Global Ethics Corner: Cyberwar Strategy: Defensive or Offensive?

Aug 5, 2011

Governments and corporations are under serious and growing threat from cyber attacks. Which do you favor: a strategy that seeks out hackers and punishes them at the risk of waging an undeclared cyberwar, or a more defensive strategy, as adopted by today’s Pentagon?

In the future how will hacking affect espionage or even war?

A new security threat is the possibility of shutting down a state by attacking its infrastructure. For instance, cyber security company McAfee has discovered years of cyber attacks by an unidentified government on a wide range of governments, international bodies, and U.S. corporations.

Complex computer systems underpin modern life. Homes depend on the electrical grid. Computers control the transportation infrastructures for us and our goods. Money moves about on electronic wings and is stored in data bases, not vaults.

America has established a new military unit, the U.S. Cyber Command, and published a new cyberwar strategy.

According to counter-terrorism expert Richard Clarke, this Pentagon strategy just tries "to plug the holes in our networks but does not punish attackers for their rampant espionage... ."

"Apparently that was the intent," he continued. "The State Department wanted to avoid the charges that the United States was 'militarizing' cyberspace, or that the Americans were the first to conduct cyberwar... ."

The successful but terrifying strategy during the Cold War was based on the assumption that defense should be minimized and offense maximized in order to create the greatest threat to potential enemies. It was called MAD—"mutual and assured destruction"—and it worked.

Which do you favor: a strategy that seeks out hackers and punishes them at the risk of waging an undeclared cyberwar, or a more defensive strategy, as adopted by today's Pentagon?

By William Vocke

For more information see:

Richard Clarke, "The growing threat from cyberspace," International Herald Tribune, August 4, 2011, p. 6 (Asian Edition).

Photo Credits in order of Appearance:

Alvin Trusty
BrokenSphere
Haribote
Mosman Library
Tovkal
Aude
U.S. Department of State
National Nuclear Security Administration
The U.S. Army
David B. Gleason

You may also like

Left to Right: Eleonore Fournier-Tombs, Ambassador Chola Milambo, Ambassador Anna Karin Eneström, Doreen Bogdan-Martin, Vilas Dhar. CREDIT: Bryan Goldberg.

SEP 19, 2024 Video

Unlocking Cooperation: AI for All

On the eve of the Summit of the Future, Carnegie Council & UNU-CPR hosted a special event exploring the implications of AI for the multilateral system.

SEP 16, 2024 Video

AI for Information Accessibility: From the Grassroots to Policy Action

How can citizens, civic institutions, and industry professionals work together to make sure that emerging technologies are accessible for everyone?

Left to Right: Toni Erskine, Kenneth Payne, Brianna Rosen, Paul Lyons, Tess Bridgeman at the REAIM Summit in Seoul, Sept. 9, 2024. CREDIT: REAIM Summit.

SEP 9, 2024 Video

Responsible Military Use of AI: Bridging the Gap between Principles and Practice

This panel at the REAIM Summit in Seoul focused on the need to develop international governance for the use of military AI.

No traducido

Este contenido aún no ha sido traducido a su idioma. Puede solicitar una traducción haciendo clic en el botón de abajo.

Solicitar traducción