91成人版抖音

When does a cyber attack become an act of war? And what's worth going to war over?

For Dr Sally Burt, it鈥檚 an evolving question that is becoming more prominent and critical.

The 91成人版抖音academic, who runs a course on Cyber and International Security, began looking at the role cyber played in diplomacy after completing her PhD in Sino-US diplomatic history.

Dr Burt said she worked out quickly that history was the lesser interest in her research and was more curious about strategic competition and the rise of China.聽

鈥淲e get to the point in the 1990s where the US is an incredible military power and wipes the floor with Iraq in the first Gulf War, China looks at that and says, 鈥榳ell, we're never going to beat them militarily. So how do we beat them?鈥 Dr Burt said

鈥淎nd they decided being better at tech than the US would be the way to go. So China started working on getting ahead of the US in the tech world.鈥

Dr Burt said it wasn鈥檛 until Barack Obama took over the presidency in 2009 that the United States began to use cyber to drive the economy and national security.

Dr Sally Burt during a lecture at King's College London this year. IFCyber

His administration established key roles such as the White House Cybersecurity Coordinator and cyber ambassadors within the State Department, as well as developing the first comprehensive cybersecurity strategy.

But with Donald Trump now back in the White House, Dr Burt admits to feeling unease over how the United States and its adversaries engage.

Rules of the game

While the United Nations has a level of agreement on basic cyber principles, there's some robust disagreement over who writes these rules, and how they can be policed 鈥 if at all.聽

鈥淭he doom and gloom side of me thinks the future is very bleak,鈥 Dr Burt said.

鈥淚 don't see how this era of strategic competition ends without our adversaries being the ones on top. The optimistic part of me says we all get nicer and play better with each other and start establishing rules of the road.聽

鈥淭here are some rules - it's not a complete Wild West in cyberspace.鈥澛

There are 11 UN norms of , intended to reduce risks to international peace and security and contribute to conflict prevention.聽聽

These norms are voluntary and non-binding and describe what states should and should not do in cyberspace.

The norms include responsible behaviour such as interstate cooperation on security, ensure supply chain security and protecting critical infrastructure.聽

What is an act of war?

Despite these norms, Dr Burt said the global community was yet to decide on where the red lines are: when does a cyber attack become an act of war?

鈥淔or instance, the interference in the 2016 US election could be seen as a fundamental breach of sovereignty, yet it wasn鈥檛 met with publicly serious repercussions,鈥 Dr Burt said.聽

If we don't get the rules right - if we have no rules - we're in real trouble.
Dr Sally Burt

鈥淚s that not a red line? Can I interfere with your sovereignty and that鈥檚 OK as long as it鈥檚 in cyberspace and I鈥檓 not sending in the military?

鈥淣one of those red lines have really been established. There's a whole grey zone where it's not black or white - we can push and see what happens.聽

鈥淭hat gets dangerous when rules are being made, because rules are shaped by how people behave. If states behave in certain ways and nobody responds appropriately, that becomes normal.

鈥淚f we don't get the rules right - if we have no rules - we're in real trouble. That would be like having trade with no rules about shipping - the world doesn't function well.聽聽

鈥淚f cyber ends up with no rules, it would be drastic because tech companies and cybercriminals could do whatever they want.鈥

But while technical knowledge is important, addressing cyber challenges requires expertise from humanities and social sciences too.聽

Understanding geopolitical contexts, strategic competition, deterrence theory, and diplomatic history is essential for effective cyber policy and strategy.聽

Attribution of cyberattacks, for instance, requires both technical forensics and geopolitical analysis to determine who would benefit from specific actions.聽

鈥淚t's really hard to definitively identify who's attacking you and prove it,鈥 Dr Burt said.聽

鈥淭o do the best we can in attribution, we need both the technical side and the humanities side. We need to understand what happened, how sophisticated it was, what the attack did, and what was the intent.聽

鈥淲hat data were they after? What did they do with the data?鈥澛

China threat聽

Chinese advanced persistent threat groups are reportedly embedded in critical infrastructure across the US, Australia, and the UK, potentially positioning China to hold these nations' infrastructure hostage during a future conflict.

Dr Burt says this represents how cyber capabilities enable coercive power without necessarily requiring kinetic warfare, changing the nature of international competition and conflict.

鈥淔rom China's perspective, they don't have to fight - they're holding a gun to everyone's head saying, 鈥業 want to play over here in my sandpit鈥. And you let them because they have that leverage,鈥 she said.

鈥淯kraine shows traditional war isn't finished, but China is focused on not fighting unless absolutely necessary, and they're finding ways to avoid direct conflict.鈥澛

It is this idea that war could eventually become computer games that Dr Burt discusses with her students in her Cyber and International Security three-day course.

"They'd have to be dangerous computer games to achieve strategic objectives.

鈥淚f you're saving lives by just using automated drones, why not? That requires more humanities thinking than technical computer science perspective.鈥

  • Dr Sally Burt will run her next Cyber and International Security three-day course from 21-23 October, 2025. This in-person course will be held on campus at UNSW Canberra. You can find more information here.