42 VOL. 2, NO. 4, WINTER 2023
Rethinking Russo- American Strategic Nuclear Arms Control
War in space is a possibility, but cyberwar among state and nonstate actors already
poses a signicant danger to international security.
26
Cyberattacks occur as solo ex-
cursions or as supplements to kinetic uses of force. Both the public and private sectors
are vulnerable to cyberwar, and the possibility of a crippling attack against American
infrastructure, including military forces and command- and- control systems, requires
constant vigilance and upgrading of information systems.
In the event of a nuclear rst strike on the United States, the attack will likely be
preceded by cyberattacks against American early warning and nuclear C3 systems
(NC3) in order to introduce confusion or paralysis—delaying or forestalling an eec-
tive response. Cyberattacks directed at government or private sector targets in the
United States and other countries include ransomware, network inltration, insertion
of malware to corrupt digital control systems, and extraction of condential les for
espionage.
27
With regard to nuclear infrastructure, cyberattacks against Iran’s nuclear program
caused the destruction of many centrifuges, and “le of launch” techniques have alleg-
edly been used by the United States in attempts to disable or divert adversary nuclear
missile launches. In addition, breaches of internal security like the Edward Snowden
aair made available to foreign powers some of the most sensitive cyber weapons used
by the National Security Agency. In 2016, the so- called Shadow Brokers posted online
tools used by the agency’s highly classied Tailored Access Operations unit to break
into computer networks in Russia, China, Iran, and elsewhere.
28
American capabilities for oensive cyberwar are second to none, but defenses
against enemy cyberattack are a larger challenge since American civilian infrastruc-
ture contains so many potentially vulnerable targets.
29
One example is the electric
grid. Another issue with respect to cyberwar is the potential for AI to raise the bar in
providing tools for military and strategic deception, including in cyberspace.
Deepfakes can simulate politicians, generals, and others announcing decisions or
conducting war games that seem very convincing to large audiences on social media.
AI systems already produce encyclopedias, plays, novels, and other creative works that
were previously the purview of individual artists and scholars. Future declarations of
war by heads of state or announcements of victory by commanding generals are open
to simulation and temporarily may convince large audiences of their validity. In the
26. Andrew Futter, Cyber reats and Nuclear Weapons: New Questions for Command and Control,
Security and Strategy (London: Royal United Service Institute for Defence and Security Studies [RUSI],
2016); and Erik Gartzke and Jon R. Lindsay, “ermonuclear Cyberwar,” Journal of Cybersecurity 3, no. 1
(2017), https://academic.oup.com/.
27. Chad Heitzenrater, “Cyber Attacks Reveal Uncomfortable Truths about U.S. Defenses,” Rand Blog,
September 21, 2023, https://www.rand.org/; and see also CSIS, “Signicant Cyber Incidents since 2006”
(Washington, DC: CSIS, 2023), https://csis- website- prod.s3.amazonaws.com/.
28. David E. Sanger, e Perfect Weapon: War, Sabotage and Fear in the Cyber Age (New York: Crown
Publishers, 2018), 227, 268–79.
29. For a detailed look at cyber operations see Chase Cunningham, Cyber Warfare—Truth, Tactics,
and Strategies (Birmingham, UK: Packt, 2020).