Chanakya is amongst the best Indian philosophers, economists, and political strategists who lived in the 4th century BCE. He is best known for his treatise on statecraft, the ARTHASHASTRA, which covers a wide range of topics, including warfare
One of Chanakya’s key theories of warfare is the concept of “Asymmetric Warfare,” which involves using unconventional tactics to defeat a stronger opponent. In the context of Cyber Warfare, this could involve using cyber-attacks to disrupt an enemy’s critical infrastructure, such as power grids, communication networks, and financial systems, rather than engaging in traditional military operations
Another key theory of Chanakya’s is the concept of “Dharma-Yuddha,” or “Righteous War“. According to Chanakya, a righteous war is one that is fought for a noble cause, such as self-defense or the defense of others, and is conducted in a manner that is consistent with ethical principles. In the context of cyber warfare, this could involve using cyber-attacks to defend against an enemy’s cyber-attacks, rather than using them to launch offensive operations
While Chanakya’s theories were developed in the context of ancient warfare, they continue to be relevant today, including in the context of Cyber Warfare.
Let’s decode Cyber Warfare
Cyber warfare is a term used to describe a series of cyber-attacks that target a country, with the potential to wreak havoc on government and civilian infrastructure and disrupt critical systems, resulting in damage to the State and even loss of life. Some consider cyber warfare to be a cyber-attack that can result in death. Cyber warfare typically involves a nation-state perpetrating cyber-attacks on another, but in some cases, the attacks are carried out by terrorist organisations or non-state actors seeking to further the goal of a hostile nation
There are several types of cyber warfare attacks, including espionage, sabotage, denial-of-service (DoS) attacks, electrical power grid attacks, propaganda attacks, economic disruption, and surprise attacks
- Espionage refers to monitoring other countries to steal secrets. In cyber warfare, this can involve using botnets or spear phishing attacks to compromise sensitive computer systems before exfiltrating sensitive information
- Sabotage involves hostile governments or terrorists stealing information, destroying it, or leveraging insider threats such as dissatisfied or careless employees, or government employees with affiliation to the attacking country
- DoS attacks prevent legitimate users from accessing a website by flooding it with fake requests and forcing the website to handle these requests. This type of attack can be used to disrupt critical operations and systems and block access to sensitive websites by civilians, military and security personnel, or research bodies
- Attacking the power grid allows attackers to disable critical systems, disrupt infrastructure, and potentially result in bodily harm. Attacks on the power grid can also disrupt communications and render services such as text messages and communications unusable
- Propaganda attacks attempt to control the minds and thoughts of people living in or fighting for a target country. Propaganda can be used to expose embarrassing truths, spread lies to make people lose trust in their country, or side with their enemies
- Economic Disruption: Most modern economic systems operate using computers. Attackers can target computer networks of economic establishments such as stock markets, payment systems, and banks to steal money or block people from accessing the funds they need
- Surprise attacks are the cyber equivalent of attacks like Pearl Harbor and 9/11
Is Cyber Warfare and Cyber Terrorism both the same?
Certainly! Cyber warfare and cyber terrorism are two distinct concepts, although they are often used interchangeably
Cyber warfare is the use of digital technology to attack a nation’s computer systems, networks, and infrastructure. It is typically carried out by one nation-state against another, with the goal of causing damage to the target’s military or economic capabilities. Cyber warfare can involve a range of tactics, including espionage, sabotage, and disruption of critical infrastructure
On the other hand, cyber terrorism is the use of digital technology to carry out acts of terror, such as causing physical harm or destruction of property. Unlike cyber warfare, cyber terrorism is not limited to nation-states and can be carried out by individuals or groups with political or social objectives
While there are some similarities between the two concepts, the key difference lies in their objectives. Cyber warfare is primarily aimed at weakening the military or economic capabilities of a nation-state, while cyber terrorism is aimed at causing fear and panic among the general public. For instance, a cyber-attack on a country’s power grid or military installations would be considered an act of cyber warfare, whereas a cyber-attack on a hospital’s computer systems or a bank’s website would be considered an act of cyber terrorism
Here are some examples of Cyber Warfare and Cyber Terrorism
Cyber Warfare
- In 2010, the United States and Israel allegedly used a computer virus called Stuxnet to attack Iran’s nuclear program. The virus was designed to damage the centrifuges used to enrich uranium, causing significant delays in Iran’s nuclear program
- In 2017, North Korea allegedly launched a cyber-attack on the British health service, causing widespread disruption and chaos
- In 2018, Russian hackers allegedly targeted the US power grid, gaining access to critical infrastructure and causing widespread concern about the vulnerability of the US electrical system
Cyber Terrorism
- In 2015, a group of hackers calling themselves the Cyber Caliphate took control of the Twitter and YouTube accounts of the US Central Command, posting messages in support of ISIS
- In 2016, a group of hackers calling themselves the Armada Collective launched a series of DDoS attacks on banks and financial institutions in Greece, causing widespread disruption and panic
- In 2017, the WannaCry ransomware attack affected more than 200,000 computers in 150 countries, causing significant damage to hospitals, banks, and other critical infrastructure
It is also important to note that in cyber warfare, the traditional deterrence of punishing a country doesn’t work. Holding individuals accountable, as many governments are increasingly doing, has far more potential. To protect themselves from cyber terrorism, nations can take a number of steps, including developing a comprehensive cybersecurity strategy, investing in cybersecurity infrastructure, collaborating with other nations, educating the public, and establishing legal frameworks to prosecute cyber criminals and terrorists
Comments