Query Result Set
Skip Navigation Links
   ActiveUsers:420Hits:19923757Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER OFFENSE (2) answer(s).
 
SrlItem
1
ID:   186375


Cyber Offense and a Changing Strategic Paradigm / Spector, Leonard   Journal Article
Spector, Leonard Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Although much secrecy surrounds the issue, unclassified literature provides numerous indications that China, Russia, and the United States are pursuing two offensive cyber capabilities with the potential to alter strategic relations among these countries. The two capabilities take the form of different modes of stealthily implanted malware to be used, as needed, in a future military crisis. One of these cyber capabilities is designed to compromise one or more elements of an adversary’s nuclear weapon systems—including nuclear command, control, communications, and early warning capabilities—and/or to disable an adversary’s nuclear weapons and delivery systems themselves by tampering with supply chains for internal electronic components or in-weapon computer code.1 The second cyber effort is intended to disrupt, perhaps catastrophically, an adversary’s critical infrastructure—i.e. its electric power, transportation, financial, communications, and other key systems.
        Export Export
2
ID:   178083


Cyber offense in NATO: challenges and opportunities / Jacobsen, Jeppe T   Journal Article
Jacobsen, Jeppe T Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract As a response to the Russian invasion of Crimea, NATO returned to the core military concepts of deterrence and collective defence. This NATO adaption has recently come to include attempts to integrate offensive cyber effects into NATO force structure and response doctrine. The article argues—counter to what is publicly declared—that such an integration does little to strengthen NATO's deterrence posture and is unlikely to deter non-military, hybrid cyber activity below the threshold of collective defence. The article identifies several practical challenges to the current integration effort, which include the temporal dimension of developing exploits, battle damage assessment and deconfliction. With these challenges in mind, the article suggests that deploying minor and less resourceful cyber effects that cause persistent ‘cyber annoyances’ holds an unappreciated potential as they can drain opponent resources, disturb vital IT-systems and complicate decision-making. The article ends by arguing that NATO should not adapt its collective defence clause to cyberspace. A more active NATO in cyberspace risks undermining the cyber-intelligence norm that so far has prevented escalation and thereby increasing the likelihood that Russia misinterprets intelligence and active cyber defence activities as military preparation, armament or an attack in the making.
Key Words NATO  Collective Defence  Cyber Offense  Cyberspace Risk 
        Export Export