and CNE activity as CNE can elevate to an actual attack with mere keystrokes. As with other forms of warfare, CNA-style cyber warfare targeting can be countervalue, that is, focused on civilian targets like the US banking industry, or counter-force, focused on military personnel, forces, and facilities, United States Pacific Command, for example. In Chapter 2, we further develop this discussion. We focus on deterring CNA-style attacks as they pose the most serious threat and therefore the deterrence of these attacks is of paramount importance to national security. In 2010, the Economist envisioned the most extreme of major CNA-style cyber attacks when it described 'the almost instantaneous failure of the systems that keep the modern world turning. As computer networks collapse, factories and chemical plants explode, satellites spin out of control and the financial and power grids fail'.18 The targets of such an attack could include hospitals, Supervisory Control and Data Acquisition (SCADA) industrial control systems for chemical or nuclear plants, water filtration systems, transportation systems such as air traffic management systems or subways, banking and financial systems, and the electrical grid itself.19 Regarding the latter target, in particular, the potential consequences could be severe. In 2607, the US National Academy of Sciences (NAS) estimated that a major cyber attack on the US electrical grid could lead to 'hundreds or even thousands of deaths' due to exposure to extreme temperatures.'0 We would surmise that an attack on other utilities, financial, medical, or transportation industries would have similar consequences. In May 2013, a report on the electric grids vulnerability from Congressmen Edward Markey and Henry Waxman added further credibility to NAS's estimate. The Congressional report points out that most utilities are subject to numerous daily cyber attacks, they do not comply with the most robust cyber-security standards, and available spare transformers may not be adequate.21 Doug Myers, chief information officer for Pepco, an electric company in the mid-Atlantic region, predicts that it is not a question of if a cyber attack on the electrical grid happens, but when." Given the connectivity of the electrical grid in North America, the consequences are likely to be significant with doi: 10.1057/9781137476180.0004 DOl: 10.1057/9781137476180.0004 8 Deterring Cyber Warfare Introduction 9 considerable uncertainty as to the ability of the utilities or government to restore power rapidly The seriousness of the threat of major cyber attacks on civilian critical infrastructure is highlighted by the US governments hosting of a massive public-private exercise called GridEx II in November 2013.13 CNA-style attacks are not limited to systems connected to the Internet, as demonstrated by the Stuxnet attack, which was able to strike a closed SCADA system in Iran, presumably through flash drives or covert radio pathways.14 Further, future technological breakthroughs in cyber warfare technology could entail the development of attack code that could spread through sonic transmission to 'air gapped' devices not otherwise accessible.25 No doubt defenses will be developed, but they would likely be at least several steps behind. The United States and its allies must systematically confront this growing and significant threat. While any approach will involve numerous avenues, ranging from export-control regimes to mitigate proliferation of cyber weapons to the development and training of a new cadre of cyber warriors, deterrence must be part of the solution. In essence, successful deterrence seeks to achieve a cognitive effect on an adversary's thinking that prevents cyber attacks altogether. While it is clear the United States needs to deter CNA-style cyber warfare, it is challenged by the absence of proper intellectual constructs and approaches. Further, much of the existing discussion of the applicability of deterrence theory to cyber warfare is focused on theoretical questions and does not provide policymakers with a clear roadmap to addressing the challenges inherent in this task. Following our introduction, this book contains two main sections. The first section focuses on introducing cyberspace and cyber warfare, Chapter 2, and then an analysis of deterrence theory and the challenge of applying it to cyber warfare, which is done in Chapter 3. The second section then focuses on tangible ways to improve the deterrence of cyber attacks, first by examining non-material approaches followed by a review of more explicitly coercive solutions. Specifically, Chapter 4 discusses cultivating beneficial norms for strategic stability, Chapter 5 focuses on continuing efforts to improve cyber forensics and bolster cyber defenses, and Chapter 6 examines developing a declaratory policy and offensive cyber weapons. Last, Chapter 7 offers our concluding thoughts and recommendations for further research. DOI: 1O.1057/97811374/6180.OOO4 Notes 1 For the considerable evidence regarding warfare in pre-history, see Azar Gat, War in Human Civilization (Oxford: Oxford UP, 2006); and Lawrence H. Keeley, War before Civilization: The Myth of the Peaceful Savage (Oxford: Oxford UP, 1996). 2 We agree with Adam Liff's definition of cyber warfare' as 'a coercive (political) act involving computer network attack that is distinct from cyber espionage, hacking, and crime'. Adam P. Liff, "The Proliferation of Cyberwarfare Capabilities and Interstate War, Redux: Liff Responds to Junio', The Journal of Strategic Studies 36/1 (February 2013), 134-138,137. In addition, we concur with Gary McGraw^s insights: 'Cyber requires a consequential impact in the physical world, or what military experts call a "kinetic" effect'; he continues, 'In the end, war is the application of force to achieve a desired end. To qualify as cyber war, the means may be virtual but the impact should be physical'. Gary McGraw, 'Cyber War Is Inevitable (Unless We Build Security In)' The Journal of Strategic Studies 36/1 (February 2013), 109-119, 112. 3 John Reed, 'Cyber Deterrence Is Working, Hagel Tells Senators', Foreign Policy (30 January 2013), http://killerapps.foreignpolicy.com/ posts/20i3/oi/3o/cyber_deterrence_is_working_hagel_tells_senators. 4 Martin C. Libicki, Cyberdeterrence and Cyberwar (Washington, DC: Rand, 2009), xvi. 5 Peter W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford: Oxford UP, 2013), 144-148. 6 Plato, Republic, trans, by Allen Bloom (New York: Basic Books, 1968), 37-38. 7 David E. Sanger and Steven Erlanger, 'Suspicion Falls on Russia as "Snake" Cyberattacks Target Ukraine's Government', The New York Times (8 March 2014). 8 James Clapper, 'Statement for the Record: Worldwide Threat Assessment of the U.S. Intelligence Community', Senate Select Committee on Intelligence (12 March 2013), http://www.intelligence.senate.gov/130312/clapper.pdf. 9 Ponemon Institute, 2013 Cosf of Data Breach Study: Global Analysis (United States: 2013), 2. 10 McAfee, Net Losses: Estimating the Global Cost of Cybercrime; Economic Impact of Cybercrime II (United States: Center for Strategic and International Studies 2014), 7. 11 William Wan and Ellen Nakashima, 'Report Ties Cyberattacks on U.S. Computers to Chinese Military', Washington Post (19 February 2013), http:// artides.washingtonpost.com/2013-02-19/world/37166888_1_chinese-cyber-attacks-extensive-cyber-espionage-chinese-military-unit. 12 Wan and Nakashima, 'Report Ties Cyberattacks on U.S. Computers to Chinese Military'. DOI: 1O.1O57/9781137476180.O004 10 Deterring Cyber Warfare !j Anna Mulrine, 'China Is a Lead Cyberattacker of U.S. Military Computers, Pentagon Reports', Christian Science Monitor (18 May 2012), http://www. csmonitor.com/ USA/Military/ 2012/0518/China-is- a-Iead-cyberattacker-of-US-military-computers-Pentagon-reports. 14 Flavia Krause-Jackson, 'Donilon Says China Cyber Attacks Hurt Bid for Better Ties', Bloomberg News (12 March 2013), http://www.bfoomberg.com/ news/20i3-o3-n/china-cyber-attacks-harm-u-s-bid-for-tighter-ties-donilon-says.html. !j Dennis Murphy, "What Is War? The Utility of Cyberspace Operations in the Contemporary Operational Environment', Issue Paper Vol. 1-10, Center for Strategic Leadership, U.S. Army War College (February 2010), http:// www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20 Paper%2oFinah.pdf. 16 United States Department of Defense, Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms (15 May 2011), 93 !7 United States Government Accountability Office, GAO-11-695R: Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed forDOD to Develop Full-Spectrum Cyberspace Budget Estimates (Washington DC: 29 July 2011), 10. jg The Economist, 'Cyberwar' (1 July 2010), http://www.economist.com/ node/16481504. !9 FireEye, 'World War C: Understanding Nation-State Motives behind Today's Advanced Cyber Attacks' (30 September 2013), 20. 10 Lucas Kello, "The Meaning of the Cyber Revolution: Perils to Theory and Statecraft' International Security 38/2 (Fall 2013), 23. 21 Offices of US Congressmen Markey and Waxman, 'Electric Grid Vulnerability: Industry Responses Reveal Security Gaps', U.S. House of Representatives (21 May 2013), 3. 22 Yasmin Tadjdeh, 'Fears of Devastating Cyber-Attacks on Electric Grid, Critical Infrastructure Grow', National Defense Magazine (October 2013), 24, http://digital.nationaldefensemagazine.0rg/t/177663/26. 23 Matthew Wald, 'As Worries over the Power Grid Rise, a Drill Will Simulate a Knockout Blow', The New York Times (16 August 2013), http://www.nytim.es. com/2013/08/17/us/as-worries-over-the-power-grid-rise-a-drill-will-simulate -a-knockout-blow. html?_r=2 &pagewanted=print&. 24 David Sanger and Thorn Shanker, 'NSA Devises Radio Pathway into Computers', The New York Times (14 January 2014), http://www.nytimes. com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?_r=o. 25 Geoffrey Ingersoll, 'U.S. Navy: Hackers Jumping the Air Gap Would Disrupt the World Balance of Power' Business Insider (19 November 2013), http:// www.businessinsider.com/navy-acoustic-hacke rs- could-halt- fleets- 2013-11. tjoi: 10.1057/9781137476180.0004 2 Cyberspace and Cyber Warfare Abstract: This chapter introduces the core concepts of cyberspace and cyber warfare in detail and serves as a primer for later discussions of the application of deterrence theory to cyberspace and potential mitigating solutions. It defines cyberspace, cyberspace operations, Computer Network Exploitation (CNE), and Computer Network Attack (CNA). It also introduces a variety of characteristics that are unique or particularly pronounced when it comes to cyber weapons, as well as discussing some recent attacks. Keywords: Computer Network Attack; Computer Network Exploitation; cyber security; cyber warfare; cyberspace; information operations; Stuxnet Mazanec, Brian M., and Bradley A. Thayer. Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace. Basingstoke: Palgrave Macmillan, 2015. doi: 10.1057/9781137476180.0005. Dot: 10.1057/9781137476180.OOO5 11 12 Deterring Cyber Warfare Introduction Governments face many threats in contemporary international politics from terrorism, to epidemics, to war. While it was not a major threat or even concern as recently as 20 years ago, cyber warfare now ranks among these and is only likely to grow due to the following factors: its effectiveness as a weapon; the relative low cost of entry; the appeal as an asymmetric form of warfare; the lack of clearly defined international constraints; and difficulty of deterrence. Cyber weapons are currently emerging-technology weapons, that is, they have only existed for a short time, and there is relative secrecy surrounding most cyber operations. Accordingly, there is not an extensive record of customary practice of states,1 In fact, cyber warfare is so recent that its genesis was in the 1980s. Prominent cyber theorist Jason Healey usefully divides the history of cyber conflict into three phases: 'realization' in the 1980s; 'takeoff' from 1998 to 2003; and militarization' from 2003 to the present.2 Two of the main differences in each of Healey's phases are the increasing diffusion of capabilities among nations and improved and formalized organizational approaches to cyber conflict. Focusing on the militarization phase, James Lewis and the Center for Strategic and International Studies (CSIS), a major Washington, DC think tank, maintain a rolling list of 'significant cyber incidents' since 2006 and, as of July 2013, identify 153 hostile cyber operations.3 Preeminent cyber theorist Adam Liff has argued that the use of cyber warfare as a 'brute force' weapon is likely to intensify.4 The cyber weapon is here to stay and, indeed, is being used on a daily basis against the US government, industry, and people, as well as against US allies. Adversaries such as China have increasingly focused on what it refers to as 'informationized wars' that are heavily reliant on computers and information systems and focus on attacking such systems possessed by their adversaries.5 The United States would be at the vanguard of a state with a heavy dependence on information systems. Expanded international interest in cyber warfare is also based on the recognition that information networks in cyberspace are becoming operational centers of gravity in armed conflict.6 Cyber warfare involves many special characteristics that often do not apply to other forms of conflict, especially conventional military conflict.7 Accordingly, developing solutions - such as the application of appropriate tools and concepts from deterrence theory - to mitigate this significant risk is an important undertaking, and academics and Cyberspace and Cyber Warfare 13 policymakers have made noteworthy contributions.8 While scholars and defense analysts have grappled with the question of how applicable deterrence theory is for the creation of policies to deter cyber attack, the issue remains unsettled and merits further examination. However, before focusing on this issue, it is essential to develop a robust understanding of cyberspace and cyber warfare. Consequently, this chapter introduces cyberspace itself as a domain and operational center of gravity and then proceeds to examine both CNE- and CNA-style cyber warfare. It concludes with a mini-case study examination of specific examples of cyber warfare; specifically the Trans-Siberia Pipeline attack, the Estonia attack, the Operation Orchard attack, the Georgia attack, the Stuxnet attack, the Saudi Aramco attack, the Operation Ababil attack, and, most recently, the Snake attack. Cyberspace The cyberspace domain itself is defined in numerous ways and has only recently emerged as a strategic security concern. Understanding this domain is essential before one can consider how deterrence theory does or does not apply to cyber warfare. Within the United States, the domain was originally defined by the Department of Defense in 2000 as the 'notional environment in which digitized information is communicated over computer networks'.9 This computer-centric definition was significantly modified in 2006 when the US Air Force constituted a broader definition that was subsequently adopted by the Joint Chiefs of Staff in late 2006 and ultimately codified for all of DOD."° The new military definition of cyberspace - which applies to the military and non-military sectors, is 'a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processes and controllers'.11 This broader definition encompasses the Internet, the World Wide Web, 'smartphones', computer servers, tablets, and other common everyday resources. Thus, it captures the ubiquity of information systems and the role they play in modern life. Indeed, the US government's 2003 National Strategy to Secure Cyberspace usefully highlighted the virtually all-encompassing list of sectors particularly reliant on cyberspace, including: agriculture, food, water, public health, emergency services, government, defense industrial base, doii lCMO57/978ll37476l80.OO0$ ddi: 10.1057/9781137476180.0005 14 Deterring Cyber Warfare Cyberspace and Cyber Warfare 15 information and telecommunications, energy, transportation, banking and finance, chemicals and hazardous materials, and postal/shipping.12 Given the breadth of functions of daily life reflected in this list, cyberspace is unmistakably central to the US and global economy. Further, the United States is utterly dependent on cyberspace with over 239 million regular Internet users, a 77.3 per cent penetration rate.13 In addition, cyberspace is also a key supporting element of US military power. The Department of Defense relies heavily on information technology (IT) networks for Command, Control, Communications, Computer, Intelligence, Surveillance, and Reconnaissance and the planning and execution of day-to-day military operations. This reliance on cyberspace, while particularly relevant for the United States, also applies to the rest of the international community. As the Obama administrations International Strategy for Cyberspace states: The last two decades have seen the swift and unprecedented growth of the Internet as a social medium; the growing reliance of societies on networked information systems to control critical infrastructures and communications systems essential to modern life; and increasing evidence that governments are seeking to exercise traditional national power through cyberspace."1 The International Telecommunications Union (ITU), the UN agency for information and communication technologies, reported that over one-third of the world's seven billion people were online at the end of 2011, a 17 per cent increase since 2006.15 Multilateral security organizations such as NATO are still grappling with how to approach cyber threats and develop consensus on regulative norms and approaches for collective defense.16 Moreover, the cyberspace domain is largely owned and controlled by private industry, and thus many actions in cyberspace require a public-private partnership.17 This raises a multitude of ethical and legal questions associated with conducting warfare through a domain largely privately owned and controlled. For example, what are the responsibilities of Internet Service Providers (ISPs) to detect, report, and block malicious traffic intended to harm their host nations? This legal question and many others arising from this rather unique aspect of the domain have yet to be resolved. Cyber warfare While it can be challenging to reach agreement on what constitutes cyberspace as a domain, hostile action in cyberspace is more difficult to define. At the same time, it is even more pivotal to understand the dynamics of cyber warfare before examining the prospects for deterring cyber attacks. As we mentioned in Chapter 1, cyberspace operations are the employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace and cyber warfare. This is generally understood to be CNE- and CNA-style attacks. Often CNE and CNA go hand in hand as CNE is conducted to collect information and conduct pre-attack reconnaissance prior to a CNA, This study is focused on CNA-type cyber warfare, but we recognize that the line between these two major categories of hostile action in cyberspace - CNE and CNA - is often blurred. In a very real sense, using unauthorized cyber access to steal information allows the option of destroying information and progress into a cyber attack. Cyber expert Tom Gjelten described this phenomenon when he wrote, "The difference between cyber crime, cyber-espionage and cyber war is a couple of keystrokes. The same technique that gets you in to steal money, patented blueprint information, or chemical formulas is the same technique that a nation-state would use to get in and destroy things'.18 As a result, many today refer to cyber espionage as 'cyber warfare1 or cyber attacks' when in actuality no damage - other than secondary damage caused by the relative advantage the stolen information provides -occurs. John Arquilla, one of the first cyber theorists, has pointed this out by highlighting the fact that international law defines an attack as 'violence against the adversary' and that such a term does not necessarily apply to all cyber operations - namely, CNE." This imprecise lexicon when it comes to the terms 'cyber warfare' and 'cyber attacker' complicates the social environment in which norms for actual cyber warfare must emerge and develop. For example, Security and Defence Agenda, in collaboration with computer security company McAfee, published a report in February 2012, which identified the lack of agreement over key terms such as cyber war' and cyber attack' as a major impediment to norms and regulating cyber conflict.20 So significant is its impact that cyber warfare may be considered a Revolution in Military Affairs (RMA). Our opinion is that cyber warfare is conditionally an RMA if we conceive of it as a new avenue of attack in a new domain that is of significant political, intelligence, and military utility for states. If we have a higher standard of what constitutes an RMA, such as a change in the political calculus of war - for example, as nuclear weapons did - then we would not submit that cyber is an RMA.21 DOI: 10.1057/9781137476180.0005 doj: 10.1057/3781137476180.0005 16 Deterring Cyber Warfare Nevertheless, some analysts have gone so far as to predict that it will soon be revealed to be the biggest revolution in warfare, more than gunpowder and the utilization of air power in the last century'." While the fundamental significance may be debated, the threat of emerging-technology CNA-style cyber weapons is significant and will only increase. CSIS has identified more than 30 countries that are taking steps to incorporate cyber warfare capabilities into their military planning and organizations.23 Increased international interest in cyber warfare is also based on the recognition that information networks are the Achilles' heels of the United States and its allies in armed conflict.2" This was reflected in the US Department of Defenses 2014 Quadrennial Defense Review - a theme also identified in previous reviews - which argued: the United States has come to depend on cyberspace to communicate in new ways, to make and store wealth, to deliver essential services, and to perform national security functions. The importance of cyberspace to the American way of life - and to the Nations security - makes cyberspace an attractive target for those seeking to challenge our security and economic order. Cyberspace will continue to feature increasing opportunities but also constant conflict and competition - with vulnerabilities continually being created with changes in hardware, software, network configurations, and patterns of human use.2' Cyber warfare plays a role at the tactical, operational, and strategic levels of war: from impacting engagement systems at the tactical level, the adversary's ability to mass and synchronize forces at the operational level, and the ability of senior leadership to maintain clear situational awareness of the national security environment at the strategic level.26 Additionally, given its utility for states, we expect that cyber warfares role will spread though we are uncertain as to how rapidly it will do so. Michael Horowitz provides a theory on the diffusion of new military capabilities in which his adoption capacity theory predicts that cyber weapons are likely to spread quickly. This is because the diffusion of military innovations depends on two intervening variables: the financial intensity involved in adopting the capability and the internal organizational capacity to accommodate any necessary changes in recruiting, training, or operations to adopt the capability.27 The low financial and organizational barriers to developing cyber warfare capabilities indicate that the adoption of cyber warfare will likely be widespread. Last, cyber warfare involves many special characteristics that often do not apply to other forms of conflict, especially conventional military DDI: 10.1057/9781137476180.0005 Cyberspace and Cyber Warfare 17 conflict. These include the challenges of actor attribution, multi-use nature of the associated technologies, target and weapon unpredictability, potential for major collateral damage or unintended consequences due to cyberspace's 'borderless' domain, the use of covert programs for development, attractiveness to weaker powers and non-state actors as an asymmetric weapon, and the use as a force multiplier for conventional military operations.28 These factors are important to consider when evaluating the prospects for deterring cyber warfare. To illustrate these concepts, the remainder of this chapter will discuss examples of CNA-style cyber warfare. Examples of cyber warfare While most hostile cyber operations to date can be properly classified as CNE, there are some examples of cyber warfare attacks that provide insight into the emerging practice of states in regards to the most serious type of hostile cyber operation. There are many small CNA-style operations that involve Distributed Denial of Service (DDOS) attacks to degrade access to websites, such as the Code Red attack in 2001, which involved malware that launched a DDOS attack against White House computers.29 It is believed that between 10 and 25 per cent of computers connected to the Internet, or approximately 100-150 million devices, are compromised and used illicitly as part of various networks of compromised computers - known as 'botnets' - utilized to conduct these frequent DDOS attacks.30 However, in terms of major cyber warfare attacks, there are fewer public examples. This chapter will examine eight: the purported attacks on a Siberian gas pipeline in 1982, the DDOS attacks on Estonia in 2007, the Israeli 'Operation Orchard' attacks on Syria in 2007, the attacks on Georgia in 2008, the notorious Stuxnet attack on Iran disclosed in 2010, the 'Shamoon' virus attack on Saudi-Aramco in 2012, Izz ad-Din al-Qassam's 'Operation Ababil' attack against financial institutions in 2012, and the 2014 'Snake' attack against Ukraine. The United States' Trans-Siberia Pipeline attack against the Soviet Union While cyberspace as we know it today has at most existed for only two decades and most sophisticated cyber attacks have occurred only in the MASARYN OV-V.1-' St VERXHA DOl: 10.1057/9781137476180.0005 Joitovs W 18 Deterring Cyber Warfare past decade, the first purported CNA-style cyber operation dates back to 1982. This attack is largely still shrouded in uncertainty In 1982, a portion of the Trans-Siberia pipeline within the Soviet Union exploded, allegedly as a result of computer malware implanted in the pirated Canadian software by the United States Intelligence Community, causing a malfunction in the SCADA system that ran the pipeline.31 The main source of information on this cyber attack is the Farewell Dossier.32 Among other things, the document points out that contrived computer chips [would make] their way into Soviet military equipment, flawed turbines were installed on a gas pipeline, and defective plans disrupted the output of chemical plants and a tractor factory'.33 While the accuracy of this attack is disputed to this day, it purportedly resulted in the 'most monumental nonnuclear explosion and fire ever seen from space', and the embarrassed Soviets never accused the United States of the attack.34 This attack is significant because it involved an attack on critical infrastructure that was not explicitly military in nature. The Trans-Siberian pipeline was responsible for transporting natural gas to western Ukraine and, ultimately, to the broader energy market in Europe and reportedly generated revenue of about $8 billion a year.35 The Russian attack against Estonia Over 20 years later, the cyber attacks against Estonia in 2007 serve as a more current example of states' emerging contemporary practice of cyber warfare. In late April 2007, the Estonian government's efforts to relocate a Soviet-era statue in their capital city of Tallinn led to significant disruptions on their Internet and Web-based services that lasted for several weeks and consisted of 128 unique DDOS cyber warfare attacks. At its peak, traffic originating from outside Estonia was 400 times higher than its normal rate and involved approximately 100 million computers from more than 50 countries. The attackers executed the attacks using a series of botnets and investigators determined that the attacks were carefully coordinated in advance due to the fact that the attack did not propagate and did not appear to be centrally controlled through an identifiable command and control center.36 To alleviate the attacks, Estonian telecommunications companies and ISPs worked quickly to expand network capacity and move government sites to alternate servers. The cyber warfare waged against Estonia was the first time a sophisticated attack focused on disruption and denial of services had been DOl: 10.1057/9731137476180.0005 Cyberspace and Cyber Warfare 19 conducted against a nation state. Many sources believe that the Russian government was involved due to the large number of Internet Protocol (IP) addresses originating in Russia, as well as the obvious motive for their engagement. Because of the cyber attribution challenge mentioned previously - and which will be examined in more detail in the following chapter - no 'smoking gun' evidence has been made public to support that notion and the Russian Federation has denied any involvement. Estonian officials have been unable to identify and apprehend the perpetrators who coordinated the DDOS attack. Following the attack, NATO, of which Estonia is a member, established the NATO CCD COE on 14 May 2008.37 This center, located in Tallinn, Estonia, seeks to enhance NATO's ability to respond to cyber attacks and, as of late, has been acting as an organizational platform for norm entrepreneurs, as will be discussed in more detail later in this chapter. Though the Estonia cyber attacks were aimed directly at disrupting and degrading civilian services, the attack did not result in permanent damage and did not destroy any critical infrastructure. Israel's Operation Orchard attack One of the first examples of cyber warfare that was designed to support -albeit not directly cause - 'real world' physical damage was Israels suspected cyber attacks on Syrian air defense radars in advance of their 2007 attack on a Syrian nuclear reactor under construction, which was known as Operation Orchard. The cyber attack is believed to have caused meaningful degradation of Syria's air defenses and thus helped enable the Israeli aircraft to cause the physical destruction of the Syrian nuclear site. This attack targeted a clear military target, a military air defense system, in support of an attack on another clear military objective, the Syrian nuclear weapon program. Syria did not protest the cyber attack as doing so would have required acknowledging its illicit nuclear program. It is believed that the Israeli offensive cyber attack may have also damaged domestic Israeli cyber networks used by civilians.38 This showed that a certain degree of civilian collateral damage was permissible even if the attack was focused solely on military objectives. It also illuminates larger issues states have to consider in the realm of cyber war: how much uncertainty about collateral damage are governments willing to accept before launching an attack? And how much actual collateral damage are they willing to incur? c-oi: 10.1057/9781137476180.OOO5 20 Deterring Cyber Warfare Russia's attack against Georgia Compared to Estonia, the Russian attack on Georgia in July 2008 presents a different form of attack, one used in conjunction with conventional warfare conducted against the former Soviet state in order to achieve tangible disruption and effects beyond CNE-style espionage. This attack began on 20 July 2008, just prior to the military invasion of Georgia by Russian forces, with a large-scale DDOS attack shutting down Georgian servers. It is the best example to date of cyber weapons being used as a force multiplier for conventional military operations. As the invasion began, the attacks increased and spread to other targets.39 This ultimately forced the Georgian government to move critical communication services to commercial US sites as their own services were shut down.40 The attack was likely organized by the Russian government to support its broader political and military objectives in the crisis, but executed by loosely affiliated 'independent' hackers that strengthen the government's plausible deniability.41 Like the Estonian attacks, critical infrastructure was not attacked and permanent damage did not occur. That said, the Georgian case is a template of what should be expected in present-day conflicts - cyber warfare will be used in a first strike against the foe to disrupt civilian and military networks. Its effectiveness as a first strike weapon remains to be seen fully, although we have no doubt that these attacks will grow in number and also in sophistication. The Stuxnet attack Perhaps the most famous example of cyber warfare to date is Stuxnet. In July 2010, a Belarusian computer security firm first identified Stuxnet, an extremely sophisticated computer virus designed to attack industrial control systems." As the global computer security industry began deconstructing the virus, it became apparent that the Iranian nuclear program was its likely target. Soon, software patches were posted to eliminate the vulnerabilities the Stuxnet exploited, and tools were provided that computer users, including those in Iran, could use to clean their infected machines.43 The need for these clean-up tools was widespread. In a little over a year, Stuxnet spread prodigiously to approximately 100,000 computers worldwide, 40,000 of which were located outside of Iran.44 Stuxnet's sophistication was in how it spread to a system not connected to the broader Internet, targeted a very specific industrial control system, and fooled operators into thinking everything was normal while Cyberspace and Cyber Warfare 21 wreaking physical havoc on the system.45 After the 1982 Siberian pipeline attack, Stuxnet was the first incident of cyber warfare which targeted physical infrastructure and caused real-world damage without involving any kinetic weapons. It was, in the words of former CIA director Michael Hayden, 'the first attack of a major nature in which a cyber attack was used to effect physical destruction rather than just slow another computer, or hack into it to steal data',46 What made it unique was that Stuxnet utilized many 'zero-day' software strategies, and precisely identified its targets, activated its destructive payload only when it found the specific Siemens PLC used for Iranian centrifuges.47 Zero day attacks take advantage of previously unknown vulnerabilities in a computer application. When the target was identified, Stuxnet then modified the code on the Siemens PLC in order to cause physical damage while simultaneously masking its modifications to make the system appear to be functioning normally. Experts projected that this likely delayed the Iranian nuclear program by 6-18 months and destroyed approximately 1,000 P-i centrifuges, or approximately 20 per cent of Iran's total inventory.48 Once the public became aware of Stuxnet, there was immediate suspicion that the United States and Israel were behind the attack. Nevertheless, as with the attacks on Estonia and Georgia, as well as the CNE Conficker virus - which we examine in the next chapter - conclusive attribution was not possible. However, in June 2012, a New York Times story based on unspecified US sources indicated that Stuxnet was part of a series of US cyber attacks organized under the code name 'OLYMPIC GAMES'.49 The New York Times journalist David Sanger reported that even after Stuxnet became public, the United States allegedly decided to further accelerate additional cyber attacks on Iran, perhaps due to the remarkable success of Stuxnet. In October 2013, cyber researcher Ralph Langner reported that Stuxnet actually had two attack protocols. The widely reported centrifuge over-spinning attack was the simpler and less severe payload.50 Langner identified the second Stuxnet payload which, if used, would have over-pressurized Iran's centrifuges by tampering with the protection system. This attack would have been abruptly damaging to the Iranian program by destroying hundreds of centrifuges at once, but it would have blown Stuxnet's cover, which Langner argues is the reason it was not deployed.51 Iran was reluctant to even acknowledge the Stuxnet attack, in part perhaps because it did not believe the action was prohibited under customary doi: 10,1057/9781137476180.0005 DOI: 10.1057/9781117476180.0005 22 Deterring Cyber Warfare international law.52 Other nations may also have fallen victim to Stuxnet as collateral damage. In November 2013, Eugene Kašpersky, head of a major computer security firm, claimed that Stuxnet also infected nuclear facilities outside Iran, including a Russian nuclear plant.53 Iran's attack against Saudi Aramco Iran is suspected to have invested heavily in offensive cyber warfare capabilities, in part as a response to the damage wrought by Stuxnet. On 15 August 2012, these investments seem to have borne fruit in an attack involving the 'Shamoon virus that was launched against the state-owned oil company Saudi Aramco.54 The attack prompted US Secretary of Defense Leon Panetta to describe 'Shamoon as a 'very sophisticated' piece of malware generating 'tremendous concern'.55 Over 30,000 computers were infected, and in many cases data on servers as well as hard drives on individual computers were destroyed.56 The goal of the attack was purportedly to disrupt the flow of Saudi oil by damaging SCADA control systems, but it did not succeed in achieving that effect.57 An Iranian-linked group called 'Cutting Sword of Justice' ultimately took credit for the attack, which also affected the Qatari company RasGas as well as other oil companies.58 Ultimately, the attack affected the business processes of Saudi Aramco, and it is likely that some important drilling and production data were lost." This attack again showed a dangerous trend of unconstrained attacks against non-military targets and was interpreted by Richard Clarke - cyber warfare expert and former senior official at the US National Security Council - as a signal that this kind of retaliation and escalation was just beginning.60 The Iranian Operation Ababil attack against the United States In September 2012, not long after the Saudi Aramco attacks, further retaliation and escalation stemming from the Stuxnet attack on Iran occurred when the Iranian-affiliated hacker group Izz ad-Din al-Qassam launched 'Operation Ababil' targeting the websites of financial institutions for major DDOS attacks. Affected institutions included the Bank of America, New York Stock Exchange, Chase Bank, Capital One, SunTrust, and Regions Bank.61 In January 2013, Izz ad-Din al-Qassam claimed responsibility for another series of DDOS attacks, again predominantly US financial Cyberspace and Cyber Warfare 23 institutions as part of 'Operation Ababil', phase two. A third phase of DDOS attacks began in March 2013.62 US officials believe that Izz ad-Din al-Qassam is a front organization for an Iranian state-sponsored effort.63 US Senator Joseph Lieberman went so far as to state on C-SPAN that he thinks 'this was done by Iran and the Quds Force, which has its own developing cyberattack capability'64 Unfortunately, given the ambiguous-at-best attribution of major cyber attacks, let alone the daily drone of CNE, norms constraining cyber warfare do not appear to be emerging. The current environment allows states to view their own attacks as retaliation and not escalation, as Iran surely does following the Stuxnet attack. Thus, Tehran, and other states that have been victims of an attack, might be even less constrained by senses of appropriate and inappropriate targets and methods. The Snake attack against Ukraine In 2014, a cyber attack occurred during the crisis in Ukraine, this one involving a weapon known as 'Snake' or Ouroboros. Snake is of suspected Russian origin but, as with the previous cases, positive attribution has not been achieved.65 Nevertheless, under the reasonable standard of 'cui bono', Russia is likely the responsible party. The Ukraine crisis began with street protests in November 2013 when former President Viktor Yanukovych elected to withdraw from a potential economic deal with the European Union.66 What began as protests leading to a change in political leadership led to the Russian-supported annexation of Crimea and an ongoing civil war-like conflict. This conflict has extended to cyberspace, with the most sophisticated attack involving a CNE, possibly CNA, tool kit named Snake. Beginning in 2010, Snake began infecting Ukrainian computer systems.67 Since 2010, researchers have identified 56 incidents of Snake, 32 of which were found in Ukraine,68 Given the frequency and time of the Snake attacks, it is likely that some form of Russian involvement is present, either through independent hackers or through government-sponsored attacks. Although far from conclusive evidence, BAE systems has discovered Russian text in Snakes code and information suggesting the malware developers operated in the Moscow time zone.6' In addition to Snake, other possibly related DDOS cyber attacks have temporarily shut down websites in both Russia and Ukraine.70 doi: 10.1057/9781137476180.0005 DOI: 10.1057/9781137476180.0005 24 Deterring Cyber Warfare Notes 1 Gary Brown and Keira Poellet, "The Customary International Law of Cyberspace', Strategic Studies Quarterly (Fall 2012), 129-130. 2 Jason Healey, A Fierce Domain: Conflict in Cyberspace, 19S6 to 2012 (The Atlantic Council and Cyber Conflict Studies Association, 2013), 18. 3 James Lewis, 'Significant Cyber Events since 2006', Center for Strategic and International Studies (11 July 2013), http://csis.org/publication/cyber-events-2006. 4 Adam P. Liff, 'Cyberwar: A New "Absolute Weapon"? The Proliferation of Cyberwarfare Capabilities and Interstate War', Journal of Strategic Studies 35/3 (June 2012), 401-428. 5 United States China Economic and Security Review Commission, 2007 Report to Congress, http://www.uscc.gov/AnnuaLReports/2007-annual-report-congress, 94. 6 United States Department of Defense, DoD Information Operations Roadmap (30 October 2003). 7 For elaborations, see Gregory Koblentz and Brian Mazanec, 'Viral Warfare: The Security Implications of Cyber and Biological Weapons' Comparative Strategy 32/5 (November 2013), 418-434; and Thomas Rid, 'Cyber War Will Not Take Place', Journal of Strategic Studies 35/1 (February 2011), 5-32. 8 See Martin C. Libicki, Cyberdeterrence and Cyberwar (Washington, DC: Rand, 2009); David Elliott, 'Deterring Strategic Cyberattack', IEEE Security and Privacy (September/October 2011); James C. Mulvenon and Gregory J. Rattray, eds., Addressing Cyber Instability (Washington, DC: Cyber Conflict Studies Association, 2012); Peter D. Feaver, 'Blowback: Information Warfare and the Dynamics of Coercion', Security Studies 7/4 (Summer 1998), 88-120; and Gregory J. Rattray, Strategic Warfare in Cyberspace (Cambridge, MA: MIT Press, 2001). 9 Pamela Woolley, 'Defining Cyberspace as a United States Air Force Mission', Air Force Institute of Technology (June 2006), 2-3. 10 United States Department of Defense, Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms (May 2011), 93. 11 United States Department of Defense, 'The Definition of Cyberspace, Deputy Secretary of Defense Memorandum (12 May 2008). 12 United States Department of Homeland Security, U.S. National Strategy to Secure Cyberspace (2003), http://www.whitehouse.gov/pcipb/cyberspace_ strategy.pdf. 13 International Telecommunication Union, 2010 U.S. Internet Usage and Broadband Report (2011). 14 United States, International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World (Washington, DC, May 2011). DOr: 10.1057/9781137476180.0005 Cyberspace and Cyber Warfare 25 15 International Telecommunications Union, The World in 2011 - ICT Facts and Figures (December 2011). 16 Spencer Ackerman, 'NATO Doesn't Yet Know How to Protect Its Networks', Wired.com (1 February 2012). 17 United States Department of Homeland Security, U.S. National Strategy to Secure Cyberspace (2003), http://www.whitehouse.gov/pcipb/cyberspace_ strategy.pdf. 18 Tom Gjelten, 'Cyber Insecurity: U.S. Struggles to Confront Threat', NPR.org (6 April 2012), http://www.npr.org/templates/story/story. php?storyId=i25578576. 19 John Arquilla, 'Twenty Years of Cyberwar', Journal of Military Ethics (17 April 2013), 85. 20 Brigid Grauman, 'Cyber-security: The Vexed Question of Global Rules', Security Defence Agenda and McAfee (February 2012), 6. 21 For a consideration of these issues, see Bradley A. Thayer, "The Political Effects of Information Warfare: Why New Military Capabilities Cause Old Political Dangers', Security Studies 10/1 (Autumn 2000), 43-85. 22 Jeremy Bender, 'Israel: Cyber Is a Bigger Revolution in Warfare than Gunpowder', Business Insider (4 February 2014), http://www.businessinsider. com/the-internet-is-the-next-batÜefield-2014-2. 23 James Lewis and Katrina Timlin, 'Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization', Center for Strategic and International Studies (2011). 24 United States Department of Defense, DoD Information Operations Roadmap (30 October 2003), http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/ info_ops_roadm ap.pdf. 25 United States Department of Defense, 2014 Quadrennial Defense Review (2014), http://www.defense.gov/pubs/2014_Quadrennial_Defense_Review.pdf. 26 United States Department of Defense, Joint Publication 3-13.1: Electronic Warfare (January 2007), www.dtic.mil/doctrine/jel/new_pubs/jp3_13.1.pdf. 27 Michael Horowitz, The Diffusion of Military Power: Causes and Consequences for International Politics (Princeton: Princeton UP, 2012). 28 Gregory Koblentz and Brian Mazanec, 'Viral Warfare: The Security Implications of Cyber and Biological Weapons', Comparative Strategy 32/5 (November 2013), 418-434. 29 Brown and Poellet, "The Customary International Law of Cyberspace', 130. 30 Francois Paget, 'How Many Bot-Infected Machines on the Internet?', McAffe Labs (29 January 2007), http://blogs.mcafee.com/mcafee-labs/how-many-bot-infected-machines-are-on-the-internet. 31 Brown and Poellet, "The Customary International Law of Cyberspace'. 32 Gus W. Weiss, 'The Farewell Dossier: Duping the Soviets', The Central Intelligence Agency (27 June 2008), https://www.cia.gov/library/center-for-the- DOI: 10.1057/9781137476180.0005 26 Deterring Cyber Warfare Cyberspace and Cyber Warfare 27 study-of-intelligence/csi-publications/csi-studies/studies/96unclass/farewell. htm. 33 Weiss, 'The Farewell Dossier: Duping the Soviets'. 34 For disputes over the veracity of the reports regarding the attack, see Jeffrey Carr, 'The Myth of the CIA and the Trans-Siberian Pipeline Explosion' (7 June 2012), http://jefFreycarr.blogspot.com/2012/06/myth-of-cia-and-trans-siberian-pipeline.html; for information on the alleged effects of the attack, see Brown and Poellet, 'The Customary International Law of Cyberspace'. 35 Steve Melito, 'Cyber War and the Siberian Pipeline Explosion', CBRN Resource Network (2 November 2013), http://news.cbrnresourcenetwork.com/ newsDetail.cfm?id=i09. 36 Larry Greenemeier, 'Estonian "Cyber Riot" Was Planned, but Mastermind Still a Mystery', Information Week (3 August 2007), http:// www.informationweek.com/estonian-cyber-riot-was-planned-but-mast/201202784. 37 North Atlantic Treaty Organization Cooperative Cyber Defence Center of Excellence website, https://www.ccdcoe.org/, accessed 14 January 2014. 38 James Lewis, 'The Korean Cyber Attacks and Their Implications for Cyber Conflict', Center for Strategic and International Studies (October 2009). 39 John Markoff, 'Before the Gunfire, Cyberattacks', The New York Times (14 August 2008), http://www.nytimes.com/2008/08/13/technology/13cyber. html?_r=o. 40 Markoff, 'Before the Gunfire, Cyberattacks'; David Mollis, 'Cyberwar Case Study: Georgia 2008', Small Wars Journal (6 January 2011), http:// smallwarsjournal.com/jrnl/art/cyberwar-case-study-georgia-2008. 41 Gregg Keizer, 'Georgian Cyberattacks Suggest Russian Involvement', ComputerWorld (17 October 2008), http://www.computerworld.eom/s/article/9117439/ Georgian_cyberattacks_suggest_Russian_invo!vement_say_researchers. 42 Kim Zetter, 'How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History', Wired.com (11 July 2011), http://www.wired.com/ threatlevel/20ii/o7/how-digital-detectives-deciphered-stuxnet/. 43 Zetter, 'How Digital Detectives Deciphered Stuxnet'. 44 David Albright, Paul Brannan, and Christina Walrond, 'Stuxnet Malware and Natanz', Institute for Science and International Security (15 February 2011). 45 Paulo Shakarian, 'Stuxnet: Cyberwar Revolution in Military Affairs', Small Wars Journal (14 April 2011), 1, http://smallwarsjournal.com/jrnl/art/stuxnet-cyberwar-revolution-in-military-affairs. 46 Shakarian, 'Stuxnet: Cyberwar Revolution in Military Affairs' 1. 47 Shakarian, 'Stuxnet: Cyberwar Revolution in Military Affairs', 6; Zero-day vulnerabilities refer to previously unrecognized vulnerabilities in software code. Soon after they are exploited, they are often patched by the software developer, eliminating the vulnerability. 48 Shakarian, 'Stuxnet: Cyberwar Revolution in Military Affairs', 1. 49 David Sanger, 'Obama Ordered Sped Up Wave of Cyberattacks against Iran', New York Times (1 June 2012), http://www.nytimes.com/2012/06/01/ world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran. html?pagewanted=all. 50 Ralph Langner, 'Stuxnet's Secret Twin: The Real Program to Sabotage Iran's Nuclear Facilities Was Far More Sophisticated than Anyone Realized', Foreign Policy (21 November 2013), http://www.foreignpolicy.com/articles/2013/11/19/ stuxnets_secret_twin_iran_nukes_cyber_attack?page=o,i&wp_login_ redirect=o#sthash.8fThCVs0.oBk6pcLA.dpuf. 51 Langner, 'Stuxnet's Secret Twin'. 52 Brown and Poellet, 'The Customary International Law of Cyberspace'. 53 Graham Cluley, 'Stuxnet "Badly Infected" Russian Nuclear Plant, Claims Kašpersky' (10 November 2013), http://grahamcluley.com/2013/11/ stuxnet-badly-infected-russian-nuclear-plant-claims-kaspersky/?utm_ source=rss&utm_medium=rss8uitm_campaign=stuxnet-badly-infected-russian-nuclear-plant-claims-kaspersky. 54 Nicole Perlroth, 'In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back', The New York Times (23 October 2012), http://www.nytimes.com/2012/10/24/ business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html. 5 5 Christopher Bronk and Eneken Tikk-Ringas, 'The Cyber Attack on Saudi Aramco' Survival: Global Politics and Strategy 55 (April-May 2013), 81-96. 56 Wael Mahdi, 'Saudi Arabia Says Aramco Cyberattack Came from Foreign States', Bloomberg News (9 December 2012), http://www.bloomberg.com/ news/20i2-i2-o9/saudi-arabia-says-aramco-cyberattack-came-from-foreign-states.html. 57 Wael Mahdi, 'Saudi Arabia Says Aramco Cyberattack Came from Foreign States'. 58 Lewis, 'Significant Cyber Events since 2006', 12. 59 Bronk and Tikk-Ringas, 'The Cyber Attack on Saudi Aramco'. 60 Perlroth, 'In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back'. 61 Lewis, 'Significant Cyber Events since 2006'. 62 Mathew J. Schwartz, 'Bank Attackers Restart Operation Ababil DDoS Disruptions', InformationWeek Security (6 March 2013), http://www. informationweek.com/security/attacks/bank-attackers-restart-operation-ababil/240150175. 63 Lewis, 'Significant Cyber Events since 2006' 64 Ellen Nakashima, 'Iran Blamed for Cyberattacks on U.S. Banks and Companies' The Washington Post (21 September 2012), http://articles. DOC 10.1057/9781137476180.000; DOI: IO.IO57/97811374761S0.OOO5 28 Deterring Cyber Warfare washingtonpost.com/2012-09-21/world/35497878_t_web-sites-quds-force-cyberattacks. 65 David E. Sanger and Steven Erlanger, 'Suspicion Falls on Russia as "Snake" Cyberattacks Target Ukraine's Government' The New York Times (8 March 2014). 66 BBC News, 'Ukraine Crisis Timeline* (5 July 2014), http://www.bbc.com/ news/world-middle- east-26248275. 67 Sanger and Erlanger, 'Suspicion Falls on Russia as "Snake" Cyberattacks Target Ukraine's Government'. 68 Sanger and Erlanger, 'Suspicion Falls on Russia as "Snake" Cyberattacks Target Ukraine's Government'. 69 Sanger and Erlanger, 'Suspicion Falls on Russia as "Snake" Cyberattacks Target Ukraine's Government*. 70 Mark Clayton, 'Massive Cyber Attacks Slam Official Sites in Russia, Ukraine', Christian Science Monitor (18 March 2014), http://www.csmonitor.com/World/ Security-Watch/Cyber-Conflict-Monitor/2oi4/o3i8/Massive-cyberattacks-slam-official-sites-in-Russia-Ukraine. □Ol: iO,tO57/978nj747öJSo.OO0 5 3 Deterrence Theory and the Challenge of Applying It to Cyber Warfare Abstract: This chapter explains the core ideas of deterrence theory, specifically that it is largely associated with nuclear policy. During the Cold War, the United States and Soviet Union adopted a survivable nuclear force to present a 'credible' deterrent that maintained the 'uncertainty inherent in strategic stability as understood through the accepted theories of major theorists like Bernard Brodie, Herman Kahn, and Thomas Schelling. This chapter evaluates the limits and challenges associated with the application of deterrence theory to cyber warfare and argues that while there are major insights from deterrence theory for cyber warfare, there are also major problems introduced by the unique aspect of cyber technology that causes significant problems for deterrence. These are, first, uncertainty associated with awareness and attribution of an attack; and second, the uncertain effects of such an attack. Keywords: attribution; computer network attack; cyber warfare; deterrence; strategic stability Mazanec, Brian M., and Bradley A. Thayer. Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace. Basingstoke: Palgrave Macmillan, 2015. doi: 10.1057/9781137476180.0006. DOI: 10.1057/9781137470180.0006 29 30 Deterring Cyber Warfare Introduction Deterrence theory is largely associated with nuclear policy. During the Cold War the United States and Soviet Union adopted a surviv-able nuclear force to present a credible deterrent that maintained the uncertainty' inherent in a strategic balance as understood through the accepted theories of major theorists like Bernard Brodie, Herman Kahn, and Thomas Schelling.1 Theories of deterrence were largely developed early in the Cold War by academics coming to grips with the intellectual conundrum and novelty of the political and military impact of nuclear weapons, and arguably prevented a world war by allowing policymakers to understand how nuclear weapons affected traditional tools of statecraft - deterrence and coercion - and the risks associated with nuclear war.2 The concept of deterrence is about keeping an opponent from doing something that you do not want him to do by making a threat of unacceptable consequences. In order to work, nuclear deterrence requires a broad range of capabilities, and not just nuclear or other military forces but also economic and diplomatic means, and these capabilities must be directed at the many actors the United States seeks to deter - from rising peer competitors like China, new nuclear states like North Korea, emerging nuclear states like Iran, to al Qaeda and associated movements, and, today, cyber attacks. Keeping someone from doing something you do not want him to do may be brought about by threatening unacceptable punishment if the action is taken, this is called deterrence by punishment (the power to hurt), or by convincing the opponent that his objective will be denied to him, if he attacks, deterrence by denial (the power to deny military victory). Both forms of deterrence may apply in the case of a cyber attack against the US homeland or other national security interests. Nuclear weapons make deterrence easier to obtain than in the pre-nuclear world, when states only had conventional forces that need first to defeat the opponent's military. In a nuclear world, there was no necessity to defeat an opponent's military. Bombers and intercontinental missiles were able to deliver nuclear weapons over great distances and against which no effective defense was possible. In this vein, cyber attacks are like nuclear weapons since there is no need to defeat an opponents military and there is no need to be deterred if you can get away without attribution. Deterrence Theory 31 The United States seeks to deter attacks in five broad categories. The first of these is deterrence of attack on the US homeland. Historically, nuclear weapons make the costs of such an attack prohibitive due to the consequences of nuclear retaliation. As in the Cold War, the United States is a target, and, just as then, it has enemies who wish its destruction. Nuclear weapons deter those like al Qaeda who would deliberately attack the United States as well as deterring those like China who might be tempted to attack the US homeland as a result of escalation from a crisis, perhaps over Taiwan as in 1995-1996. During that crisis, a senior Chinese military leader famously threatened the United States with nuclear weapons, stating that Washington valued Los Angeles more than Taiwan.3 But in this instance of deterrence, deterrence of attacks against the homeland, cyber warfare is a problem because states can, and indeed do, cyber attack the United States. Some states, like Iran, are not deterred and employ the cyber weapon against the US homeland. Second, due to its position in international politics, the United States must extend deterrence credibly, effectively, and relatively inexpensively to its allies. This provides them with security and removes their incentive to acquire nuclear weapons. The extended deterrent of the United States is one of the most important non-proliferation mechanisms Washington possesses.4 It was the large and credible US nuclear arsenal that kept key allies like Japan or West Germany from acquiring nuclear weapons during the Cold War.5 If the United States significantly cuts its nuclear arsenal, and certainly if it disarms, powerful proliferation incentives will return for allies of the United States. As is regularly on display in the East and South China Seas, the United States faces an increasingly hostile China.6 Chinese foreign minister Yang Jiechi observed at an ASEAN meeting in 2010, 'China is a big country, and other countries are small countries and that is just a fact',7 an argument Thucydides made well over two thousand years ago in the Melian Dialogue - the strong do what they will and the weak suffer what they must. If history is a guide, as China's power continues to grow so too will its ambition and its ability to advance its objectives.8 These will progressively conflict with those of the United States and its allies for three reasons: first, the numerous and dangerous territorial conflicts China has with its neighbors, which may escalate to involve the United States; second, the conflicting grand strategies of China and the United States; and third, the changing distribution of power between Beijing and Washington. DOr. 10.1057/9781137476180.0006 doi: 10.1057/9781137476180.0006 32 Deterring Cyber Warfare The growth of Chinese military power will require a credible extended deterrent from the United States in order to reassure allies, prevent destabilizing nuclear proliferation, and intensify security competition in Asia. An inability of the United States to deter cyber attacks increases the attractiveness of that weapon for its foes and undermines the credibility of its extended deterrent. Third, the United States needs to deter attacks against the US military. Military bases in Guam and in other countries in Asia and the Pacific, or US ships, especially aircraft carriers, are inviting targets for China. US nuclear capabilities play an important role in deterring such attacks, and will become more important as China continues to develop sha shoujian, or assassin's mace', capabilities which target US military vulnerabilities.9 Chinese military thought includes cyber and nuclear weapons as part of the assassin's mace suite of weaponry, which suggests that the Chinese do not see nuclear weapons as solely a small, minimal deterrent but as useable forces to be employed at the right time against the United States. Additionally, they perceive cyber weapons to be perfectly legitimate tools of warfare against the US military and its allies. Fourth, obtaining deterrence plays a role in stability. In this context, stability, first, is considered the absence of an incentive to launch a major attack as well as of deterring the escalation of conflict; and second, it is the assurance that the United States is protected against a surprise and decapitating first strike, and thus may wait rather than retaliate immediately. That is, there is no need to launch on warning of an attack, or even need to launch under attack conditions. Deterrence contributes to the broader concept of 'strategic stability', which is 'the resilience of the international political order to disruption that could lead to strategic conflict'.10 The role of nuclear and conventional weapons in aiding stability and promoting the de-escalation of crises during the Cold War is well established." Although deterrence is always complicated, nuclear and conventional weapons have kept the 'Long Peace' the world has enjoyed since 1945. However, should deterrence fail and conflict begin, the United States will want to keep it from escalating to a higher level, and nuclear weapons and its conventional and cyber capabilities aid the ability of the United States to do this. For example, were China to attack the Philippines over Scarborough Shoal, US nuclear weapons would help prevent escalation to a strategic exchange between the United States and China. However, were China to employ a cyber attack as part of a confrontation, as it almost certainly would to destroy US command and Deterrence Theory 33 control and Intelligence, Surveillance, and Reconnaissance (ISR) capabilities, there is a greater risk that a crisis would escalate, if China could be identified as the culprit. Fifth, some nine countries are suspected of having or known to possess biological weapons (BW) programs, including China, Iran, and Syria, and approximately seven countries have known or suspected chemical weapons (CW) capabilities, again including China, Iran, and Syria.12 We include Syria in this list because it is not clear if it has destroyed its stockpiles as this book goes to press. The United States has neither; it seeks to deter the use of other weapons of mass destruction, biological weapons or chemical weapons, against the US homeland, its allies, or the US military. At this time, the United States does not consider cyber warfare use to be the equal of BW or CW. This is, no doubt, in part because of the relatively widespread use of cyber attacks in international politics. In contrast to deterrence, coercion is about getting the opponent to do something he does not want to do, or making him halt an action you do not want him to take. Because it involves a change in the status quo and the opponent must change his behavior, it is harder to coerce than to deter. Unlike deterrence, the targets of coercion are likely to value the issue at stake, such as territory, more highly, and thus the balance of resolve is likely to favor them. Thus, the coercer needs superior and diverse military capabilities, such as tactical and strategic nuclear weapons. Cyber weapons aid the coercive capabilities of the United States in three major ways. First, the United States needs to have the ability to make coercive threats to advance its interests. For example, a mix of conventional, tactical, and strategic nuclear weapons and cyber capabilities provide the United States with this ability to fight its way into areas where opponents like China have strong Anti-Access, Area Denial (A2D2) capabilities.13 The target of coercion could never be certain that the United States would not use all of its options, including nuclear threats, as Eisenhower famously did in Korea and Kennedy in the Cuban Missile Crisis. Second, the United States needs to convince the challenger not to escalate to a higher level of violence or 'move up a rung' in the escalation ladder'. Conversely, the United States needs to have cyber capabilities in addition to its conventional and nuclear capabilities to deter escalation, but also to threaten escalation to stop a conventional attack, or a limited doi: 10.1057/9781137476180.0006 doi: 10.1O57/978ll37476l8o.O006 34 Deterring Cyber Warfare nuclear attack, as well as to signal the risk of escalation to a higher level of violence, as it did during the 1973 October War. Third, although laden with risks, cyber warfare also provides the possibility of attacking first to limit the damage the United States or its allies would receive in the event of conflict. Whether the United States would strike first is another matter. Nonetheless, an unfortunate fact is that nuclear weapons may be used, and if so, the United States must have the capabilities to prevail. While there are major insights from deterrence theory for cyber warfare, there are also major problems introduced by the unique aspect of cyber technology that cause significant problems for deterrence and therefore strategic stability in cyberspace. These are, first, uncertainties associated with awareness and attribution of an attack; and, second, the uncertain effects of such an attack. In sum, deterrence of cyber warfare is a discrete analytical problem from deterrence of kinetic attacks. In order to evaluate the effectiveness of deterrence of cyber warfare, we consider the factors that undermine the certainty upon which deterrence depends. Awareness of cyber attack and attribution The first major problem of most cyber weapons is the challenge of becoming aware of the attack and properly attributing the attack once it has occurred. These problems are extremely difficult to resolve as a result of the tremendous difficulty in conclusively determining the origin, identity, and intent of an actor/attacker operating in this domain, compounded by the fact that defenders generally lack the tools needed to reliably trace an attack back to the actual attacker. As Rid argues, all cyber attacks to date have been examples of sophisticated forms of sabotage, espionage, and subversion and are reliant on this attribution difficulty.14 Cyberspace is truly global and nearly all action passes through networks and ISPs in multiple countries. Additionally, the hardware used to conduct cyber warfare can be owned by innocent noncombatants, illicitly harnessed for malicious use through the use of computer viruses, as was the case in the 2007 Estonian and 2008 Georgian attacks. As discussed in Chapter 2, in April 2007, Estonia suffered significant disruptions on their Internet and Web-based services that lasted for several weeks and consisted of 128 unique DDOS cyber warfare attacks. Deterrence Theory 35 At its peak, traffic originating from outside Estonia was 400 times higher than its normal rate and involved approximately 100 million computers from more than 50 countries - highlighting some of the issues associated with the attribution challenge. The attackers executed the attacks using a series of botnets that hijacked innocent bystanders' computers.15 The Russian attack on Georgia in July 2008 is another example of cyber warfare conducted against a former Soviet state in order to achieve political and military effects while simultaneously maintaining plausible deniability that undermines deterrence. Prior to the military invasion, a large-scale DDOS attack shut down Georgian servers and, as the invasion began, the attacks increased and spread to other targets.16 The attack was likely organized by the Russian government to support its broader political and military objectives in the crisis, but executed by loosely affiliated 'independent' hackers that strengthen the government's plausible deniability.17 In 2014, another cyber attack occurred during the crisis in Ukraine. This attack involved a weapon known as 'Snake', which, as discussed earlier, is of suspected Russian origin although, at the time of writing, positive attribution has not been achieved.18 The Estonian, Georgian, and Ukrainian experiences highlight the challenges associated with uncertainty and attribution in cyberspace. Millions of devices continue to be compromised and used illicitly as part of a various networks - 'botnets' - utilized to conduct cyber attacks.1' This also provides plausible deniability to state-sponsored activity. While it is a CNE-style attack and not CNA, the Conficker worm, first detected in November 2008, is a major illustration of the challenge of attribution in cyberspace. It is suspected that Conficker is of Ukrainian origin because it did not target Ukrainian IP addresses or computers using Ukrainian-configured keyboards. Of course, a savvy adversary could have programmed that component as part of its deception strategy.20 Another CNE-style attack highlighting the attribution challenge, this one on a US Department of Defense Solaris computer operating system and known as 'Solar Sunrise*, originally appeared to be coming from Harvard University and then from other universities in Utah and Texas.21 For almost a month, officials did not know the origin or number of hackers involved and the Deputy Secretary of Defense, John Hamre, informed President Clinton that the attacks were suspected to have been planned by operatives in Iraq in response to the threat of additional US airstrikes.22 However, highlighting the challenge of attribution in DOI: 10.1057/9781137476180.0006 doi: 10.1057/9781137476180.0006 36 Deterring Cyber Warfare cyberspace, later investigations determined the attack was conducted by two teenagers in California who were merely recreational hackers and not acting on behalf of any nation state.23 In all of these attacks - Estonia, Georgia, Conficker, Snake, and Solar Sunrise - the attackers used botnets and routed their attacks through various IP addresses, which are akin to phone numbers or physical locations on the Internet. While it is possible to trace this path of the attack back through the IP addresses to the original source, doing so requires information from the ISPs involved (often obtained by law enforcement through a court order). This can take time and make attribution and 'hot pursuit' in cyberspace impossible. Additionally, this complex process can complicate maintaining the integrity of the chain of evidence' and allows foreign ISPs to delay or impede the investigation. The resulting evidence and accusation may become suspect in the proverbial international court of public opinion.24 Finally, if quality evidence tracing an attack back to its origin is obtained, it still may not lead to attribution of the attack. Knowing the originating IP address of an attack vector will not necessarily indicate who the attacker was or if they were acting with state support or direction.25 Sometimes an analysis of the malware itself can provide clues, but these could just as easily be deliberate decoys intended to lead investigators astray and are unlikely to result in firm attribution of a cyber attack. Of course, in some instances tracing of the path of the attack across the Internet is particularly useless - such as when the malware payload is delivered to its target via alternate means, such as via a human delivery with a medium such as a USB drive or direct radio or sonic transmission discussed earlier. This particular challenge is present in the Stuxnet attack, which was an extremely sophisticated computer virus that successfully attacked Iranian industrial control systems associated with their nuclear program.26 In Table 1.1, we provide a review of these cyber attacks, as well as those examined in Chapter 2, and their suspected sponsors in order to highlight the challenge of plausible deniability in cyberspace. The challenges of attribution in cyberspace - as illustrated in the attacks listed in the table with their inherent plausible deniability - make it very difficult to attribute hostile action in cyberspace to a particular individual, organization, or state and so make cyber warfare particularly appealing for an adversary that wants to execute an attack anonymously or at least with reasonable deniability. This poses significant challenges Deterrence Theory 37 table 1.1 The challenge of attribution: selected cyber attacks and suspected sponsors Attack Name (Type) Date Effect Suspected Sponsor Trans-Siberian June 1982 Massive explosion United States Gas Pipeline (CNA) Solar Sunrise February 1998 Unauthorized Initially Israel and (CNE) access and some UAE, later two exfiltration of Californian residents sensitive data of US government agencies Estonia (CNA) April-May 2007 Major denial of Russia service Syrian Air September 2007 Degradation Israel Defense System as of air defense part of Operation capabilities Orchard (CNA) allowing kinetic strike Georgia (CNA) July 2008 Major denial of Russia service Conficker (CNE, November 2008 Creation of Ukraine possibly CNA) large botnet for DDOS attacks, unauthorized access to sensitive data Stuxnet (CNA) Late 2009-2010, Physical United States possibly as early destruction of as 2007 Iranian nuclear centrifuges Saudi-Aramco August 2012 Large-scale Iran (CNA) destruction of data and attempted physical disruption of oil production Operation Ababil September Major denial of Iran (CNA) 2012-March 2013 service Snake (CNE, March 2014 Sophisticated Russia possibly CNA) exfiltration of data, possible targeted CNA-style attacks DOI: 10,1057/9781137476180.0006 DOi: 10.1057/9781137476180.0006 38 Deterring Cyber Warfare for achieving offensive deterrence against cyber attack as an adversary can have some reasonable expectation that it may be impossible to fully attribute the attack and impose reliable costs for the action. Uncertainty regarding cyber weapon effects The second major characteristic of cyber weapons that significantly impacts the logic of deterrence is the uncertainty regarding their effects. Due to the potential for IT network evolution as well as IT interdependences, it is difficult to predict the precise effects of an attack. In cyberspace, the targeted actor is capable of literally flipping a switch and instantly changing the network or even unplugging it altogether. This factor is a destabilizing force as it rewards immediate hostile action to prevent network modification if cyber reconnaissance-targeting intrusions are later detected. In essence, it is the opposite of stable deterrence and akin to nuclear crisis instability where nuclear deterrence may fail because it incen-tivizes a first strike. Defenders may also have unknown automated countermeasures that negate the desired effects of cyber attacks, such as instantaneous network reconfiguration or firewalls. For example, the Stuxnet attack is likely no longer able to continue to attack Iranian nuclear facilities as the zero-day exploits it utilized have been plugged by Iranian officials. In addition to network/target evolution, cyber weapons themselves can also be unpredictable and can evolve. A cyber weapon can adapt - as was seen with the Conficker virus. Conficker included a mechanism that employed a randomizing function to generate a new list of 250 domain names, which were used as command and control rendezvous points on a daily basis. Thus the virus remained adaptable and stayed ahead of those seeking to shut down or hijack the illicit Conficker-enabled network.27 Network interdependencies are another dynamic contributing to the potential for collateral damage that is characteristic of cyber weapons. Because the Internet is made up of hundreds of millions of computers connected through an elaborate and organic interwoven network and it is the backbone of much of the global economy, there is the potential for significant unintended and collateral impacts from cyber action. This interconnected nature of IT systems has led to real-world collateral damage. For example, the 2007 Israeli cyber attack on Syrian air defense Deterrence Theory 39 systems as part of Operation Orchard was believed to have also damaged domestic Israeli cyber networks.28 Fear of this kind of cyber collateral damage has had a profound effect on military planning. As another example, in 2003, the United States was planning a massive cyber attack on Iraq in advance of any physical invasion - freezing bank accounts and crippling government systems. Despite possessing the ability to carry out such attacks, the Bush administration canceled the plan out of a concern that the effects would not be contained to Iraq but instead would also have a negative effect on the networks of friends and allies across the region and in Europe.2' The adverse consequences of such unintended results were powerful deterrents for the United States. Of course, this is not to say that other states would be similarly deterred from such actions, especially states that do not have the alliance obligations and responsibilities of the United States. The uncertain effects of cyber weapons, coupled with the availability of defenses and the need for secrecy and surprise, reduce their ability to serve as a strategic deterrent in their own right. Available defenses and the potential for network evolution to mitigate the effects of an attack given early warning requires cyber attackers to rely on surprise for much of their effectiveness. To achieve surprise, secrecy is required, reducing the ability of a state to make credible threats without compromising their cyber warfare capabilities. Credible threats regarding specific means of attack or targets invite the threatened state to take protective actions which could blunt the deterrent value of a threat. Essentially, although cyber weapons have the potential to inflict unacceptable damage against an adversary, they are likely unable to offer states a credible, consistent, and 'assured' capability for doing so. This deficiency significantly undermines their suitability as a deterrent tool and instead they are more likely to support an intelligence, surveillance, and reconnaissance mission, or to be used as a first strike weapon, preemptively, or as force multipliers. Addressing the uncertainty in cyberspace to improve deterrence The implications of these uncertainty challenges illustrate the need to develop a tailored approach to improve the ability to apply deterrence to cyber warfare.30 While some - most notably Jason Healey - argue that DOI: 10.1057/9781137476180.0006 DOI: 10.1057/9781137476180.0006 40 Deterring Cyber Warfare cyber deterrence is working as there has not yet been a major strategic cyber attack, our analysis indicates otherwise.3' The following chapters will offer our recommendations for mitigating these challenges and thus bolstering deterrence of cyber attacks. These recommendations fall into two general categories, which will be discussed in turn. First, we recommend investments in non-material solutions, such as norms, to help strengthen cyber deterrence. Second, we recommend efforts to invest in balance of power solutions that impact the material calculus involved in successfully deterring cyber warfare. While we recognize that it will be impossible to deter all cyber attacks, particularly some of the more basic CNE-style espionage attacks, improvements in these areas will help address some of the unique uncertainty challenges and related deterrence implications identified earlier. Notes 1 Bernard Brodie, The Absolute Weapon: Atomic Power and World Order (New York: Harcourt Press, 1946); and Strategy in the Missile Age (Princeton: Princeton University Press, 1959); Herman Kahn, Thinking about the Unthinkable (New York: Avon Books, 1962); and Thomas Schelling, Arms and Influence (New Haven, CT: Yale University Press, 1966). 2 David Yost, 'Analyzing International Nuclear Order', International Affairs 83/3 (May 2007), 549-574- 3 Danny Gittings, 'General Zhu Goes Ballistic, The Wall Street Journal (18 July 2005), http://online.wsj.com/article/o„SBn2i65i76626988o25,oo.html, 4 See Kurt M. Campbell, Robert J. Einhorn, and Mitchell B. Reiss, eds., The Nuclear Tipping Point: Why States Reconsider Their Nuclear Choices (Washington, DC: Brookings Institution Press, 2004). 5 As Frances Gavin submits: 'Twenty years after the collapse of the Soviet Union, from and what are we protecting these states? A large part of the US military commitment to Western Europe during the Cold War was motivated not only by the need to deter the Soviets but by a pressing need to keep the Federal Republic of Germany non-nuclear. Similar dual concerns - protection and restraint - motivated US security arrangements with Japan and South Korea. The benefits from a proliferation perspective, went beyond simply keeping the target state non-nuclear. If West Germany did not have nuclear weapons, Italy, Switzerland, and Sweden, for example, might be inclined to abstain. A non-nuclear Japan, Taiwan, and South Korea likely weakened proliferation pressures in Indonesia and Australia'. Francis Deterrence Theory 41 J. Gavin, 'Politics, History and the Ivory Tower-Policy Gap in the Nuclear Proliferation Debate", Journal of Strategic Studies 35/4 (2012), 588-589. 6 For example, see, John F. Copper, 'Island Grabbing in the East China Sea', The National Interest (14 September 2012), http://nationaIinterest.org/ commentary/understanding-the-south-china-sea-conflict-7453; and Bonnie S. Glaser, 'Armed Clash in the South China Sea', Contingency Planning Memorandum No. 14, Council on Foreign Relations, http://www.cfr.org/ east-asia/armed-clash-south-china-sea/p27883. 7 John Pomfret, 'U.S. Takes Tougher Tone with China', The Washington Post (30 July 2010), http://www.washingtonpost.com/wp-dyn/content/ article/ 2010/07/29/AR2010072906416 .html. 8 These motivations are explored in Bradley A. Thayer, 'Humans, Not Angels: Doubting the Decline of War Thesis', International Studies Review 15/3 (September 2013), 405-411. 9 Mark Schneider, "The Nuclear Doctrine and Forces of the People's Republic of China', National Institute of Public Policy (November 2007), http://www. nipp.org/National%20 Institute% 2oPress/Current%2oPublications/PDF/ China%2onuclear%2ofinal%2opub.pdf. 10 Jeffrey Larsen and Polly Holdorf, Strategic Stability at Low Numbers of Nuclear Weapons (Defense Threat Reduction Agency Advanced Systems and Concepts Office, November 2010). 11 This argument was common in the Cold War and well expressed by Pierre Gallois, 'NATO's New Teeth', Foreign Affairs 39/1 (i960), 73. Also see John Lewis Gaddis, We Now Know: Rethinking Cold War History (New York: Oxford UP, 1997). 12 See Carnegie Endowment for International Peace, 'Chemical and Biological Weapons in the Middle East', http://www.carnegieendowment. org/2002/04/16/chemical-and-biological-weapons-in-middle-east/dlu; Nuclear Threat Initiative, 'Syria', http://www.nti.org/country-profiles/syria/; Nuclear Threat Initiative, Tran', http://www.nti.org/country-profiles/iran/; Nuclear Threat Initiative, 'China', http://www.nti.org/country-profiles/china/. 13 Andrew Krepinevich, Barry Watts, and Robert Work, 'Meeting the Anti-Access and Area-Denial Challenges', Center for Strategic and Budgetary Assessments (2003), www.csbaonline.org/wp.../2003.05.20-Anti-Access-Area-Denial- A2-AD.pdf. 14 Rid, 'Cyber War Will Not Take Place', Journal of Strategic Studies (February 2011) 5-32. 15 Larry Greenemeier, 'Estonian "Cyber Riot" Was Planned, but Mastermind Still a Mystery', Information Week (3 August 2007), http:// www.informationweek.com/estonian-cyber-riot-was-planned-but-mast/201202784. doi: 10.1057/9781137476180.0006 doi: 10.1057/9781137476180.0006