WEBVTT 00:00:12.020 --> 00:00:15.821 If you have followed diplomatic news recently, 00:00:15.821 --> 00:00:19.506 you may have heard of a crisis between China and the U.S. 00:00:19.506 --> 00:00:24.134 regarding cyber attacks against Google. 00:00:24.134 --> 00:00:26.643 It has generated a lot of talk, even of cyberwar, 00:00:26.643 --> 00:00:32.153 when it's more likely a quite mishandled spy operation. 00:00:32.884 --> 00:00:38.343 However, this episode reveals a growing anxiety in the Western World 00:00:38.343 --> 00:00:41.410 regarding the emergeance of these cyber weapons 00:00:41.410 --> 00:00:45.631 These weapons are dangerous. They are of a new nature. 00:00:45.631 --> 00:00:49.129 And they could lead the world to a cyber-conflict 00:00:49.129 --> 00:00:51.866 that could turn into a full-fledge armed struggle 00:00:51.866 --> 00:00:56.000 since these virtual weapons can also destroy the physical world. 00:00:56.711 --> 00:01:04.800 In 1982, in the middle of the cold war in soviet Siberia, a pipeline explodes 00:01:04.800 --> 00:01:08.957 with a burst of 3 kilotons, that is one fourth of the Hiroshima bomb. 00:01:08.957 --> 00:01:13.000 We know today, this was revealed by Thomas Reed, 00:01:13.000 --> 00:01:15.075 Reagan's former US Air Force Secretary, 00:01:15.075 --> 00:01:18.956 this explosion was actually the result of a CIA sabotage operation. 00:01:18.956 --> 00:01:25.000 The CIA had infiltrated the pipeline’s IT management systems 00:01:25.840 --> 00:01:30.950 More recently, the US government revealed that in September 2008, 00:01:30.950 --> 00:01:35.000 3 million people in the state of Espirito Santo In Brazil, 00:01:35.000 --> 00:01:38.000 were plunged into darkness 00:01:38.000 --> 00:01:41.327 because of some cyber-pirates' blackmail operation 00:01:42.310 --> 00:01:46.190 Even more worrisome for the U.S., in December 2008, 00:01:46.190 --> 00:01:49.000 CentCom's very IT systems, 00:01:49.000 --> 00:01:54.410 the US Central Command managing the wars in Iraq and Afghanistan, 00:01:54.410 --> 00:02:01.470 is said to have been infiltrated by hackers using booby-trapped USB sticks; 00:02:01.470 --> 00:02:05.020 with these sticks, they may have been able to enter these systems, 00:02:05.040 --> 00:02:09.000 to see and hear everything, and maybe even booby-trap some of these systems. 00:02:10.530 --> 00:02:12.490 Americans take the threat very seriously: 00:02:12.490 --> 00:02:17.000 let me quote General James Cartwright, Vice Chairman of the Joint Chief of Staff 00:02:17.000 --> 00:02:22.000 and who states in a report to Congress that a cyberattack may be in the magnitude 00:02:22.000 --> 00:02:24.580 of a weapon of mass destruction. 00:02:24.580 --> 00:02:28.590 Americans will spend 30 billion dollars in the next five years 00:02:28.590 --> 00:02:32.100 to build up their cyber-war capacities. 00:02:32.100 --> 00:02:37.070 And across the world today, a sort of cyber-arms race is taking place 00:02:37.070 --> 00:02:42.950 with military cyber units built by countries like North Korea or Iran. 00:02:44.280 --> 00:02:48.650 However, what you will never hear from the Pentagon 00:02:48.650 --> 00:02:50.990 or the French Department of Defense, 00:02:50.990 --> 00:02:55.230 is that the issue is not necessarily who the enemy is, 00:02:55.230 --> 00:02:58.330 but actually the very nature of these new cyber weapons. 00:02:58.830 --> 00:03:01.560 To understand that, let’s look at how, through history, 00:03:01.560 --> 00:03:07.000 new military technologies made or broke world peace. 00:03:07.820 --> 00:03:13.000 For example, if TEDxParis had been held 350 years ago, 00:03:13.000 --> 00:03:15.980 we would have talked about the military innovation of the day, 00:03:15.980 --> 00:03:18.980 Vauban-style massive fortifications 00:03:18.980 --> 00:03:24.260 and we would have forecast a period of stability in the world or in Europe, 00:03:24.260 --> 00:03:28.320 which was the case in Europe from 1650 to 1750. 00:03:29.070 --> 00:03:32.930 Likewise, if we had this conference 30 or 40 years ago, 00:03:32.930 --> 00:03:36.750 we would have seen how the advent of nuclear weapons 00:03:36.750 --> 00:03:42.000 and their inherent threat of mutually-assured destruction 00:03:42.000 --> 00:03:44.930 would prohibit a direct fight between the two Superpowers 00:03:46.000 --> 00:03:49.540 However, if we had this conference 60 years ago, 00:03:49.540 --> 00:03:54.490 we would have seen how the emerging aircraft and tank technologies 00:03:54.490 --> 00:03:59.750 that give the advantage to the offensive make credible the Blitzkrieg doctrine 00:03:59.750 --> 00:04:02.530 and chances of war in Europe. 00:04:02.530 --> 00:04:08.440 So military technologies can make or break world peace. 00:04:08.440 --> 00:04:11.410 And here lies the issue with cyber weapons. 00:04:11.410 --> 00:04:14.410 First issue: imagine a potential enemy 00:04:14.410 --> 00:04:19.790 announces he’s building a cyber-war unit only for defense. 00:04:19.790 --> 00:04:24.140 Great, but what makes it different from an offensive unit? 00:04:24.140 --> 00:04:30.600 The issue gets thornier when doctrines of use become blurred. 00:04:30.600 --> 00:04:35.000 Just 3 years ago, the USA and France 00:04:35.000 --> 00:04:37.850 were both saying they were going military into cyberspace 00:04:37.850 --> 00:04:41.400 but only to defend their IT systems. 00:04:41.400 --> 00:04:46.730 But today, both countries say the best form of defense is attack. 00:04:46.730 --> 00:04:49.210 In this respect, they’re matching up with China 00:04:49.210 --> 00:04:51.060 that over the last 15 years 00:04:51.060 --> 00:04:55.960 has had a doctrine of use both offensive and defensive. 00:04:56.810 --> 00:04:58.210 Second issue: 00:04:58.210 --> 00:05:01.430 your country may be under cyber-attack 00:05:01.430 --> 00:05:04.550 with vast areas plunged into total darkness, 00:05:04.550 --> 00:05:08.060 and you may be clueless about who’s attacking you. 00:05:08.070 --> 00:05:10.740 A particular characteristic of cyberweapons 00:05:10.740 --> 00:05:13.280 is they can be used without leaving traces. 00:05:13.280 --> 00:05:16.460 This gives a tremendous advantage to the attacker 00:05:16.460 --> 00:05:19.630 because the defender doesn’t know against who to fight back. 00:05:19.630 --> 00:05:22.140 And if the defender goes against the wrong adversary, 00:05:22.140 --> 00:05:24.380 they might end up with an additional enemy 00:05:24.380 --> 00:05:27.000 and isolated at the diplomatic level. 00:05:27.000 --> 00:05:29.120 This is not theoretical: 00:05:29.120 --> 00:05:33.000 in may 2007, Estonia was the target of cyber-attacks putting at risk 00:05:33.000 --> 00:05:36.160 its communication and banking systems; 00:05:36.160 --> 00:05:40.010 Estonia accused Russia, but NATO, though on Estonia's side, 00:05:40.020 --> 00:05:44.420 proved very prudent because it couldn’t be 100% sure 00:05:44.420 --> 00:05:48.410 that the Kremlin was really behind these attacks. 00:05:49.840 --> 00:05:55.670 To sum up, first when a potential enemy says they're building a cyberwar unit, 00:05:55.670 --> 00:05:59.090 you don’t know whether it’s for attack or defense, 00:05:59.090 --> 00:06:03.070 and secondly, we know that these weapons give the advantage to the attack. 00:06:03.730 --> 00:06:06.070 In a 1978 seminal article, 00:06:06.070 --> 00:06:09.610 Prof. Robert Jervis, from Columbia University, NY, 00:06:09.610 --> 00:06:12.440 described a model to understand how conflicts could arise. 00:06:13.520 --> 00:06:16.830 In a situation in which you don’t know 00:06:16.830 --> 00:06:20.310 if the potential enemy is preparing for defense or attack, 00:06:20.310 --> 00:06:24.000 and if weapons give the advantage to the attack, 00:06:24.000 --> 00:06:29.000 then it is the most favorable situation to trigger a war. 00:06:29.000 --> 00:06:33.060 This is the situation currently shaping up with cyber weapons 00:06:33.060 --> 00:06:36.750 and historically it's what the situation was in Europe 00:06:36.750 --> 00:06:39.440 at the onset of World War I. 00:06:41.000 --> 00:06:44.000 So cyber-weapons, by nature, are dangerous 00:06:44.000 --> 00:06:48.000 but on top of that, they’re emerging in a much more unstable situation. 00:06:48.000 --> 00:06:50.325 Remember the cold war? 00:06:50.325 --> 00:06:55.000 It was a very tough game, but played with only two players 00:06:55.000 --> 00:06:58.880 which allowed for some coordination between the two Superpowers. 00:07:00.000 --> 00:07:02.250 But today we’re entering a multi-polar world 00:07:02.250 --> 00:07:04.280 where coordination is much more complex. 00:07:04.280 --> 00:07:06.680 We’ve witnessed that at Copenhagen. 00:07:06.680 --> 00:07:11.000 And this coordination may become even trickier 00:07:11.000 --> 00:07:13.060 with the introduction of cyber-weapons. 00:07:13.060 --> 00:07:19.530 Why? Because no nation knows for sure whether its neighbor is about to attack. 00:07:19.530 --> 00:07:23.940 So nations may live under what Nobel prize laureate Thomas Schelling 00:07:23.940 --> 00:07:27.400 has called the “reciprocal fear of surprise attack”. 00:07:27.400 --> 00:07:30.590 Since I don’t know whether my neighbor is about to attack me, 00:07:30.590 --> 00:07:37.080 and I may never know, I may choose to be the first to attack 00:07:38.000 --> 00:07:44.000 In a New York Times article dated January 2010, 26, 00:07:44.000 --> 00:07:45.830 it was revealed for the first time 00:07:45.830 --> 00:07:48.830 that officials at the National Security Agency 00:07:48.830 --> 00:07:52.490 were considering pre-emptive attacks 00:07:52.490 --> 00:07:58.340 in case of an imminent cyber-attack on the USA. 00:07:58.700 --> 00:08:01.330 And these pre-emptive attacks or counter-attacks 00:08:01.330 --> 00:08:04.990 might not stay only in cyberspace. 00:08:06.640 --> 00:08:13.230 In May 2009, General Kevin Chilton, Commander of the US nuclear forces, 00:08:13.230 --> 00:08:19.000 stated that in case of cyber-attacks against the US, 00:08:19.000 --> 00:08:21.540 all the options would be on the table. 00:08:21.540 --> 00:08:26.070 Cyber weapons don’t suppress conventional or nuclear armament. 00:08:26.070 --> 00:08:31.210 They're just an addition to the existing terror devices. 00:08:31.210 --> 00:08:35.200 But they also add up their own risk of triggering war, 00:08:35.200 --> 00:08:39.480 a very high risk, as we've just seen it, a risk we'll have to face, 00:08:39.480 --> 00:08:45.610 maybe with a collective security solution including all of us, European allies, 00:08:45.610 --> 00:08:50.440 NATO members, with our American friends and allies, 00:08:50.440 --> 00:08:52.540 with our other Western allies, 00:08:52.540 --> 00:08:56.730 and maybe, twisting their arm a little, our Russian and Chinese partners. 00:08:56.730 --> 00:09:00.380 Because the information technologies Joel de Rosnay was just talking about, 00:09:00.380 --> 00:09:03.240 born historically from our of military research, 00:09:03.240 --> 00:09:08.730 are today on the verge to develop an offensive capability of destruction, 00:09:08.730 --> 00:09:14.220 which, if we're not careful, could destroy world peace tomorrow. 00:09:14.220 --> 00:09:15.590 Thank you. 00:09:15.590 --> 00:09:18.200 (Applause)