Query Result Set
Skip Navigation Links
   ActiveUsers:1853Hits:18240313Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER CONFLICT (16) answer(s).
 
SrlItem
1
ID:   181129


#SorryNotSorry: Why states neither confirm nor deny responsibility for cyber operations / Brown, Joseph M; Fazal, Tanisha M   Journal Article
Fazal, Tanisha M Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract States accused of perpetrating cyber operations typically do not confirm or deny responsibility. They issue ‘non-denial denials’ or refuse to comment on the accusations. These ambiguous signals are prevalent, but they are largely ignored in the existing cyber literature, which tends to treat credit claiming as a binary choice. The ambiguity of non-denial denials and ‘non-comments’ allows states to accomplish two seemingly opposed goals: maintaining crisis stability and leaving open the possibility of their involvement in the attack. By deliberately remaining a suspect, a state can manipulate rivals’ perceptions of its cyber capability and resolve. Refusing to deny responsibility can also shape rivals’ perceptions of allies’ capabilities, enhancing the credibility of deterrence. All of this can be accomplished without the escalatory risks that would come with an explicit admission of responsibility. Where previous research has focused on the dangers of escalation and the limitations of costly signalling with cyber, we show that non-denial denials and non-comments make cyber operations considerably more useful than the literature appreciates.
Key Words Intelligence  Deterrence  Coercion  Cyber Conflict  Signalling 
        Export Export
2
ID:   186761


America’s cyber-reckoning: how to fix a failing strategy / Gordon, Sue; Rosenbach, Eric   Journal Article
Gordon, Sue Journal Article
0 Rating(s) & 0 Review(s)
Key Words Democracy  United States  America  Cyber War  Cyber Conflict  Cybersecurity 
Cyber Peace 
        Export Export
3
ID:   159189


Another manifestation of cyber conflict: attaining military objectives through cyber avenues of approach / Fasana, Kenton G   Journal Article
Fasana, Kenton G Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations.
Key Words Cyber War  Clausewitz  Sun Tzu  Military Theory  Cyber Conflict 
        Export Export
4
ID:   132419


Cyber actions by state actors: motivation and utility / Brantly, Aaron F   Journal Article
Brantly, Aaron F Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Covert action is as old as political man. The subversive manipulation of others is nothing new. It has been written about since Sun Tzu and Kautilya. People and nations have always sought the use of shadowy means to influence situations and events. Covert action is and has been a staple of the state system. A dark and nefarious tool often banished to philosophical and intellectual exile, covert action is in truth an oft-used method of achieving utility that is frequently overlooked by academics. Modern scholars contend that, for utility to be achieved, activities such as war and diplomacy must be conducted transparently. Examined here is the construction of utility for a subset of covert action: cyber attacks.
        Export Export
5
ID:   171960


Cyber security meets security politics: Complex technology, fragmented politics, and networked science / Dunn Cavelty, Myriam; Wenger, Andreas   Journal Article
Wenger, Andreas Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In the last decade, cyber incidents have become more expensive, more disruptive, and in many cases more political, with a new body of theoretically informed research emerging in parallel. This article provides the intellectual history to situate this literature in its broader evolutionary context. After identifying and discussing six drivers from the fields of technology, politics, and science that have been influential in the evolution of cyber security politics and how it is studied, we describe three historically contingent clusters of research. Using the same driving factors to look into the future of research on cyber security politics, we conclude that it is a vibrant and diverse biotope that is benefitting from its interdisciplinarity, its relevance for policy, and its cognizance of the interplay between technological possibilities and political choices of state actors.
        Export Export
6
ID:   141532


Cyberspace and national security: threats, opportunities and power in a virtual world / Reveron, Derek S (ed.) 2013  Book
Reveron, Derek S (ed.) Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Satyam Law International, 2013.
Description ix, 246p.: ill.pbk
Standard Number 9789382823001
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058334355.033002854678/REV 058334MainOn ShelfGeneral 
7
ID:   181217


Defining cyberwar: towards a definitional framework / Ashraf, Cameran   Journal Article
Ashraf, Cameran Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract For nearly thirty years scholars have offered changing definitions of cyberwar. The continued ambiguity demonstrates that efforts at establishing definitional clarity have not been successful. As a result, there are many different and contradictory definitions, ranging from cyberwar’s non-existence to cyberwar as an imminent threat. Ongoing definitional ambiguity makes interdisciplinary research and policy communications challenging in this diverse field. Instead of offering a new definition, this paper proposes that cyberwar can be understood through a fluid framework anchored in three themes and five variables identified in a broad interdisciplinary survey of literature. This framework's applicability is demonstrated by constructing an example definition of cyberwar utilising these themes and variables.
Key Words Geopolitics  Cyber Security  Internet  Cyberwar  Cyber Conflict 
        Export Export
8
ID:   162725


Demilitarisation of Cyber Conflict / Boeke, Sergei   Journal Article
Boeke, Sergei Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The debate about state behaviour in cyberspace may be set in the wrong legal key.
Key Words Demilitarisation  Cyber Conflict 
        Export Export
9
ID:   165132


Disrupt and restraint: the evolution of cyber conflict and the implications for collective security / Taillat, Stéphane   Journal Article
Taillat, Stéphane Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.
        Export Export
10
ID:   132349


Dynamics of cyber conflict between rival antagonists, 2001–11 / Valeriano, Brandon; Maness, Ryan C   Journal Article
Valeriano, Brandon Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Much discussion of the concept of cyberwar, cyber conflict, and the changing dynamic of future security interactions is founded upon the study of what could be, conjured through spectacular flights of the imagination. The goal of this research article is to exhaustively collect information on cyber interactions between rival states in the last decade so that we can delineate the patterns of cyber conflict as reflected by evidence at the international level. The field of cyber security needs a clear return to social science in order to be able to definitively engage the cyber debate with facts, figures, and theory. To that end we provide a dataset of cyber incidents and cyber disputes that spans from 2001 to 2011. Our data include 110 cyber incidents and 45 cyber disputes. Further, we test our theory of cyber conflict which argues that restraint and regionalism should be expected, counter-intuitive to conventional wisdom. We find here that the actual magnitude and pace of cyber disputes among rivals does not match with popular perception; 20 of 126 active rivals engaged in cyber conflict. The interactions that are uncovered are limited in terms of magnitude and frequency suggesting cyber restraint. Further, most of the cyber disputes that are uncovered are regional in tone, defying the unbounded nature of cyberpower. The coming era of cyber conflict may continue to exhibit these patterns despite fears mentioned in the discourse by the media and cyber security professionals.
Key Words Regionalism  Rivalry  Restraint  Cyber Conflict 
        Export Export
11
ID:   086831


Georgia's cyber left hook / Korns, Stephen W; Kastenberg, Joshua E   Journal Article
Korns, Stephen W Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract On 19 July 2008 an Internet security reported a distributed denial of service (DDOS) cyber attack against web sites in the country of Georgia. Three week later, on 8 August, security experts observed a second, more substantial round of DDOS attcks against Georgian web sites.
Key Words United States  Cyber crime  Georgia  Cyber Attack  Cyber Conflict 
        Export Export
12
ID:   174826


Hacked IT superpower: how India secures its cyberspace as a rising digital democracy / Ebert, Hannes   Journal Article
Ebert, Hannes Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Why has India developed into one of the world’s top targets and sources of cyber attacks despite possessing a strategic edge in information and communications technology (ICT)? India has one of the most competitive ICT industries and workforces, largest global sourcing and fastest growing e-commerce markets, and second largest and fastest growing internet user base, and is a leader in using ICT to provide governance services, yet its economic and political information infrastructures have been disproportionality affected by cyber attacks. This article traces the evolution of cyber threats to India’s national security and identifies drivers of the national and international policies the Indian state has adopted to address these threats in the past two decades. It finds evidence for a growing gap between the ideation and implementation of cyber security legislation and policy, which is rooted in the political constraints inherent in India’s state capacity-building efforts, reluctance to engage in multistakeholder coordination, and struggles to yield gains from its hedging diplomacy in global cyber security negotiations. For the Security Studies scholarship on the sources of cyber insecurity, these findings highlight the need to further study the links between different types of cyber capacity, state structure and political systems as well as the specific conditions under which quickly digitizing democracies can effectively translate their ICT capacities and regulations into greater cyber resilience.
        Export Export
13
ID:   182673


International trade and cyber conflict: Decomposing the effect of trade on state-sponsored cyber attacks / Akoto, William   Journal Article
Akoto, William Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract A state’s decision to engage in cyber operations has important implications for its trade. Successful cyber espionage could yield valuable trade secrets that could boost domestic production and spur economic growth. On the other hand, uncovered cyber operations could invite devastating sanctions that retard economic development. In spite of this, the nexus between trade and cyber attacks has received little attention in the literature. In this article, I explore how a state’s trade relations affect its propensity to engage in cyber attacks. I develop a theoretical framework that links the composition of a state’s trade to its deficit in proprietary information relative to other states. I decompose trade into its inter- and intra-industry components and show that while inter-industry trade is associated with higher incidence of state-sponsored cyber attacks, intra-industry trade has the opposite effect. I also show that these effects are non-monotonic, varying by the share of inter- or intra-industry trade in total trade. The results also show that states that have a heavy concentration of high-tech industries such as aerospace, computers, and pharmaceuticals have a higher propensity to engage in cyber espionage operations. These results are robust to a variety of controls and specifications.
        Export Export
14
ID:   125249


Major issues of the national cyber security system in South Kor / Do, Kim Young; Sung, Kim Jin; Ho, Lee Kyung   Journal Article
Do, Kim Young Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract the national cyber security system (NCSS) of South Korea came under criticism when North Korean cyber terrorist attacked the office computers and servers of major south Korean broadcasting and financial companies on March 20, 2013. The NCSS had evolved up to that time by addressing problems, that arose from incidents dating to the January 25, 2003, internet crisis, the March 4, 2011 distributed denial of service (DDoS) crisis, and other event occurring between those attacks. The above 2013 cyber terrorism incident magnified the limits of NCSS leadership, expertise and collaborative systems, while revealing that past reform were nothing more than stopgap measures.
        Export Export
15
ID:   096857


Multilateral agreements to constrain cyberconflict / Lewis, James A   Journal Article
Lewis, James A Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
16
ID:   190774


New and better quiet option? strategies of subversion and cyber conflict / Maschmeyer, Lennart   Journal Article
Maschmeyer, Lennart Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Theorizing on cyber conflict has moved from warfare to conflict short of war, but strategic thought has not kept pace. This article argues cyber conflict is subversive, builds on intelligence scholarship to identify strategies of subversion, and examines their applicability in cyber conflict. It distinguishes three subversive strategies: manipulation, erosion and overthrow. The analysis shows cyber operations can only implement one of these strategies (erosion), indicating they offer less strategic value than traditional counterparts. Accordingly, although cyber operations offer superior scale, I argue their scope of influence is more limited. Finally, the article discusses strategic implications and identifies possible counterstrategies.
Key Words Subversion  Cyber Conflict  Cybersecurity  Covert Operations  Strategy 
        Export Export