Cybersecurity and the Changing Nature of Warfare in the 21st Century

Article

In the New World Order of the 21st century, the information age has revolutionized our lives, shrunk distances, and made societies more interdependent. Cyberspace and its underlying systems emerged as domains of profound influence on defense doctrines with the advent of communications technology, proliferation...

1. INTRODUCTION

In the New World Order of the 21st century, the information age has revolutionized our lives, shrunk distances, and made societies more interdependent. Cyberspace and its underlying systems emerged as domains of profound influence on defense doctrines with the advent of communications technology, proliferation of the Internet and networked devices so-called the “IoT“ (The Internet of Things). Virtual warfare, waged via computers and the Internet, became an essential aspect of military conflicts between adversaries, as the operation and management of warfare in the future has begun to change.1 To policymakers, possession of fastest computers is as crucial in the 21st century as possession of longest-range aircraft was in 20th century. Just as airpower had transformed battle scenes back then, the military utility of cyberspace has risen with diffusion of asymmetric warfare, which, in essence, is the goal of a war: One side will inevitably want to dominate over the other and make the balance asymmetric.2 As a form of smart power, cyberpower emboldens low profile actors, decreases threshold of turning points in crises, and multiplies kinetic power’s impact. Since the very orality of the Internet has a way of turning territorial battles into battles of ideas,3 transformation of modern battles utilizes de-territorialised cyber attacks as means of persuasion and winning hearts and minds on a mass scale.4 In the information age, what’s important is not just “whose army wins in battle, but whose story wins over people“.5

News headlines highlight incidents about private firms, government institutions, agencies, and critical infrastructure as frequent targets of increasingly sophisticated cyber weapons and techniques utilized by criminal organizations, state-sponsored terrorist, belligerent non-state actors, as well as national armed forces. Depending on an assailant’s motivation and desired impact on the target, malicious activities on cyberspace aim to subdue victims through data loss, financial gain, espionage, damage to commercial, physical assets, and disruption of supply chain, transportation, communication, and geo-location systems. Political actors are targeted during election campaigns through perceptual manipulation of public opinion over ads, spam, spoofing, and phishing attacks through cyberspace. The real power of cyber is in fact its potential cascading effects on other domains. Since it enables a strike directly and immediately aimed at the seat of the opposing will and policy, it diminishes the decisiveness of major wars.6 Missile tests, nuclear detonations, and advanced Artificial Intelligence (AI) platforms precipitate cyber responses that may spiral into a full-scale conflict in high-risk profile regions.


2. CYBERSECURITY AND HYBRID WARFARE

For 400 years, those who possessed the greatest power in the global commons, especially at sea, have been able to exert dominion over those who do not. Cyberspace, on the other hand, appears to empower challengers to resist against hegemony.7 Insurgents, armed groups, terrorists, political fractions of all sorts can exploit vulnerabilities of nations states by using “hacktivist“ techniques to further their cause and undermine the global order.8 Above all, cyberspace has the potential to promote social and political change, as seen by the transformative effect of social media on politics in the Middle East and North Africa, and furthermore to “alter the configuration of the global commons“.9 The Internet is the new battlefield, social networks are the weapons, and states, non-state actors, and citizens are its combatants.10

Cyber warfare may not resemble conventional war but damages can be as crippling. Perhaps most importantly, since cyberspace is ubiquitous, it affects all aspects of life, rendering it highly unlikely that future conflicts will unfold in exclusively one domain. Due to its low buy- in cost and as a multiplier of physical force, cyber warfare can generate “catastrophic cascading effects through asymmetric operations“.11 A cyber attack can target a nation’s “ner vous system“12 behind the protective barriers of physical battlefronts, and as such, its principal goal is to persuade and subdue the enemy through strategic communication without fighting, thus framing a conflict in an ideologically advantageous way that enables direct influence over societies.13 Iran, for instance, uses a mix of threats and forces to employ intimidation as a form of asymmetric warfare.14 A cyber espionage group linked to the Iranian government recently attacked energy, military, and aerospace targets in Saudi Arabia, South Korea, and the U.S.15 A war does not necessarily involve conflict, and, as Sun Tzu says in his famous work “The Art of War“, Iran’s aim is to win the war without fighting the war.16

It is taken from TASAM Publishing's book named “New World Architecture Of Economy and Security“
This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.

Areas

Continents ( 5 Fields )
Action
 Contents ( 454 ) Actiivities ( 218 )
Areas
Africa 0 144
Asia 0 230
Europe 0 38
Latin America & Carribean 0 34
North America 0 8
Regions ( 4 Fields )
Action
 Contents ( 173 ) Actiivities ( 52 )
Areas
Balkans 0 93
Middle East 0 59
Black Sea and Caucasus 0 16
Mediterranean 0 5
Identity Fields ( 2 Fields )
Action
 Contents ( 175 ) Actiivities ( 74 )
Areas
Islamic World 0 146
Turkish World 0 29
Turkey ( 1 Fields )
Action
 Contents ( 219 ) Actiivities ( 57 )
Areas
Turkey 0 219

The Ukraine-Russia war has had shocking effects across the African continent and all over the world. Many African states, which are currently struggling with political, economic and sociocultural problems, are exposed to the effects of this war when they have yet to recover from the impact of the ...;

BRAINS2 TÜRKİYE is a brand/initiative with multi-programs based in Turkey which develops market, ecosystem and capacity in the ‘Biotechnology’, ‘Robotics’, ‘Artificial Intelligence’, ‘Nanotechnology’, ‘Space’ and ‘Strategic Services’ fields. The programs planned through identical visions and strateg...;

'Russia Is Not Angry; It's focusing.' This is a Russian aphorism put forward by Alexander Gorchakov, the Foreign Minister of the Russian empire, in 1856, after Russia lowered its international profile following its defeat in the Crimean War. Indeed, Russia is a country that has had its ups and dow...;

After the Industrial Revolution, with the development of production, trade, logistics and markets, it is seen that Britain in the 19th century and the United States later in the 20th century owed their control over world trade to navy.;

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the develo...;

Transforming the relations between Turkey and Middle East (or in a narrower context between Turkey and the Gulf States - where strategic dialogue is still developing despite its strong historical and cultural background) from a fragile axis to a cooperation axis that will adapt to new balances, new ...;

The geopolitical panorama created by the similarities of African countries as well as their differences provides crucial data both for their integration and for their potential for conflict. Both intra-continental and international defence and security strategies need to be determined in a way that ...;

The international institutions and the understanding of security created after World War II for global balance and control become unable to respond to the security needs of our age. The deepening of the last wave of globalization that started in the 1980s brought with it unprecedented alignments and...;

Istanbul Cyber-Security Forum

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background.

  • 03 Nov 2022 - 04 Nov 2022
  • DTB Hilton Istanbul Topkapi Hotel -
  • İstanbul - Turkey

6th Turkey - Gulf Defence And Securıty Forum

  • 03 Nov 2022 - 04 Nov 2022
  • Harbiye Military Museum and Cultural Site -
  • İstanbul - Türkiye

5th Turkey - Afrıca Defence Securıty And Aerospace Forum

  • 03 Nov 2022 - 04 Nov 2022
  • Harbiye Military Museum and Cultural Site -
  • İstanbul - Türkiye

4th Marıne And Marıtıme Securıty Forum 2022

  • 03 Nov 2022 - 04 Nov 2022
  • Harbiye Askerî Müzesi ve Kültür Sitesi -
  • İstanbul - Türkiye

8th Istanbul Security Conference (2022)

  • 03 Nov 2022 - 04 Nov 2022
  • Harbiye Military Museum and Cultural Site -
  • İstanbul - Turkey

World Turkic Forum Wise Persons Board Meeting 5

  • 14 Jun 2023 - 14 Jun 2023
  • İstanbul - Türkiye