Can Cyberwarfare Be Regulated? | The Business Standard
Skip to main content
  • Epaper
  • Economy
    • Aviation
    • Banking
    • Bazaar
    • Budget
    • Industry
    • NBR
    • RMG
    • Corporates
  • Stocks
  • Analysis
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
The Business Standard

Tuesday
May 20, 2025

Sign In
Subscribe
  • Epaper
  • Economy
    • Aviation
    • Banking
    • Bazaar
    • Budget
    • Industry
    • NBR
    • RMG
    • Corporates
  • Stocks
  • Analysis
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
TUESDAY, MAY 20, 2025
Can Cyberwarfare Be Regulated?

Thoughts

Joseph S. Nye, Jr.
09 October, 2019, 10:20 am
Last modified: 09 October, 2019, 10:30 am

Related News

  • What role for China in Ukraine?
  • Agriculture under pressure: The Bangladesh chapter
  • Europe and China must unite against Trump’s trade assault
  • Trump's tariff chaos could reverse 80 years of economic progress
  • Gazette on 'Cyber Safety Ordinance' end of this month: Faiz

Can Cyberwarfare Be Regulated?

In the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or the same program can be used for legitimate or malicious purposes, depending on the user’s intent.

Joseph S. Nye, Jr.
09 October, 2019, 10:20 am
Last modified: 09 October, 2019, 10:30 am
Can Cyberwarfare Be Regulated?

Whether or not a conflict spirals out of control depends on the ability to understand and communicate about the scale of hostility. Unfortunately, when it comes to cyber conflict, there is no agreement on scale or how it relates to traditional military measures. What some regard as an agreed game or battle may not look the same to the other side.

A decade ago, the United States used cyber sabotage instead of bombs to destroy Iranian nuclear enrichment facilities. Iran responded with cyber attacks that destroyed 30,000 Saudi Aramco computers and disrupted American banks. This summer, following the imposition of crippling sanctions by US President Donald Trump's administration, Iran shot down an unmanned American surveillance drone. There were no casualties. Trump initially planned a missile strike in response, but canceled it at the last moment in favor of a cyber attack that destroyed a key database used by the Iranian military to target oil tankers. Again, there were costs but not casualties. Iran then carried out, directly or indirectly, a sophisticated drone and cruise missile strike against two major Saudi oil facilities. While it appears there were no or only light casualties, the attack represented a significant increase in costs and risks.

The problem of perceptions and controlling escalation is not new. In August 1914, the major European powers expected a short and sharp "Third Balkan War." The troops were expected to be home by Christmas. After the assassination of the Austrian archduke in June, Austria-Hungary wanted to give Serbia a bloody nose, and Germany gave its Austrian ally a blank check rather than see it humiliated. But when the Kaiser returned from vacation at the end of July and discovered how Austria had filled in the check, his efforts to de-escalate were too late. Nonetheless, he expected to prevail and almost did.

The Business Standard Google News Keep updated, follow The Business Standard's Google news channel

Had the Kaiser, the Czar, and the Emperor known in August 1914 that a little over four years later, all would lose their thrones and see their realms dismembered, they would not have gone to war. Since 1945, nuclear weapons have served as a crystal ball in which leaders can glimpse the catastrophe implied by a major war. After the Cuban Missile Crisis in 1962, leaders learned the importance of de-escalation, arms-control communication, and rules of the road to manage conflict.

Cyber technology, of course, lacks the clear devastating effects of nuclear weapons, and that poses a different set of problems, because there is no crystal ball. During the Cold War, the great powers avoided direct engagement, but that is not true of cyber conflict. And yet the threat of cyber Pearl Harbors has been exaggerated. Most cyber conflicts occur below the threshold established by the rules of armed conflict. They are economic and political, rather than lethal. It is not credible to threaten a nuclear response to cyber theft of intellectual property by China or cyber meddling in elections by Russia.

According to American doctrine, deterrence is not limited to a cyber response (though that is possible). The US will respond to cyberattacks across domains or sectors, with any weapons of its choice, proportional to the damage that has been done. That can range from naming and shaming to economic sanctions to kinetic weapons. Earlier this year, a new doctrine of "persistent engagement" was described as not only disrupting attacks, but also helping to reinforce deterrence. But the technical overlap between intrusion into networks to gather intelligence or disrupt attacks and to carry out offensive operations often makes it difficult to distinguish between escalation and de-escalation. Rather than relying on tacit bargaining, as proponents of "persistent engagement" sometimes emphasize, explicit communication may be necessary to limit escalation.

After all, we cannot assume that we have enough experience to understand what is an agreed competition in cyberspace or that we can be certain of how actions taken in other countries' networks will be interpreted. For example, Russian cyber meddling in US elections was not an agreed competition. With a domain as new as cyber, open rather than mere tacit communication can enlarge our limited understanding of the boundaries.

Negotiating cyber arms-control treaties is problematic, but this does not make diplomacy impossible. In the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or the same program can be used for legitimate or malicious purposes, depending on the user's intent. But if that makes traditional arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets (rather than weapons) and negotiate rough rules of the road that limit conflict.

In any event, strategic stability in cyberspace will be difficult to maintain. Because technological innovation there is faster than in the nuclear realm, cyberwarfare is characterized by a heightened reciprocal fear of surprise.

Over time, however, better attribution forensics may enhance the role of punishment; and better defenses through encryption or machine learning may increase the role of prevention and denial. Moreover, as states and organizations come to understand better the limitations and uncertainties of cyberattacks and the growing importance of Internet entanglement to their economic wellbeing, cost-benefit calculations of the utility of cyberwarfare may change.

At this point, however, the key to deterrence, conflict management, and de-escalation in the cyber realm is to acknowledge that we all still have a lot to learn and expand the process of communication among adversaries.

Joseph S. Nye, Jr. is a professor at Harvard and author of the forthcoming Do Morals Matter? Presidents and Foreign Policy from FDR to Trump.
 

Top News

Project Syndicate / Cyber Security / opinion / Millitary

Comments

While most comments will be posted if they are on-topic and not abusive, moderation decisions are subjective. Published comments are readers’ own views and The Business Standard does not endorse any of the readers’ comments.

Top Stories

  • British Prime Minister Keir Starmer speaks during a reception, following the UK-EU summit, in London, Britain, May 19, 2025. REUTERS/Hannah McKay/Pool/File Photo
    UK suspends trade talks with Israel, summons ambassador, issues sanctions over new Gaza offensive
  • A file photo of the NBR Bhaban in Agargaon, Dhaka
    NBR dissolution: Protesters say meeting with advisers not fruitful, announces sit-in programme tomorrow
  • 36 Bangladeshi trucks carrying ready-made garments were stranded at Benapole land port on Sunday. Photo: Collected
    Land port restrictions and the Kaladan project: Is bilateral trade between India and Bangladesh falling apart?

MOST VIEWED

  • Lotto inaugurates new factory to nearly triple production capacity
    Lotto inaugurates new factory to nearly triple production capacity
  • Ikramul Hasan Shakil at the Base Camp of Mount Everest. Photo: Collected from Shakil's official Facebook page
    From sea to summit: Shakil walks from Cox's Bazar to conquer Everest
  • Illustration: Collected
    Unemployment rate hits historic high, rises to 4.63% as 27.4 lakh now jobless
  • Representational image
    Govt plans to scrap reduced tax benefits for textile sector
  • Saleh Uddin Ahmed. Sketch: TBS
    Large depositors in troubled banks to be offered shares, bonds: Salehuddin
  • The Chattogram Custom House building in Chattogram. File Photo: Collected
    Ctg custom house pen-down strike continues for 5th day

Related News

  • What role for China in Ukraine?
  • Agriculture under pressure: The Bangladesh chapter
  • Europe and China must unite against Trump’s trade assault
  • Trump's tariff chaos could reverse 80 years of economic progress
  • Gazette on 'Cyber Safety Ordinance' end of this month: Faiz

Features

Fired by US aid cuts, driven by courage: A female driver steering through uncertainty

Fired by US aid cuts, driven by courage: A female driver steering through uncertainty

6h | Features
Photo: TBS

How Shahbagh became the focal point of protests — and public suffering

1d | Panorama
PHOTO: Collected

Helmet Hunt: Top 5 half-face helmets that meet international safety standards

2d | Wheels
Photo: Collected

Simple accessories to extend the life of your luggage

2d | Brands

More Videos from TBS

How is China the 'winner' of the India-Pakistan conflict?

How is China the 'winner' of the India-Pakistan conflict?

56m | Others
Why ADP implementation rate lowest in education and health sectors?

Why ADP implementation rate lowest in education and health sectors?

1h | Podcast
Chief Advisor's meeting with the chief of Armed Forces

Chief Advisor's meeting with the chief of Armed Forces

2h | TBS Today
News of The Day, 20 MAY 2025

News of The Day, 20 MAY 2025

3h | TBS News of the day
EMAIL US
contact@tbsnews.net
FOLLOW US
WHATSAPP
+880 1847416158
The Business Standard
  • About Us
  • Contact us
  • Sitemap
  • Advertisement
  • Privacy Policy
  • Comment Policy
Copyright © 2025
The Business Standard All rights reserved
Technical Partner: RSI Lab

Contact Us

The Business Standard

Main Office -4/A, Eskaton Garden, Dhaka- 1000

Phone: +8801847 416158 - 59

Send Opinion articles to - oped.tbs@gmail.com

For advertisement- sales@tbsnews.net