Query Result Set
Skip Navigation Links
   ActiveUsers:1536Hits:18394933Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER OPERATIONS (26) answer(s).
 
12Next
SrlItem
1
ID:   124098


Asymmetric nature of cyber warfare / Phillips, Andrew   Journal Article
Phillips, Andrew Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract How likely is it that a conflict between two combatants involving both kinetic and cyber operations would be an asymmetric one? And does the answer to that question depend on who the combatants are? In a kinetic scenario, the creation and "massing" of forces is often possible to observe. Whether it is the number of troops, warheads, or aircraft, one can physically monitor the activity. The buildup can be measured in days or weeks. Such a scenario involving state-of-the-art kinetic weaponry also needs a high level of expertise that only comes from years of education and training. One needs a well-funded organization to support this kind of activity.You can trace the kinetic matériel fairly accurately to its source, and the effects of a kinetic attack unfold over an observable period of time. You can watch and react to it. Defense is possible as long as you are sufficiently diligent and prepared with a response.
        Export Export
2
ID:   139296


Bringing fear to the perpetrators: humanitarian cyber operations as evidence gathering and deterrence / Kallberg, Jan   Article
Kallberg, Jan Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Humanitarian cyber operations would allow democratic states to utilise cyber operations as a humanitarian intervention to capture information and create a foundation for decision making for collective international action supported by humanitarian international law. This follows the legal doctrine of responsibility to protect, which relies first on the nation state itself but when the state fails to protect its citizens, then the international community can act, ignoring the repressive or failed state’s national sovereignty.
        Export Export
3
ID:   192658


Challenges of military adaptation to the cyber domain: a case study of the Netherlands / Smeets, Max   Journal Article
Smeets, Max Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Whilst NATO speaks increasingly publicly about the military use of cyber operations, adaptation to the cyber domain has reportedly been challenging for most militaries. Little research has sought to understand the nature of these challenges. This study seeks to address this gap through a case study of the Netherlands. By utilizing a range of primary and secondary sources, this article reveals that the Dutch Defense Cyber Command has faced significant constraints in its adaptation to the cyber domain, primarily due to issues related to organizational structure, operational mandate, and the availability of skills and resources. A cyber command that lacks regular opportunities for day-to-day operations and where personnel may not have continuous learning opportunities to acquire and refine their skills will encounter difficulties in recruiting, training, and retaining a proficient workforce. These findings highlight the tendency of observers to mistakenly equate the mere establishment of a cyber command with the existence of a robust military cyber capability – namely, the ability to effectively carry out and sustain a range of cyber operations for tactical or strategic purposes.
        Export Export
4
ID:   130364


Creating cyber warriors / Brown, Nancy; Barrett, Danelle; Castillo, Jesse   Journal Article
Brown, Nancy Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
5
ID:   186097


Cyber campaigns and strategic outcomes / Harknett, Richard J; Smeets, Max   Journal Article
Harknett, Richard J Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber operations, with the specific objective of achieving strategic outcomes without the need of armed attack. These campaigns are not simply transitory clever tactics, but strategic in intent. This article examines strategic cyber competition and reveals how the adoption of a different construct can pivot both explanation and policy prescription. Strategy must be unshackled from the presumption that it deals only with the realm of coercion, militarised crisis, and war in cyberspace.
Key Words China  Russia  Cyberwar  Cyber Operations  Cyber Espionage  Cyber Campaigns 
        Export Export
6
ID:   187498


Cyber conflict short of war: a European strategic vacuum / Liebetrau, Tobias   Journal Article
Liebetrau, Tobias Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Cyber conflict short of war plays an increasingly important role in contemporary security politics. Dedicated to a study of three European NATO members – the Netherlands, France and Norway, this article expands the existing focus of the study of cyber conflict short of war beyond its dominating US context. It compares and assesses how the countries perceive and respond to a changing strategic environment characterised by increasing cyber conflict short of war. The analysis demonstrates that all three countries acknowledge that cyber operations short of war alter the strategic environment and challenge the idea of deploying offensive cyber capabilities as purely a warfare matter. However, it also identifies a strategic vacuum, as none of them have formulated strategies that describe in detail how military and intelligence entities are supposed to approach and manage the new strategic environment. The article asserts that the current lack of strategic guidance is a fundamental challenge that puts European societies at risk and undermines democratic governance as navigating the new space of strategic cyber competition is a significant challenge to contemporary European statecraft. It concludes by noting three avenues for how to ameliorate this situation and fill the vacuum.
        Export Export
7
ID:   139499


Cyber dimensions of the Syrian civil war: implications for future conflict / Grohe, Edwin   Article
Grohe, Edwin Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The use of cyber operations, as well as the interaction of other elements of power that have an effect on cyber operations, represents another method by which nations and non-state actors may attempt to achieve political ends. The Syrian civil war has encompassed many elements of warfare, including cyber operations. A study of the observed cyber operations by both direct and indirect participants in the Syrian civil war can lead to valuable lessons regarding who operates in the cyber domain, what these operators can accomplish, and how a nation-state can respond. These lessons may be applied to future conflicts.
        Export Export
8
ID:   128705


Cyber operations: bridging form concept to cyber superiority / Kallberg, Jan; Thuraisingham, Bhavani   Journal Article
Thuraisingham, Bhavani Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
        Export Export
9
ID:   113382


Cyber operations and jus in bello / Melzer, Nils   Journal Article
Melzer, Nils Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
10
ID:   188891


Cyber Operations and Signaling: an Exchange – The Authors Reply / Lonergan, Erica D; Lonergan, Shawn W   Journal Article
Lonergan, Shawn W Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In response to our article, “Cyber Operations, Accommodative Signaling, and the De-Escalation of International Crises,” we are delighted to engage with three scholars: Brandon K. Yoder, Fiona S. Cunningham, and Michael P. Fischerkeller. By way of background, this project grew out of our prior research on cyber operations’ limitations for coercion and the paucity of evidence that cyber operations cause escalation.Footnote1 Our inherent intuition was that cyber operations may be useful for conveying an aversion to significantly escalate disputes for some of the same reasons they are poor tools of coercion—and that this could help account for the relatively robust empirical finding that cyber operations are not associated with crisis escalation.Footnote2 Therefore, one part of our argument rests on cyber operations’ relatively limited effects compared to other tools at a state’s disposal.
Key Words Signaling  Cyber Operations 
        Export Export
11
ID:   161529


Cyber operations and useful fools: the approach of Russian hybrid intelligence / Gioe, David V   Journal Article
Gioe, David V Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article argues that Russian intelligence has achieved recent success in influencing democratic elections and referenda by combining the traditional Human Intelligence (HUMINT) discipline of manipulating useful fools with cutting edge cyber tactics, including hacking, phishing, social engineering, and weaponizing purloined information. This essay further argues that this synthesis yields greater effects than the sum of its parts. Given its potency, democracies and NATO members should expect to confront this type of threat more often. The 2016 American presidential election is used as a case study to conceptualize Russian hybrid intelligence, a new term reminiscent of Soviet ‘complex active measures’ and updated for the twenty-first century.
        Export Export
12
ID:   188212


Cyber Operations, Accommodative Signaling, and the De-Escalation of International Crises / Lonergan, Erica D; Lonergan, Shawn W   Journal Article
Lonergan, Shawn W Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Signaling is a core element of international crisis bargaining and coercive diplomacy. To succeed in crises, a state must convey to its opponent that it possesses the capability to impose an advantageous outcome and that it is resolved to do so, while also managing the risks of unintended escalation and war. However, less studied in signaling literature is how states can use signals for the purposes of managing escalation risks or even de-escalating crises. In this article, we develop a theory of signaling in cyberspace. We argue that, although cyber operations are not particularly well suited as costly signals of resolve or capabilities in the context of coercive diplomacy, they have a distinct utility for signaling to manage escalation risks. We build a framework organized around the causal mechanisms of accommodative signaling in cyberspace and test it against a set of comparative case studies. We find that cyber operations can act as accommodative signaling under some conditions, particularly when decision makers are faced with managing tensions between simultaneously signaling to domestic audiences and adversary governments.
        Export Export
13
ID:   188890


Cyber Signaling: Deeper Case Research Tells a Different Story / Fischerkeller, Michael P   Journal Article
Fischerkeller, Michael P Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In “Cyber Operations, Accommodative Signaling, and the De-Escalation of International Crises,” Erica D. Lonergan and Shawn W. Lonergan develop a theory of accommodative signaling that focuses on states seeking to de-escalate a crisis while simultaneously satisfying a nationalistic constituency. They test their claims against five case studies, arguing that all support their theory. But for various reasons, none do. In the cases where they claim cyber operations are used for accommodative signaling, there is compelling evidence that the operations are coercive tactics employed as part of a coercive strategy. In the case where they claim a cyber operation was a coercive signal, the covert operations scholarship used to build their theory would conclude that the operation was an accommodative signal or was not primarily intended to send a signal.
Key Words Cyber Operations  Cyber Signaling 
        Export Export
14
ID:   130650


Cyber warfare and the laws of war / Jha, U C   Journal Article
Jha, U C Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
15
ID:   165133


Damoclean sword of offensive cyber: policy uncertainty and collective insecurity / Leuprecht, Christian; Szeman, Joseph   Journal Article
Leuprecht, Christian Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.
        Export Export
16
ID:   149755


False flag: Russia increases use of Ukraine cyber proxies / Pigman, Lincoln   Journal Article
Pigman, Lincoln Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Russia's cyber operations in Ukraine are increasingly dependent on criminal proxies. Lincoln Pigman examines what this means for cyber-security in Ukraine and beyond.
        Export Export
17
ID:   170890


Focus on fifth domain: cyber space operations should become an integral part of the IAF / Rai, Ramesh   Journal Article
Rai, Ramesh Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
18
ID:   162723


Hiding in plain sight: political effects of cyber operations / Sharp, Travis   Journal Article
Sharp, Travis Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Cyber operations may not impose much physical destruction, but they can squeeze at least three political pressure points: money, leadership and secrecy.
Key Words Cyber Operations 
        Export Export
19
ID:   150986


Incorporating offensive cyber operations into conventional deterrence strategies / Fischerkeller, Michael   Journal Article
Fischerkeller, Michael Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Cyber capabilities, whether used alone or in combination with other military tools, offer an opportunity to influence an adversary’s decision-making.
        Export Export
20
ID:   138703


Law of cyber targeting / Schmitt, Michael N   Article
Schmitt, Michael N Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The 2008 war between Georgia and Russia was predictably short, as Russian military might quickly trumped Georgian nationalist enthusiasm. Beyond its momentous geopolitical implications, it was the first war in which cyber activities loomed large; the conflict marked the public birth of “cyber war,” or at least cyber in war.
        Export Export
12Next