{"id":95562,"date":"2018-12-07T13:00:27","date_gmt":"2018-12-07T21:00:27","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=95562"},"modified":"2019-01-31T15:45:56","modified_gmt":"2019-01-31T23:45:56","slug":"cybersecurity-canon-candidate-book-review-cyber-war-anatomy-global-security-threat","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/12\/cybersecurity-canon-candidate-book-review-cyber-war-anatomy-global-security-threat\/","title":{"rendered":"Cybersecurity Canon Candidate Book Review: Cyber-War: Anatomy of the Global Security Threat"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:43.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-32398 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png\" alt=\"\" width=\"600\" height=\"260\" \/><\/span><\/div><\/p>\n<p><em>We modeled the\u00a0<a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\">Cybersecurity Canon<\/a>\u00a0after the Baseball Hall of Fame and the Rock &amp; Roll Hall of Fame, except it\u2019s a canon for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number.\u00a0Please write a review and nominate your favorite.\u00a0<\/em><\/p>\n<p><em>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\">directly participate in the process<\/a>. Please do so! <\/em><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Executive Summary<\/span><\/p>\n<p><em>Cyber-War<\/em> attempts to demystify technical concepts surrounding the study of cyber threats and, in particular, the likelihood and possibility of a cyber war. It does so by focusing on certain key debates within government and academic circles and bringing a plain-language approach to them. He does this through examinations of the hyperbole and generalizations that often accompany such debates. In doing so, the author, Julian Richards, largely accomplishes his goal, which is not one of resolving debate but rather encouraging a standard framework for that debate.<\/p>\n<p>While the approach Richards uses in <em>Cyber-War<\/em> is a valid one, his examples and conclusions suffer a bit from the passage of time and the accompanying increased understanding and visibility of the strategic cyber threats facing the U.S.\u00a0 For this reason, I am not recommending it for inclusion in the Cyber Canon.<\/p>\n<p><span style=\"font-size: 18pt;\"><br \/>\nReview<\/span><\/p>\n<p><em>Cyber-War<\/em>\u2019s author, Julian Richards is the Co-Director of the Centre for Security and Intelligence Studies at the University of Buckingham, U.K. He spent 17 years working in security and intelligence for the U.K. government. But despite being written by a U.K. security expert, <em>Cyber-War<\/em> is remarkably U.S.-centric in its analysis, perhaps owing to the relative wealth of cyber incidents affecting, or publicized in, the U.S.<\/p>\n<p>Richards begins with the premise that we can\u2019t really have an honest discussion about the real risk posed by cyber attacks and whether those attacks rise to the level of cyber war because of two impediments to analysis: 1) Cyber is an inherently technical realm, which in essence makes it difficult for non-techies to understand and assess; and 2) Discussion of the potential for cyber war is framed more in terms of science fiction rather than fact. <em>Cyber-War<\/em> sets out to \u201ccut through some of the myth and hyperbole surrounding the cyber debate.\u201d Richards doesn\u2019t really seek to resolve or settle any debate (although he admits to having his own views), but instead to lay out a clearer playing field for those debates. To that extent, <em>Cyber-War<\/em> is relatively successful.<\/p>\n<p>Richards begins his book by bringing up some of the major cyber events from preceding years. He highlights the fact that often, the initial knee-jerk response to these events was to assign blame to actors in accordance with developing norms of the time, e.g., to assign blame to Russia for a SCADA attack when in fact it was a simple error by an employee.\u00a0 Having lived through the response to that \u201cattack,\u201d and witnessing firsthand the speed with which a conclusion was reached, I recognize and appreciate his point. However, Richards does have a clear \u201cthe cyber Pearl Harbor attack isn\u2019t likely\u201d bias (one to which he admits) that may lean too far in the other direction.<\/p>\n<p>Through its six chapters, <em>Cyber-War<\/em> brings out some issues surrounding the overall debate about the likelihood, and indeed the very definition, of cyber war. For example:<\/p>\n<ul>\n<li>Are cyber attacks the archetypal modern asymmetric technique, or are they simply a new way of conducting or supplementing warfare as it\u2019s been conducted throughout history? As part of this discussion, Richards brings up the very real catch-22 of U.S. technological superiority: It makes us both the beneficiary and likely victim of the asymmetric cyber threat.<\/li>\n<li>Do even the most egregious cyber attacks by nation states constitute an act of war in the traditional sense of the term? The discussion of this point is relatively simplistic considering the various international-law, national-security, and military-doctrine overlays inherent in any such analysis. This question alone can be, and has been, the basis for an entire book.<\/li>\n<li>Are China and Russia developing military-grade capabilities for use in a future wartime conflict? Or is the analysis of those countries\u2019 activities a reflection of an antiquated \u201cCold War mentality\u201d in the U.S.? The author leans toward the U.S. position being driven more by hyperbole than fact with respect to this question \u2014 a position I don\u2019t find all that convincing, especially when informed by developments since the book was published.<\/li>\n<li>How should states develop counterthreat strategies in the contemporary era, especially in light of the mutual dependencies of the private and government sectors and the privacy considerations they engender? The author shies away from the common consideration of cyber war as analogous to a nuclear attack and suggests that an analogy to biological\/chemical attacks is more fitting.<\/li>\n<li>Is the general three-tier categorization of cyber warfare threats (cyber-enabled traditional information operations, which can happen both during conflict and in peacetime scenarios; cyber attack activities, which enable battle in the physical realm; and cyber attacks, which cause real physical death and destruction) appropriate, and does it facilitate defining when cyber war exists?\u00a0 Richards appears to dismiss the last of these as unlikely due to political and practical factors.<\/li>\n<\/ul>\n<p><span style=\"font-size: 18pt;\"><br \/>\nConclusion<\/span><\/p>\n<p><em>Cyber-War<\/em> is an interesting read for those who are in the earlier stages of educating themselves about the cyber threat and when it slides into the realm of cyber war, as well as what could be done when that shift occurs. It is, however, hampered by its relative age. Although not an old book by most standards, it doesn\u2019t benefit from the events of the last 4 years. Those events, including chiefly the rise in hacks of huge government and private sector systems, as well as the disclosure of cyber-facilitated information manipulation in the 2016 election, paint a different background for today\u2019s analysts.<\/p>\n<p><em>Cyber-War<\/em>\u2019s continued value is in its promotion of careful analysis and common vocabularies as necessities for a productive discussion of the cyber threat. It guides the reader toward a healthy skepticism of some accepted \u201ctruths\u201d about cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>William Yurek reviews \"Cyber-War: Anatomy of the Global Security Threat\" for the Cybersecurity Canon.<\/p>\n","protected":false},"author":394,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[6705,251,4270,6704,5407],"coauthors":[4252],"class_list":["post-95562","post","type-post","status-publish","format-standard","hentry","category-canon","category-points-of-view","tag-cyber-war","tag-cybersecurity-canon","tag-cybersecurity-canon-review","tag-julian-richards","tag-william-yurek"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/95562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/394"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=95562"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/95562\/revisions"}],"predecessor-version":[{"id":95563,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/95562\/revisions\/95563"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=95562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=95562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=95562"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=95562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}