Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2019, Conflict Zone Cyberspace: Prospects for Security and Peace Cyberspace as a Domain of Military Action 2 ETHICS AND ARMED FORCES 01/19
AI
The paper examines the concept of 'cyberwar,' exploring its historical context and the reasons why, despite the omnipresence of cyber attacks, a global catastrophic cyberwar has not materialized. It discusses the limitations of the term 'cyberwar,' contrasting extreme perspectives on its implications and the role of military forces in cybersecurity. The analysis suggests that rather than an imminent threat of large-scale cyber conflict, the reality is a state of persistent cyber crime and espionage that complicates traditional distinctions between war and peace.
IEEE Technology and Society Magazine, 2014
Computer Science and Information Technology
The Internet quite naturally is becoming a 'new battlefield' or 'offers a new dimension' (the fifth to the: land, sea, air, and stratosphere) to the conflict. Cyberwar is another way of being in conflict in the long history of military technology, which forces new tactical and operational concepts. Global awareness of cyberwar has risen considerably in the last few years and many national states are preparing for defence and offensive operations. In fact, cyberwar is a part of the evolution of conventional war, which, on the other hand is related to the changes in the social, political and mainly technological sphere. What is being stressed is the need to examine the ethical implications, which lead to further questions and doubts whether the use of the techniques of cyber war may result in shorter and less bloody and consequently more 'ethical' conflicts? Cyber-attack doesn't need to kill anyone or cause material loses, but it is still considered dangerous.
The International Spectator, 2018
The convergence of telecommunication and computer technologies that has evolved in the field of information and communication technologies (ICT) in the last two decades has had very important effects on new war technologies and the ongoing process of battlefield digitisation. The Stuxnet worm, uncovered in 2010 and responsible for the sabotaging of a uranium enrichment infrastructure in Iran, is a clear example of a digital weapon. The incident shows what is meant by cyber war and what the particular features of this new warfare dimension are compared to the conventional domains of land, sea, air and space, with relevance both at the operational and strategic levels. But cyberspace also extends to the semantic level, within the complimentary field of information warfare involving the content of messages flowing through the Internet for the purposes of propaganda, information, disinformation, consensus building, etc. The overall cyber warfare domain needs to be put into perspective internationally as many countries are developing strong cyber capabilities and an 'arms race' is already taking place, showing that these technologies can potentially be used to undermine international stability and security. What is needed is a public debate on the topic and its impact on global stability, and some kind of regulation or international agreement on this new warfare domain, including an approach involving confidence building measures (CBMs).
CANABARRO, D. R. ; BORNE, T. ; CEPIK, M. A. C. . Three Controversies on Cyberwar: a Critical Perspective. In: MPSA Annual Conference, 2013, Chicago - IL - Estados Unidos. MPSA Conference Paper Archive, 2013, on line. The spread of contemporary information and communication technologies among state and non-state actors adds new dimensions to the study of diffusion in global politics. The Digital Era brings about different challenges for national and international security policymaking, heating up academic and political debate surrounding the scope and the implications of the term cyberwar. This paper surveys the evolution of academic and technical production on cyberwar with the intention of providing background for the critical evaluation of the Brazilian case. Finally, it details the prospective research agenda that follows from the evaluation of the Brazilian case.
The tremendous achievements and the development of the leading technology, sophisticaled computer systems opened new " cyberspace " that constantly destroys the old traditional forms of organization, behavior and belief. Cyber information led to cyber revolution and the emergence of the information society, which dominates the race for information and communication technologies, in parallel the global liberalization and free circulation of people, goods and ideas (Stern, Jessica, 1999). Today, thirty years after the introduction of the term, the concept of cybernetics, it inevitably became a primary component of many important terms: cyber society, cyber policy, cyber economy, cyber warefare, cyber terrorism, cyber crime, in which essentially the most precious crown represents cyber information. Cyber terrorism is an important cybersystem of cyber warefare, and is very difficult to detect and counter because it is almost impossible to determine the political affiliation or sponsors of its prepertators.
Oxford Bibliographies Online Datasets, 2014
Wentz 2009 present a similar thesis with some policy recommendations, as does Rosenzweig 2013. Carr 2010, and the edited volume Latham 2003, provide some deep analysis of the nature of the cyber war threat and its complex intermingling with other threat vectors such as crime, activisim and terrorism. Denning 1998 and Healey 2013 provides a similar analysis of the changing nature of threat in this area, drawing some interesting parallels with information warfare through history. Rid 2013 offers a rare critical reading of the normative view of cyber war, and does so from a non-US perspective. Richards 2014 is similarly sceptical about whether any of the events seen so far constitute acts of war, while suggesting that the pace of technological change means that such an eventuality in the future cannot be ruled out.
Strategic Analysis, 2010
The last couple of decades have seen a colossal change in terms of the influence that computers have on the battle field, to an extent that defence pundits claim it to be a dawn of a new era in warfare. The use of computers and information in defence has manifested into various force multipliers such as Information Operations, C4I2SR Systems, Network Centric Warfare, to the extent that commentators are terming this information age as a Revolution in Military Affairs (RMA). These advances have not only revolutionized the way in which wars are fought, but have also initiated a new battle for the control of a new dimension in the current contemporary world: The Cyber Space. Over time cyber warfare has assumed the shape of an elephant assessed by a group of blind people, with every one drawing different meanings based upon their perceptions. Under these circumstances there was a gradual paradigm shift in military thinking and strategies, from the strategic aspect to the tactical aspect of cyber warfare laying more emphasis on cyber attacks and counter measures. This resulted in the formation of a notion that cyber warfare or information warfare is a potent force multiplier, which in a sense downgraded the strategic aspects of cyber war to a low grade tactical warfare used primarily for a force enhancement effect. The author believes this is wrong, cyber war is a new form of warfare and, rather than cyber war merely being an enhancement of traditional operations, traditional operations will be force multipliers of cyber war. This paper tries to shatter myths woven around cyber warfare so as to illuminate the strategic aspects of this relatively misinterpreted notion. This paper will elucidate the scenarios and mechanisms illuminating the process of using the strategies of cyber war, so as to achieve conventional objectives. The paper will also analyze the doctrine and strategies including first and second strike capabilities with regard to cyber war. This paper identifies a paradigm shift from the conventional belief of cyber warfare acting as a force multiplier for conventional warfare to the recognition, that conventional warfare will be acting as a force multiplier around cyber war and hence making cyber war as the primary means of achieving grand strategic objectives in the contemporary world order.
The position of cyber warfare in the strategic arena is the subject of an ongoing debate. While some scholars believe that “cyber war will not take place” (to use Thomas Rid’s confident assertion), others maintain that cyber war will exert a strategic paralytic impact unto nations. The present study seeks to broaden the debate by presenting cyber warfare as a military revolution on a par with previous major paradigm shifts (to use Hans Kuhn’s famous definition of a scientific revolution). By way of doing so it will introduce a new theoretical model of military revolutions, comprising both evolutionary and revolutionary components and addressing such issues as socioeconomic changes, technological breakthroughs and operational/organizational/doctrinal adjustments. The dissertation identifies seven revolutions in warfare that correspond to the model’s criteria: the gun powder revolution; the naval revolution; the French/Napoleonic revolution; the industrial revolution; the aviation revolution; the nuclear revolution and its culmination in the cyber revolution. Having described the nature and characteristics of all previous revolutions as well as their historic evolution, the study will offer an in-depth analysis of cyber warfare, the political and academic debate surrounding it, its role in the future strategic environment, and its unparalleled development. It concludes with a call to scholars to open their theoretical toolkits to explore, explain, and predict adversarial cyber relationships with a view to yielding focused theorization that could guide policy planning in this ever more important sphere.
Survival, 2012
The reported use of malware by the United States and Israel against Iran has arguably created a new de facto norm for the conduct of cyber attacks. The article discusses the policy and legal dynamics that govern the use of cyber malware; active defence vs first strike; the meaning of UN Charter Art 2.4's notion of "use of force;" the strategic implications of cyber war.
Kanun Jurnal Ilmu Hukum
The purpose of this research is to identify cyber warfare as a model of War, its position in the perspective of international law, and the steps taken by the state in minimizing losses arising from cyber warfare. This research is normative research using conceptual and statute approaches to answer the problems in this research. The analysis used is content analysis. The study results indicate a need for a common understanding of cyber warfare as a new model of war agreed upon by countries in practice. Normative cyber warfare in international law has to be applied universally. The periodic simulations of cyber defense and artificial intelligence are needed in minimizing the losses caused by cyber warfare. The recommendation is to formulate a definition of cyber warfare universally agreed upon and the state's agreement on the meaning of cyber warfare in international law perspectives.
Technology now forms an essential part of every country's critical infrastructure and is therefore, a major national security concern. This concern combined with the complexity of cyberspace and political agendas, has caused a misrepresentation of the cyber-threat. Although the motivation of cyber-attacks has only been associated with criminal behavior, espionage and even terrorism; current Administrations and the media would have the country believe that a cyber-war is upon us. This paper demonstrates that cyber-war is certainly a misnomer. To date there has been an inability to acquire any substantial, irrefutable evidence of cyber-warfare; only speculations based on historical information, rumors, propaganda and misinterpretation or misrepresentation of facts. Current international legal framework and interpretations indicate that what has been termed cyber-warfare does not match the criteria for war. While the dispute over the term cyber-war and what it represents will definitely continue, there is consensus on the reality of cyber-weapons and cyber-attacks.
International Relations theory has endured two failures in the last half century. No International Relations theorist foresaw the end of the Cold War. Likewise with the rise of Cyber War. Whilst the Internet is acknowledged as having the CIA as its parent, no one predicted that it would become a theatre for conflict. Cyber War is here and its impact on our lives will only increase in time. It is only a matter of time before a completely cyber conflict is waged. Yet no theory on Cyber War exists…until now.
IJCIET, 2018
Cyber warfare figures conspicuously on the motivation of policymakers and military pioneers far and wide. New units to guarantee cybersecurity are made at different levels of government, incorporating into the military. Be that as it may, cyber activities in equipped clash circumstances could have possibly intense outcomes, specifically when their impact isn't restricted to the information of the focused on PC framework or PC. Undoubtedly, cyber tasks are generally expected to have an impact on 'this present reality'. For example, by messing with the supporting PC frameworks, one can control an adversary's airport regulation frameworks, oil pipeline stream frameworks, or atomic plants. The potential helpful effect of some cyber activities on the non-military personnel populace is colossal. It is along these lines vital to examine the principles of International humanitarian law(IHL) that represent such activities since one of the primary destinations of this collection of law is to shield the non-military personnel populace from the impacts of warfare. The article provides an understanding of cyber-crime as a non-state cyberwarfare by analyzing and identifying the terms and catches in cyber-crime and cyberwarfare, while comparing different cases and studies around the globe, challenges, issues and the precautions in the implementation of an international humanitarian law. The article goes ahead to take a gander at probably the most essential standards of IHL overseeing the lead of dangers and the translation in the cyber domain of those guidelines, in particular, the standards of qualification, proportionality, and safety measure. As for these principles, the cyber domain suggests various conversation starters that are as yet open. Specifically, the interconnectedness of cyberspace represents a test to the most key commence of the tenets on the direct of dangers, to be specific that regular citizen and military articles can and should be Cyber-Terrorism as A Non-State Cyber Warfare: An Overview http://www.iaeme.com/IJCIET/index.asp 860 [email protected] recognized constantly. In this way, regardless of whether the customary standards of IHL will give adequate security to regular citizens from the impacts of cyber warfare stays to be seen. Their understanding will positively need to consider the specificities of cyberspace. Without better learning of the potential impacts of cyber warfare, it can't be barred that more stringent standards may be essential.
International Security, 2013
While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Some scholars presume that the related technology's scientific complexity and methodological issues prohibit orderly investigation; only a minimum degree of technical acuity is needed, however, revealing the scope of maneuver in the cyber domain. Other skeptics argue that the cyber peril is overblown, contending that cyber weapons have no intrinsic capacity for violence and do not alter the nature or means of war. This view misses the essence of the danger and conceals its true significance: the new capability is expanding the range of possible harm and outcomes between the concepts of war and peace—with important implications for national and international security. The cyber domain, moreover, features enormous defense complications and dangers to strategic stability: offense dominance, attribution difficulties, techno...
Within western security discourse, the threat posed by cyberwar has risen from a barely acknowledged concern to one of the greatest challenges confronting the West and the world in only a few short years. How did this happen so quickly, and what are the consequences for how security is performatively enacted? We argue that an event that occurred in 2007 catalyzed cyberwar's actualization as a new policy object, and has continued to affect the discursive practices materializing cyberwar since 2007. After a brief genealogy of cyberwar imaginings prior to 2007, the article interrogates how the 2007 events catalyzed cyberwar's materialization, and the discursive practices that have worked perform-atively to stabilize and institutionalize a knowledge-power assemblage named cyberwar as a new policy object. In particular, it traces the ways in which the site and situation of cyberwar's birth have affected the emerging apparatuses of cybersecurity, how the event enabled Estonian cybersecurity specialists and political and military elites as " catalyzing agents and shimmering points " in the emerging cyberwar resonance machine, while Tallinn became elevated as a cybersecurity center of calculation, and finally how the events of 2007 have served as a precautionary baseline for the anticipatory actions through which future cyberwars are made present.
Science Research Society, 2021
The digital age has given rise to a new type of threat: cyberwar. "Cyberwar" denotes the use or targeting of computers, the internet of things (IOTs), and network-based systems in the context of warfare. Since information technology and the internet have evolved to the point where they are major components of national power, state militaries have been developing cyber weapons for use in national security preparation. An alarming number of states are engaging in cyber espionage, reconnaissance, or cyber-attacks, or both. There is considerable debate over whether such campaigns can be called "wars." Due to a lack of detailed knowledge in cybersecurity, those who are already in the industry have a difficult time meeting the cyberwarfare challenge. Despite several cyberattacks, the world has failed to keep up with the evolving threats of modern warfare. This research paper aims to examine the legal context of cyber warfare, i.e., the legislation that applies to cyber warfare, as well as case studies of cyber warfare events from around the world. It also focuses on issues like the use of force and the challenge of electronic warfare governance. This paper concludes with observations and recommendations for the future of cyber warfare.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.