Global Security and Intelligence Studies Volume 2, Issue 1, Fall 2016 | Page 29

Anonymous Versus ISIS: The Role of Non-state Actors in Self-defense Non-state Actors Versus Non-state Actors in the Cyber Battle Space Definitions abound to exactly what cyber-war looks like. The concept is increasingly considered, challenged, debated, accepted, rejected, and embraced. However, some parties are not convinced that war, which is essentially destructive and leads to widespread loss of life, can be waged in cyber-space, nor can cyber-conflict ever be described as “cyber-war” until such time as there is direct and real “loss of life.” Others contend that cyber-war, or cyber-conflict, is confined to what has been described as cyber-intelligence, cyber-espionage, cyber-disruption, and cyber-sabotage; activities which can be—and are—undertaken independently or in the context of a war. There are parties that claim that the effect of cyber-warfare is not destructive in the real world and therefore not war like (Wisniewski 2013, Valeriano and Maness 2012, Singel 2010). While cyber-attacks thus far have not directly killed people or significantly damage property, it can be a vehicle for such results. Economically, cyber-attacks may be able to cripple a nation in such a manner that it may have a similar effect to a sustained physical attack upon its industrial base or other facets of the economy (Ruus 2008). In that sense, cyber-war can have similar outcomes or impacts upon a nation as a real war would, and therefore an impact on non-state actors as well. In 2008, the U.S. National Intelligence Council posited that by 2025 “Cyber and sabotage attacks on critical US economic, energy, and transportation infrastructures might be viewed by some adversaries as a way to circumvent US strengths on the battlefield and attack directly US interests at home” (DNI 2008, 97). Thus, squeezing or negating resources available to, or used by, non-state actors is a method which is used to degrade the economic—and therefore political—capacity of those particular actors. Traditionally, such action requires multistate actor collaboration. For example, there is some obvious reluctance for airstrikes to target ISIS-controlled oil installations. The environmental impact of such was there for all to see during the 1991 Gulf War. Most of the ISIS-controlled oil sold on the open market is smuggled through Turkey. Challenges for Ankara are numerous; porous borders, economic interdependence, political weakness, fear of reprisal, sectarian and ethnic divisions all contribute to Turkey being unwilling and/or unable to comply (Snyder 2014, Akyol 2014, Crompton 2014, Hawramy et al 2014, Giglio 2014, Hager 2014, and Sullivan 2014). Water resources in the region can also be used as both a source of revenue or bargaining chip for state actors and non-state actors alike. Again, Turkey plays a major role here. Turkey closed the Ataturk dam on the Euphrates in August 2014 and reduced water supplies to Syria and Iraq, which led to threats from ISIS. ISIS itself has used water and electricity as a weapon, cutting off the Euphrates water supplies to the Anbar Province in Iraq and electricity to parts of the Damascus region in Syria (Halevy and Yashar 2015). Activities such as the above are founded in the physical realm. However, the 1 The question of Prisoners Of War (POWs) must surely fill the likes of Anonymous with dread. We have already seen that ISIS does not abide by the rules—certainly not Geneva Convention standards— in relation to management of prisoners and “enemy combatants.” Having said this, an equal response by the hacktivists’ were they to do so, would, of course, violate Jus in Bello and the question of reprisal action. 23