ABOUT THE SPEAKER
Guy-Philippe Goldstein - Author
Guy-Philippe Goldstein is the author of Babel Minute Zero, a novel that examines the reality of cyberwar in our current geopolitical topography.

Why you should listen

By day, Guy-Philippe Goldstein is a management consultant. At night, he writes gripping political thrillers treating of cyberwar. He's a graduate of France’s prestigious Hautes Études Commerciales, and has an MBA from Northwestern University. Babel Minute Zero is his first novel.

More profile about the speaker
Guy-Philippe Goldstein | Speaker | TED.com
TEDxParis 2010

Guy-Philippe Goldstein: How cyberattacks threaten real-world peace

Filmed:
558,059 views

Nations can now attack other nations with cyber weapons: silent strikes on another country's computer systems, power grids, dams that leave no trace behind. (Think of the Stuxnet worm.) Guy-Philippe Goldstein shows how cyberattacks can leap between the digital and physical worlds to prompt armed conflict -- and how we might avert this global security hazard.
- Author
Guy-Philippe Goldstein is the author of Babel Minute Zero, a novel that examines the reality of cyberwar in our current geopolitical topography. Full bio

Double-click the English transcript below to play the video.

00:15
Good afternoon.
0
0
1000
00:16
If you have followed
1
1000
2000
00:18
diplomatic news in the past weeks,
2
3000
2000
00:20
you may have heard of a kind of crisis
3
5000
2000
00:22
between China and the U.S.
4
7000
2000
00:24
regarding cyberattacks
5
9000
2000
00:26
against the American company Google.
6
11000
2000
00:28
Many things have been said about this.
7
13000
2000
00:30
Some people have called a cyberwar
8
15000
2000
00:32
what may actually be
9
17000
2000
00:34
just a spy operation --
10
19000
2000
00:36
and obviously, a quite mishandled one.
11
21000
2000
00:38
However, this episode reveals
12
23000
3000
00:41
the growing anxiety in the Western world
13
26000
2000
00:43
regarding these emerging cyber weapons.
14
28000
3000
00:46
It so happens that these weapons are dangerous.
15
31000
2000
00:48
They're of a new nature:
16
33000
2000
00:50
they could lead the world
17
35000
2000
00:52
into a digital conflict
18
37000
2000
00:54
that could turn into an armed struggle.
19
39000
2000
00:56
These virtual weapons can also destroy the physical world.
20
41000
4000
01:01
In 1982, in the middle of the Cold War
21
46000
3000
01:04
in Soviet Siberia,
22
49000
2000
01:06
a pipeline exploded with a burst of 3 kilotons,
23
51000
4000
01:10
the equivalent of a fourth of the Hiroshima bomb.
24
55000
2000
01:12
Now we know today -- this was revealed
25
57000
2000
01:14
by Thomas Reed,
26
59000
2000
01:16
Ronald Reagan's former U.S. Air Force Secretary --
27
61000
2000
01:18
this explosion was actually the result
28
63000
3000
01:21
of a CIA sabotage operation,
29
66000
2000
01:23
in which they had managed
30
68000
2000
01:25
to infiltrate the IT management systems
31
70000
2000
01:27
of that pipeline.
32
72000
2000
01:29
More recently, the U.S. government revealed
33
74000
3000
01:32
that in September 2008, more than 3 million people
34
77000
3000
01:35
in the state of Espirito Santo in Brazil
35
80000
3000
01:38
were plunged into darkness,
36
83000
2000
01:40
victims of a blackmail operation from cyber pirates.
37
85000
5000
01:45
Even more worrying for the Americans,
38
90000
2000
01:47
in December 2008 the holiest of holies,
39
92000
3000
01:50
the IT systems of CENTCOM,
40
95000
2000
01:52
the central command
41
97000
2000
01:54
managing the wars in Iraq and Afghanistan,
42
99000
3000
01:57
may have been infiltrated by hackers
43
102000
2000
01:59
who used these:
44
104000
3000
02:02
plain but infected USB keys.
45
107000
2000
02:04
And with these keys, they may have been able
46
109000
2000
02:06
to get inside CENTCOM's systems,
47
111000
2000
02:08
to see and hear everything,
48
113000
2000
02:10
and maybe even infect some of them.
49
115000
2000
02:12
As a result, the Americans take the threat very seriously.
50
117000
2000
02:14
I'll quote General James Cartwright,
51
119000
2000
02:16
Vice Chairman of the Joint Chiefs of Staff,
52
121000
2000
02:18
who says in a report to Congress
53
123000
2000
02:20
that cyberattacks could be as powerful as
54
125000
3000
02:23
weapons of mass destruction.
55
128000
3000
02:26
Moreover, the Americans have decided
56
131000
2000
02:28
to spend over 30 billion dollars
57
133000
2000
02:30
in the next five years
58
135000
1500
02:32
to build up their cyberwar capabilities.
59
136500
1500
02:34
And across the world today, we see
60
139000
2000
02:36
a sort of cyber arms race,
61
141000
3000
02:39
with cyberwar units
62
144000
2000
02:41
built up by countries like North Korea
63
146000
2000
02:43
or even Iran.
64
148000
1000
02:44
Yet, what you'll never hear
65
149000
2000
02:46
from spokespeople
66
151000
2000
02:48
from the Pentagon or the French Department of Defence
67
153000
3000
02:51
is that the question isn't really
68
156000
2000
02:53
who's the enemy, but actually
69
158000
2000
02:55
the very nature of cyber weapons.
70
160000
3000
02:58
And to understand why, we must look at how,
71
163000
2000
03:00
through the ages, military technologies
72
165000
3000
03:03
have maintained or destroyed
73
168000
2000
03:05
world peace.
74
170000
2000
03:08
For example,
75
173000
2000
03:10
if we'd had TEDxParis
76
175000
1000
03:11
350 years ago,
77
176000
2000
03:13
we would have talked about the military innovation of the day --
78
178000
3000
03:16
the massive Vauban-style fortifications --
79
181000
3000
03:19
and we could have predicted
80
184000
2000
03:21
a period of stability in the world or in Europe.
81
186000
3000
03:24
which was indeed the case in Europe
82
189000
3000
03:27
between 1650 and 1750.
83
192000
2000
03:29
Similarly, if we'd had this talk
84
194000
3000
03:32
30 or 40 years ago, we would have seen
85
197000
3000
03:35
how the rise of nuclear weapons,
86
200000
2000
03:37
and the threat of mutually assured destruction they imply,
87
202000
4000
03:41
prevents a direct fight between the two superpowers.
88
206000
3000
03:45
However, if we'd had this talk 60 years ago,
89
210000
2000
03:47
we would have seen how the emergence
90
212000
3000
03:50
of new aircraft and tank technologies,
91
215000
3000
03:53
which give the advantage to the attacker,
92
218000
3000
03:56
make the Blitzkrieg doctrine very credible
93
221000
3000
03:59
and thus create the possibility of war in Europe.
94
224000
3000
04:02
So military technologies
95
227000
2000
04:04
can influence the course of the world,
96
229000
2000
04:06
can make or break world peace --
97
231000
2000
04:08
and there lies the issue with cyber weapons.
98
233000
2000
04:10
The first issue:
99
235000
2000
04:12
Imagine a potential enemy announcing
100
237000
3000
04:15
they're building a cyberwar unit,
101
240000
2000
04:17
but only for their country's defense.
102
242000
2000
04:19
Okay, but what distinguishes it
103
244000
3000
04:22
from an offensive unit?
104
247000
2000
04:24
It gets even more complicated
105
249000
2000
04:26
when the doctrines of use become ambiguous.
106
251000
4000
04:30
Just 3 years ago, both the U.S. and France
107
255000
4000
04:34
were saying they were investing militarily in cyberspace,
108
259000
4000
04:38
strictly to defend their IT systems.
109
263000
2000
04:41
But today both countries say
110
266000
3000
04:44
the best defense is to attack.
111
269000
2000
04:46
And so, they're joining China,
112
271000
2000
04:48
whose doctrine of use for 15 years has been
113
273000
4000
04:52
both defensive and offensive.
114
277000
3000
04:55
The second issue:
115
280000
2000
04:57
Your country could be under cyberattack
116
282000
4000
05:01
with entire regions plunged into total darkness,
117
286000
3000
05:04
and you may not even know
118
289000
2000
05:06
who's attacking you.
119
291000
2000
05:08
Cyber weapons have this peculiar feature:
120
293000
1800
05:10
they can be used
121
294800
1500
05:12
without leaving traces.
122
296300
1700
05:13
This gives a tremendous advantage to the attacker,
123
298000
2000
05:15
because the defender
124
300000
2000
05:17
doesn't know who to fight back against.
125
302000
2000
05:19
And if the defender retaliates against the wrong adversary,
126
304000
2000
05:21
they risk making one more enemy
127
306000
3000
05:24
and ending up diplomatically isolated.
128
309000
2000
05:26
This issue isn't just theoretical.
129
311000
2000
05:28
In May 2007, Estonia was the victim of cyberattacks,
130
313000
2000
05:30
that damaged its communication
131
315000
3000
05:33
and banking systems.
132
318000
2000
05:35
Estonia accused Russia.
133
320000
2000
05:37
But NATO, though it defends Estonia,
134
322000
2000
05:39
reacted very prudently. Why?
135
324000
2000
05:41
Because NATO couldn't be 100% sure
136
326000
2000
05:43
that the Kremlin was indeed behind these attacks.
137
328000
5000
05:48
So to sum up, on the one hand,
138
333000
3000
05:51
when a possible enemy announces
139
336000
2000
05:53
they're building a cyberwar unit,
140
338000
2000
05:55
you don't know whether it's for attack
141
340000
2000
05:57
or defense.
142
342000
1000
05:58
On the other hand,
143
343000
1000
05:59
we know that these weapons give an advantage to attacking.
144
344000
4000
06:03
In a major article published in 1978,
145
348000
3000
06:06
Professor Robert Jervis of Columbia University in New York
146
351000
2000
06:08
described a model to understand
147
353000
2000
06:10
how conflicts could arise.
148
355000
2000
06:12
In this context,
149
357000
3000
06:15
when you don't know if the potential enemy
150
360000
2000
06:17
is preparing for defense or attack,
151
362000
3000
06:20
and if the weapons give an advantage to attacking,
152
365000
2000
06:22
then this environment is
153
367000
2000
06:24
most likely to spark a conflict.
154
369000
4000
06:28
This is the environment that's being created
155
373000
2000
06:30
by cyber weapons today,
156
375000
2000
06:32
and historically it was the environment in Europe
157
377000
3000
06:35
at the onset of World War I.
158
380000
4000
06:39
So cyber weapons
159
384000
2000
06:41
are dangerous by nature,
160
386000
2000
06:43
but in addition, they're emerging
161
388000
3000
06:46
in a much more unstable environment.
162
391000
2000
06:48
If you remember the Cold War,
163
393000
2000
06:50
it was a very hard game,
164
395000
2000
06:52
but a stable one played only by two players,
165
397000
2000
06:54
which allowed for some coordination between the two superpowers.
166
399000
2000
06:57
Today we're moving to a multipolar world
167
402000
5000
07:02
in which coordination is much more complicated,
168
407000
1000
07:03
as we have seen at Copenhagen.
169
408000
3000
07:06
And this coordination may become even trickier
170
411000
3000
07:09
with the introduction of cyber weapons.
171
414000
3000
07:12
Why? Because no nation
172
417000
2000
07:14
knows for sure whether its neighbor
173
419000
3000
07:17
is about to attack.
174
422000
2000
07:19
So nations may live under the threat
175
424000
2000
07:21
of what Nobel Prize winner Thomas Schelling
176
426000
3000
07:24
called the "reciprocal fear of surprise attack,"
177
429000
2000
07:26
as I don't know if my neighbor
178
431000
2000
07:28
is about to attack me or not --
179
433000
2000
07:30
I may never know --
180
435000
2000
07:32
so I might take the upper hand
181
437000
2000
07:34
and attack first.
182
439000
3000
07:37
Just last week,
183
442000
2000
07:39
in a New York Times article dated January 26, 2010,
184
444000
4000
07:43
it was revealed for the first time that
185
448000
2000
07:45
officials at the National Security Agency
186
450000
3000
07:48
were considering the possibility of preemptive attacks
187
453000
4000
07:52
in cases where the U.S. was about
188
457000
3000
07:55
to be cyberattacked.
189
460000
3000
07:58
And these preemptive attacks
190
463000
2000
08:00
might not just remain
191
465000
1000
08:01
in cyberspace.
192
466000
3000
08:05
In May 2009, General Kevin Chilton,
193
470000
5000
08:10
commander of the U.S. nuclear forces,
194
475000
3000
08:13
stated that in the event of cyberattacks against the U.S.,
195
478000
5000
08:18
all options would be on the table.
196
483000
3000
08:21
Cyber weapons do not replace
197
486000
2000
08:23
conventional or nuclear weapons --
198
488000
2000
08:25
they just add a new layer to the existing system of terror.
199
490000
5000
08:30
But in doing so, they also add their own risk
200
495000
3000
08:33
of triggering a conflict --
201
498000
2000
08:35
as we've just seen, a very important risk --
202
500000
2000
08:37
and a risk we may have to confront
203
502000
2000
08:39
with a collective security solution
204
504000
3000
08:42
which includes all of us:
205
507000
2000
08:44
European allies, NATO members,
206
509000
2000
08:46
our American friends and allies,
207
511000
2000
08:48
our other Western allies,
208
513000
2000
08:50
and maybe, by forcing their hand a little,
209
515000
2000
08:52
our Russian and Chinese partners.
210
517000
3000
08:55
The information technologies
211
520000
2000
08:57
Joël de Rosnay was talking about,
212
522000
1500
08:59
which were historically born from military research,
213
523500
2500
09:01
are today on the verge of developing
214
526000
2000
09:03
an offensive capability of destruction,
215
528000
3000
09:06
which could tomorrow, if we're not careful,
216
531000
4000
09:10
completely destroy world peace.
217
535000
3000
09:13
Thank you.
218
538000
2000
09:15
(Applause)
219
540000
3000
Translated by Elisabeth Buffard
Reviewed by Veronica Martinez

▲Back to top

ABOUT THE SPEAKER
Guy-Philippe Goldstein - Author
Guy-Philippe Goldstein is the author of Babel Minute Zero, a novel that examines the reality of cyberwar in our current geopolitical topography.

Why you should listen

By day, Guy-Philippe Goldstein is a management consultant. At night, he writes gripping political thrillers treating of cyberwar. He's a graduate of France’s prestigious Hautes Études Commerciales, and has an MBA from Northwestern University. Babel Minute Zero is his first novel.

More profile about the speaker
Guy-Philippe Goldstein | Speaker | TED.com

Data provided by TED.

This site was created in May 2015 and the last update was on January 12, 2020. It will no longer be updated.

We are currently creating a new site called "eng.lish.video" and would be grateful if you could access it.

If you have any questions or suggestions, please feel free to write comments in your language on the contact form.

Privacy Policy

Developer's Blog

Buy Me A Coffee