PL EN
REVIEW PAPER
NATO IN THE NEW STRATEGIC ENVIRONMENT: CYBER ATTACKS NOW COVERED BY ARTICLE 5 OF THE NORTH ATLANTIC TREATY
 
More details
Hide details
1
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego w Warszawie
 
 
Publication date: 2014-12-05
 
 
SBN 2014;6(2): 397-418
 
KEYWORDS
ABSTRACT
The greatest change ever in the defence policy and military strategy of the North Atlantic Treaty Organisation occurred in 2014 in response to a series of major cyber attacks against NATO member states and partner states - Estonia in 2007, the United States and Georgia in 2008, and others in later years - and to a general transformation of the security environment in which cyberwar and other threats to cybersecurity gain rapidly in importance. At the 2014 Wales Summit, NATO recognised that cyber defence is part of its central task of collective defence and that Article 5 of the North Atlantic Treaty - ”The Parties agree that an armed attack against one or more of them in Europe or North America shall be considered an attack against them all . . .” - can be invoked in the case of cyber attacks. This statement is the first and only expansion of the meaning of Article 5 and the first and only addition of a new type of warfare to the policy and strategy of NATO. After the change, the Alliance must face new challenges not less urgent and difficult than the old ones of kinetic warfare or weapons of mass destruction. This article addresses the broadest strategic context of the change. An analysis is made in the light of the global strategic thought and of the development of warfare through history. By entering the new strategic space of cyber warfare, NATO proves itself to be among the world’s most modern and advanced powers while, at the same time, it returns to the ancient - and lasting - tenet of strategy: information is not inferior to force. This way the Alliance moves away from Carl von Clausewitz and closer to Sun Zi. The recognition of cyberspace as a strategic space also corresponds to another influential idea in the heritage of strategy: the concept of the ”great common” the control of which is the key to the power over the world and over war and peace worldwide. Alfred Thayer Mahan considered the global ocean to be the ”great common” crossed by vital trade routes and by navies competing for superiority. Now cyberspace is as open, vital and fragile as the maritime space was in Mahan’s vision. Cyberwar also creates a promise and a temptation of a decisive strike - the first and last strike in a war - circumventing all military defences and paralysing the enemy country. It is a new version - less lethal or not, dependent on the tactics of cyber attacks in a cyber offensive - of the idea of strategic bombing and of the entire concept of air power, especially by its visionary Giulio Douhet, and then of nuclear strategy. Finally, the article provides two practical recommendations regarding the policy and structure of the North Atlantic Alliance in unfolding new era. Now NATO needs a speedy follow-on to the breakthrough decision of the Wales Summit. Cyber defence should be fully integrated into the next Strategic Concept which is expected in or around 2020 but could be worked out sooner because of the accelerating transition of the security environment. NATO should also consider establishing a global Cyber Command to maintain the initiative and to assure the credibility of the enlarged meaning of Article 5 of the North Atlantic Treaty. This credibility will be immediately, continuously and comprehensively tested by many players of the global game.
 
REFERENCES (34)
1.
R. Buchan, “Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?”, Journal of Conflict and Security Law, (Oxford, UK: Oxford University Press), Vol. 17, Issue 2 (Summer 2012).
 
2.
S.J. Cimbala, Nuclear Weapons in the Information Age, New York: Continuum International Publishing Group, 2012.
 
3.
C. von Clausewitz, On War, Edited and Translated by Michael Howard and Peter Paret, Princeton, NJ: Princeton University Press, 1984.
 
4.
E. A. Cohen, “Technology and Warfare”, In Strategy in the Contemporary World: An Introduction to Strategic Studies, Edited by John Baylis, James J. Wirtz, and C.S. Gray, 4th Edition, Oxford, UK: Oxford University Press, 2013.
 
5.
Cyberpower and National Security, Edited by F.D. Kramer, S.H. Starr, and L.K. Wentz, Washington, DC: National Defense University Press; Potomac Books, 2009.
 
6.
Cyberwar, Netwar and the Revolution in Military Affairs Edited by E. Halpin, P. Trevorrow, D. Webb, and S. Wright, Houndmills, Basingstoke, Hampshire, UK: Palgrave Macmillan, 2006.
 
7.
Cyberwar and Information Warfare Edited by Daniel Ventre, London: ISTE, 2011.
 
8.
C.C. Demchak, Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security, Athens, GA: University of Georgia Press, 2011.
 
9.
H.H. Dinniss, Cyber Warfare and the Laws of War, New York: Cambridge University Press, 2012.
 
10.
G. Douhet, The Command of the Air, Translated by D. Ferrari, Washington, DC: Office of Air Force History, 1983.
 
11.
L. Freedman, The Evolution of Nuclear Strategy, 3rd Edition, Houndmills, Basingstoke, Hampshire, UK: Palgrave Macmillan, 2003.
 
12.
W.T. Hagestad, 21st century Chinese Cyberwarfare: An Examination of the Chinese Cyberthreat from Fundamentals of Communist Policy Regarding Information Warfare through the Broad Range of Military, Civilian and Commercially Supported Cyberattack Threat Vectors, Ely, Cambridgeshire, UK: IT Governance Publishing, 2012.
 
13.
L.J. Janczewski and A.M. Colarik (Editors), Cyber Warfare and Cyber Terrorism, Hershey, PA: IGI Global, 2007.
 
14.
L. Kello. “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft”, International Security, Vol. 38, No. 2 (Fall 2013).
 
15.
G. Kostrzewa-Zorbas, “A Plan for NATO: Central Europe Indistinguishable from Western Europe”, Aspen Review Central Europe (Prague, Czech Republic), No. 2/2014.
 
16.
A. Kott, C. Wang, and R.F. Erbacher (Editors), Cyber Defense and Situational Awareness, New York, NY: Springer Science+Business Media, 2014.
 
17.
M.C. Libicki, Conquest in Cyberspace: National Security and Information Warfare, New York: Cambridge University Press, 2007.
 
18.
M.C. Libicki, Cyberdeterrence and Cyberwar Santa Monica, CA: RAND Corporation, 2009.
 
19.
A.T. Mahan, The Influence of Sea Power Upon History, 1660–1783, New York: Dover Publications, 1987.
 
20.
National Cyber Security Framework Manual Edited by A. Klimburg, Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence, 2012.
 
21.
NATO Strategy Documents 1949–1969. Edited by Dr. G.W. Pedlow, Chief, Historical Office, Supreme Headquarters Allied Powers Europe, in Collaboration with NATO International Staff Central Archives. [Brussels: North Atlantic Treaty Organisation, 1997.].
 
22.
M.E. O’Connell, “Cyber Security without Cyber War”, Journal of Conflict and Security Law (Oxford, UK: Oxford University Press), Vol. 17, Issue 2 (Summer 2012).
 
23.
W.A. Owens, K.W. Dam, and H.S. Lin (Editors), Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, National Research Council of the National Academies, Washington, DC: National Academies Press, 2009.
 
24.
C. Paul, I.R. Porche, and E. Axelband, The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces, Santa Monica, CA: RAND Corporation, 2014.
 
25.
D.S. Reveron (Editor), Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World, Washington, DC: Georgetown University Press, 2012.
 
26.
J. Rivera, “A Theory of Cyberwarfare”, Georgetown Security Studies Review, Vol. 2, No. 2 (June 2014).
 
27.
N. Robinson, A. Walczak, S.-C. Brune, A. Esterle, P. Rodriguez, it Stocktaking Study of Military Cyber Defence Capabilities in the European Union (milCyberCAP): Unclassified Summary Santa Monica, CA: RAND Corporation, 2013.
 
28.
M. Roscini, Cyber Operations and the Use of Force in International Law, Oxford, UK: Oxford University Press, 2014.
 
29.
S.D. Sagan and K.N. Waltz The Spread of Nuclear Weapons: An Enduring Debate, 3rd Edition, New York: W.W. Norton, 2013.
 
30.
J.B. Sheldon, “The Rise of Cyberpower”, In Strategy in the Contemporary World: An Introduction to Strategic Studies, Edited by J. Baylis, J.J. Wirtz, and C.S. Gray, 4th Edition, Oxford, UK: Oxford University Press, 2013.
 
31.
Sun Tsu [Sun Zi], The Art of War, Translated and with an Introduction by S.B. Griffith. London: Oxford University Press, 1963.
 
32.
Tallinn Manual on the International Law Applicable to Cyber Warfare Prepared by the International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence General Editor M.N. Schmitt, Cambridge, UK: Cambridge University Press, 2013.
 
33.
N. Tsagourias, “Cyber Attacks, Self-defence and the Problem of Attribution”, Journal of Conflict and Security Law (Oxford, UK: Oxford University Press), Vol. 17, Issue 2 (Summer 2012).
 
34.
J.A. Warden, The Air Campaign: Planning for Combat, Revised Edition. San Jose, CA: to Excel, 1998.
 
ISSN:2082-2677
Journals System - logo
Scroll to top