Page 26 - CDM Cyber Warnings November 2013
P. 26
within the MOD face”. This is a misplaced understanding of the argument for explicit delineation
and definitions. A government cannot treat a cyber-attack from an individual with intent to steal
money for personal gain in the same way it would respond to state-sponsored interference
which may well be a Casus Belli (justification for war). The challenge for clarity and agreement
is axiomatic, and it is for us all to engage in this straightforward but crucially necessary debate.
Academics have done little to help the wider global community navigate the murky waters of
cyber terminology. There is a severe lack of academic engagement but I congratulate the few
who have brought the subject to the fore, like Thomas Rid and Ronald Deibert. Although Rid
discounts the term ‘cyber warfare’ he recognises the need to unpack the nuanced differences
between certain cyber acts - like: subversion, espionage and sabotage to name a few. He
further stated at a recent online debate hosted by The Economist, that our understanding of the
cyber lexicon… “hinges on terminology”. It is essential that International governments,
institutions and organisations realise this.
The struggle to differentiate the many nuances of sinister cyber activity is clear. Governments
must shake off the parochial cloistered formation of their own cyber vernacular as it only serves
to feed global bewilderment. Moreover, the term ‘cyber warfare’ is seen by many as the argot of
doomsayers. This should not be an ‘either-or’ situation. It is essential to comprehend the
potential of all malicious cyber actions in order to develop the sanctions and legislations that I
referred to earlier. As a starting reference to inform debate I offer the following definitions:
Cyber Terrorism: A person or group that intends to disrupt, damage or destroy public or
private property or seek to terrorise citizens in order to achieve a political, religious or
idealistic aim through the means of cyberspace.
Cyber Warfare: A state-sponsored attack or response that leads to a sinister
engagement through the means of cyberspace, in addition to the use of cyber
technology as part of an established conflict.
Cyber Espionage: A person, group or state who penetrates public or private networks
in order to gain classified information through the medium of cyberspace.
26 Cyber Warnings E-Magazine – November 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide