Cybersecurity and the Changing Nature of Warfare in the 21st Century

Article

In the New World Order of the 21st century, the information age has revolutionized our lives, shrunk distances, and made societies more interdependent. Cyberspace and its underlying systems emerged as domains of profound influence on defense doctrines with the advent of communications technology, proliferation...

1. INTRODUCTION

In the New World Order of the 21st century, the information age has revolutionized our lives, shrunk distances, and made societies more interdependent. Cyberspace and its underlying systems emerged as domains of profound influence on defense doctrines with the advent of communications technology, proliferation of the Internet and networked devices so-called the “IoT“ (The Internet of Things). Virtual warfare, waged via computers and the Internet, became an essential aspect of military conflicts between adversaries, as the operation and management of warfare in the future has begun to change.1 To policymakers, possession of fastest computers is as crucial in the 21st century as possession of longest-range aircraft was in 20th century. Just as airpower had transformed battle scenes back then, the military utility of cyberspace has risen with diffusion of asymmetric warfare, which, in essence, is the goal of a war: One side will inevitably want to dominate over the other and make the balance asymmetric.2 As a form of smart power, cyberpower emboldens low profile actors, decreases threshold of turning points in crises, and multiplies kinetic power’s impact. Since the very orality of the Internet has a way of turning territorial battles into battles of ideas,3 transformation of modern battles utilizes de-territorialised cyber attacks as means of persuasion and winning hearts and minds on a mass scale.4 In the information age, what’s important is not just “whose army wins in battle, but whose story wins over people“.5

News headlines highlight incidents about private firms, government institutions, agencies, and critical infrastructure as frequent targets of increasingly sophisticated cyber weapons and techniques utilized by criminal organizations, state-sponsored terrorist, belligerent non-state actors, as well as national armed forces. Depending on an assailant’s motivation and desired impact on the target, malicious activities on cyberspace aim to subdue victims through data loss, financial gain, espionage, damage to commercial, physical assets, and disruption of supply chain, transportation, communication, and geo-location systems. Political actors are targeted during election campaigns through perceptual manipulation of public opinion over ads, spam, spoofing, and phishing attacks through cyberspace. The real power of cyber is in fact its potential cascading effects on other domains. Since it enables a strike directly and immediately aimed at the seat of the opposing will and policy, it diminishes the decisiveness of major wars.6 Missile tests, nuclear detonations, and advanced Artificial Intelligence (AI) platforms precipitate cyber responses that may spiral into a full-scale conflict in high-risk profile regions.


2. CYBERSECURITY AND HYBRID WARFARE

For 400 years, those who possessed the greatest power in the global commons, especially at sea, have been able to exert dominion over those who do not. Cyberspace, on the other hand, appears to empower challengers to resist against hegemony.7 Insurgents, armed groups, terrorists, political fractions of all sorts can exploit vulnerabilities of nations states by using “hacktivist“ techniques to further their cause and undermine the global order.8 Above all, cyberspace has the potential to promote social and political change, as seen by the transformative effect of social media on politics in the Middle East and North Africa, and furthermore to “alter the configuration of the global commons“.9 The Internet is the new battlefield, social networks are the weapons, and states, non-state actors, and citizens are its combatants.10

Cyber warfare may not resemble conventional war but damages can be as crippling. Perhaps most importantly, since cyberspace is ubiquitous, it affects all aspects of life, rendering it highly unlikely that future conflicts will unfold in exclusively one domain. Due to its low buy- in cost and as a multiplier of physical force, cyber warfare can generate “catastrophic cascading effects through asymmetric operations“.11 A cyber attack can target a nation’s “ner vous system“12 behind the protective barriers of physical battlefronts, and as such, its principal goal is to persuade and subdue the enemy through strategic communication without fighting, thus framing a conflict in an ideologically advantageous way that enables direct influence over societies.13 Iran, for instance, uses a mix of threats and forces to employ intimidation as a form of asymmetric warfare.14 A cyber espionage group linked to the Iranian government recently attacked energy, military, and aerospace targets in Saudi Arabia, South Korea, and the U.S.15 A war does not necessarily involve conflict, and, as Sun Tzu says in his famous work “The Art of War“, Iran’s aim is to win the war without fighting the war.16

It is taken from TASAM Publishing's book named “New World Architecture Of Economy and Security“
This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.

Areas

Continents ( 5 Fields )
Action
 Contents ( 472 ) Actiivities ( 219 )
Areas
TASAM Africa 0 149
TASAM Asia 0 236
TASAM Europe 0 44
TASAM Latin America & Carribea... 0 34
TASAM North America 0 9
Regions ( 4 Fields )
Action
 Contents ( 178 ) Actiivities ( 54 )
Areas
TASAM Balkans 0 93
TASAM Middle East 0 62
TASAM Black Sea and Caucasus 0 16
TASAM Mediterranean 0 7
Identity Fields ( 2 Fields )
Action
 Contents ( 176 ) Actiivities ( 75 )
Areas
TASAM Islamic World 0 147
TASAM Turkic World 0 29
TASAM Türkiye ( 1 Fields )
Action
 Contents ( 223 ) Actiivities ( 59 )
Areas
TASAM Türkiye 0 223

I want to emphasize how crucial security is for a country. Kobil has over 100 million users and collaborates with companies worldwide. Achieving such success as Turkey is also a source of pride. We hope to see more of such companies globally because I believe it is necessary.;

We are very glad to be together at the 9th Istanbul Security Conference and its co-events, which we have continued without any disruption until today. We extend our gratitude to all our guests, both domestic and international.;

Although after the war ends, Ukraine will most certainly keep its status of an independent state, the final quality of its statehood and nationhood is undefined. Russia’s ongoing destruction of Ukraine has already changed its demographic, economic and social structure with the most severe long-term ...;

In the 100th year of the Republic, on 23-24 November 2023, the 9th Istanbul Security Conference titled as "Strategic Transformation in the Ecosystem" will be held by TASAM-NDSI with global participation at Istanbul Kent University Kağıthane Campus. Last day to register is today, and the Participants...;

2nd Istanbul Cyber-Security Forum titled as “New Cyber Economy and Turkish Products“ will be held as a co-activity in the first day of the 9th Istanbul Security Conference to be held on 23-24 November 2023 at Istanbul Kent University Kağıthane Campus by TASAM - NDSI. The deadline to register is Nove...;

9th Istanbul Security Conference titled as "Strategic Transformation in the Ecosystem" will be held by TASAM-NDSI with participation on a global scale at Istanbul Kent University Kağıthane Campus. The deadline to apply for participation is November 21. The conference participants will be given certi...;

In order for Türkiye - Yemen relations to be carried to an ideal point in today’s multi-dimensional world order; every parameter should be taken into consideration. The aims of the Program are to prepare a civil, institutional and intellectual strategic base to improve and strengthened the Türkiye -...;

Artificial intelligence has become an important turning point of technological developments. Especially with the use of this technology a transformation process has begun in our lives. Systems developed and under development together with artificial intelligence technology: for example, the developm...;

5th Marine and Maritime Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • Istanbul Kent University Kağıthane Campus -
  • İstanbul - Türkiye

2nd Istanbul Cyber-Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • Istanbul Kent University Kağıthane Campus -
  • İstanbul - Türkiye

7th Türkiye - Gulf Defence and Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • Istanbul Kent University Kağıthane Campus -
  • İstanbul - Türkiye

6th Türkiye - Africa Defence Security and Aerospace Forum

  • 23 Nov 2023 - 24 Nov 2023
  • Istanbul Kent University Kağıthane Campus -
  • İstanbul - Türkiye

9th Istanbul Security Conference (2023)

  • 23 Nov 2023 - 24 Nov 2023
  • Istanbul Kent University Kağıthane Campus -
  • Istanbul - Türkiye

Istanbul Cyber-Security Forum

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background.

  • 03 Nov 2022 - 03 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Turkey