Considered the newest domain in modern warfare, cyberspace has now joined the ranks of traditional areas assessed by militaries all over the world. And this is exactly how cyberspace should be evaluated, since an effective terrorist attack against a nation’s power grid, for example, could result in massive loss of life, crippling damage to infrastructure, and a blow to the economy that could take years to repair. Stuxnet has carried out what in the past could only be accomplished by directly bombing a country’s infrastructure or sending in human agents to plant explosives. The Flame virus (which has been circulating for more than five years and has yet to be claimed by an owner, although speculation centers around Israel) has turned the computer into the ultimate spy, gathering data files, turning on PC microphones to record nearby conversations, logging instant messaging chats, taking screen shots, and even remotely changing settings on other computers. Explaining the nexus between traditional theatres of land, sea, air, and space, U.S. Defense Secretary Leon E. Panetta has warned that the “next Pearl Harbor we confront could very well be a cyberattack that cripples our power systems, our grid, our security systems, our financial systems.”

“We have built our future upon a capability that we have not learned how to protect.” – Former CIA Director George J. Tenet

The same computing DNA that produced the communications revolution has also created acute vulnerabilities – – and attractive terror targets – – for societies that depend on cyberspace for national security and economic survival. Back in March of this year, security officials invited members of the Senate to the White House for a classified presentation illustrating what would happen if an enemy state – – or even a talented, lone hacker – – launched a spear phishing attack against New York City’s central computer systems, effectively shutting down the urban center’s electric grid. The simulation was a more simplified version of the Pentagon’s ongoing cyberwar games, presented to Congress to push for a bill that would allow federal control over protecting the computer networks that run America’s most exposed infrastructures.

One of the indirect lessons that can be taken from this simulation presented to the Senate was that cyberwarfare has created a new deterrent posture, a threat reminiscent of mutually assured destruction (MAD). In other words, as one security expert put it, if you take out New York, I take out Moscow. 

“The digital infrastructure we depend on every day is a strategic national asset, so keeping it secure must be a top national priority. Cyberspace is real and so are the risks that come with it.” – Barack Obama

Earlier this week in a feature article in The New York Times, U.S. President Barack Obama publicly announced the joint U.S.-Israeli effort to take out Iran’s nuclear program in a blatant act of cyberwarfare. This is the first time in history that the U.S. has admitted to using cyberweapons to cripple another country’s infrastructure (although there have been a slew of smaller reports of attacks against personal computers used by Al Qaeda operatives). But the launch of the Stuxnet virus – code-named “Olympic Games” – was on a totally different level of sophistication, and was carried out with deep Israeli involvement, most likely including Israel’s elite signal intelligence corps Unit 8200, led by a Brigadier-General whose name is kept strictly classified.

Despite the apparent rapport between the Israelis and Americans, something is not quite right: an alleged error in the Stuxnet code led to the bug replicating itself across the Internet, threatening to do damage outside the targeted nuclear plants. American officials suspect this was a surreptitious modification carried out by the Israelis for their own uses, and lets just say there are members of the White House that are not too happy about it. (See comments by Joe Biden.)

The Israelis are well aware of the zero-sum game involved in the world of cyberwarfare, as evidenced by statements made today by Israeli Defense Minister Ehud Barak in The Jerusalem Post. Israel plans to become a world leader in the development of cyber capabilities, and to be fair, the chops they’ve shown so far indicate that they might already be there. So, even if the Americans are a little miffed over possible deceptions that took place during the Olympic Games operation, Israel is not a strategic ally that will be tossed aside so easily. The Americans should also keep in mind the extreme and existential threats Israel faces in the region, as well as the multitude of hostile countries it must balance. These factors can at least partially explain the heightened urgency and daring in Israel’s national security decisions. Concerning potential damages, Barak warned: “Cyberwarfare has taken asymmetric warfare to a new height, allowing a lone hacker to cause major damage.” Whether this was referring to Israel’s vulnerabilities, or as a barely veiled threat to its enemies, is unclear.

And yet an obvious question must be asked: Why now? Speculation against the U.S. and Israel over Stuxnet has been around for awhile, but why is Obama making this provocative announcement just now? It could very well be that, despite the real cyber threats Iran faces, the recent declaration of cyber war is a decoy. It forces Iran to shift its resources towards defensive measures surrounding its computer systems, when it might very well be that the next attack is going to be something completely unrelated and even more incapacitating.

The Pressing Questions: How will global strategic relations be affected by the shifting power politics connected to cyberwarfare? Should the U.S. legitimize the use of cyberweapons as a covert tool? At what point will cyberwarfare become so destructive that countries will need to consider developing treaties to control its use?

Read more below:

Obama Order Sped Up Wave of Cyberattacks Against Iran by  The New York Times

Mutually Assured Cyberdestruction? by The New York Times

Special Report: Understanding Cyberspace is Key to Defending Against Digital Attacks by The Washington Post

Ya’alon Hints at Israeli Role in ‘Flame’ Virus by The Jerusalem Post

Barak: Israel Working to Become a Cyber Leader by The Jerusalem Post

Cyber Warfare: Concepts and Strategic Trends by The Institute of National Security Studies in Tel Aviv

About the author

Jessica Snapper

Jessica Snapper has a Masters degree in Security Intelligence with a concentration in Counterterrorism and the Middle East. Her areas of expertise include terrorist infrastructure, asymmetric warfare, tactical adaptability, deterrence and national defense policy. She has conducted in-depth research at both the University of Pittsburgh’s Graduate School of Public and International Affairs and the Hebrew University’s Department of Political Violence and Terrorism. Read more at