It’s not just about China and America—smaller countries want to wage cyberwar too


America’s Department of Defense yesterday released its annual report on China’s military capabilities (pdf). The report includes “electronic warfare” and “information dominance” as part of a larger campaign it says is an “essential element, if not a fundamental prerequisite” of China’s defense planning.

The report is good PR for China’s cyberwarriors but there is nothing surprising about the country’s ambitions. America itself is relatively open about its cyberwarfare activities. The US air force recently designated six bits of code as “weapons” so it could squeeze some more funding out of the defense budget. And the most widely known instance of cyberwarfare, Stuxnet, is a computer virus with not one, not two, but five “zero-day exploits,” as attacks on previously undiscovered vulnerabilities are knowns. Stuxnet was hailed as such a success that its authors, America and Israel, gleefully ensured that the whole world knew who was behind it.

Some researchers doubt the effectiveness of Stuxnet. That seems almost immaterial. Where the wide publicity given to Chinese attacks ensures a bogeyman, the success of Stuxnet—and the low cost of developing such weapons—has become a model for other countries to follow.

For example, here is what the British Intelligence and Security Committee’s latest annual report (pdf) had to say about cyberwar: “While attacks in cyberspace represent a significant threat to the UK, and defending against them must be a priority, we believe that there are also significant opportunities for our intelligence and security agencies.”

The committee’s recommended actions included accessing enemy networks to obtain intelligence without detection, destruction of data, and “disruption,” which it describes as accessing the “networks or systems of others to hamper their activities or capabilities without detection (or at least without attribution).” It cited Stuxnet as an example.

France is the latest to hop on to the bandwagon. A white paper submitted to the president by a committee on defence and security last week outlined the need for “la capacité informatique offensive” (pdf in French). There are few national security agencies that haven’t outlined something similar (pdf) to their governments.

A milder form of cyberwar is fighting crime online. But this too requires many of the same techniques and involves the same extra-territorial incursions. The Dutch ministry of security and justice said last week that it is seeking new legislation to allow police to break into computers, which would make it a crime to refuse to share passwords with the law. In this, the Dutch could argue they are merely fulfilling their commitments to the Convention on Cybercrime, which practically requires (pdf) such laws.

While the convention encourages international cooperation and allows unilateral access to data in other countries, negotiators were unable to agree on the extent of that access. Reaching into an American server and destroying or stealing private data without the consent of the owner is frowned upon. Yet that is the right the Dutch are seeking, since many services, such as Gmail, now lie beyond their jurisdiction. Even for those countries that aren’t yet building full-blown cyberwarfare capabilities, there are only couple of steps that lie between snooping and spying, and between spying and sabotage.

As published on http://qz.com/81997/its-not-just-about-china-and-america-smaller-countries-want-to-wage-cyberwar-too/

Unknown's avatar

About Shailendra Nair

AI Generalist & Executive Tech Leader in Insurance & Benefits Tech. Driving growth, trust, and resilience from AIG to Marsh McLennan. I am an AI Generalist and Executive Technology Leader with a career dedicated to reimagining how insurance and benefits ecosystems work in a digital first world. My expertise spans Insurance & Benefits Tech, digital transformation, and cybersecurity, with a proven ability to turn technology into both a growth engine and a resilience enabler. I have worked with global leaders such as PepsiCo, Allianz, AIG, and Marsh McLennan, experiences that gave me a rare mix of perspectives across insurance carriers, broking, and benefits advisory. This combination allows me to design solutions that balance global standards, local compliance, and client expectations while driving measurable business value. My strength lies in full stack insurance technology leadership, covering Property & Casualty, Life, and Benefits. I bring hands-on expertise in infrastructure, cloud, security, and enterprise architecture, combined with data platforms, AI automation, and digital ecosystems. Having led across this spectrum, I can translate complex technology into practical outcomes that deliver trust, scale, and innovation. As an AI Generalist, I focus on impact: • Building automation first operations that scale efficiently. • Designing chatbots and intelligent assistants to empower employees and clients. • Deploying AI-driven QA frameworks to improve speed and accuracy. • Exploring agentic AI roles to support compliance and transformation. My philosophy is simple: technology should reduce friction, inspire confidence, and accelerate growth. I design platforms that enhance sales, revenue, and client stickiness, proving that tech can directly enable business outcomes. At the same time, I remain deeply client centric a solution enabler who thinks out of the box to solve real challenges and deliver measurable ROI. 🌍 What excites me most is reimagining benefits ecosystems for the future of work. Employees demand seamless digital first experiences, organizations need efficiency, and regulators require trust and security. My mission is to build ecosystems that are secure, resilient, innovative, and human focused.
This entry was posted in Technology and tagged , . Bookmark the permalink.

Kindly leave your feedback or suggestions