Wednesday, 19 March 2025
logo
Up-to-the-minute perspectives on defence, security and peace
issues from and for policy makers and opinion leaders.
        



dv-header-dday
     |      View our Twitter page at twitter.com/defenceredbox     |     
espionage

By Oliver Jones

Much has been made over recent years of the emerging threat of "cyber-attacks" on Western targets. Governments have become increasingly vocal on these threats, publishing a range of materials and proposing a number of policies. In the United States the government has taken steps which include the establishment of the US "Cyber-Command", alongside the US senate debating a so called "kill switch bill", which proposes to grant the president emergency powers over the internet. In the UK the cyber threat is also a growing concern. The recent Strategic Defence and Security Review and the UK National Security Strategy have both identified the sphere of "cyber Security" as a "Tier 1" threat or risk . Outside of government circles the issue is also becoming increasingly debated. Recently the popular periodicals "Foreign Affairs" and "The New Yorker" have both released articles detailing and debating the issue.

What however is the threat from this new "cyber domain", does it represent a new paradigm in warfare? Popular perceptions stemming from fictitious sources, such as the 2007 blockbuster Die Hard 4.0 in which the US comes under assault from "cyber-Terrorists" who target key infrastructure to cause a "fire sale" attack with potentially devastating consequences, suggest that cyber-warfare represents a devastating new strategic weapon capable of the kind of destruction only previously threatened by "WMD's". What's more the threat of cyber-attack is also characterised as being an emerging "asymmetric" threat. This idea of cyber-war is also lent credence from sources such as "Unrestricted Warfare," a proposal for Chinese military strategy, written by two Peoples Liberation Army colonels, whereby China seeks to beat a technologically and military superior opponent through the use of imaginative strategies which utilise measures that avoid direct military confrontation and instead attack their adversary through other avenues. Also adding to this perception of the cyber threat are the events like those in Estonia in 2007, where the Government and other sectors came under sustained denial of service attacks during a diplomatic spat with Russia over the relocation of "the Bronze Soldier of Tallinn". This and similar ideas certainly suggest that cyber-war does represent a threat in this way and this idea has been championed by American authorities on cyber-war. Richard A. Clarke, a former White House official with responsibility for the field, this year published "Cyberwar" a proposal for US strategy which prophesizes a particularly apocalyptic vision of a Chinese cyber-attack with mass casualties.

Read more...  

By George Friedman

Julian Assange has declared that geopolitics will be separated into pre-"Cablegate" and post-"Cablegate" eras. That was a bold claim. However, given the intense interest that the leaks produced, it is a claim that ought to be carefully considered. Several weeks have passed since the first of the diplomatic cables were released, and it is time now to address the following questions: First, how significant were the leaks? Second, how could they have happened? Third, was their release a crime? Fourth, what were their consequences? Finally, and most important, is the WikiLeaks premise that releasing government secrets is a healthy and appropriate act a tenable position?

Let's begin by recalling that the U.S. State Department documents constituted the third wave of leaks. The first two consisted of battlefield reports from Iraq and Afghanistan. Looking back on those as a benchmark, it is difficult to argue that they revealed information that ran counter to informed opinion. I use the term "informed opinion" deliberately. For someone who was watching Iraq and Afghanistan with some care over the previous years, the leaks might have provided interesting details but they would not have provided any startling distinction between the reality that was known and what was revealed. If, on the other hand, you weren't paying close attention, and WikiLeaks provided your first and only view of the battlefields in any detail, you might have been surprised.

Let's consider the most controversial revelation, one of the tens of thousands of reports released on Iraq and Afghanistan and one in which a video indicated that civilians were deliberately targeted by U.S. troops. The first point, of course, is that the insurgents, in violation of the 1949 Geneva Conventions, did not go into combat wearing armbands or other distinctive clothing to distinguish themselves from non-combatants. The Geneva Conventions have always been adamant on this requirement because they regarded combatants operating under the cover of civilians as being responsible for putting those civilians in harm's way, not the uniformed troops who were forced to distinguish between combatants and non-combatants when the combatants deliberately chose to act in violation of the Geneva Conventions.

It follows from this that such actions against civilians are inevitable in the kind of war Iraqi insurgents chose to wage. Obviously, this particular event has to be carefully analyzed, but in a war in which combatants blend with non-combatants, civilian casualties will occur, and so will criminal actions by uniformed troops. Hundreds of thousands of troops have fought in Iraq, and the idea that criminal acts would be absent is absurd. What is most startling is not the presence of potentially criminal actions but their scarcity. Anyone who has been close to combat or who has read histories of World War II would be struck not by the presence of war crimes but by the fact that in all the WikiLeaks files so few potential cases are found. War is controlled violence, and when controls fail — as they inevitably do — uncontrolled and potentially criminal violence occurs. However, the case cited by WikiLeaks with much fanfare did not clearly show criminal actions on the part of American troops as much as it did the consequences of the insurgents violating the Geneva Conventions.

Only those who were not paying attention to the fact that there was a war going on, or who had no understanding of war, or who wanted to pretend to be shocked for political reasons, missed two crucial points: It was the insurgents who would be held responsible for criminal acts under the Geneva Conventions for posing as non-combatants, and there were extraordinarily few cases of potential war crimes that were contained in the leaks.

Read more...  

By Petr Labrentsev

International migration, polyethnicity, and transnationalism are major trends intrinsic to modern globalization. They have increasingly affected the societies of major immigrant-receiving countries such as the United Kingdom and the United States. Do they affect these countries' national security? For instance, is ethnic espionage a rising major threat? This essay attempts to answer these questions. It does not intend to present solutions. Rather, by examining and correlating socio-cultural, security, and globalization dimensions, it intends to point out to the forthcoming security challenges modern liberal-democratic countries might potentially face.

Read more...  
 

Latest from the Ministry of Defence

Cookies
We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the Defence Viewpoints website. However, if you would like to, you can modify your browser so that it notifies you when cookies are sent to it or you can refuse cookies altogether. You can also delete cookies that have already been set. You may wish to visit www.aboutcookies.org which contains comprehensive information on how to do this on a wide variety of desktop browsers. Please note that you will lose some features and functionality on this website if you choose to disable cookies. For example, you may not be able to link into our Twitter feed, which gives up to the minute perspectives on defence and security matters.