Skip to main content
Part of complete coverage from

Cyberwar hits Ukraine

By Peter Bergen and Tim Maurer
updated 10:09 AM EST, Fri March 7, 2014
STORY HIGHLIGHTS
  • Ukrainian officials say phone services of members of parliament were targeted
  • Authors: Cyberattack was also reported before Russian invasion of Georgia in 2008
  • They say attacks are easier than conventional warfare but can provoke counterattacks
  • Bergen, Maurer: U.S. had a lead in cyberwarfare but that is likely to ebb

Editor's note: Peter Bergen is CNN's national security analyst, a director at the New America Foundation and the author of "Manhunt: The Ten-Year Search for bin Laden -- From 9/11 to Abbottabad." Tim Maurer is a research fellow at New America focusing on cyberspace and international affairs.

(CNN) -- Ukrainian security officials are complaining that unknown attackers are interfering with the mobile phone services of members of Ukraine's parliament, making difficult political decisions about what to do about Russia's incursion last week into Crimea that much harder.

The head of Ukraine's security service said on Tuesday, "I confirm that an IP-telephonic attack is underway on mobile phones of members of Ukrainian parliament for the second day in row."

This is reminiscent of the Distributed Denial of Service (DDoS) attacks on Georgia that preceded Russia's invasion of the country in August 2008. The attacks shut down several websites of Georgia's government including the president's.

Peter Bergen
Peter Bergen

While the Kremlin denied any involvement, Georgian officials accused Russia of being behind the attacks.

Of course, just as some states have exploited offensive cyber capabilities for their own purposes, so too has the United States.

Cyberattacks are double-edged swords. Compared to mounting a conventional war they cost little in terms of blood and treasure. However, in the long run they may have larger unintended consequences if more and more nation states and even private groups use cyberwarfare capabilities.

The Stuxnet malware that was discovered in 2010 showed the potential of cyberattacks. The joint U.S.-Israeli operation demonstrated how the nuclear enrichment facility of Natanz in Iran could be effectively disrupted using a cyberattack that interfered with Iranian centrifuges' capacity to enrich uranium.

Cyberattacks hitting close to home
Snipers attack U.S. electrical grid
Israel's cyberdefense training gym

The level of sophistication of the malware was unprecedented and affected the facility even though it was "air gapped" -- disconnected -- from the public Internet.

Last month came the news that Obama national security officials have debated since 2011 whether to target Bashar al-Assad's regime in Syria with cyberattacks.

The upside: No American boots on the ground and some potentially significant harm could be done to al-Assad's military capabilities.

The downside: What about unknown risks? Might such attacks embolden Syrian allies like Iran and Russia to launch cyber-counterattacks against targets in the U.S.?

The Stuxnet attack on Iran was not an isolated event. A January report by the Center for Strategic and International Studies points out that Iran "is the likely source of a recent series of incidents aimed at Gulf energy companies, American banks, and Israel. The most important involved a major disruption involving the destruction of data on computers used by (oil giant) Saudi Aramco...."

The Syrian Electronic Army, a group that supports the al-Assad regime, showed the potential to undermine trust in the financial system when it hacked The Associated Press's Twitter account last year to falsely report an attack on the White House, which caused the Dow Jones to drop by 150 points.

While technically not comparable to Stuxnet and its effect was only temporary -- the White House quickly refuted the reporting -- it nevertheless demonstrates the existence of a tool for shadowy organizations to influence events that did not exist before.

These recent incidents underscore both the scope and the significant differences among cyberthreats:

-- The actions by the Syrian Electronic Army did not cause a physical effect; they changed data and the content of The Associated Press's reporting.

-- The disruption at Saudi Aramco was due to the destruction of computer data, but it did not cause a physical effect either.

--Stuxnet, on the other hand, had a physical impact making Iranian uranium enrichment centrifuges spin at a rate they were not supposed to.

The DDoS attacks that appear to be happening in Ukraine right now, and the type of cyberattack that the U.S. launched against Iran that could at some point happen in some other form against Syria, raise significant moral and legal issues.

In many ways the cyberwarfare issue is akin to the issue of the use of armed drones, which greatly reduce the number of deaths that would result from a conventional armed conflict.

Whoever launches a drone attack or a cyberattack pays no costs of the kind that would typically take place on a conventional battlefield. You can't shoot down a drone pilot or kill a computer technician launching some kind of cyberattack thousands of miles from the intended target.

For this reason drones and cyber capabilities can also make conflict more likely as the barriers to entry to engage in either drone warfare or cyberconflict are so low. Moreover, there is a risk that the use of drones or cyber capabilities can escalate into a conventional armed conflict.

Similarly to the case of armed drones, the United States has had a large lead in its ability to mount effective offensive cyberattacks, but that advantage is unlikely to last. And since the United States is the only superpower and among the most technologically advanced (as well as most vulnerable), it must lead by example and harden cybersecurity at home and contribute to international agreements to govern the use of these powerful new tools.

These tools that will only get more powerful as the world becomes more connected and ever-more dependent on computers.

Follow us on Twitter @CNNOpinion.

Join us on Facebook/CNNOpinion.

ADVERTISEMENT
Part of complete coverage on
updated 9:05 AM EDT, Tue September 16, 2014
LZ Granderson says Congress has rebuked the NFL on domestic violence issue, but why not a federal judge?
updated 7:49 AM EDT, Tue September 16, 2014
Mel Robbins says the only person you can legally hit in the United States is a child. That's wrong.
updated 1:23 PM EDT, Mon September 15, 2014
Eric Liu says seeing many friends fight so hard for same-sex marriage rights made him appreciate marriage.
updated 3:38 PM EDT, Mon September 15, 2014
SEATTLE, WA - SEPTEMBER 04: NFL commissioner Roger Goodell walks the sidelines prior to the game between the Seattle Seahawks and the Green Bay Packers at CenturyLink Field on September 4, 2014 in Seattle, Washington. (Photo by Otto Greule Jr/Getty Images)
Martha Pease says the NFL commissioner shouldn't be judge and jury on player wrongdoing.
updated 9:15 AM EDT, Tue September 16, 2014
It's time for a much needed public reckoning over U.S. use of torture, argues Donald P. Gregg.
updated 8:25 AM EDT, Tue September 16, 2014
Peter Bergen says UK officials know the identity of the man who killed U.S. journalists and a British aid worker.
updated 7:28 AM EDT, Tue September 16, 2014
Joe Torre and Esta Soler say much has been achieved since a landmark anti-violence law was passed.
updated 4:55 PM EDT, Fri September 12, 2014
David Wheeler wonders: If Scotland votes to secede, can America take its place and rejoin England?
updated 8:41 AM EDT, Tue September 16, 2014
Jane Stoever: Society must grapple with a culture in which 1 in 3 teen girls and women suffer partner violence.
updated 4:36 PM EDT, Fri September 12, 2014
World-famous physicist Stephen Hawking recently said the world as we know it could be obliterated instantaneously. Meg Urry says fear not.
updated 6:11 PM EDT, Fri September 12, 2014
Bill Clinton's speech accepting the Democratic nomination for president in 1992 went through 22 drafts. But he always insisted on including a call to service.
updated 6:18 PM EDT, Fri September 12, 2014
Joe Amon asks: What turns a few cases of disease into thousands?
updated 1:21 PM EDT, Thu September 11, 2014
Sally Kohn says bombing ISIS will worsen instability in Iraq and strengthen radical ideology in terrorist groups.
updated 1:30 PM EDT, Thu September 11, 2014
Analysts weigh in on the president's plans for addressing the threat posed by the Islamic State of Iraq and Syria.
updated 9:27 AM EDT, Thu September 11, 2014
Artist Prune Nourry's project reinterprets the terracotta warriors in an exhibition about gender preference in China.
updated 9:36 AM EDT, Wed September 10, 2014
The Apple Watch is on its way. Jeff Yang asks: Are we ready to embrace wearables technology at last?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT