Return to Video

Should we fear a cyber-war? | Guy-Philippe Goldstein | TEDxParis

  • 0:12 - 0:16
    If you have followed
    diplomatic news recently,
  • 0:16 - 0:20
    you may have heard
    of a crisis between China and the U.S.
  • 0:20 - 0:24
    regarding cyber attacks against Google.
  • 0:24 - 0:27
    It has generated a lot of talk,
    even of cyberwar,
  • 0:27 - 0:32
    when it's more likely
    a quite mishandled spy operation.
  • 0:33 - 0:38
    However, this episode reveals
    a growing anxiety in the Western World
  • 0:38 - 0:41
    regarding the emergeance
    of these cyber weapons
  • 0:41 - 0:46
    These weapons are dangerous.
    They are of a new nature.
  • 0:46 - 0:49
    And they could lead the world
    to a cyber-conflict
  • 0:49 - 0:52
    that could turn into
    a full-fledge armed struggle
  • 0:52 - 0:56
    since these virtual weapons
    can also destroy the physical world.
  • 0:57 - 1:05
    In 1982, in the middle of the cold war
    in soviet Siberia, a pipeline explodes
  • 1:05 - 1:09
    with a burst of 3 kilotons,
    that is one fourth of the Hiroshima bomb.
  • 1:09 - 1:13
    We know today,
    this was revealed by Thomas Reed,
  • 1:13 - 1:15
    Reagan's former US Air Force Secretary,
  • 1:15 - 1:19
    this explosion was actually
    the result of a CIA sabotage operation.
  • 1:19 - 1:25
    The CIA had infiltrated
    the pipeline’s IT management systems
  • 1:26 - 1:31
    More recently, the US government
    revealed that in September 2008,
  • 1:31 - 1:35
    3 million people in the state
    of Espirito Santo In Brazil,
  • 1:35 - 1:38
    were plunged into darkness
  • 1:38 - 1:41
    because of some cyber-pirates'
    blackmail operation
  • 1:42 - 1:46
    Even more worrisome for the U.S.,
    in December 2008,
  • 1:46 - 1:49
    CentCom's very IT systems,
  • 1:49 - 1:54
    the US Central Command managing the wars
    in Iraq and Afghanistan,
  • 1:54 - 2:01
    is said to have been infiltrated
    by hackers using booby-trapped USB sticks;
  • 2:01 - 2:05
    with these sticks, they may have been able
    to enter these systems,
  • 2:05 - 2:09
    to see and hear everything, and maybe
    even booby-trap some of these systems.
  • 2:11 - 2:12
    Americans take the threat very seriously:
  • 2:12 - 2:17
    let me quote General James Cartwright,
    Vice Chairman of the Joint Chief of Staff
  • 2:17 - 2:22
    and who states in a report to Congress
    that a cyberattack may be in the magnitude
  • 2:22 - 2:25
    of a weapon of mass destruction.
  • 2:25 - 2:29
    Americans will spend 30 billion dollars
    in the next five years
  • 2:29 - 2:32
    to build up their cyber-war capacities.
  • 2:32 - 2:37
    And across the world today,
    a sort of cyber-arms race is taking place
  • 2:37 - 2:43
    with military cyber units built
    by countries like North Korea or Iran.
  • 2:44 - 2:49
    However, what you will never hear
    from the Pentagon
  • 2:49 - 2:51
    or the French Department of Defense,
  • 2:51 - 2:55
    is that the issue is not necessarily
    who the enemy is,
  • 2:55 - 2:58
    but actually the very nature
    of these new cyber weapons.
  • 2:59 - 3:02
    To understand that,
    let’s look at how, through history,
  • 3:02 - 3:07
    new military technologies
    made or broke world peace.
  • 3:08 - 3:13
    For example, if TEDxParis
    had been held 350 years ago,
  • 3:13 - 3:16
    we would have talked about
    the military innovation of the day,
  • 3:16 - 3:19
    Vauban-style massive fortifications
  • 3:19 - 3:24
    and we would have forecast a period
    of stability in the world or in Europe,
  • 3:24 - 3:28
    which was the case in Europe
    from 1650 to 1750.
  • 3:29 - 3:33
    Likewise, if we had this conference
    30 or 40 years ago,
  • 3:33 - 3:37
    we would have seen
    how the advent of nuclear weapons
  • 3:37 - 3:42
    and their inherent threat
    of mutually-assured destruction
  • 3:42 - 3:45
    would prohibit a direct fight
    between the two Superpowers
  • 3:46 - 3:50
    However, if we had this conference
    60 years ago,
  • 3:50 - 3:54
    we would have seen how the emerging
    aircraft and tank technologies
  • 3:54 - 4:00
    that give the advantage to the offensive
    make credible the Blitzkrieg doctrine
  • 4:00 - 4:03
    and chances of war in Europe.
  • 4:03 - 4:08
    So military technologies
    can make or break world peace.
  • 4:08 - 4:11
    And here lies the issue
    with cyber weapons.
  • 4:11 - 4:14
    First issue: imagine a potential enemy
  • 4:14 - 4:20
    announces he’s building
    a cyber-war unit only for defense.
  • 4:20 - 4:24
    Great, but what makes it different
    from an offensive unit?
  • 4:24 - 4:31
    The issue gets thornier
    when doctrines of use become blurred.
  • 4:31 - 4:35
    Just 3 years ago, the USA and France
  • 4:35 - 4:38
    were both saying
    they were going military into cyberspace
  • 4:38 - 4:41
    but only to defend their IT systems.
  • 4:41 - 4:47
    But today, both countries say
    the best form of defense is attack.
  • 4:47 - 4:49
    In this respect,
    they’re matching up with China
  • 4:49 - 4:51
    that over the last 15 years
  • 4:51 - 4:56
    has had a doctrine of use
    both offensive and defensive.
  • 4:57 - 4:58
    Second issue:
  • 4:58 - 5:01
    your country may be under cyber-attack
  • 5:01 - 5:05
    with vast areas plunged
    into total darkness,
  • 5:05 - 5:08
    and you may be clueless
    about who’s attacking you.
  • 5:08 - 5:11
    A particular characteristic
    of cyberweapons
  • 5:11 - 5:13
    is they can be used
    without leaving traces.
  • 5:13 - 5:16
    This gives a tremendous advantage
    to the attacker
  • 5:16 - 5:20
    because the defender
    doesn’t know against who to fight back.
  • 5:20 - 5:22
    And if the defender
    goes against the wrong adversary,
  • 5:22 - 5:24
    they might end up with an additional enemy
  • 5:24 - 5:27
    and isolated at the diplomatic level.
  • 5:27 - 5:29
    This is not theoretical:
  • 5:29 - 5:33
    in may 2007, Estonia was the target
    of cyber-attacks putting at risk
  • 5:33 - 5:36
    its communication and banking systems;
  • 5:36 - 5:40
    Estonia accused Russia, but NATO,
    though on Estonia's side,
  • 5:40 - 5:44
    proved very prudent
    because it couldn’t be 100% sure
  • 5:44 - 5:48
    that the Kremlin
    was really behind these attacks.
  • 5:50 - 5:56
    To sum up, first when a potential enemy
    says they're building a cyberwar unit,
  • 5:56 - 5:59
    you don’t know
    whether it’s for attack or defense,
  • 5:59 - 6:03
    and secondly, we know that these weapons
    give the advantage to the attack.
  • 6:04 - 6:06
    In a 1978 seminal article,
  • 6:06 - 6:10
    Prof. Robert Jervis,
    from Columbia University, NY,
  • 6:10 - 6:12
    described a model to understand
    how conflicts could arise.
  • 6:14 - 6:17
    In a situation in which you don’t know
  • 6:17 - 6:20
    if the potential enemy is preparing
    for defense or attack,
  • 6:20 - 6:24
    and if weapons give
    the advantage to the attack,
  • 6:24 - 6:29
    then it is the most favorable
    situation to trigger a war.
  • 6:29 - 6:33
    This is the situation currently shaping up
    with cyber weapons
  • 6:33 - 6:37
    and historically
    it's what the situation was in Europe
  • 6:37 - 6:39
    at the onset of World War I.
  • 6:41 - 6:44
    So cyber-weapons, by nature, are dangerous
  • 6:44 - 6:48
    but on top of that, they’re emerging
    in a much more unstable situation.
  • 6:48 - 6:50
    Remember the cold war?
  • 6:50 - 6:55
    It was a very tough game,
    but played with only two players
  • 6:55 - 6:59
    which allowed for some coordination
    between the two Superpowers.
  • 7:00 - 7:02
    But today we’re entering
    a multi-polar world
  • 7:02 - 7:04
    where coordination is much more complex.
  • 7:04 - 7:07
    We’ve witnessed that at Copenhagen.
  • 7:07 - 7:11
    And this coordination
    may become even trickier
  • 7:11 - 7:13
    with the introduction of cyber-weapons.
  • 7:13 - 7:20
    Why? Because no nation knows for sure
    whether its neighbor is about to attack.
  • 7:20 - 7:24
    So nations may live under
    what Nobel prize laureate Thomas Schelling
  • 7:24 - 7:27
    has called the “reciprocal fear
    of surprise attack”.
  • 7:27 - 7:31
    Since I don’t know whether
    my neighbor is about to attack me,
  • 7:31 - 7:37
    and I may never know,
    I may choose to be the first to attack
  • 7:38 - 7:44
    In a New York Times article
    dated January 2010, 26,
  • 7:44 - 7:46
    it was revealed for the first time
  • 7:46 - 7:49
    that officials
    at the National Security Agency
  • 7:49 - 7:52
    were considering pre-emptive attacks
  • 7:52 - 7:58
    in case of an imminent
    cyber-attack on the USA.
  • 7:59 - 8:01
    And these pre-emptive attacks
    or counter-attacks
  • 8:01 - 8:05
    might not stay only in cyberspace.
  • 8:07 - 8:13
    In May 2009, General Kevin Chilton,
    Commander of the US nuclear forces,
  • 8:13 - 8:19
    stated that in case
    of cyber-attacks against the US,
  • 8:19 - 8:22
    all the options would be on the table.
  • 8:22 - 8:26
    Cyber weapons don’t suppress
    conventional or nuclear armament.
  • 8:26 - 8:31
    They're just an addition
    to the existing terror devices.
  • 8:31 - 8:35
    But they also add up
    their own risk of triggering war,
  • 8:35 - 8:39
    a very high risk, as we've just seen it,
    a risk we'll have to face,
  • 8:39 - 8:46
    maybe with a collective security solution
    including all of us, European allies,
  • 8:46 - 8:50
    NATO members,
    with our American friends and allies,
  • 8:50 - 8:53
    with our other Western allies,
  • 8:53 - 8:57
    and maybe, twisting their arm a little,
    our Russian and Chinese partners.
  • 8:57 - 9:00
    Because the information technologies
    Joel de Rosnay was just talking about,
  • 9:00 - 9:03
    born historically
    from our of military research,
  • 9:03 - 9:09
    are today on the verge to develop
    an offensive capability of destruction,
  • 9:09 - 9:14
    which, if we're not careful,
    could destroy world peace tomorrow.
  • 9:14 - 9:16
    Thank you.
  • 9:16 - 9:18
    (Applause)
Title:
Should we fear a cyber-war? | Guy-Philippe Goldstein | TEDxParis
Description:

Guy-Philippe Goldstein talks about cyberwars and their impact on international relations. Filmed at TEDxPARIS on January 30th, 2010.

This talk was given at a TEDx event organized independently from TED conferences.

more » « less
Video Language:
French
Team:
closed TED
Project:
TEDxTalks
Duration:
09:24

English subtitles

Revisions Compare revisions