• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Tech

Cyber warfare: Regional nuisances may become global threats

By
Peter Suciu
Peter Suciu
Down Arrow Button Icon
By
Peter Suciu
Peter Suciu
Down Arrow Button Icon
October 3, 2015, 2:24 PM ET
144634736
Cyber WarHiroshi Watanabe Getty Images

While the Cold War never turned hot between the major world powers, throughout Asia there were a number of border disputes and other regional small wars. For instance, India and Pakistan engaged in several border disputes, and China engaged both India and the Soviet Union in similar small wars. Cooler heads prevailed and major conflicts were avoided. But these small conflicts continue, in the 21st century. Only instead of shells flying across a border, the battlefront has moved online.

Last year, a full-blown hacking war erupted between India and Pakistan, with groups on each side defacing websites belonging to organizations in their rival nation. It was a brief cyber war, with the websites of the Press Club of India (PCI) and the Pakistan People’s Party (PPP) getting hacked. “We’re seeing this as a common form of attack,” says Martin Libicki, senior management scientist with the RAND Corp. “This is a relatively easy attack to carry off, and the cost in terms of damage isn’t very large.” But as it continues to develop, cyber warfare has the potential to cause a lot more harm than mischief and nuisance.

Cyber warfare has become an extension of traditional small war politics. In most cases it isn’t meant to cause physical or even economic damage but is one that is more of mass annoyance or mass distraction. Outside the economic harm it caused, the alleged North Korean cyber attack on Sony is an example of how it fits into the mass annoyance category.

But there are cases where these attacks have had more damaging results. In March 2013, a bank and three South Korean TV stations were victims of an attack also believed to have been carried out by North Korea. The attacks actually froze computer terminals and shut down ATMs and mobile payment services. In total more than 50,000 servers across South Korea were taken offline in the attack – costing as much as $800 million. Similar attacks also occurred there in 2009 and 2011.

In Dec. 2014, North Korea was also accused of a cyber attack on South Korea’s Korea Hydro and Nuclear Power Co Ltd. That attack didn’t cause physical damage but it may have been conducted to gain plant blueprints and test data.

“These are two cases—the attack in 2013 and the one in 2014—where it was more than embarrassment,” Libicki says. “But the latter is also an extension of cyber warfare as espionage, which is largely used by everyone today.”

As noted by the documents leaked by Edward Snowden, countries spy on one another all the time—and this includes allies spying on each other. But most security breaches are likely kept quiet to avoid the embarrassment that comes along with it. Still, these “friendly” security breaches can put people in harm’s way. For instance, government operatives, as in spies or sources, can be compromised through these kinds of breaches.

“There is very likely the possibility that someone could be put in danger if they are compromised,” says Bryce Boland, CTO of cyber security firm FireEye. “Intelligence gathering through a cyber attack could unmask operatives and that could lead to people being physically at risk.”

But it’s not just state-sponsored spies being put at risk by cyber warfare. According to a FireEye report released early this year, the volume of attacks involving the theft of corporate data has increased dramatically, and China has been suspected of cyber attacks that have targeted not only government agencies but also corporate entities and even journalists. The attacks reportedly began as early as 2005 and may have targeted businesses all over Southeast Asia, including India, Indonesia, Malaysia, Nepal, the Philippines, Singapore, Thailand and Vietnam. Chinese companies, which are closely tied to the government in Beijing, may have sought out intellectual property and other sensitive data from their regional competitors.

“It has become part of the doctrine by certain countries as how they project power,” says Boland.

There has been backlash from these attacks, but it hasn’t been much different than how trade negotiations have been handled for many years. Basically some Chinese companies including Huawei, Lenovo (LNVGY) and ZTE Corp (ZTCOY) have been blacklisted by western governments. The “Five Eyes,” which encompasses the intelligence agencies of Australia, Canada, Great Britain, New Zealand and the United States, instituted policies in recent years that ban computers or other devices from these companies being used on secure networks.

Likewise, regionally, India and other nations have instituted similar bans on the use of Chinese devices. “We are seeing that notable Chinese companies aren’t trusted by western or even regional governments,” explains Boland.

From website hacking to trade embargoes, this demonstrates the very real concern that actions in cyberspace can escalate quickly and have real world consequences, possibly spilling into the safety and welfare of civilians. Libicki suggests that thus far “we haven’t really seen where something can get that out of control, but it could happen.”

With the possibility that a cyber attack could lead to real world damage, there is the question of what will be the “proportional response” that the President has promised?

Boland thinks it is just a matter of time before we see the waters being tested, but he cautions that such an attack is more likely to come from a group acting not for a nation state but potentially an insurgent group. In other words, if cyber warfare is being used behind the scenes in border wars, what would happen if a force without borders started in?

“Cyber terrorism is the greater fear for loss of life at this point,” he notes. “Where a group affiliated with ISIS could conduct a cyber attack that results in the loss of life.”

About the Author
By Peter Suciu
See full bioRight Arrow Button Icon

Latest in Tech

Chess master and co-founder of Chess.com, Danny Rensch
SuccessEntrepreneurs
Chess.com cofounder says it took a pinch of delusion to bring the traditional game online—and it’s a ‘requirement for every successful entrepreneur’
By Emma BurleighDecember 14, 2025
4 hours ago
JPMorganChase CEO Jamie Dimon says AI will eliminate jobs—and that soft skills will be more important than ever.
Future of WorkTech
Jamie Dimon says soft skills like emotional intelligence and communication are vital as AI eliminates roles
By Nino PaoliDecember 14, 2025
6 hours ago
AIchief executive officer (CEO)
Microsoft AI boss Suleyman opens up about his peers and calls Elon Musk a ‘bulldozer’ with ‘superhuman capabilities to bend reality to his will’
By Jason MaDecember 13, 2025
16 hours ago
InvestingStock
There have been head fakes before, but this time may be different as the latest stock rotation out of AI is just getting started, analysts say
By Jason MaDecember 13, 2025
21 hours ago
Politicsdavid sacks
Can there be competency without conflict in Washington?
By Alyson ShontellDecember 13, 2025
21 hours ago
InnovationRobots
Even in Silicon Valley, skepticism looms over robots, while ‘China has certainly a lot more momentum on humanoids’
By Matt O'Brien and The Associated PressDecember 13, 2025
23 hours ago

Most Popular

placeholder alt text
Economy
Tariffs are taxes and they were used to finance the federal government until the 1913 income tax. A top economist breaks it down
By Kent JonesDecember 12, 2025
2 days ago
placeholder alt text
Success
Apple cofounder Ronald Wayne sold his 10% stake for $800 in 1976—today it’d be worth up to $400 billion
By Preston ForeDecember 12, 2025
2 days ago
placeholder alt text
Success
40% of Stanford undergrads receive disability accommodations—but it’s become a college-wide phenomenon as Gen Z try to succeed in the current climate
By Preston ForeDecember 12, 2025
2 days ago
placeholder alt text
Economy
The Fed just ‘Trump-proofed’ itself with a unanimous move to preempt a potential leadership shake-up
By Jason MaDecember 12, 2025
2 days ago
placeholder alt text
Success
Apple CEO Tim Cook out-earns the average American’s salary in just 7 hours—to put that into context, he could buy a new $439,000 home in just 2 days
By Emma BurleighDecember 12, 2025
2 days ago
placeholder alt text
Uncategorized
Transforming customer support through intelligent AI operations
By Lauren ChomiukNovember 26, 2025
18 days ago
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.