August 14, 2018

Battlefield Internet

A Plan for Securing Cyberspace

By Michèle Flournoy and Michael Sulmeyer

Cyberspace has been recognized as a new arena for competition among states ever since it came into existence. In the United States, there have long been warnings of a “cyber–Pearl Harbor”—a massive digital attack that could cripple the country’s critical infrastructure without a single shot being fired. Presidential commissions, military task force reports, and congressional investigations have been calling attention to such a risk for decades. In 1984, the Reagan administration warned of the “significant security challenges” of the coming information age. And just this year, Dan Coats, the director of national intelligence, said of such threats, “the lights are blinking red.”

Yet the Internet has always been much more than a venue for conflict and competition; it is the backbone of global commerce and communication. That said, cyberspace is not, as is often thought, simply part of the global commons in the way that the air or the sea is. States assert jurisdiction over, and companies claim ownership of, the physical infrastructure that composes the Internet and the data that traverses it. States and companies built the Internet, and both are responsible for maintaining it. Actions taken in the public sector affect the private sector, and vice versa. In this way, the Internet has always been hybrid in nature.

So, accordingly, is the real cyberwar threat. It turns out that for all the increasingly vehement warnings about a cyber–Pearl Harbor, states have shown little appetite for using cyberattacks for large-scale destruction. The immediate threat is more corrosive than explosive. States are using the tools of cyberwarfare to undermine the very foundation of the Internet: trust. They are hacking into banks, meddling in elections, stealing intellectual property, and bringing private companies to a standstill. The result is that an arena that the world relies on for economic and informational exchange has turned into an active battlefield.


Read the Full Article at Foreign Affairs

  • Podcast
    • November 19, 2021
    How Russia Fights

    Russia is a formidable adversary that is currently undergoing transformative modernization. Its combat proficient force has inculcated lessons learned from recent combat opera...

    By Samuel Bendett

  • Reports
    • November 17, 2021
    The Future of the Digital Order

    Executive Summary Nations that successfully harness the vast economic, political, and societal power of emerging information and communications technologies will shape the fut...

    By Jeff Cirillo, Lisa Curtis, Joshua Fitt, Kara Frederick, ​Coby Goldberg, Ilan Goldenberg, Andrea Kendall-Taylor, Megan Lamberth, Martijn Rasser & Dania Torres

  • Podcast
    • November 4, 2021
    A techno-diplomacy strategy for telecommunications in the Indo-Pacific

    Head of ANU National Security College Professor Rory Medcalf and Director of ANU Tech Policy Design Centre Johanna Weaver join Lisa Curtis and Martijn Rasser from the Center f...

    By Lisa Curtis & Martijn Rasser

  • Video
    • November 2, 2021
    Better Together: The Case for a Technology Alliance

    The Center for a New American Security (CNAS) has released a new video called "Better Together: The Case for a Technology Alliance." The United States faces a challenge like ...

View All Reports View All Articles & Multimedia