Cybersecurity and the Changing Nature of Warfare in the 21st Century

Article

In the New World Order of the 21st century, the information age has revolutionized our lives, shrunk distances, and made societies more interdependent. Cyberspace and its underlying systems emerged as domains of profound influence on defense doctrines with the advent of communications technology, proliferation...

1. INTRODUCTION

In the New World Order of the 21st century, the information age has revolutionized our lives, shrunk distances, and made societies more interdependent. Cyberspace and its underlying systems emerged as domains of profound influence on defense doctrines with the advent of communications technology, proliferation of the Internet and networked devices so-called the “IoT“ (The Internet of Things). Virtual warfare, waged via computers and the Internet, became an essential aspect of military conflicts between adversaries, as the operation and management of warfare in the future has begun to change.1 To policymakers, possession of fastest computers is as crucial in the 21st century as possession of longest-range aircraft was in 20th century. Just as airpower had transformed battle scenes back then, the military utility of cyberspace has risen with diffusion of asymmetric warfare, which, in essence, is the goal of a war: One side will inevitably want to dominate over the other and make the balance asymmetric.2 As a form of smart power, cyberpower emboldens low profile actors, decreases threshold of turning points in crises, and multiplies kinetic power’s impact. Since the very orality of the Internet has a way of turning territorial battles into battles of ideas,3 transformation of modern battles utilizes de-territorialised cyber attacks as means of persuasion and winning hearts and minds on a mass scale.4 In the information age, what’s important is not just “whose army wins in battle, but whose story wins over people“.5

News headlines highlight incidents about private firms, government institutions, agencies, and critical infrastructure as frequent targets of increasingly sophisticated cyber weapons and techniques utilized by criminal organizations, state-sponsored terrorist, belligerent non-state actors, as well as national armed forces. Depending on an assailant’s motivation and desired impact on the target, malicious activities on cyberspace aim to subdue victims through data loss, financial gain, espionage, damage to commercial, physical assets, and disruption of supply chain, transportation, communication, and geo-location systems. Political actors are targeted during election campaigns through perceptual manipulation of public opinion over ads, spam, spoofing, and phishing attacks through cyberspace. The real power of cyber is in fact its potential cascading effects on other domains. Since it enables a strike directly and immediately aimed at the seat of the opposing will and policy, it diminishes the decisiveness of major wars.6 Missile tests, nuclear detonations, and advanced Artificial Intelligence (AI) platforms precipitate cyber responses that may spiral into a full-scale conflict in high-risk profile regions.


2. CYBERSECURITY AND HYBRID WARFARE

For 400 years, those who possessed the greatest power in the global commons, especially at sea, have been able to exert dominion over those who do not. Cyberspace, on the other hand, appears to empower challengers to resist against hegemony.7 Insurgents, armed groups, terrorists, political fractions of all sorts can exploit vulnerabilities of nations states by using “hacktivist“ techniques to further their cause and undermine the global order.8 Above all, cyberspace has the potential to promote social and political change, as seen by the transformative effect of social media on politics in the Middle East and North Africa, and furthermore to “alter the configuration of the global commons“.9 The Internet is the new battlefield, social networks are the weapons, and states, non-state actors, and citizens are its combatants.10

Cyber warfare may not resemble conventional war but damages can be as crippling. Perhaps most importantly, since cyberspace is ubiquitous, it affects all aspects of life, rendering it highly unlikely that future conflicts will unfold in exclusively one domain. Due to its low buy- in cost and as a multiplier of physical force, cyber warfare can generate “catastrophic cascading effects through asymmetric operations“.11 A cyber attack can target a nation’s “ner vous system“12 behind the protective barriers of physical battlefronts, and as such, its principal goal is to persuade and subdue the enemy through strategic communication without fighting, thus framing a conflict in an ideologically advantageous way that enables direct influence over societies.13 Iran, for instance, uses a mix of threats and forces to employ intimidation as a form of asymmetric warfare.14 A cyber espionage group linked to the Iranian government recently attacked energy, military, and aerospace targets in Saudi Arabia, South Korea, and the U.S.15 A war does not necessarily involve conflict, and, as Sun Tzu says in his famous work “The Art of War“, Iran’s aim is to win the war without fighting the war.16

It is taken from TASAM Publishing's book named “New World Architecture Of Economy and Security“
This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.

Areas

Continents ( 5 Fields )
Action
 Contents ( 477 ) Actiivities ( 219 )
Areas
TASAM Africa 0 149
TASAM Asia 0 239
TASAM Europe 0 44
TASAM Latin America & Carribea... 0 35
TASAM North America 0 10
Regions ( 4 Fields )
Action
 Contents ( 178 ) Actiivities ( 54 )
Areas
TASAM Balkans 0 93
TASAM Middle East 0 62
TASAM Black Sea and Caucasus 0 16
TASAM Mediterranean 0 7
Identity Fields ( 2 Fields )
Action
 Contents ( 176 ) Actiivities ( 75 )
Areas
TASAM Islamic World 0 147
TASAM Turkic World 0 29
TASAM Türkiye ( 1 Fields )
Action
 Contents ( 229 ) Actiivities ( 60 )
Areas
TASAM Türkiye 0 229

The world is going through testing times. Global challenges are everywhere. Poverty is persistent. Income inequality is widespread. Environmental degradation is stinging. Migration and security concerns are rampant. Global warming is unabated. We are all experiencing that sinking feeling. The old wo...;

The island of Cyprus has had an important geopolitical and cultural position throughout history and has been under the influence of different civilizations. However, in the second half of the 20th century, the fate of the island was shaped as one of the intersection points of international politics....;

The book War in the Gardens of Babylon. Middle East after the Iraqi War published in 2004 by TASAM – Turkish Asian Center for Strategic Studies – edited by Bülent ARAS, is a collection of different perspectives on a number of serious Middle Eastern problems. Bülent Aras compiled articles of outstand...;

The eastern Mediterranean and the Gulf region remain an extremely turbulent and unstable neighborhood, where a “Hobbesian“ security environment prevails. There is a general failure of governance and a long list of frequently interacting – and in some cases interconnected – security problems, includi...;

The 2024 U.S. Arctic Strategy is a comprehensive document aimed at safeguarding U.S. security and defense interests in the Arctic region. The Department of Defense (DoD) is guided by this strategy to ensure that the Arctic remains a stable region, secure the U.S. homeland, and protect vital national...;

Despite a strong historical and cultural background, the relations between Türkiye and the Middle East, or more narrowly, Türkiye and the Gulf Countries, where strategic dialogue is still evolving, need to transform from a fragile axis into a cooperation axis that adapts to new balances, roles, and ...;

Concerns should be taken into account about how comprehensive international military strategies contribute to regional security crises on the continent of Africa. There are views suggesting that Africa's inability to properly strengthen its military capacity due to existing problems in both the indu...;

The world is going through a critical phase, where boundaries are being pushed excessively in almost every aspect. Various social and political structures such as family, society, and the state, including the individuals themselves, are facing a profound security crisis, both in terms of mind and bo...;

5th Marine and Maritime Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • Istanbul Kent University Kağıthane Campus -
  • İstanbul - Türkiye

2nd Istanbul Cyber-Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • Istanbul Kent University Kağıthane Campus -
  • İstanbul - Türkiye

7th Türkiye - Gulf Defence and Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • Istanbul Kent University Kağıthane Campus -
  • İstanbul - Türkiye

6th Türkiye - Africa Defence Security and Aerospace Forum

  • 23 Nov 2023 - 24 Nov 2023
  • Istanbul Kent University Kağıthane Campus -
  • İstanbul - Türkiye

9th Istanbul Security Conference (2023)

  • 23 Nov 2023 - 24 Nov 2023
  • Istanbul Kent University Kağıthane Campus -
  • Istanbul - Türkiye

Istanbul Cyber-Security Forum

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background.

  • 03 Nov 2022 - 03 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Turkey