How cyberattacks threaten real-world peace - Guy-Philippe Goldstein
[Music]
[Music]
[Music]
[Music]
hello <00:00:16.120>If <00:00:16.640>you <00:00:17.160>have <00:00:17.680>followed
hello If you have followed
hello If you have followed
diplomatic <00:00:18.440>news <00:00:18.800>a <00:00:19.160>little <00:00:19.520>in
diplomatic news a little in
diplomatic news a little in
recent <00:00:20.180>weeks <00:00:20.440>you <00:00:20.700>may <00:00:20.960>have
recent weeks you may have
recent weeks you may have
heard <00:00:21.623>about <00:00:21.887>a <00:00:22.151>kind <00:00:22.415>of <00:00:22.679>crisis
heard about a kind of crisis
heard about a kind of crisis
between <00:00:23.432>China <00:00:23.784>and <00:00:24.136>the <00:00:24.488>United <00:00:24.840>States
between China and the United States
between China and the United States
over <00:00:25.335>a <00:00:25.631>computer <00:00:25.927>attack <00:00:26.223>of <00:00:26.519>which
over a computer attack of which
over a computer attack of which
the <00:00:27.080>American <00:00:27.440>company <00:00:27.800>Google <00:00:28.160>would
the American company Google would
the American company Google would
have <00:00:28.559>been <00:00:28.718>the <00:00:28.877>victim, <00:00:29.036>we <00:00:29.195>said <00:00:29.354>a <00:00:29.513>lot <00:00:29.672>of
have been the victim, we said a lot of
have been the victim, we said a lot of
things <00:00:29.967>around <00:00:30.175>that, <00:00:30.383>we <00:00:30.591>talked <00:00:30.799>about
things around that, we talked about
things around that, we talked about
cyberwar <00:00:31.119>for <00:00:31.358>what <00:00:31.597>is <00:00:31.836>perhaps <00:00:32.075>probably
cyberwar for what is perhaps probably
cyberwar for what is perhaps probably
just <00:00:33.840>a
just a
just a
spying <00:00:34.586>operation <00:00:35.052>and, <00:00:35.518>moreover,
spying operation and, moreover,
spying operation and, moreover,
relatively
relatively
relatively
clumsy <00:00:37.880>evidence, <00:00:38.560>nevertheless <00:00:39.240>this <00:00:39.920>episode <00:00:40.600>reveals
clumsy evidence, nevertheless this episode reveals
clumsy evidence, nevertheless this episode reveals
the <00:00:41.439>growing <00:00:41.799>anxiety <00:00:42.159>in <00:00:42.519>the
the growing anxiety in the
the growing anxiety in the
Western <00:00:43.133>world <00:00:43.506>over <00:00:43.879>the <00:00:44.252>emergence <00:00:44.625>of <00:00:44.998>these
Western world over the emergence of these
Western world over the emergence of these
cyber <00:00:45.720>weapons, <00:00:46.240>but <00:00:46.760>these <00:00:47.280>weapons <00:00:47.800>are
cyber weapons, but these weapons are
cyber weapons, but these weapons are
dangerous, <00:00:48.380>they <00:00:48.840>are <00:00:49.300>of <00:00:49.760>a
dangerous, they are of a
dangerous, they are of a
new <00:00:50.486>nature <00:00:50.852>and <00:00:51.218>they <00:00:51.584>risk <00:00:51.950>dragging <00:00:52.316>the
new nature and they risk dragging the
new nature and they risk dragging the
world <00:00:52.791>into <00:00:53.183>an <00:00:53.575>electronic <00:00:53.967>conflict <00:00:54.359>which
world into an electronic conflict which
world into an electronic conflict which
could <00:00:54.973>turn <00:00:55.346>into <00:00:55.719>an
could turn into an
could turn into an
armed <00:00:56.607>confrontation <00:00:57.015>because <00:00:57.423>these <00:00:57.831>virtual <00:00:58.239>weapons
armed confrontation because these virtual weapons
armed confrontation because these virtual weapons
also <00:00:59.200>destroy <00:00:59.480>the
also destroy the
also destroy the
physical <00:01:01.180>world <00:01:01.680>in
physical world in
physical world in
1982 <00:01:02.889>at <00:01:03.219>the <00:01:03.549>heart <00:01:03.879>of <00:01:04.209>the <00:01:04.539>cold <00:01:04.869>war <00:01:05.199>in
1982 at the heart of the cold war in
1982 at the heart of the cold war in
Soviet <00:01:06.149>Siberia <00:01:06.779>a <00:01:07.409>pipeline <00:01:08.039>explodes
Soviet Siberia a pipeline explodes
Soviet Siberia a pipeline explodes
with <00:01:08.953>a <00:01:09.226>detonation <00:01:09.499>of <00:01:09.772>3 <00:01:10.045>K <00:01:10.318>ton
with a detonation of 3 K ton
with a detonation of 3 K ton
the <00:01:11.167>equivalent <00:01:11.414>of <00:01:11.661>a/4 <00:01:11.908>of <00:01:12.155>the
the equivalent of a/4 of the
the equivalent of a/4 of the
Hiroshima <00:01:12.624>bomb <00:01:12.848>but <00:01:13.072>we <00:01:13.296>know <00:01:13.520>it
Hiroshima bomb but we know it
Hiroshima bomb but we know it
today <00:01:13.976>Today <00:01:14.232>it <00:01:14.488>was <00:01:14.744>revealed <00:01:15.000>by
today Today it was revealed by
today Today it was revealed by
former <00:01:15.455>Secretary <00:01:15.791>of <00:01:16.127>the <00:01:16.463>Force <00:01:16.799>Ronald
former Secretary of the Force Ronald
former Secretary of the Force Ronald
Rean <00:01:17.579>Thomas <00:01:18.039>Reed <00:01:18.499>that <00:01:18.959>the <00:01:19.419>explosion <00:01:19.879>was
Rean Thomas Reed that the explosion was
Rean Thomas Reed that the explosion was
actually <00:01:20.339>the <00:01:20.718>result <00:01:21.097>of <00:01:21.476>a
actually the result of a
actually the result of a
CIA <00:01:21.914>sabotage <00:01:22.228>operation <00:01:22.542>which <00:01:22.856>had <00:01:23.170>at <00:01:23.484>the <00:01:23.798>time
CIA sabotage operation which had at the time
CIA sabotage operation which had at the time
managed <00:01:24.813>to <00:01:25.386>infiltrate <00:01:25.959>the
managed to infiltrate the
managed to infiltrate the
computer <00:01:26.679>systems <00:01:26.958>of <00:01:27.237>management <00:01:27.516>of <00:01:27.795>this <00:01:28.074>pipeline
computer systems of management of this pipeline
computer systems of management of this pipeline
more <00:01:29.280>recently
more recently
more recently
the <00:01:30.775>American <00:01:31.190>government <00:01:31.605>revealed <00:01:32.020>that <00:01:32.435>in
the American government revealed that in
the American government revealed that in
September <00:01:33.231>2008 <00:01:33.663>more <00:01:34.095>than <00:01:34.527>3 <00:01:34.959>million
September 2008 more than 3 million
September 2008 more than 3 million
inhabitants <00:01:35.560>of <00:01:35.840>the <00:01:36.120>state <00:01:36.400>of <00:01:36.680>Spirito <00:01:36.960>Santo
inhabitants of the state of Spirito Santo
inhabitants of the state of Spirito Santo
Brazil <00:01:38.119>were <00:01:38.759>plunged <00:01:39.399>into
Brazil were plunged into
Brazil were plunged into
darkness <00:01:41.359>victims <00:01:42.639>of
darkness victims of
darkness victims of
cyberpiracy <00:01:44.480>blackmail <00:01:45.000>finally <00:01:45.520>more <00:01:46.040>worrying <00:01:46.560>again
cyberpiracy blackmail finally more worrying again
cyberpiracy blackmail finally more worrying again
for <00:01:47.183>the <00:01:47.607>Americans <00:01:48.031>in <00:01:48.455>December <00:01:48.879>2008
for the Americans in December 2008
for the Americans in December 2008
it <00:01:49.765>is <00:01:50.051>the <00:01:50.337>holy <00:01:50.623>of <00:01:50.909>all <00:01:51.195>the
it is the holy of all the
it is the holy of all the
sencom <00:01:52.050>computer <00:01:52.460>system <00:01:52.870>the <00:01:53.280>central
sencom computer system the central
sencom computer system the central
command <00:01:54.170>which <00:01:54.460>today <00:01:54.750>pilots <00:01:55.040>the
command which today pilots the
command which today pilots the
wars <00:01:55.519>in <00:01:55.879>Iraq <00:01:56.239>and <00:01:56.599>Afghanistan <00:01:56.959>which <00:01:57.319>has
wars in Iraq and Afghanistan which has
wars in Iraq and Afghanistan which has
been <00:01:58.030>infiltrated <00:01:58.420>by <00:01:58.810>hackers <00:01:59.200>it
been infiltrated by hackers it
been infiltrated by hackers it
would <00:02:00.625>have <00:02:01.091>used <00:02:01.557>this <00:02:02.023>simple <00:02:02.489>keys <00:02:02.955>USB
would have used this simple keys USB
would have used this simple keys USB
but <00:02:03.690>trapped <00:02:03.981>and <00:02:04.272>thanks <00:02:04.563>to <00:02:04.854>these <00:02:05.145>keys <00:02:05.436>they
but trapped and thanks to these keys they
but trapped and thanks to these keys they
would <00:02:05.759>have <00:02:05.918>been <00:02:06.077>able <00:02:06.236>to <00:02:06.395>break
would have been able to break
would have been able to break
into <00:02:07.189>these <00:02:07.498>computer <00:02:07.807>systems <00:02:08.116>to
into these computer systems to
into these computer systems to
see <00:02:08.507>everything, <00:02:08.695>hear <00:02:08.883>everything <00:02:09.071>and <00:02:09.259>perhaps <00:02:09.447>even <00:02:09.635>to
see everything, hear everything and perhaps even to
see everything, hear everything and perhaps even to
trap <00:02:10.106>some <00:02:10.453>of <00:02:10.800>these
trap some of these
trap some of these
systems <00:02:12.039>so <00:02:12.479>the <00:02:12.919>Americans <00:02:13.359>take <00:02:13.799>it
systems so the Americans take it
systems so the Americans take it
very <00:02:14.430>seriously <00:02:14.740>I <00:02:15.050>quote <00:02:15.360>General
very seriously I quote General
very seriously I quote General
James <00:02:16.046>here <00:02:16.292>because <00:02:16.538>who <00:02:16.784>is <00:02:17.030>vice-chairman <00:02:17.276>of
James here because who is vice-chairman of
James here because who is vice-chairman of
the <00:02:17.595>general <00:02:17.830>staff <00:02:18.065>in <00:02:18.300>the <00:02:18.535>United <00:02:18.770>States <00:02:19.005>and <00:02:19.240>who <00:02:19.475>says
the general staff in the United States and who says
the general staff in the United States and who says
in <00:02:19.975>a <00:02:20.351>report <00:02:20.727>to <00:02:21.103>Congress <00:02:21.479>that
in a report to Congress that
in a report to Congress that
cyberattacks <00:02:22.560>could <00:02:23.000>be <00:02:23.440>as
cyberattacks could be as
cyberattacks could be as
powerful <00:02:24.146>as <00:02:24.492>weapons <00:02:24.838>of
powerful as weapons of
powerful as weapons of
mass <00:02:25.736>destruction <00:02:26.072>and <00:02:26.408>moreover <00:02:26.744>the <00:02:27.080>Americans
mass destruction and moreover the Americans
mass destruction and moreover the Americans
have <00:02:27.712>decided <00:02:27.905>to <00:02:28.098>devote <00:02:28.291>more <00:02:28.484>than <00:02:28.677>30
have decided to devote more than 30
have decided to devote more than 30
billion <00:02:29.293>dollars <00:02:29.546>in <00:02:29.799>the <00:02:30.052>next <00:02:30.305>5 <00:02:30.558>years
billion dollars in the next 5 years
billion dollars in the next 5 years
to <00:02:31.639>build <00:02:32.598>their
to build their
to build their
cyber <00:02:33.650>warfare <00:02:33.940>capacity <00:02:34.230>and <00:02:34.520>across <00:02:34.810>the <00:02:35.100>world <00:02:35.390>we <00:02:35.680>are
cyber warfare capacity and across the world we are
cyber warfare capacity and across the world we are
witnessing <00:02:36.249>today <00:02:36.619>a <00:02:36.989>sort <00:02:37.359>of
witnessing today a sort of
witnessing today a sort of
cyber <00:02:38.626>arms <00:02:39.332>race <00:02:40.038>with
cyber arms race with
cyber arms race with
cyber <00:02:40.646>warfare <00:02:40.932>units <00:02:41.218>which <00:02:41.504>are <00:02:41.790>built <00:02:42.076>by
cyber warfare units which are built by
cyber warfare units which are built by
countries <00:02:42.600>like <00:02:43.000>North <00:02:43.400>Korea <00:02:43.800>or <00:02:44.200>even
countries like North Korea or even
countries like North Korea or even
Iran <00:02:44.780>but <00:02:45.200>what <00:02:45.620>you <00:02:46.040>will
Iran but what you will
Iran but what you will
never <00:02:46.855>hear <00:02:47.191>from <00:02:47.527>speakers <00:02:47.863>from <00:02:48.199>the
never hear from speakers from the
never hear from speakers from the
Pentagon <00:02:48.713>or <00:02:49.026>the <00:02:49.339>French <00:02:49.652>Ministry <00:02:49.965>of <00:02:50.278>Defense
Pentagon or the French Ministry of Defense
Pentagon or the French Ministry of Defense
is <00:02:51.250>that <00:02:51.780>the <00:02:52.310>problem <00:02:52.840>is
is that the problem is
is that the problem is
not <00:02:53.607>necessarily <00:02:54.055>who <00:02:54.503>the <00:02:54.951>adversary <00:02:55.399>is
not necessarily who the adversary is
not necessarily who the adversary is
but <00:02:56.444>rather <00:02:56.929>the <00:02:57.414>nature <00:02:57.899>itself <00:02:58.384>of <00:02:58.869>CC <00:02:59.354>and
but rather the nature itself of CC and
but rather the nature itself of CC and
to <00:02:59.979>understand <00:03:00.158>it <00:03:00.337>we <00:03:00.516>must <00:03:00.695>see <00:03:00.874>how
to understand it we must see how
to understand it we must see how
over <00:03:02.159>the <00:03:03.159>ages
over the ages
over the ages
military <00:03:04.132>technologies <00:03:04.465>have <00:03:04.798>succeeded <00:03:05.131>in <00:03:05.464>making <00:03:05.797>or
military technologies have succeeded in making or
military technologies have succeeded in making or
breaking <00:03:06.410>the <00:03:06.820>peace <00:03:07.230>of <00:03:07.640>the <00:03:08.050>world <00:03:08.460>for <00:03:08.870>example <00:03:09.280>if
breaking the peace of the world for example if
breaking the peace of the world for example if
we <00:03:09.805>had <00:03:09.970>been <00:03:10.135>lucky <00:03:10.300>enough <00:03:10.465>to <00:03:10.630>have <00:03:10.795>TEDx
we had been lucky enough to have TEDx
we had been lucky enough to have TEDx
Paris <00:03:11.771>350 <00:03:12.102>years <00:03:12.433>ago <00:03:12.764>we <00:03:13.095>would <00:03:13.426>have <00:03:13.757>talked
Paris 350 years ago we would have talked
Paris 350 years ago we would have talked
about <00:03:14.313>the <00:03:14.626>military <00:03:14.939>innovation <00:03:15.252>of <00:03:15.565>the <00:03:15.878>moment
about the military innovation of the moment
about the military innovation of the moment
namely <00:03:17.099>the <00:03:18.158>massive
namely the massive
namely the massive
Boban <00:03:18.880>style <00:03:19.400>fortifications <00:03:19.920>and <00:03:20.440>we <00:03:20.960>could <00:03:21.480>have <00:03:22.000>predicted
Boban style fortifications and we could have predicted
Boban style fortifications and we could have predicted
an <00:03:22.820>era <00:03:23.080>of <00:03:23.340>stability <00:03:23.600>in <00:03:23.860>the <00:03:24.120>world <00:03:24.380>or <00:03:24.640>in
an era of stability in the world or in
an era of stability in the world or in
Europe <00:03:24.980>which <00:03:25.200>was <00:03:25.420>the <00:03:25.640>case <00:03:25.860>elsewhere <00:03:26.080>in
Europe which was the case elsewhere in
Europe which was the case elsewhere in
Europe <00:03:26.720>between <00:03:27.240>1650 <00:03:27.760>and
Europe between 1650 and
Europe between 1650 and
1750
1750
1750
if <00:03:30.616>similarly <00:03:31.032>we <00:03:31.448>had <00:03:31.864>had <00:03:32.280>this
if similarly we had had this
if similarly we had had this
conference <00:03:32.685>30 <00:03:32.931>or <00:03:33.177>40 <00:03:33.423>years <00:03:33.669>ago <00:03:33.915>we
conference 30 or 40 years ago we
conference 30 or 40 years ago we
would <00:03:34.280>have <00:03:34.520>been <00:03:34.760>able <00:03:35.000>to <00:03:35.240>see <00:03:35.480>how <00:03:35.720>the <00:03:35.960>advent <00:03:36.200>of
would have been able to see how the advent of
would have been able to see how the advent of
nuclear <00:03:36.951>weapons <00:03:37.542>and <00:03:38.133>the <00:03:38.724>threat <00:03:39.315>of
nuclear weapons and the threat of
nuclear weapons and the threat of
mutually <00:03:39.779>assured <00:03:40.119>destruction <00:03:40.459>that <00:03:40.799>they
mutually assured destruction that they
mutually assured destruction that they
carry <00:03:41.583>prevents <00:03:42.007>a <00:03:42.431>direct <00:03:42.855>conflict <00:03:43.279>between
carry prevents a direct conflict between
carry prevents a direct conflict between
the <00:03:43.879>two
the two
the two
superpowers. <00:03:45.219>On <00:03:45.518>the <00:03:45.817>other <00:03:46.116>hand, <00:03:46.415>if <00:03:46.714>we <00:03:47.013>had <00:03:47.312>had
superpowers. On the other hand, if we had had
superpowers. On the other hand, if we had had
this <00:03:47.742>conference <00:03:48.004>60 <00:03:48.266>years <00:03:48.528>ago <00:03:48.790>we <00:03:49.052>would <00:03:49.314>have
this conference 60 years ago we would have
this conference 60 years ago we would have
was <00:03:49.793>able <00:03:50.067>to <00:03:50.341>see <00:03:50.615>how <00:03:50.889>the <00:03:51.163>emergence <00:03:51.437>of
was able to see how the emergence of
was able to see how the emergence of
armored <00:03:52.030>forces <00:03:52.420>and <00:03:52.810>air <00:03:53.200>forces
armored forces and air forces
armored forces and air forces
which <00:03:54.319>gives <00:03:54.598>the <00:03:54.877>advantage <00:03:55.156>to
which gives the advantage to
which gives the advantage to
the <00:03:56.351>offensive <00:03:56.823>gives <00:03:57.295>credibility <00:03:57.767>to <00:03:58.239>the
the offensive gives credibility to the
the offensive gives credibility to the
doctrine <00:03:58.612>of <00:03:58.905>the <00:03:59.198>Blitz <00:03:59.491>and <00:03:59.784>therefore <00:04:00.077>the
doctrine of the Blitz and therefore the
doctrine of the Blitz and therefore the
possibility <00:04:00.553>of <00:04:00.906>a <00:04:01.259>war <00:04:01.612>in <00:04:01.965>Europe <00:04:02.318>therefore
possibility of a war in Europe therefore
possibility of a war in Europe therefore
military <00:04:03.059>technologies <00:04:03.599>are
military technologies are
military technologies are
capable <00:04:04.040>of <00:04:04.320>influencing <00:04:04.600>on <00:04:04.880>the <00:04:05.160>course <00:04:05.440>of <00:04:05.720>the
capable of influencing on the course of the
capable of influencing on the course of the
world <00:04:06.075>to <00:04:06.310>make <00:04:06.545>or <00:04:06.780>break <00:04:07.015>the <00:04:07.250>peace <00:04:07.485>of <00:04:07.720>the
world to make or break the peace of the
world to make or break the peace of the
world <00:04:08.105>and <00:04:08.411>that <00:04:08.717>is <00:04:09.023>the <00:04:09.329>problem <00:04:09.635>with
world and that is the problem with
world and that is the problem with
cyberweapons <00:04:11.066>first <00:04:11.732>problem <00:04:12.398>imagine
cyberweapons first problem imagine
cyberweapons first problem imagine
that <00:04:13.326>a <00:04:13.612>potential <00:04:13.898>adversary <00:04:14.184>announces <00:04:14.470>that <00:04:14.756>it
that a potential adversary announces that it
that a potential adversary announces that it
is <00:04:15.439>building <00:04:15.838>a <00:04:16.237>new
is building a new
is building a new
cyberwar <00:04:17.053>capability <00:04:17.546>but <00:04:18.039>only
cyberwar capability but only
cyberwar capability but only
for <00:04:18.570>the <00:04:18.781>defenses <00:04:18.992>of <00:04:19.203>its <00:04:19.414>country <00:04:19.625>very <00:04:19.836>well
for the defenses of its country very well
for the defenses of its country very well
but <00:04:20.448>what <00:04:20.896>distinguishes <00:04:21.344>it <00:04:21.792>from <00:04:22.240>a
but what distinguishes it from a
but what distinguishes it from a
unit <00:04:23.000>for
unit for
unit for
attack <00:04:24.400>and <00:04:24.800>the <00:04:25.200>problem <00:04:25.600>is <00:04:26.000>all <00:04:26.400>the <00:04:26.800>more
attack and the problem is all the more
attack and the problem is all the more
increased <00:04:27.320>when <00:04:27.640>the <00:04:27.960>doctrines
increased when the doctrines
increased when the doctrines
of <00:04:29.019>use <00:04:29.598>become <00:04:30.177>very <00:04:30.756>vague
of use become very vague
of use become very vague
still <00:04:31.085>3 <00:04:31.330>years <00:04:31.575>ago <00:04:31.820>the <00:04:32.065>United <00:04:32.310>States <00:04:32.555>of <00:04:32.800>America
still 3 years ago the United States of America
still 3 years ago the United States of America
and <00:04:33.672>France <00:04:34.064>both <00:04:34.456>said <00:04:34.848>that <00:04:35.240>they
and France both said that they
and France both said that they
invested <00:04:35.933>militarily <00:04:36.346>in <00:04:36.759>cyberspace
invested militarily in cyberspace
invested militarily in cyberspace
solely <00:04:37.999>for <00:04:38.359>the <00:04:38.719>defense <00:04:39.079>of <00:04:39.439>their
solely for the defense of their
solely for the defense of their
computer <00:04:40.252>system <00:04:40.865>but <00:04:41.478>today
computer system but today
computer system but today
these <00:04:42.733>two <00:04:43.026>countries <00:04:43.319>both <00:04:43.612>say <00:04:43.905>that <00:04:44.198>the
these two countries both say that the
these two countries both say that the
best <00:04:44.792>defense <00:04:45.264>is <00:04:45.736>attack <00:04:46.208>and <00:04:46.680>in
best defense is attack and in
best defense is attack and in
this <00:04:47.186>they <00:04:47.492>are <00:04:47.798>only <00:04:48.104>joining <00:04:48.410>the <00:04:48.716>China
this they are only joining the China
this they are only joining the China
that <00:04:49.383>for <00:04:49.766>15 <00:04:50.149>years <00:04:50.532>now <00:04:50.915>a
that for 15 years now a
that for 15 years now a
doctrine <00:04:51.799>of <00:04:52.559>both
doctrine of both
doctrine of both
defensive <00:04:53.879>but <00:04:54.478>also
defensive but also
defensive but also
offensive <00:04:56.209>use <00:04:56.738>of <00:04:57.267>the <00:04:57.796>problem <00:04:58.325>your <00:04:58.854>country <00:04:59.383>AG <00:04:59.912>by
offensive use of the problem your country AG by
offensive use of the problem your country AG by
a <00:05:00.391>cyber <00:05:00.702>attack <00:05:01.013>of <00:05:01.324>entire <00:05:01.635>regions
a cyber attack of entire regions
a cyber attack of entire regions
plunged <00:05:02.560>into <00:05:02.960>the <00:05:03.360>most
plunged into the most
plunged into the most
complete <00:05:03.754>darkness <00:05:03.988>and <00:05:04.222>well <00:05:04.456>it <00:05:04.690>is <00:05:04.924>possible <00:05:05.158>that
complete darkness and well it is possible that
complete darkness and well it is possible that
you <00:05:05.553>ignore <00:05:05.866>the <00:05:06.179>very <00:05:06.492>identity <00:05:06.805>of <00:05:07.118>the
you ignore the very identity of the
you ignore the very identity of the
attacker <00:05:07.933>cybersames <00:05:08.586>have <00:05:09.239>this
attacker cybersames have this
attacker cybersames have this
particular <00:05:09.952>Ceel <00:05:10.184>that <00:05:10.416>they <00:05:10.648>can <00:05:10.880>be
particular Ceel that they can be
particular Ceel that they can be
used <00:05:11.433>without <00:05:11.786>leaving <00:05:12.139>a <00:05:12.492>trace <00:05:12.845>and <00:05:13.198>this
used without leaving a trace and this
used without leaving a trace and this
gives <00:05:14.090>a <00:05:14.580>considerable <00:05:15.070>advantage <00:05:15.560>to
gives a considerable advantage to
gives a considerable advantage to
the <00:05:15.936>attack <00:05:16.192>because <00:05:16.448>the <00:05:16.704>party <00:05:16.960>defending
the attack because the party defending
the attack because the party defending
does <00:05:17.686>not <00:05:18.012>know <00:05:18.338>against <00:05:18.664>who <00:05:18.990>retaliated <00:05:19.316>and
does not know against who retaliated and
does not know against who retaliated and
if <00:05:19.768>he <00:05:19.976>retaliated <00:05:20.184>against <00:05:20.392>the <00:05:20.600>wrong
if he retaliated against the wrong
if he retaliated against the wrong
adversary <00:05:21.430>and <00:05:21.900>well <00:05:22.370>it <00:05:22.840>risks
adversary and well it risks
adversary and well it risks
making <00:05:23.295>an <00:05:23.671>additional <00:05:24.047>enemy <00:05:24.423>and <00:05:24.799>being
making an additional enemy and being
making an additional enemy and being
diplomatically <00:05:25.552>isolated <00:05:25.944>this <00:05:26.336>is <00:05:26.728>not <00:05:27.120>a
diplomatically isolated this is not a
diplomatically isolated this is not a
theoretical <00:05:27.704>problem <00:05:28.168>in <00:05:28.632>May <00:05:29.096>2007 <00:05:29.560>Estonia
theoretical problem in May 2007 Estonia
theoretical problem in May 2007 Estonia
was <00:05:30.427>the <00:05:30.655>victim <00:05:30.883>of <00:05:31.111>a <00:05:31.339>cyber <00:05:31.567>attack <00:05:31.795>which
was the victim of a cyber attack which
was the victim of a cyber attack which
damaged <00:05:32.546>its <00:05:33.092>communication <00:05:33.638>system
damaged its communication system
damaged its communication system
and <00:05:35.010>its <00:05:35.460>banking <00:05:35.910>system <00:05:36.360>Estonia
and its banking system Estonia
and its banking system Estonia
accused <00:05:36.855>Russia <00:05:37.231>but <00:05:37.607>the <00:05:37.983>time <00:05:38.359>which
accused Russia but the time which
accused Russia but the time which
defends <00:05:38.887>Estonia <00:05:39.135>the <00:05:39.383>time <00:05:39.631>she <00:05:39.879>was
defends Estonia the time she was
defends Estonia the time she was
very <00:05:40.679>cautious <00:05:41.358>why <00:05:42.037>because
very cautious why because
very cautious why because
the <00:05:42.406>time <00:05:42.692>could <00:05:42.978>not <00:05:43.264>be <00:05:43.550>100% <00:05:43.836>sure
the time could not be 100% sure
the time could not be 100% sure
that <00:05:44.920>behind <00:05:45.280>these <00:05:45.640>attacks <00:05:46.000>was
that behind these attacks was
that behind these attacks was
actually <00:05:46.663>hiding <00:05:46.847>the <00:05:47.031>hand <00:05:47.215>of <00:05:47.399>the
actually hiding the hand of the
actually hiding the hand of the
kemmelin <00:05:48.948>so <00:05:49.336>to <00:05:49.724>summarize <00:05:50.112>on <00:05:50.500>the <00:05:50.888>one <00:05:51.276>hand
kemmelin so to summarize on the one hand
kemmelin so to summarize on the one hand
when <00:05:51.989>a <00:05:52.499>potential <00:05:53.009>adversary <00:05:53.519>announces
when a potential adversary announces
when a potential adversary announces
that <00:05:54.085>it <00:05:54.251>is <00:05:54.417>developing <00:05:54.583>a <00:05:54.749>cyberwar <00:05:54.915>unit
that it is developing a cyberwar unit
that it is developing a cyberwar unit
although <00:05:55.665>we <00:05:55.810>do <00:05:55.955>not <00:05:56.100>know <00:05:56.245>if <00:05:56.390>it <00:05:56.535>is <00:05:56.680>to
although we do not know if it is to
although we do not know if it is to
prepare <00:05:57.011>the <00:05:57.222>attack <00:05:57.433>or <00:05:57.644>if <00:05:57.855>it <00:05:58.066>is <00:05:58.277>to
prepare the attack or if it is to
prepare the attack or if it is to
defend <00:05:58.499>itself <00:05:58.638>and <00:05:58.777>on <00:05:58.916>the <00:05:59.055>other <00:05:59.194>hand
defend itself and on the other hand
defend itself and on the other hand
we <00:06:00.544>know <00:06:00.808>that <00:06:01.072>these <00:06:01.336>weapons <00:06:01.600>give
we know that these weapons give
we know that these weapons give
the <00:06:02.304>advantage <00:06:02.728>to <00:06:03.152>attack <00:06:03.576>in <00:06:04.000>an
the advantage to attack in an
the advantage to attack in an
important <00:06:05.039>1978 <00:06:05.558>paper, <00:06:06.077>Professor <00:06:06.596>Robert
important 1978 paper, Professor Robert
important 1978 paper, Professor Robert
JIS <00:06:07.407>of <00:06:07.854>Colombia <00:06:08.301>University <00:06:08.748>New <00:06:09.195>York
JIS of Colombia University New York
JIS of Colombia University New York
described <00:06:09.632>a <00:06:09.864>model <00:06:10.096>for <00:06:10.328>understanding <00:06:10.560>how
described a model for understanding how
described a model for understanding how
conflicts <00:06:11.279>can <00:06:11.639>emerge
conflicts can emerge
conflicts can emerge
in <00:06:13.048>an <00:06:13.736>environment <00:06:14.424>where <00:06:15.112>we <00:06:15.800>do
in an environment where we do
in an environment where we do
not <00:06:16.224>know <00:06:16.488>whether <00:06:16.752>the <00:06:17.016>potential <00:06:17.280>enemy
not know whether the potential enemy
not know whether the potential enemy
is <00:06:18.354>preparing <00:06:18.748>defense <00:06:19.142>or <00:06:19.536>the <00:06:19.930>attack <00:06:20.324>and <00:06:20.718>if
is preparing defense or the attack and if
is preparing defense or the attack and if
the <00:06:21.257>weapons <00:06:21.554>give <00:06:21.851>the <00:06:22.148>advantage <00:06:22.445>to <00:06:22.742>the <00:06:23.039>attack
the weapons give the advantage to the attack
the weapons give the advantage to the attack
well <00:06:23.953>this <00:06:24.186>environment <00:06:24.419>is <00:06:24.652>the <00:06:24.885>one <00:06:25.118>which
well this environment is the one which
well this environment is the one which
is <00:06:25.625>the <00:06:26.051>most <00:06:26.477>likely <00:06:26.903>to <00:06:27.329>trigger <00:06:27.755>a
is the most likely to trigger a
is the most likely to trigger a
conflict <00:06:28.294>and <00:06:28.549>it <00:06:28.804>is <00:06:29.059>an <00:06:29.314>environment <00:06:29.569>which <00:06:29.824>is <00:06:30.079>being
conflict and it is an environment which is being
conflict and it is an environment which is being
created <00:06:30.660>today <00:06:31.040>by <00:06:31.420>the <00:06:31.800>cyarmes
created today by the cyarmes
created today by the cyarmes
and <00:06:33.191>historically <00:06:33.582>it <00:06:33.973>is <00:06:34.364>the <00:06:34.755>environment
and historically it is the environment
and historically it is the environment
of <00:06:36.034>Europe <00:06:36.309>on <00:06:36.584>the <00:06:36.859>eve <00:06:37.134>of <00:06:37.409>the <00:06:37.684>First <00:06:37.959>World
of Europe on the eve of the First World
of Europe on the eve of the First World
War
War
War
the <00:06:40.609>cy <00:06:41.418>by <00:06:42.227>nature <00:06:43.036>are
the cy by nature are
the cy by nature are
dangerous <00:06:43.671>but <00:06:44.143>in <00:06:44.615>addition <00:06:45.087>are <00:06:45.559>emerging
dangerous but in addition are emerging
dangerous but in addition are emerging
today <00:06:46.679>much <00:06:47.039>more
today much more
today much more
unstable <00:06:48.846>Cold <00:06:49.332>laer <00:06:49.818>well <00:06:50.304>the <00:06:50.790>War <00:06:51.276>I
unstable Cold laer well the War I
unstable Cold laer well the War I
very <00:06:51.894>hard <00:06:52.309>but <00:06:52.724>a <00:06:53.139>I <00:06:53.554>real <00:06:53.969>of <00:06:54.384>players <00:06:54.799>P
very hard but a I real of players P
very hard but a I real of players P
have <00:06:55.456>a <00:06:55.792>form <00:06:56.128>of <00:06:56.464>coordination <00:06:56.800>between
have a form of coordination between
have a form of coordination between
the <00:06:57.199>two
the two
the two
supers <00:06:58.895>today <00:06:59.390>we <00:06:59.885>are <00:07:00.380>entering <00:07:00.875>a
supers today we are entering a
supers today we are entering a
multipolar <00:07:01.519>world <00:07:02.038>coordination
multipolar world coordination
multipolar world coordination
becomes <00:07:02.919>much <00:07:03.239>more <00:07:03.559>complicated <00:07:03.879>we
becomes much more complicated we
becomes much more complicated we
have <00:07:04.359>also <00:07:04.679>seen <00:07:04.999>it <00:07:05.319>with
have also seen it with
have also seen it with
Copenhagen <00:07:06.870>and <00:07:07.340>this <00:07:07.810>coordination <00:07:08.280>risks
Copenhagen and this coordination risks
Copenhagen and this coordination risks
becoming <00:07:08.930>even <00:07:09.340>more <00:07:09.750>difficult <00:07:10.160>to
becoming even more difficult to
becoming even more difficult to
achieve <00:07:10.519>with <00:07:10.758>the <00:07:10.997>introduction <00:07:11.236>of <00:07:11.475>desers
achieve with the introduction of desers
achieve with the introduction of desers
weapons <00:07:12.719>why <00:07:12.959>because <00:07:13.199>quite <00:07:13.439>simply
weapons why because quite simply
weapons why because quite simply
a <00:07:14.580>nation <00:07:14.880>will <00:07:15.180>not <00:07:15.480>know <00:07:15.780>for <00:07:16.080>sure <00:07:16.380>whether <00:07:16.680>or
a nation will not know for sure whether or
a nation will not know for sure whether or
not <00:07:17.096>its <00:07:17.392>neighbor <00:07:17.688>is <00:07:17.984>about <00:07:18.280>to
not its neighbor is about to
not its neighbor is about to
attack <00:07:19.049>it <00:07:19.578>and <00:07:20.107>nations <00:07:20.636>risk
attack it and nations risk
attack it and nations risk
living <00:07:20.953>under <00:07:21.186>the <00:07:21.419>threat <00:07:21.652>of <00:07:21.885>what <00:07:22.118>the
living under the threat of what the
living under the threat of what the
Nobel <00:07:23.000>Prize-winning <00:07:23.600>economist <00:07:24.200>Thomasing <00:07:24.800>called
Nobel Prize-winning economist Thomasing called
Nobel Prize-winning economist Thomasing called
reciprocal <00:07:25.335>fear <00:07:25.631>of <00:07:25.927>the <00:07:26.223>surprise <00:07:26.519>attack
reciprocal fear of the surprise attack
reciprocal fear of the surprise attack
as <00:07:27.267>I <00:07:27.495>don't <00:07:27.723>know <00:07:27.951>if <00:07:28.179>my <00:07:28.407>neighbor <00:07:28.635>is
as I don't know if my neighbor is
as I don't know if my neighbor is
about <00:07:29.079>to <00:07:29.399>attack <00:07:29.719>me <00:07:30.039>and
about to attack me and
about to attack me and
maybe <00:07:30.712>I <00:07:31.064>will <00:07:31.416>never <00:07:31.768>know <00:07:32.120>and
maybe I will never know and
maybe I will never know and
well <00:07:32.711>maybe <00:07:32.943>I <00:07:33.175>will <00:07:33.407>take <00:07:33.639>the
well maybe I will take the
well maybe I will take the
lead <00:07:34.303>and <00:07:34.727>be <00:07:35.151>the <00:07:35.575>first <00:07:35.999>to
lead and be the first to
lead and be the first to
attack <00:07:37.229>not <00:07:37.738>later <00:07:38.247>this <00:07:38.756>week
attack not later this week
attack not later this week
in <00:07:39.905>a <00:07:40.611>January <00:07:41.317>26,
in a January 26,
in a January 26,
2010 <00:07:41.976>New <00:07:42.313>York <00:07:42.650>Times <00:07:42.987>article <00:07:43.324>it <00:07:43.661>was <00:07:43.998>revealed
2010 New York Times article it was revealed
2010 New York Times article it was revealed
for <00:07:44.663>the <00:07:44.966>first <00:07:45.269>time <00:07:45.572>that <00:07:45.875>officials
for the first time that officials
for the first time that officials
at <00:07:46.656>the <00:07:46.912>National <00:07:47.168>Security <00:07:47.424>Agency <00:07:47.680>were
at the National Security Agency were
at the National Security Agency were
mulling <00:07:49.240>the <00:07:49.800>possibility
mulling the possibility
mulling the possibility
of a
of a
of a
preemptive <00:07:52.091>attack <00:07:52.462>in <00:07:52.833>the <00:07:53.204>event <00:07:53.575>that <00:07:53.946>America <00:07:54.317>was
preemptive attack in the event that America was
preemptive attack in the event that America was
the <00:07:55.099>point <00:07:55.439>of <00:07:55.779>being <00:07:56.119>attacked <00:07:56.459>by <00:07:56.799>a
the point of being attacked by a
the point of being attacked by a
cyberattack <00:07:58.039>and <00:07:58.558>these <00:07:59.077>preemptive <00:07:59.596>attacks
cyberattack and these preemptive attacks
cyberattack and these preemptive attacks
risk <00:08:00.839>not <00:08:01.479>remaining <00:08:02.119>strictly
risk not remaining strictly
risk not remaining strictly
in <00:08:02.799>the <00:08:02.959>domain <00:08:03.119>of
in the domain of
in the domain of
cyberspace <00:08:05.859>in <00:08:06.519>May
cyberspace in May
cyberspace in May
2009 <00:08:08.199>General <00:08:08.958>Kevin <00:08:09.717>Chilton <00:08:10.476>commander
2009 General Kevin Chilton commander
2009 General Kevin Chilton commander
of <00:08:11.089>the <00:08:11.218>American <00:08:11.347>nuclear <00:08:11.476>forces
of the American nuclear forces
of the American nuclear forces
announced <00:08:13.630>that <00:08:14.540>in <00:08:15.450>the <00:08:16.360>event
announced that in the event
announced that in the event
of <00:08:16.886>an <00:08:17.092>electronic <00:08:17.298>attack <00:08:17.504>against <00:08:17.710>the <00:08:17.916>America
of an electronic attack against the America
of an electronic attack against the America
all <00:08:19.056>options <00:08:19.392>were <00:08:19.728>on <00:08:20.064>the <00:08:20.400>table,
all options were on the table,
all options were on the table,
cber <00:08:21.399>armament <00:08:21.919>does <00:08:22.439>not <00:08:22.959>make
cber armament does not make
cber armament does not make
conventional <00:08:24.239>armament <00:08:24.879>or
conventional armament or
conventional armament or
nuclear <00:08:25.696>armament <00:08:26.073>disappear, <00:08:26.450>it <00:08:26.827>only <00:08:27.204>adds <00:08:27.581>to <00:08:27.958>the
nuclear armament disappear, it only adds to the
nuclear armament disappear, it only adds to the
already <00:08:28.860>existing <00:08:29.320>system <00:08:29.780>of <00:08:30.240>terror
already existing system of terror
already existing system of terror
but <00:08:31.159>in <00:08:31.439>doing <00:08:31.719>so <00:08:31.999>it <00:08:32.279>adds <00:08:32.559>its <00:08:32.839>own
but in doing so it adds its own
but in doing so it adds its own
risk <00:08:33.650>of <00:08:34.060>triggering <00:08:34.470>a <00:08:34.880>conflict.
risk of triggering a conflict.
risk of triggering a conflict.
very <00:08:35.211>significant <00:08:35.422>risk <00:08:35.633>as <00:08:35.844>we <00:08:36.055>are <00:08:36.266>going <00:08:36.477>to
very significant risk as we are going to
very significant risk as we are going to
see <00:08:36.839>and <00:08:37.079>a <00:08:37.319>risk <00:08:37.559>that <00:08:37.799>we <00:08:38.039>will
see and a risk that we will
see and a risk that we will
perhaps <00:08:38.775>have <00:08:39.151>to <00:08:39.527>confront <00:08:39.903>with <00:08:40.279>a
perhaps have to confront with a
perhaps have to confront with a
collective <00:08:41.519>security <00:08:42.398>solution <00:08:43.277>including
collective security solution including
collective security solution including
all <00:08:43.872>of <00:08:44.225>us <00:08:44.578>obviously <00:08:44.931>European <00:08:45.284>allies <00:08:45.637>members
all of us obviously European allies members
all of us obviously European allies members
of <00:08:46.245>NATO <00:08:46.490>with <00:08:46.735>our <00:08:46.980>American <00:08:47.225>allies <00:08:47.470>and <00:08:47.715>friends
of NATO with our American allies and friends
of NATO with our American allies and friends
with <00:08:49.259>our <00:08:50.239>other
with our other
with our other
Western <00:08:50.793>allies <00:08:50.986>and <00:08:51.179>perhaps <00:08:51.372>by <00:08:51.565>forcing <00:08:51.758>their
Western allies and perhaps by forcing their
Western allies and perhaps by forcing their
hand <00:08:52.390>a <00:08:52.700>little <00:08:53.010>bit, <00:08:53.320>our
hand a little bit, our
hand a little bit, our
Russian <00:08:54.053>partners <00:08:54.346>and <00:08:54.639>our <00:08:54.932>Chinese <00:08:55.225>partners <00:08:55.518>because
Russian partners and our Chinese partners because
Russian partners and our Chinese partners because
the <00:08:56.186>information <00:08:56.612>technologies <00:08:57.038>that
the information technologies that
the information technologies that
Joë <00:08:57.621>de <00:08:57.843>Renet <00:08:58.065>spoke <00:08:58.287>about <00:08:58.509>and <00:08:58.731>which <00:08:58.953>are
Joë de Renet spoke about and which are
Joë de Renet spoke about and which are
historically <00:08:59.879>military <00:09:00.359>research,
historically military research,
historically military research,
are <00:09:02.023>today <00:09:02.366>on <00:09:02.709>the <00:09:03.052>verge <00:09:03.395>of
are today on the verge of
are today on the verge of
developing <00:09:04.090>an <00:09:04.620>offensive <00:09:05.150>capacity <00:09:05.680>for
developing an offensive capacity for
developing an offensive capacity for
destruction <00:09:06.659>who <00:09:07.039>could <00:09:07.419>tomorrow <00:09:07.799>if <00:09:08.179>we <00:09:08.559>are
destruction who could tomorrow if we are
destruction who could tomorrow if we are
not <00:09:09.224>careful <00:09:09.728>bring <00:09:10.232>down <00:09:10.736>and <00:09:11.240>destroy
not careful bring down and destroy
not careful bring down and destroy
the <00:09:11.919>peace <00:09:12.118>of <00:09:12.317>the <00:09:12.516>world
the peace of the world
the peace of the world
[Music]
[Music]
[Music]
[Applause]
[Applause]
[Applause]
[Music]
thank you
Guy-Philippe Goldstein, TED, TEDx, TEDxParis, cyberattack, internet, peace, violence, cyberwarfare