Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Estonia's digital ID lesson for South Africa

      Estonia’s digital ID lesson for South Africa

      4 February 2026
      Vodacom's real growth story isn't mobile

      Vodacom’s real growth story isn’t mobile

      4 February 2026
      Why stablecoins are booming in Africa - Yellow Card MD Lasbery Oludimu

      Why stablecoins are booming in Africa

      4 February 2026
      Prosus inks three-year AWS deal to scale AI across its global portfolio

      Prosus inks three-year AWS deal to scale AI across its global portfolio

      4 February 2026
      South African fintech Lula lands R340m to scale SME working capital - Trevor Gosling

      South African fintech Lula lands R340m to scale SME working capital

      4 February 2026
    • World
      AI won't replace software, says Nvidia CEO amid market rout - Jensen Huang

      AI won’t replace software, says Nvidia CEO amid market rout

      4 February 2026
      Apple acquires audio AI start-up Q.ai

      Apple acquires audio AI start-up Q.ai

      30 January 2026
      SpaceX IPO may be largest in history

      SpaceX IPO may be largest in history

      28 January 2026
      Nvidia throws AI at the weather

      Nvidia throws AI at weather forecasting

      27 January 2026
      Debate erupts over value of in-flight Wi-Fi

      Debate erupts over value of in-flight Wi-Fi

      26 January 2026
    • In-depth
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
    • TCS
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels: S1E1 – ‘William, Prince of Wheels’

      8 January 2026
    • Opinion
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      South Africa’s new fibre broadband battle

      20 January 2026
      AI moves from pilots to production in South African companies - Nazia Pillay SAP

      AI moves from pilots to production in South African companies

      20 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » In-depth » It’s time to write the rules of cyberwar

    It’s time to write the rules of cyberwar

    By Leonid Bershidsky9 July 2017
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    [dropcap]A[/dropcap] new report by Bloomberg News about Russia being suspected of recently hacking a dozen US power plants, including a nuclear one, is far more serious than any possible attempt to influence an election. It could be a sign of something even scarier: two military superpowers stepping up a cyberwar in the shadows and without rules of engagement that protect civilians from other kinds of warfare.

    Attacks on power grids have a potential for mass destruction. A temporary power outage doesn’t appear to be all that threatening compared with the use of chemical, biological or nuclear weapons, but blackouts kill people even when they don’t last long.

    During the US East Coast blackout of 2003, some power was restored within seven hours, and still dozens of deaths were ascribed to the event. A lasting power grid breakdown could be an apocalyptic scenario, with hospitals and other critical services running out of fuel for reserve generators and unable to obtain it easily; traffic, food and water supplies disrupted; urban life plunged into chaos. And that’s before we even think of nuclear power plants getting out of control.

    Bold statement

    The US department of homeland security and the Federal Bureau of Investigation are stressing that “there is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks”. But that’s a bold statement, given that a 2015 report by the think-tank Chatham House said this about the security of civilian nuclear facilities:

    There is a pervading myth that nuclear facilities are ‘air gapped’ — or completely isolated from the public Internet — and that this protects them from cyberattack. Yet not only can air gaps be breached with nothing more than a flash drive (as in the case of Stuxnet), but the commercial benefits of Internet connectivity mean that nuclear facilities may now have virtual private networks and other connections installed, sometimes undocumented or forgotten by contractors and other legitimate third-party operators.

    Stuxnet was the malware the US used in its most successful hacking operation to date, the crippling 2010 attack on the Iranian nuclear programme. It’s openly celebrated now as an example of what the US can do to an adversary’s infrastructure if it sets its mind to it. Paranoid security professionals in Russia and elsewhere have long worried about factory-installed backdoors in American-made software and equipment. National Security Agency leaker Edward Snowden revealed a range of such physical and software-based implants.

    Attacks on civilian services, and especially on nuclear plants, are a different matter. They are unambiguous acts of war

    If Russia is behind the power plant hacks, they could very well be responding to US threats to deploy “implants” in important Russian networks. According to a recent Washington Post report, then President Barack Obama ordered the use of implants on Russian networks that would cause “pain and discomfort if they were disrupted”.

    Russia appears to be eager to demonstrate — without admitting it — that it has a similar capability. There’s circumstantial evidence that it has messed with the Ukrainian power grid, causing two brief blackouts. The current attacks on the US power plants can only loosely be attributed to any state agents, let alone to Russia, but they reportedly match the profile of earlier attacks by a hacker group known as Energetic Bear, which has targeted energy companies in Russia’s adversary nations.

    I’ve long written that I consider the story of Russian meddling in last year’s US presidential election overblown. If the actual voting and tabulation weren’t affected — which no one appears to doubt — Americans made up their own minds how to vote; propaganda and the release of stolen e-mails, Russian or not, are par for the course in election campaigns. Only strong evidence of something like collusion between Donald Trump’s campaign and the Russian intelligence services could make this a national security problem.

    Attacks on civilian services, and especially on nuclear plants, are a different matter. They are unambiguous acts of war. It is known that the US is capable of them, and it would stand to reason that Russia wouldn’t let itself be outdone. Nor would China and, given that cyberweapons are relatively cheap to develop, smaller players such as Israel or North Korea. And yet there are no rules of engagement for countries that have the capability to shut off each other’s power grids or, say, traffic light systems. There’s no cyberwar equivalent of the Geneva and Hague conventions, which set rules for the treatment of civilians and ban certain kinds of cruel weapons.

    In the so-called Tallinn Manual, originally published in 2013, a group of experts working for the North Atlantic Treaty Organisation attempted to lay down some rules, warning against attacks on critical infrastructure. It specifically named hospitals and nuclear power plants as facilities that should be out of bounds. But the manual is not even an official Nato document.

    These rules are necessary before the US, Russia and China go after each other with all they’ve got, which is more than we know

    In February, the United Nations Security Council unanimously adopted Resolution 2341 calling on states to arm themselves against terrorist attacks on critical infrastructure. But what about such attacks initiated by other governments, not terror groups? It’s time there were some internationally recognised principles that applied to them, defining, for example, what constitutes an attack, what response is permissible, and what can and cannot be done to civilian networks. It would be helpful to establish some international attribution mechanism; a nation’s intelligence services cannot be trusted to make an assessment that would be used to justify international sanctions.

    Conventions have often been broken in wartime. Some countries still make and use chemical and biological weapons, even if they won’t openly admit it. Some militaries mistreat prisoners and kill civilians. But rules of engagement are still useful: most belligerent parties aim to act honourably and avoid being branded as war criminals. Official cyberwar rules wouldn’t stop attacks, but they would define unacceptable behaviour for all concerned. These rules are necessary before the US, Russia and China go after each other with all they’ve got, which is more than we know.  — (c) 2017 Bloomberg LP



    Leonid Bershidsky top
    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleLarry Page must testify in Uber lawsuit
    Next Article Liquid successful in R9.4bn capital raise

    Related Posts

    18GW in unplanned breakdowns cripple Eskom

    2 November 2021

    Nersa kicks the Karpowership can down the road

    13 September 2021

    If you think South African load shedding is bad, try Zimbabwe’s

    13 September 2021
    Company News
    Most business owners don't worry about IT, until they have to - Graeme Millar SevenC

    Most business owners don’t worry about IT – until they have to

    4 February 2026
    Why cloud projects fail - and how three days can fix it - LSD Open

    Why cloud projects fail – and how three days can fix this

    4 February 2026
    Zero downtime, 12 months: XLink raises the bar for mission-critical networks

    Zero downtime, 12 months: XLink raises the bar for mission-critical networks

    4 February 2026
    Opinion
    South Africa's skills advantage is being overlooked at home - Richard Firth

    South Africa’s skills advantage is being overlooked at home

    29 January 2026
    Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

    Why Elon Musk’s Starlink is a ‘hard no’ for me

    26 January 2026
    South Africa's new fibre broadband battle - Duncan McLeod

    South Africa’s new fibre broadband battle

    20 January 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Estonia's digital ID lesson for South Africa

    Estonia’s digital ID lesson for South Africa

    4 February 2026
    Vodacom's real growth story isn't mobile

    Vodacom’s real growth story isn’t mobile

    4 February 2026
    Why stablecoins are booming in Africa - Yellow Card MD Lasbery Oludimu

    Why stablecoins are booming in Africa

    4 February 2026
    Prosus inks three-year AWS deal to scale AI across its global portfolio

    Prosus inks three-year AWS deal to scale AI across its global portfolio

    4 February 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}