1 00:00:12,020 --> 00:00:15,821 If you have followed diplomatic news recently, 2 00:00:15,821 --> 00:00:19,506 you may have heard of a crisis between China and the U.S. 3 00:00:19,506 --> 00:00:24,134 regarding cyber attacks against Google. 4 00:00:24,134 --> 00:00:26,643 It has generated a lot of talk, even of cyberwar, 5 00:00:26,643 --> 00:00:32,153 when it's more likely a quite mishandled spy operation. 6 00:00:32,884 --> 00:00:38,343 However, this episode reveals a growing anxiety in the Western World 7 00:00:38,343 --> 00:00:41,410 regarding the emergeance of these cyber weapons 8 00:00:41,410 --> 00:00:45,631 These weapons are dangerous. They are of a new nature. 9 00:00:45,631 --> 00:00:49,129 And they could lead the world to a cyber-conflict 10 00:00:49,129 --> 00:00:51,866 that could turn into a full-fledge armed struggle 11 00:00:51,866 --> 00:00:56,000 since these virtual weapons can also destroy the physical world. 12 00:00:56,711 --> 00:01:04,800 In 1982, in the middle of the cold war in soviet Siberia, a pipeline explodes 13 00:01:04,800 --> 00:01:08,957 with a burst of 3 kilotons, that is one fourth of the Hiroshima bomb. 14 00:01:08,957 --> 00:01:13,000 We know today, this was revealed by Thomas Reed, 15 00:01:13,000 --> 00:01:15,075 Reagan's former US Air Force Secretary, 16 00:01:15,075 --> 00:01:18,956 this explosion was actually the result of a CIA sabotage operation. 17 00:01:18,956 --> 00:01:25,000 The CIA had infiltrated the pipeline’s IT management systems 18 00:01:25,840 --> 00:01:30,950 More recently, the US government revealed that in September 2008, 19 00:01:30,950 --> 00:01:35,000 3 million people in the state of Espirito Santo In Brazil, 20 00:01:35,000 --> 00:01:38,000 were plunged into darkness 21 00:01:38,000 --> 00:01:41,327 because of some cyber-pirates' blackmail operation 22 00:01:42,310 --> 00:01:46,190 Even more worrisome for the U.S., in December 2008, 23 00:01:46,190 --> 00:01:49,000 CentCom's very IT systems, 24 00:01:49,000 --> 00:01:54,410 the US Central Command managing the wars in Iraq and Afghanistan, 25 00:01:54,410 --> 00:02:01,470 is said to have been infiltrated by hackers using booby-trapped USB sticks; 26 00:02:01,470 --> 00:02:05,020 with these sticks, they may have been able to enter these systems, 27 00:02:05,040 --> 00:02:09,000 to see and hear everything, and maybe even booby-trap some of these systems. 28 00:02:10,530 --> 00:02:12,490 Americans take the threat very seriously: 29 00:02:12,490 --> 00:02:17,000 let me quote General James Cartwright, Vice Chairman of the Joint Chief of Staff 30 00:02:17,000 --> 00:02:22,000 and who states in a report to Congress that a cyberattack may be in the magnitude 31 00:02:22,000 --> 00:02:24,580 of a weapon of mass destruction. 32 00:02:24,580 --> 00:02:28,590 Americans will spend 30 billion dollars in the next five years 33 00:02:28,590 --> 00:02:32,100 to build up their cyber-war capacities. 34 00:02:32,100 --> 00:02:37,070 And across the world today, a sort of cyber-arms race is taking place 35 00:02:37,070 --> 00:02:42,950 with military cyber units built by countries like North Korea or Iran. 36 00:02:44,280 --> 00:02:48,650 However, what you will never hear from the Pentagon 37 00:02:48,650 --> 00:02:50,990 or the French Department of Defense, 38 00:02:50,990 --> 00:02:55,230 is that the issue is not necessarily who the enemy is, 39 00:02:55,230 --> 00:02:58,330 but actually the very nature of these new cyber weapons. 40 00:02:58,830 --> 00:03:01,560 To understand that, let’s look at how, through history, 41 00:03:01,560 --> 00:03:07,000 new military technologies made or broke world peace. 42 00:03:07,820 --> 00:03:13,000 For example, if TEDxParis had been held 350 years ago, 43 00:03:13,000 --> 00:03:15,980 we would have talked about the military innovation of the day, 44 00:03:15,980 --> 00:03:18,980 Vauban-style massive fortifications 45 00:03:18,980 --> 00:03:24,260 and we would have forecast a period of stability in the world or in Europe, 46 00:03:24,260 --> 00:03:28,320 which was the case in Europe from 1650 to 1750. 47 00:03:29,070 --> 00:03:32,930 Likewise, if we had this conference 30 or 40 years ago, 48 00:03:32,930 --> 00:03:36,750 we would have seen how the advent of nuclear weapons 49 00:03:36,750 --> 00:03:42,000 and their inherent threat of mutually-assured destruction 50 00:03:42,000 --> 00:03:44,930 would prohibit a direct fight between the two Superpowers 51 00:03:46,000 --> 00:03:49,540 However, if we had this conference 60 years ago, 52 00:03:49,540 --> 00:03:54,490 we would have seen how the emerging aircraft and tank technologies 53 00:03:54,490 --> 00:03:59,750 that give the advantage to the offensive make credible the Blitzkrieg doctrine 54 00:03:59,750 --> 00:04:02,530 and chances of war in Europe. 55 00:04:02,530 --> 00:04:08,440 So military technologies can make or break world peace. 56 00:04:08,440 --> 00:04:11,410 And here lies the issue with cyber weapons. 57 00:04:11,410 --> 00:04:14,410 First issue: imagine a potential enemy 58 00:04:14,410 --> 00:04:19,790 announces he’s building a cyber-war unit only for defense. 59 00:04:19,790 --> 00:04:24,140 Great, but what makes it different from an offensive unit? 60 00:04:24,140 --> 00:04:30,600 The issue gets thornier when doctrines of use become blurred. 61 00:04:30,600 --> 00:04:35,000 Just 3 years ago, the USA and France 62 00:04:35,000 --> 00:04:37,850 were both saying they were going military into cyberspace 63 00:04:37,850 --> 00:04:41,400 but only to defend their IT systems. 64 00:04:41,400 --> 00:04:46,730 But today, both countries say the best form of defense is attack. 65 00:04:46,730 --> 00:04:49,210 In this respect, they’re matching up with China 66 00:04:49,210 --> 00:04:51,060 that over the last 15 years 67 00:04:51,060 --> 00:04:55,960 has had a doctrine of use both offensive and defensive. 68 00:04:56,810 --> 00:04:58,210 Second issue: 69 00:04:58,210 --> 00:05:01,430 your country may be under cyber-attack 70 00:05:01,430 --> 00:05:04,550 with vast areas plunged into total darkness, 71 00:05:04,550 --> 00:05:08,060 and you may be clueless about who’s attacking you. 72 00:05:08,070 --> 00:05:10,740 A particular characteristic of cyberweapons 73 00:05:10,740 --> 00:05:13,280 is they can be used without leaving traces. 74 00:05:13,280 --> 00:05:16,460 This gives a tremendous advantage to the attacker 75 00:05:16,460 --> 00:05:19,630 because the defender doesn’t know against who to fight back. 76 00:05:19,630 --> 00:05:22,140 And if the defender goes against the wrong adversary, 77 00:05:22,140 --> 00:05:24,380 they might end up with an additional enemy 78 00:05:24,380 --> 00:05:27,000 and isolated at the diplomatic level. 79 00:05:27,000 --> 00:05:29,120 This is not theoretical: 80 00:05:29,120 --> 00:05:33,000 in may 2007, Estonia was the target of cyber-attacks putting at risk 81 00:05:33,000 --> 00:05:36,160 its communication and banking systems; 82 00:05:36,160 --> 00:05:40,010 Estonia accused Russia, but NATO, though on Estonia's side, 83 00:05:40,020 --> 00:05:44,420 proved very prudent because it couldn’t be 100% sure 84 00:05:44,420 --> 00:05:48,410 that the Kremlin was really behind these attacks. 85 00:05:49,840 --> 00:05:55,670 To sum up, first when a potential enemy says they're building a cyberwar unit, 86 00:05:55,670 --> 00:05:59,090 you don’t know whether it’s for attack or defense, 87 00:05:59,090 --> 00:06:03,070 and secondly, we know that these weapons give the advantage to the attack. 88 00:06:03,730 --> 00:06:06,070 In a 1978 seminal article, 89 00:06:06,070 --> 00:06:09,610 Prof. Robert Jervis, from Columbia University, NY, 90 00:06:09,610 --> 00:06:12,440 described a model to understand how conflicts could arise. 91 00:06:13,520 --> 00:06:16,830 In a situation in which you don’t know 92 00:06:16,830 --> 00:06:20,310 if the potential enemy is preparing for defense or attack, 93 00:06:20,310 --> 00:06:24,000 and if weapons give the advantage to the attack, 94 00:06:24,000 --> 00:06:29,000 then it is the most favorable situation to trigger a war. 95 00:06:29,000 --> 00:06:33,060 This is the situation currently shaping up with cyber weapons 96 00:06:33,060 --> 00:06:36,750 and historically it's what the situation was in Europe 97 00:06:36,750 --> 00:06:39,440 at the onset of World War I. 98 00:06:41,000 --> 00:06:44,000 So cyber-weapons, by nature, are dangerous 99 00:06:44,000 --> 00:06:48,000 but on top of that, they’re emerging in a much more unstable situation. 100 00:06:48,000 --> 00:06:50,325 Remember the cold war? 101 00:06:50,325 --> 00:06:55,000 It was a very tough game, but played with only two players 102 00:06:55,000 --> 00:06:58,880 which allowed for some coordination between the two Superpowers. 103 00:07:00,000 --> 00:07:02,250 But today we’re entering a multi-polar world 104 00:07:02,250 --> 00:07:04,280 where coordination is much more complex. 105 00:07:04,280 --> 00:07:06,680 We’ve witnessed that at Copenhagen. 106 00:07:06,680 --> 00:07:11,000 And this coordination may become even trickier 107 00:07:11,000 --> 00:07:13,060 with the introduction of cyber-weapons. 108 00:07:13,060 --> 00:07:19,530 Why? Because no nation knows for sure whether its neighbor is about to attack. 109 00:07:19,530 --> 00:07:23,940 So nations may live under what Nobel prize laureate Thomas Schelling 110 00:07:23,940 --> 00:07:27,400 has called the “reciprocal fear of surprise attack”. 111 00:07:27,400 --> 00:07:30,590 Since I don’t know whether my neighbor is about to attack me, 112 00:07:30,590 --> 00:07:37,080 and I may never know, I may choose to be the first to attack 113 00:07:38,000 --> 00:07:44,000 In a New York Times article dated January 2010, 26, 114 00:07:44,000 --> 00:07:45,830 it was revealed for the first time 115 00:07:45,830 --> 00:07:48,830 that officials at the National Security Agency 116 00:07:48,830 --> 00:07:52,490 were considering pre-emptive attacks 117 00:07:52,490 --> 00:07:58,340 in case of an imminent cyber-attack on the USA. 118 00:07:58,700 --> 00:08:01,330 And these pre-emptive attacks or counter-attacks 119 00:08:01,330 --> 00:08:04,990 might not stay only in cyberspace. 120 00:08:06,640 --> 00:08:13,230 In May 2009, General Kevin Chilton, Commander of the US nuclear forces, 121 00:08:13,230 --> 00:08:19,000 stated that in case of cyber-attacks against the US, 122 00:08:19,000 --> 00:08:21,540 all the options would be on the table. 123 00:08:21,540 --> 00:08:26,070 Cyber weapons don’t suppress conventional or nuclear armament. 124 00:08:26,070 --> 00:08:31,210 They're just an addition to the existing terror devices. 125 00:08:31,210 --> 00:08:35,200 But they also add up their own risk of triggering war, 126 00:08:35,200 --> 00:08:39,480 a very high risk, as we've just seen it, a risk we'll have to face, 127 00:08:39,480 --> 00:08:45,610 maybe with a collective security solution including all of us, European allies, 128 00:08:45,610 --> 00:08:50,440 NATO members, with our American friends and allies, 129 00:08:50,440 --> 00:08:52,540 with our other Western allies, 130 00:08:52,540 --> 00:08:56,730 and maybe, twisting their arm a little, our Russian and Chinese partners. 131 00:08:56,730 --> 00:09:00,380 Because the information technologies Joel de Rosnay was just talking about, 132 00:09:00,380 --> 00:09:03,240 born historically from our of military research, 133 00:09:03,240 --> 00:09:08,730 are today on the verge to develop an offensive capability of destruction, 134 00:09:08,730 --> 00:09:14,220 which, if we're not careful, could destroy world peace tomorrow. 135 00:09:14,220 --> 00:09:15,590 Thank you. 136 00:09:15,590 --> 00:09:18,200 (Applause)