Cyber ​​war

from Wikipedia, the free encyclopedia

Cyber ​​war (from English Cyberwar , from cyber for cybernetics ) is, on the one hand, the armed conflict in and around virtual space, cyberspace , with resources primarily from the field of information technology . On the other hand, cyber war refers to the highly technical forms of war in the information age, which are based on extensive computerization , electronicization and networking of almost all military areas and concerns.

Origin of the term

Cyber War, in English Cyberwar , one is portmanteau of the words cyberspace and War (Engl. Was ). The term was first proposed in 1993 by scientists John Arquilla and David Ronfeldt in their study Cyberwar is coming! for RAND Corporation .

The terms 'Information War' and 'Information Operations' can be traced back to the time of the First World War . The term “information warfare” has been used in its current meaning since 1976

General

The weapons used are tools from the field of computer science . In the simplest case, attacks target computer-supported connections in order to thwart communication in this way. More complex attacks can be aimed at controlling specific computer systems. Conversely, cyber warfare includes providing and maintaining one's own communication and command structures as well as defending against or preventing enemy attacks on them.

An example of a successful cyber attack can be found in 2007 in Estonia , where government and administrative offices, as well as the largest bank in Estonia, could no longer be reached after concerted denial-of-service attacks. The attack also affected hospitals, energy supply systems and emergency numbers.

In 2016, Myriam Dunn Cavelty wrote:

"In contrast to the Euro-Atlantic perspective, which narrowly defines cyber warfare as destructive attacks on computer systems and critical infrastructures, Russia takes a more holistic approach to the topic: In addition to information systems, people and their opinions are the most important goal of its information wars."

- Miriam Dunn-Cavelty, 2016

Such a cyber war is not only aimed at combatants , but also destabilizing with an information war on the civilian population , which is supposed to be incited to hatred and distrust of their own government through fake news and hate speech on blogs . Christian Mölling, Deputy Director of the Research Institute of the German Society for Foreign Policy (DGAP) explains that we now know relatively well how this Russian disinformation network works: Russia's propaganda is always aimed at certain population groups in order to dissolve social cohesion .

Joshua Davies called the Russian attack on Estonia in 2007 Web War One , while Robertz / Kahr even mention the attack as a case study of cyber terrorism. War conventions as they apply to conventional conflicts do not yet exist.

Methods and evolution of cyber war

Example: The projected Heterogeneous Urban RSTA Team (HURT) of the Information Processing Technology Office of the Defense Advanced Research Projects Agency wants to guarantee comprehensive interoperability and communication between the subunits in the urban environment

Common cyber warfare practices include:

  • Espionage : The intrusion into foreign computer systems for the purpose of obtaining information
  • Defacement : Changes to the content of a website in order to a. To switch to propaganda
  • various forms of social engineering
  • Infiltration of compromised hardware that deliberately works incorrectly or allows external control
  • Denial-of-service attacks to disrupt or completely suppress enemy services
  • Material attacks (destruction, sabotage , switching off) of hardware (e.g. cable, antenna and satellite connections)

On the software side, attackers primarily exploit the vulnerabilities that are prevalent in many web applications . At the physical level, weapons that are based on radiation emissions and thereby interfere with electronic devices, such as EMP weapons or airborne tactical lasers, are used in particular .

Strategic Concepts

C4ISR , i.e. the networking of all command, information and monitoring systems to obtain an exact picture of the situation in order to improve the decision-making and leadership skills of the armed forces, initially institutionalized in the US armed forces technically and organizationally, is now established in most armies in the world ; In the US strategic planning, cyberspace is categorized as a fundamental component of the war theater alongside land, air, sea and space - where space (i.e. outer space) and cyberspace are usually combined under the responsibility of the US Air Force. In addition, since 2002 she maintains a. a. the AFIT Center for Cyberspace Research (CCR).

history

For a number of authors, the 1999 Kosovo war is considered to be the first “real cyber war” between states, in which both sides used appropriate weapons on the battlefield. The comprehensive management and control of the war by means of space-based systems was also a decisive factor here on the NATO side.

The alliance disrupted and manipulated Serbian air defense systems and the like. a. using high-frequency microwave radiation, attacked the Yugoslav telephone network and electronically broke into Russian , Greek and Cypriot banks in order to sabotage and empty the accounts of Serbian President Slobodan Milošević . Serbian forces interfered with u. a. NATO servers and wiretapped unprotected NATO communications.

Following the bombing of the Chinese embassy in Belgrade by NATO bombers, Chinese hackers intervened and attacked websites, sent virus-infected e-mails and started propaganda. Attacked were u. a. the websites of the US Department of Energy and the National Park Service . The White House website even had to shut down for three days.

Another example of a cyber attack occurred in Estonia in April and May 2007 , when political tensions with Russia heightened in the wake of the relocation of a Soviet soldiers' memorial in the capital Tallinn . As a result, there have been numerous hacker attacks since April 27, 2007 , which lasted for several weeks and were directed against state organs, including the Estonian parliament , the President as well as various ministries, banks and the media.

In 2008, an Estonian citizen of Russian origin was charged and sentenced. In March 2009 Konstantin Goloskokow, a functionary of the government-affiliated Russian youth organization Naschi , claimed to be the mastermind behind the attacks. However, the Russian government subsequently rejected all allegations.

The military has continued to expand its capacities in recent years. In 2016, in the United States and Russia alone, more than 4,000 military personnel were solely entrusted with cyberwar activities.

According to the Washington Post , the United States in 2018 led the first time by a cyber attack on Russia when it just before and during the elections in the United States on November 6, 2018 as Troll factory known Internet research agency in St. Petersburg by offensive means disconnected from the Internet. Paul Rosenzweig, law professor at Georgetown University and former Deputy Assistant Secretary for Policy in the Department of Homeland Security under George W. Bush, classified the attack as crossing the Rubicon for cyber warfare and the most significant event in the current world situation. He considers it particularly noticeable that this act hardly attracted any attention. He believes that a standard for cyber operations below the level of war will develop.

Historical outline of the development of cyberwar concepts in the United States

In 1992, the Department of Defense's secret directive TS-3600.1 on "Information Warfare" was issued. A year later the US Air Force opened in San Antonio ( Texas ), the Air Force Information Warfare Center at that time 1,000 employees. In 1995, the first soldiers trained in information warfare completed their officer training courses at the National Defense University in Washington, DC . The School for Information Warfare and Strategy was founded there in 1994 .

In January 1995 the US Navy issued the instruction OPNAVINST 3430.26 for the implementation of information warfare . From the same year the United States began, largely under the direction of Vice Admiral Arthur K. Cebrowski (1942-2005; from October 2001 to January 2005 he was director of the Office of Force Transformation of the Pentagon), the concept of "Network Centric Warfare" develop; Its aim is to convert information superiority directly into military superiority.

In 1998, under the aegis of the FBI, various US authorities founded the National Infrastructure Protection Center (NIPC), which cooperated with private companies and whose task it was to coordinate and organize the protection of vital infrastructures.

In July 2002, the Bush administration established the Office of Global Communications (OGC), which reports directly to the Executive Office of the President in the White House , with the aim of "formulating and coordinating messages for a foreign audience"; his job was to "coordinate the presentation of US foreign policy and monitor its image abroad."

The National Cyber ​​Security Division (NCSD) , which began its work on June 6, 2003 as a division of the Office of Cyber ​​Security & Communications , brought together several institutions and has since been responsible for the civilian cyber defense of the United States.

From 1999 onwards, the Pentagon, under the leadership of what was then USSTRATCOM, began to set up an Infowar team that was tasked with developing offensive weapons for cyber warfare. In 2002, the then US president ordered George W. Bush in the National Security Presidential Directive 16 on the elaboration of a strategy should be set in the guidelines and criteria for the management of a cyber war.

Already during the term of office of Bush's predecessor Bill Clinton under the name Federal Intrusion Detection Network (FIDNet) planned plans for an effective internet defense were to be concretized in the form of a more than 50 million dollar protective shield under President Bush from 2001. State and private-sector networks in the United States should be able to be effectively defended against cyber attacks from 2003 (the Iraq campaign took place in the spring of this year after lengthy diplomatic, propaganda and military preparations). The project was apparently largely scaled back because of other priorities; by 2005, however, the Joint Functional Component Command for Network Warfare (JFCCNW), assigned to the National Security Agency , was formed. The Joint Information Operations Warfare Command (JIOWC) is responsible for the main areas of reconnaissance and information gathering .

Core Information Operations (IO) capabilities, as per U.S. military doctrines, include:

  • Psychological operations (PSYOP) to manipulate perception
  • Military Deception (MILDEC) ; the provocation of mistakes and misconduct on the enemy side through incorrect information, images and statements
  • Operational Security (OPSEC) ; the identification of necessary information bases for one's own actions or the prevention of access to information, the knowledge of which could bring advantages for the enemy (even if it is not secret; for example, those responsible were urged during the Iraq war to remove everything that was appropriate from DoD websites could be to provide useful information to the other party)
  • Operations in computer networks (computer network operations, CNO) ; a distinction is made here between
    • the defense of computer networks (Computer Network Defense, CND)
    • the exploitation of computer networks (Computer Network Exploitation, CNE) with a focus on the collection of information and
    • Attacks on computer networks (Computer Network Attack, CNA) , i.e. the dedicated paralyzing or destruction of opposing network capacities in a comprehensive sense

NATO's Cooperative Cyber ​​Defense Center of Excellence

On May 14, 2008 the Cooperative Cyber ​​Defense Center of Excellence (CCD CoE, Estonian: K5 or Küberkaitse Kompetenzikeskus ) , which supports NATO but does not belong to its formal organization , was launched in Tallinn , Estonia. On October 28th it was officially accredited by NATO as one of ten Centers of Excellence . Estonia had proposed the center back in 2003; so it is not due to the 2007 attacks on Estonia ; but it is reasonable to assume that it could possibly have been one of the reasons for this. In addition to the host country, the international military organization is currently supported by Lithuania, Latvia, Italy, Spain, the Slovak Republic and Germany (“Sponsoring Nations”; they and not NATO also founded the center); the USA and Turkey have announced that they will shortly join the CCD CoE, which is only open to NATO member states. The staff consists of 30 people ( as of April 2009). The Cyber ​​Defense Cooperation Center states that its priorities are to provide NATO with insight, assistance and expertise on various aspects of the issue. This includes the conception, training and exercises, the publication of research results as well as the development of a legal framework for what the CCD CoE calls, still "immature discipline", cyber defense. - The director of the CCD CoE has been Lieutenant Colonel Ilmar Tamm (37) since February 2008 ( as of June 2009).

At the NATO summit in Bucharest in April 2008, the alliance's readiness to offer the "ability to support alliance members in repelling a cyberattack upon request" was underlined. - The first CCD COE Conference on Cyber ​​Warfare under the direction of Kenneth Geers took place from June 17th to 19th, 2009. The CCD CoE wants, as they say, to create a lexicon on cyber warfare as soon as possible : “The definition and the concepts are astonishingly challenging in cyberspace,” said Geers at the opening of the conference in Tallinn: “And they are very focused Require attention. ”- The Cyber ​​Conflict Legal & Policy Conference 2009 also took place in Tallinn from September 9-11, 2009 , jointly hosted by the George Mason University Center for Infrastructure Protection (CIP) and the CCD CoE.

Suleyman Anil, of the Center for responding to computer incidents with NATO (NCIRC TC) directs said in spring 2008 at a congress of cybercrime in London : "Cyber defense is now in the highest ranks along with the missile defense and energy security on a par . We have seen more and more of these attacks and we don't think this problem will go away anytime soon. Unless globally supported action is taken, it can become a global problem. ”Although some have warned of the potential dangers since the 1980s, the matter has only been on the radar of governments around the world for a few years. The cost of hi-tech attacks has decreased while the amount of damage they can cause has increased, Anil said.

In NATO headquarters in the Belgian Mons the alliance maintains its Incident Management Section .

The Information and Computer Network Operations Department, Cyber ​​Unit of the Bundeswehr

Coat of arms of the Strategic Reconnaissance Command

The Bundeswehr maintains the information and computer network operations department of the Strategic Reconnaissance Command ( Gelsdorf near Bonn ) in the Tomburg barracks in Rheinbach near Bonn . The 76 employees are primarily recruited from graduates of the IT departments at the universities of the German Armed Forces . The commander ( status: early 2009) is Brigadier General Friedrich Wilhelm Kriesel. Defense Minister Franz Josef Jung ordered the establishment of the cyber unit in 2006 .

The Strategic Reconnaissance Command officially commissioned the SAR-Lupe satellite reconnaissance system under Kriesel's leadership in December 2008 . With five satellites , SAR-Lupe, which is considered to be one of the most modern systems of its kind, can deliver images with a resolution of less than one meter regardless of daylight and weather. This means that almost any point on earth can be explored. "It procures, collects and evaluates information about the military-political situation in individual countries and alliances of the potential or actual opponent and about his armed forces."

The satellite-based communication system of the Bundeswehr SATCOMBw started its partial operation with the launch of the COMSATBw-1 satellite in space at the beginning of October 2009. The second satellite, COMSATBw-2, was launched on May 21, 2010 and reached its predicted position in Earth orbit after a week. The satellites cover the eastern and western hemisphere of the planet , respectively . COMSATBw-1 has new and secure communication systems, explained Colonel Pirmin Meisenheimer after the launch from the European spaceport in French Guiana . This is an important step to improve the performance for Germany, especially for troops deployed abroad.

In 2001, in a simulation game in which the Federal Ministry of the Interior also participated, the German Armed Forces had for the first time simulated a war that was largely conducted over the Internet. On April 1, 2002, the Federal Office for Information Management and Information Technology of the Bundeswehr (IT-AmtBw) was founded. The IT chief of the German troops at the time, Klaus Hahnenfeld, explained: "We analyze potential threats, but also develop capabilities to protect the armed forces from the specific dangers associated with the use of modern information technology."

2001: First parliamentary cyber disarmament initiatives in Germany

Political options for arms control were commissioned for the first time by the Subcommittee on Disarmament, Arms Control and Non-Proliferation of the German Bundestag at the Office for Technology Assessment at the German Bundestag (TAB). The TAB examined 1993-1996 the consequences of the use u. a. of information warfare for armament dynamics .

Also in 2001, when the military's plans for future wars and the dangers on the Internet became known to a broader public, the Greens in the German Bundestag called for a “cyber peace policy” against the backdrop of fear of a digital arms race: “It exists the danger that a new electronic arms race will arise. It can still be slowed down and perhaps stopped, ”said Grietje Bettin, then the party's media policy spokesperson, still confident. Her parliamentary group colleague Winfried Nachtwei , a member of the Bundestag Defense Committee, expected the red-green federal government “not to participate in the cyber arms spiral.” In Berlin , the Greens presented their initiative “For a peaceful use of cyberspace” in June.

June 2009: ANSSI, the first government cybersecurity agency in France

The Agence nationale de la sécurité des systèmes d'information (ANSSI, for example: National Security Agency for Information Systems) has existed in the Republic of France since June 2009 . The government in Paris followed the recommendations of the White Paper on Defense and National Security (Livre Blanc sur la Défense et la Sécurité nationale) published in June 2008 with its establishment one year late. “In France a political-economic dispute is ongoing. The debate about the Internet blocking law and copyright infringement has long been about more: control, filtering measures, politics and massive business interests. "

United States Cyber ​​Command (USCYBERCOM)

On October 31, 2010, the United States Cyber ​​Command began its service. This newly created part of the US military , which is also associated with the National Security Agency (NSA), deals with strategies and possibilities of cyber war.

reception

The goal of netwar is human consciousness , according to the succinct proclamation by George Stein (US Air Force) before the turn of the millennium: "The target of netwar is the human mind." Such profound declarations of intent led to a fundamental change in the nature of war itself and made previous delimitations and categorizations in the political, social, economic and military spheres obsolete - far beyond previous ideas; the possible consequences could be both the permanence of the state of war and the self-execution of the military through its all-encompassing cybernetization and the accompanying equalization of the potential for power and violence (example: the "equality of arms", which has already been demonstrated several times, for example between hacker groups and entire states), argues Goedart Palm:

“The net is a battlefield of high diffusivity, which generates anonymous combatants as well as state hackers and perhaps also the“ condottiers of the new combat zones ”( Friedrich Kittler ) who control the code . Just as the classic battlefield evokes the networked warrior who is armed autonomously with top-sight properties, the network produces combatants who appear like unpredictable ricochets in their positionless positions in classic warfare. The ideal of permanent information dominance remains a chimera under the conditions of the network , especially since technologies are in any case subject to the historical reservation that they can be surpassed. [...] “Netwar” is presented by its protagonists as advanced psychological warfare. But much more far-reaching, this omnipotent war concept is intended to resolve the differences between war, propaganda, “psyops” (psychological operations, “operations-other-than-war”), ideological and economic competition, and military and civilian access to human consciousness become. Just as the boundaries between war and peace never ran discreetly in classical conflicts , the war design is totalized in such a way that boundaries that previously arose from social and state systems and geopolitical logics appear anachronistic . The result would be a lasting peace at war that dissimulates his unpeaceful intentions because that alone corresponds to his " subcutaneous " doctrine of rule. Just as Machiavelli only approved of peace as preparation for war, and only understood the logistical necessities of future wars as a task for peace, the state of peace would be abolished in the war of consciousness because his strategies no longer have anything in common with the time patterns of classic war goals. "

- Goedart Palm

Myriam Cavelty-Dunn from the Crisis and Risk Network at ETH Zurich contradicted the concept of cyber war in 2010. According to Dunn, “cyber war” is in part a sensational term for events that would be better described with other terms

“Nobody denies that we as societies are extraordinarily networked and dependent and therefore, theoretically,“ vulnerable ”. But defacing websites is not cyber war. Distributed denial of service attacks, even if banks are affected, are not cyberwar. Spying on government secrets or stealing business secrets using computers is not cyber war. Electronic warfare is not cyberwar. Disseminating half-true or false information in war is not cyberwar. Even the sabotage of an industrial plant with the help of sophisticated malware is cyberwar. "

- Miriam Dunn-Cavelty, 2010

On the other hand, some theorists, who give hacking a fundamental and new meaning as a military agent, even if perhaps not much of it has been publicly known, such as the cyber war researcher Sandro Gaycken . In response to Cavelty-Dunn, Gaycken emphasizes

“Conflicts can be fueled, other states can be agitated. One could test the efficiency of developed weapons. ... And finally, the use of cyber weapons also makes sense in conventional conflicts. If many targets are to be attacked, he is m. E. cheaper, risk-free, tactically more flexible, it costs less civilian human life and causes less irreversible destruction. Options that will also be attractive to superpowers. "

- Sandro Gaycken, 2010

Cavelty-Dunn made an essential distinction in 2012: cybersecurity in free states like the USA is linked to freedom of expression and democracy , while Russia and China understand this to mean their "information security". In these authoritarian states, cybersecurity could also be a tool for control , i.e. it could be instrumentalized to maintain the regime . In 2012, too, in the military sector, it was extremely difficult to see where this would lead. In 2016 she wrote

“The targeted manipulation of content on the Internet is a tactic that Moscow has been systematically using for years. ... In contrast to the Euro-Atlantic perspective, which narrowly defines cyber warfare as destructive attacks on computer systems and critical infrastructures, Russia approaches the issue more holistically: In addition to information systems, people and their opinions are the most important target of its information wars. "

- Miriam Dunn-Cavelty, 2016

"Continuing the war by other means"

"The future has clearly not yet been decided," said Chris Hables Gray (author of the "classic" Postmodern War , 1997; see literature ) in an article for Ars Electronica 1998, which was about InfoWar . Ironically, “the most information-intensive societies” are “most susceptible to attacks and disruptions in the sense of InfoWar. But instead of understanding this fact as a further impetus for the abolition of war, it justifies the militarization of cyberspace and other parts of public space. "

“Although presumably conducive to military budgets and the circulation of mass newspapers, this term (Infowar) does not describe a new form of warfare, but rather obscures the view of the crisis of modern war itself, which has to contend with two fundamental paradoxes. From the 16th century to 1945 modern war developed into a comprehensive industrial - scientific system with the aim of effective, total war. Ironically, total war, in its most developed form, turned out to be impracticable, as a true apocalypse would be the inevitable result. From this first central paradox of today's warfare, the path led directly to the development of postmodern war. - Both modern and postmodern war are based on the manipulation (and increasing power) of information, although we don't even really know what information is. This addresses the second central paradox. [...] The increasing efficiency of weapon systems led to the crisis of the postmodern war, which is shaping international relations today. - Most politics now revolves around survival of the war. [...] According to Michel Foucault , politics today is the 'continuation of the war by other means' and not the other way around. […] That information is so appealing as a military factor is in part due to its long history in the army. The first - and perhaps the best - analysis of the war comes from Sunzi, who never tires of emphasizing the importance of good information. Every great general was aware of this. But not only Sunzi, but also all great theorists since then, it was clear that there can be no perfect information in war. Whether they called this uncertainty factor 'Fortuna' (Machiavelli) or 'Fog of War' (Clausewitz) - everyone knew that certain things would only be certain after the end of the war. Of course, also about the most important thing - the winner. But in the age of weapons of mass destruction, such a view not only robs war of all political effectiveness, it makes it an utterly insane endeavor. […] There are always new technologies and theories to justify these recurring revolutions in the military sector or RMAs (Revolutions in Military Affairs). The basic premises , however, remain the same: war is inevitable, and new information technologies help to win wars. The InfoWar takes many aspects of previous RMAs and exaggerates them to an unimaginable extent. "

- Chris Hables Gray, 1998

In fact, military spending worldwide now surpasses anything that has been seen before - despite the global economic and financial crisis. According to SIPRI, China moved up to second place after the USA in 2008. According to estimates by the Swedish think tank, the US spent $ 607 billion on armaments, followed a long way by China ($ 84.9 billion), France ($ 65.7 billion) and the UK ($ 65.3 billion). Russia ranks fifth, ahead of Germany, with $ 58.6 billion. According to the information, global military spending has increased 45 percent since 1999 to $ 1.46 trillion; Responsible for this are primarily the war in Iraq and the " war on terror " proclaimed by the Bush administration , Russia's resurgence and the growing importance of the People's Republic of China on the world stage. In the meantime, the problems raised by Gray seem to have found a response, for example, from high-ranking military theorists of NATO: “In my opinion, NATO would be well advised to choose an approach that starts with a fundamental debate on strategies for conflict prevention and conflict resolution in the 21st century . A grand strategy could be developed from this, which then determines the reform process. This would take into account the far-reaching changes in the strategic environment. Only keywords such as the appearance of transnational actors who can and will break the states' monopoly of violence , the use of cyberspace as a medium for waging war, or the options in the development of future weapons that are becoming conceivable through nanotechnology and bio-technology indicate that ours will benefit from the The Westphalian world of states and the strategic thinking in the 21st century, shaped by the dogma of annihilation, falls short. ”-“ All in all, the 21st century promises to be a rather restless century in which there will be many a conflict and alongside the well-known war between states there will also be new forms of armed conflict such as cyber warfare and the struggle of transnational forces against states. Initially, and probably also for the foreseeable future, it will be a world without a global order , not least because the Pax Americana has lost its importance in Europe, is no longer really effective in the Middle East , but is irreplaceable and only in the Pacific is the ultimate stability factor remains ”, said the former Inspector General of the Bundeswehr and Chairman of the NATO Military Committee (1996 to 1999), Klaus Naumann , in a lecture for the German Atlantic Society , Bonn, on May 31, 2008.

“The arms race of the brains perpetuates the armament dynamics ad infinitum. Scientists are devising new weapon technology options and looking for political purposes to justify them. The means of war become independent, they need the enemy, whether he exists in reality or only in the imagination. The battlefield becomes an observation field for testing new weapons, the war as a whole becomes a scientific experiment. […] Since networks reach everywhere, they link the globalization of violence with the miniaturization of violence, which is expressed in the information wars on our computers as well as in nanosystems, mini-war machines and killer microbes . Through them, war finds its way into our immediate area, our apartment, even our own bodies. The claim to control the outer space (outer space) finds its counterpart in the control of the inner space [s] (inner space) within societies. "

- Jürgen Scheffran (2005)

Big Brother Award

On May 5, 2017, the negative Big Brother Award in the authorities category was given to the Bundeswehr and the Federal Minister of Defense Ursula von der Leyen as their Commander-in-Chief “for the massive digital armament of the Bundeswehr with the new Cyber ​​and Information Space Command '(KdoCIR) ”. In his laudation, Rolf Gössner from the International League for Human Rights Association explained the jury's criticism:

“With this digital upgrade - in addition to land, air, water and space - a fifth battlefield, the so-called 'battlefield of the future', is opened and cyberspace - one could also say: the Internet - is declared a potential war zone. With the ability of the Bundeswehr to engage in cyber warfare, the Federal Republic is participating in the global arms race in cyberspace - largely without parliamentary participation, without democratic control, and without a legal basis. "

- Rolf Gössner : Laudatory speech for the Bundeswehr at the BigBrotherAwards 2017

Quotes

“'Cyberwar' appears on the conceptual agenda in times when a change in state warfare can be discerned. Political considerations make the use of mass armies appear increasingly inexpedient, which means that traditional forms of warfare are bid farewell. The example of the second Gulf War in 1990 showed that the warring parties are striving to prefer ranged weapons to personal armed forces. Ranged weapons are subject to their different perception conditions . Optical equipment and networked information take the place of human combatants [cf. Virilio 1989]. With this development, the war suddenly comes into focus as a complete distance category: as war in virtual spaces: those of the electronic databases . "

- Thoralf Kamin : referring to Paul Virilio - cf. Dromology

“ The approaches of 'netwar' are furthest away from the previous ideas of war and peace . According to this model, in which the body of the opponent is no longer the target of physical attacks, but his will should be changed directly through information dominance, any form of ideological or political conflict would consequently be rated as war. "

- Ralf Bendrath (1998)

“The right step (against cyber war) would be dewatering. The networks would have to be dismantled and downsized. During the past 20 years, IT has been creeping into everything. In many areas we let ourselves be talked about networks and IT and don't need them there. Instead, one could work with simpler solutions, especially in critical areas. So my advice is to ditch all that stuff and build it from scratch. But of course that would cost a lot of money. "

- Sandro Gaycken, Free University of Berlin (2011)

“Civil technology and weapon development are in an unbreakable relationship, mutually fertilize each other and at the latest with the arrival of modern information technologies, the discrete boundaries of technological phenomena in“ dual use ”are completely dissolved. An observation satellite does not become a genuine weapon of war because of its technological design, but rather because of its purpose. The same applies to information that opens many gateways for adversaries in a growing network of global information structures and makes the discreet separation of military and civil information appear illusory anyway, as demonstrated not only by the purchase of satellite images during the war in Afghanistan , but also by simple knowledge of the Modalities of civil airlines by the September terrorists. "

- Goedart Palm

“Strategists must be aware that some part of any political and military conflict will take place on the internet, the ubiquitous and unpredictable characteristics of which mean that all battles fought here can be as significant, if not more important, than events taking place on the ground . "

- Kenneth Geers

“Cyber ​​warfare is asymmetrical warfare; there is more at stake for us than for our potential opponents. Another aspect is that victims of cyber warfare may never be able to determine the identity of the real attacker. That is why America cannot counter this threat by relying only on a strategy of retaliation or even offensive operations in general. [...] As the recent attacks on the Pentagon's computer system have shown, the US must assume that our potential adversaries in the world are preparing for such attacks. "

- John J. Kelly, Lauri Almann

“What we see is an international crime. We need to start thinking about gun control ways in cyberspace. "

- Ron Deibert, Munk Center, University of Toronto (Canada) via GhostNet

“The vision of global 'electronic warfare' can only be thought of as a paranoid concept in the context of an aggressive economy with extreme distributional injustices. It implies - thought through to the end - total control over all technological, economic, physical, chemical, biological, mental and other parameters of reality. The corresponding sensors must therefore do their job ubiquitously.

Ultimately, as in 'Minority Report' (USA 2002), one could not avoid making thoughts and inner images visible. We are already discussing whether the 'military-technological revolution' will inevitably carry the model of the preventive security state in luggage. "

- Peter Bürger : War as a Computer Game, 2006.

"If we're unwilling to rethink today's internet, we're just waiting for a series of public disasters."

- Nick McKeown, an engineer at Stanford University , quoted from

“America needs the ability to throw bomb carpets into cyberspace in order to create the deterrent we lack [...] at least one foreign nation has advocated unlimited war in cyberspace. - If the US can have a plan to control each of the “atrocities” on the parade ground, it is less certain that our adversaries will have it. - The days of the bulwark are numbered, even in cyberspace. While America has to steel itself in cyberspace, we cannot afford to leave opponents in this area unchallenged. The af.mil bot network offers the ability to help thwart an enemy attack or to defeat them before they reach our coasts. "

- Col. Charles W. Williamson III (Air Force Intelligence, Surveillance and Reconnaissance Agency, Lackland Air Force Base, Texas): Carpet bombing in cyberspace, a plea for a US military botnet, 2008; Criticism:

“Under the conditions of plurality and multiculturalism, how is it conceivable that we could live together on the horizon of global networking that would transform the world into neither a global casino nor a digital madhouse? The ethical and political debate on the minima moralia to these questions has an explosive nature, comparable to their related because more and more in the context of the global networking and digitization Vice end bioethical issues . [...] At the same time, an increasingly urgent task is the creation of a quasi-legal, internationally recognized moral code that serves as the basis for resolving pending conflicts - from cyber wars to child pornography and right-wing radicalism to virus attacks, which cause barely measurable economic damage cause - should serve. "

- Rafael Capurro, 2005

“Today we're going to focus on nuclear , biological and cyber threats - three 21st century threats that have been neglected over the past eight years. It is time to break out of Washington's conventional thinking that it has failed to keep up with unconventional threats. [...]

Every American depends, directly or indirectly, on our system of information networks. They are increasingly forming the backbone of our economy and our infrastructure - our national security and our personal well-being. It's no secret that terrorists could use our computer networks to deal a paralyzing blow. We know that cyber espionage and related crimes are on the rise. And while countries like China quickly understood this change, we have followed suit over the past eight years.

As President, I will make cybersecurity the top priority it has in the 21st century. I will declare our cyber infrastructure to be a strategic facility and a National Cyber ​​Advisor [ u. U. Better Translation Suggestion: Appoint Advisor on National Issues in Cyberspace] to report directly to me. I will coordinate efforts across the federal government, introduce a truly national cybersecurity policy, and streamline information security standards - from the networks the federal government relies on to the networks you use in your personal life. "

- Barack Obama speaking at the Summit on Confronting New Threats , Purdue University, July 16, 2008

“Much of the news one gets in war is contradicting, a bigger part is false and by far the greatest is subject to some degree of uncertainty. […] In short: most of the news is false, and people's fearfulness becomes the new force of lies and falsehood. As a rule, everyone is inclined to believe the bad rather than the good; everyone is inclined to magnify the bad somewhat, and the dangers which are reported in this way, whether they collapse in themselves like the waves of the sea, nevertheless return, like those, again and again for no apparent cause. Firmly trusting in his better inner knowledge, the guide must stand like the rock on which the wave breaks. [...] Firm trust in himself must arm him against the apparent urge of the moment; his earlier conviction will prove its worth in the course of development, when the front scenes, which fate inserts into the war scenes, with their thickly painted figures, have moved away from danger and the horizon has expanded. - This is one of the great gaps between designing and executing. "

- Carl von Clausewitz : About the war - 1st book / 6. chapter

"Nobody can control the Internet, so everyone can control it."

- Rod Beckstrom , CEO of the Internet Corporation for Assigned Names and Numbers (ICANN) since June 2009 : Heise online

Virus-induced nuclear strike

“The basic ethical problem seems to lie primarily in the question of who is to be regarded as the actor, because a virus-induced nuclear strike can also be seen as a result of malware. Such a cyber war, be it a “virus-induced nuclear strike” or the manipulation of a chemical factory, is in any case not justifiable with the principles of just war, since compliance with the principles, in particular the restriction to combatants, cannot be guaranteed; Neither have attacks been consistently limited to a single target, at least so far. "

- Jan Eike Welchering, 2012

See also

literature

Web links

Individual evidence

  1. For example: Ben Schwan: War and Peace in Cyberspace: Experts advise on disarmament in the Infowar . In: c't , No. 15/2001
  2. . Cyber ​​crime and cyber crime control (PDF, 111 kB) University of Bonn, colloquium in the summer semester 2003: How to deal with global threat scenarios as rationally as possible: Cyber ​​wars and cyber terror ( Memento from February 23, 2013 in the Internet Archive )
  3. See, for example, the British weekly newspaper The Economist (May 24, 2007): Defenses against cyberwarfare are still rudimentary. That's scary (accessed June 7, 2007) and, regardless of Estonia, The Christian Science Monitor (September 14, 2007): China Emerges as Leader in Cyberwarfare (accessed September 16, 2007)
  4. Myriam Dunn-Cavelty: In: NZZ : Cyberspace Becomes a Political Battlefield , NZZ, October 24, 2016
  5. Hannes Grassegger: https://www.dasmagazin.ch/2017/09/01/stell-dir-vor-es-ist-krieg-und-keiner- geht-hin/ Imagine it's war and nobody notices , The magazine September 2, 2017, pages 8–15
  6. Russia and the West - Is a New Cold War Looming? , ZDF, April 4, 2018
  7. Frank J. Robertz, Robert Kahr: The media staging of amok and terrorism: On the media psychological effect of journalism in the case of excessive violence , Springer-Verlag, 2016, ISBN 978-3-658-12136-5 , page 123
  8. Even refrigerators are dangerous , Novaja Gazeta, March 17, 2017
  9. Christoph Wolfert: Application security: The biggest weak points in web applications . In: Computerwoche , June 23, 2009
  10. Stephen Northcutt et al .: Penetration Testing: Assessing Your Overall Security Before Attackers Thu . (PDF; 1.6 MB) SANS Analyst Program, 2006 (white paper, especially for corporate applications)
  11. ^ OWASP - the free and open application security community
  12. ^ Andrew Buncombe: Pentagon attacked for 'Pulse' gun that inflicts long-distance pain . In: The Independent . March 5, 2005.
  13. Air Force Cyber ​​Command ( Memento from May 31, 2009 in the Internet Archive )
  14. ^ Lt Col Paul Berg, USAF: Air Force Cyber ​​Command: What It Will Do and Why We Need It. In: Air & Space Power Journal, February 20, 2007
  15. AFIT and Center for Cyberspace Research designated the Air Force Cyberspace Technical Center of Excellence ( Memento of March 6, 2009 in the Internet Archive ) ( press release of June 2008 , PDF, 2 pages)
  16. ^ Lewis Page: Pentagon: China threatens space and cyberspace . In: The Register . May 30, 2007.
  17. cf. Heinz-Michael Winkels: Information Warfare: Military operations with and in information networks. Lecture on the parliamentary round table “Mars & Minerva”, Berlin, October 21, 2003 (PDF; 1.08 MB).
  18. Internet sabotage: Kremlin youth confess to attack on Estonia. In: The world . March 11, 2009, accessed February 21, 2014 .
  19. Der Spiegel : "Cyber ​​Caliphate": Russia is said to be behind hacker attacks by IS on June 18, 2016
  20. Ellen Nakashima: US Cyber ​​Command operation disrupted Internet access of Russian troll factory on day of 2018 midterms . In: Washington Post . February 26, 2019. (English)
  21. ^ Paul Rosenzweig: The New Contours of Cyber ​​Conflict . In: Lawfare . February 27, 2019.
  22. ^ Alfred Baumann: I-WAR: Information technology and war. In: tecchannel.de , March 20, 2003. Retrieved August 22, 2018.
  23. OPNAVINST 3430.26 (PDF; 1.82 MB; 21 pages) Department of the Navy, January 18, 1995
  24. Florian Rötzer: Is it over for FIDNet? In: Telepolis , August 1, 1999
  25. James Bamford: The Man Who Sold the War: Meet John Rendon, Bush's general in the propaganda war . ( Memento of January 23, 2007 in the Internet Archive ) In: Rolling Stone , November 17, 2005 (Bamford's text won the 2006 National Magazine Award in the Reportage category in the USA)
  26. Jeremy Singer: Defending the Nation's Resources in Cyberspace ( Memento June 6, 2009 on the Internet Archive ) (Space News, January 26, 2007)
  27. Florian Rötzer: The "most dangerous group of hackers" in the world . In: Telepolis , April 18, 2005
  28. Florian Rötzer: Strategy for Cyber ​​War . In: Telepolis . February 7, 2003.
  29. ^ Clay Wilson: Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues . (PDF; 120 kB; 17 pages) CRS Report for Congress, March 20, 2007
  30. Bobbie Johnson: No one is ready for this . Report on the K5 in Estonia ("The Guardian", April 16, 2009 - with an audio report by the author, 4:45 min. )
  31. Estonia: Lt. Col. Tamm appointed head of Cyberdefense Center (Estonian Embassy in Washington, February 2008)
  32. Sebastian Baumann: NATO 2008 - The Results of Bucharest in an Alliance Political Context (Weltpolitik.net, DGAP, February 11, 2009)
  33. ^ CCD COE Conference on Cyber ​​Warfare: Program ( Memento of November 27, 2011 in the Internet Archive )
  34. Cooperative Cyber ​​Defense Center of Excellence (official website)
  35. Coming to terms with cyber warfare (SecurityFocus, June 17, 2009)
  36. Critical infrastructure Protection Program (homepage)
  37. Cyber ​​Conflict Legal & Policy Conference 2009 (HSDL, August 14, 2009)
  38. NATO Computer Incident Response Capability - Technical Center (NCIRC TC)
  39. ^ NATO says cyber warfare poses as great a threat as a missile attack (" The Guardian ", March 6, 2008)
  40. ^ Frank Gardner: Nato's cyber defense warriors . In: BBC . February 3, 2009.
  41. KSA Brigadegeneral ret. Friedrich Wilhelm Kriesel Cyberwar - relevant for security and society? A problem analysis  ( page no longer available , search in web archives )@1@ 2Template: Dead Link / www.dkriesel.com
  42. Page no longer available , search in web archives: Video: SAR-Lupe reconnaissance system (Bundeswehr.de, October 9, 2008)@1@ 2Template: Toter Link / www.bundeswehr.de
  43. Second Bundeswehr satellite delivered after a successful test phase ("Federal Office for Information Management and Information Technology of the Bundeswehr", March 9, 2011)
  44. Bundeswehr shoots its own satellites into space ( Memento from October 5, 2009 in the Internet Archive ) (Tagesschau.de, October 2, 2009)
  45. Germany's COMSATBw-1 MilComms Satellite Is Readied For Launch (Spacewar.com, September 8, 2009)
  46. TAB report No. 45: Control criteria for the evaluation and decision regarding new technologies in the armaments sector
  47. Christoph Seidler: Cyber ​​War: Virtual White Flag . In: Manager Magazin . June 26, 2001.
  48. ANSSI (homepage)
  49. La France se dote d'une vraie agence gouvernementale de cyber-sécurité ( Memento of March 2, 2011 in the Internet Archive ) (ITespresso.fr, July 10, 2009)
  50. Thomas Pany: The end of the "immoral zone Internet" . In: Telepolis . September 16, 2009.
  51. ^ In: Battlefield of the Future , also in: Air Power Journal No. 1/1995, quoted from Goedart Palm On the war of the future - between gigantomachy and spheromachy. Retrieved August 22, 2018.
  52. a b Goedart Palm: On the war of the future - between gigantomachy and spheromachy. In: goedartpalm.de . Retrieved August 22, 2018.
  53. Myriam Dunn-Cavelty: In: The European : As likely as the sighting of ET
  54. Sandro Gaycken: Cyber ​​fear and cyber worry: cable gate . In: The European . January 23, 2011. Retrieved August 1, 2012.
  55. Interview with Myriam Dunn Cavelty about Cyberwar in May 2012 [1]
  56. Myriam Dunn-Cavelty: In: NZZ : Cyberspace Becomes a Political Battlefield , NZZ, October 24, 2016
  57. Chris Hables Gray: InfoWar in crisis . In: Ars Electronica . 1998. (PDF; 108 kB; 7 pages)
  58. Wen Liao: China Crosses the Rubicon ( Memento of June 21, 2009 in the Internet Archive ) ("The Moscow Times", Issue 4170, June 19, 2009 - "Moscow Times" publications are only available free of charge for a short period of time payable in the archive. )
  59. ^ SIPRI Yearbook 2009 - Armaments, Disarmament and International Security: Summary . ( Memento of June 10, 2009 in the Internet Archive ) (PDF; 283 kB; 28 pages) SIPRI, Stockholm, June 2009.
  60. Ilja Kramnik: Military spending breaks all records worldwide (RIA Novosti, June 9, 2009)
  61. Country comparison: China moves up in terms of military spending ( Handelsblatt .com, June 8, 2009)
  62. Klaus Naumann : NATO, quo vadis? - Approaches to a grand strategy for an unsafe world . ( Memento from July 30th, 2009 in the Internet Archive ) (PDF) In: Deutsche Atlantische Gesellschaft: Atlantic contributions , March 2009.
  63. Jürgen Scheffran: Science, armaments technology and total war. Historical insights into an interrelation. In: Science and Peace . No. 1/2005: Mainsprings of Armament.
  64. a b Rolf Gössner : The BigBrotherAward 2017 in the authorities category goes to the Bundeswehr and the Federal Minister of Defense, Dr. Ursula von der Leyen (CDU), as their commander-in-chief. In: BigBrotherAwards.de. May 5, 2017. Retrieved July 25, 2017 .
  65. ^ Off to cyber warfare - Ursula von der Leyen receives "Big Brother Award". In: Stern.de. May 5, 2017. Retrieved July 25, 2017 .
  66. ^ Eike Kühl: Negative price for spying imams. In: Zeit Online. May 5, 2017. Retrieved May 11, 2017 .
  67. Thoralf Kamin : Cyberwar - New Technology and Arms Control. Humboldt-Universität zu Berlin - Institute for Social Sciences, accessed on June 11, 2019 . - Paul Virilio: Information and Apocalypse. The strategy of deception. Munich: Carl Hanser, 2000. - ISBN 978-3-446-19860-9 .
  68. Ralf Bendrath: New Technologies and the Change in Civil-Military Relationships - Computers and the New Role of the Military in the USA (Diploma thesis, FU Berlin, 1998 - excerpt; RTF, 8 pp., 42 kB)
  69. Sandro Gaycken: It's best to throw away all the IT stuff (interview with Tagesschau on June 16, 2011 - excerpt)
  70. Kenneth Geers: Cyberspace and the changing nature of warfare ( Memento of August 25, 2009 in the Internet Archive ). In: SC Magazine US , August 27, 2008.
  71. eWMDs. The botnet peril ( Memento of April 18, 2010 in the Internet Archive ). In: Policy Review, Hoover Institution, Dec. 2008 / Jan. 2009.
  72. ^ "Ghostnet" spy network: A "wake-up call for politics" (Heise Online, March 31, 2009)
  73. Ronald J. Deibert (Homepage at CitizenLab)
  74. ^ John Markoff: Do We Need a New Internet? (Logistics Log, February 15, 2009)
  75. ^ Charles W. Williamson III: Carpet bombing in cyberspace: Why America needs a military botnet ( Memento of May 18, 2008 in the Internet Archive ) (Armed Forces Journal, May 2008); see. Air Force Colonel calls for military botnet (TecChannel, May 13, 2008)
  76. Jon Stokes: Preparing for cyber warfare: US Air Force floats botnet plan (ars technica, May 12, 2008)
  77. Rafael Capurro: Does the digital world network lead to a global information ethics? . In: Concilium . International Journal of Theology 2005, 1, 39-45.
  78. Katharine Jose: Obama Adds 'Cyber ​​Security' to National Defense Plan ( January 18, 2012 memento on the Internet Archive ), (The New York Observer, July 16, 2008)
  79. ICANN CEO: Nobody can control the Internet . In: Heise online . June 26, 2009.
  80. That is: “Developed in 2007. Power failure in the country leads to the station blackout of one or more nuclear power plants. [Also: " Blackfall "] With a second wave of attacks, the emergency generators of the power plants are switched off. Without a power supply, the fuel assemblies in the NPP can no longer be cooled. A core meltdown would be the result ”. In: Deutschlandfunk.de , Computer und Kommunikation , August 8, 2015, Peter Welchering in conversation with Manfred Kloiber : Digital weapons of the Bundeswehr - Starting to use Trojans (August 9, 2015)
  81. Cyberwar - and where is the ethics please? In: Manfred Kloiber, Jan Rähm , Peter Welchering : Bits and bombs. Cyberwar: Concepts, Strategies, and Real Digital Controversies . Akademische Verlagsgemeinschaft München, Thomas Martin Verlag, Munich 2012, pp. 127–132, here: 132.