International Conflicts in Cyberspace - Battlefield of the 21st Century
()
About this ebook
Read more from Strategic Studies Institute
Russian Cyber Attack: The Rules of Cyber Warfare & Grizzly Steppe Report Rating: 0 out of 5 stars0 ratingsThe Korean Military Threat Rating: 0 out of 5 stars0 ratingsThe Battle against Al-Qaeda and Islamic State: History, Doctrine, Modus Operandi and U.S. Strategy to Defeat Terrorism Rating: 0 out of 5 stars0 ratingsTerrorist Sanctuary in the Sahara Rating: 0 out of 5 stars0 ratingsWhat Should the U.S. Army Learn From History? Rating: 0 out of 5 stars0 ratings
Related to International Conflicts in Cyberspace - Battlefield of the 21st Century
Related ebooks
Civil-military Relationship: Now and Then Rating: 0 out of 5 stars0 ratingsCombating a Modern Hydra: Al Qaeda and the Global War on Terrorism Rating: 0 out of 5 stars0 ratingsNonstate Warfare: The Military Methods of Guerillas, Warlords, and Militias Rating: 4 out of 5 stars4/5International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors Rating: 0 out of 5 stars0 ratingsJihadi Terrorism, Insurgency, and the Islamic State: A Small Wars Journal Anthology Rating: 0 out of 5 stars0 ratingsProxy Wars: Suppressing Violence through Local Agents Rating: 0 out of 5 stars0 ratingsUn-Winnable Wars Rating: 0 out of 5 stars0 ratingsU.S. Army Special Warfare Its Origin: Psychological and Unconventional Warfare, 1941-1952 Rating: 0 out of 5 stars0 ratingsWar In The Heart And Mind: The Moral Domain Of The Guerrilla Warrior Rating: 0 out of 5 stars0 ratingsCommonalities In Russian Military Operations In Urban Environments Rating: 0 out of 5 stars0 ratingsRanger Selection: A Sam Harper Military Thriller: Sam Harper, #0 Rating: 0 out of 5 stars0 ratingsInsider Threats Rating: 5 out of 5 stars5/5Arms and the People: Popular Movements and the Military from the Paris Commune to the Arab Spring Rating: 0 out of 5 stars0 ratingsGlobal Radical Islamist Insurgency: Al Qaeda and Islamic State Networks Focus: A Small Wars Journal Anthology Rating: 0 out of 5 stars0 ratingsDefining Critical Technologies For Special Operations Rating: 0 out of 5 stars0 ratingsResurgent Russia: An Operational Approach to Deterrence Rating: 0 out of 5 stars0 ratingsIt Takes More than a Network: The Iraqi Insurgency and Organizational Adaptation Rating: 0 out of 5 stars0 ratingsFighting Back: What Governments Can Do About Terrorism Rating: 0 out of 5 stars0 ratingsFlipping the Circle: A Political Thriller Rating: 0 out of 5 stars0 ratingsShadow Warriors: The Irish Army Ranger Wing Rating: 5 out of 5 stars5/5The Terrorist's Dilemma: Managing Violent Covert Organizations Rating: 4 out of 5 stars4/5Arms of Little Value: The Challenge of Insurgency and Global Instability in the Twenty-First Century Rating: 0 out of 5 stars0 ratingsThe Privatisation of Security in the Kurdistan Region of Iraq Rating: 0 out of 5 stars0 ratingsThe New Makers of Modern Strategy: From the Ancient World to the Digital Age Rating: 0 out of 5 stars0 ratingsThey Rest Not at Night: Footnotes from the Field of Operations Intelligence Rating: 0 out of 5 stars0 ratingsCyber Warfare: Its Implications on National Security Rating: 0 out of 5 stars0 ratingsGuerrilla Warfare: Insurgents, Rebels, and Terrorists from Sun Tzu to Bin Laden Rating: 0 out of 5 stars0 ratingsPacification Rating: 0 out of 5 stars0 ratingsSecret Intelligence in the European States System, 1918-1989 Rating: 0 out of 5 stars0 ratingsDrums In The Distance: Journeys Into the Global Far Right Rating: 4 out of 5 stars4/5
Internet & Web For You
Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsSix Figure Blogging Blueprint Rating: 5 out of 5 stars5/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Get Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsHow To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5Podcasting For Dummies Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline Rating: 0 out of 5 stars0 ratingsStop Asking Questions: How to Lead High-Impact Interviews and Learn Anything from Anyone Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Python QuickStart Guide: The Simplified Beginner's Guide to Python Programming Using Hands-On Projects and Real-World Applications Rating: 0 out of 5 stars0 ratingsThe Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsEverybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5The Designer's Web Handbook: What You Need to Know to Create for the Web Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5
Related categories
Reviews for International Conflicts in Cyberspace - Battlefield of the 21st Century
0 ratings0 reviews
Book preview
International Conflicts in Cyberspace - Battlefield of the 21st Century - Strategic Studies Institute
Legality in Cyberspace: An Adversary View
Table of Contents
Foreword
About the Authors
Summary
Introduction
The Cyber Security Schism
The Euro-Atlantic Consensus
Russian Views
Conclusion
Foreword
Table of Contents
While conflict in cyberspace is not a new phenomenon, the legality of hostile cyber activity at a state level remains imperfectly defined. While there is broad agreement among the United States and its allies that cyber warfare would be governed by existing law of armed conflict, with no need for additional treaties or conventions to regulate hostilities online, this view is not shared by many nations that the United States could potentially face as adversaries.
A range of foreign states use definitions for cyber conflict that are entirely different from our own, ex- tending to different concepts of what constitutes online hostilities and even a state of war. This leads to a potentially dangerous situation where an adversary could be operating according to an entirely different understanding of international law to that followed by the United States.
In this Letort Paper, Mr. Keir Giles uses Russian-language sources and interviews to illustrate the very distinct set of views on the nature of conflict in cyberspace that pertains to Russia. He provides an important window into Russian thinking and explains how fundamental Russian assumptions on the nature of cyber activity need to be considered when countering, or engaging with, Russian cyber initiatives.
The Strategic Studies Institute is pleased to offer this detailed analysis as an essential guide to the mindset of an important cyber actor, and one which it is essential for the United States to understand.
DOUGLAS C. LOVELACE, JR.
Director
Strategic Studies Institute and U.S. Army War College Press
About the Authors
Table of Contents
KEIR GILES is the director of the Conflict Studies Re - search Centre (CSRC), a group of deep subject matter experts on Eurasian security formerly attached to the United Kingdom (UK) Ministry of Defence. Now operating in the private sector, CSRC provides in-depth analysis on security issues affecting Russia and its relations with overseas partners. After beginning his career working with paramilitary aviation in the former Soviet Union and Ukraine immediately following the fall of the Soviet Union, Mr. Giles joined the BBC Monitoring Service (BBCM) to report on political and military affairs in the former Soviet space. While attached from BBCM to CSRC at the UK Defence Academy, he wrote and briefed for UK and North Atlantic Treaty Organization (NATO) government agencies on Russian defense and security issues. Uniquely, he is a double Associate Fellow of the Royal Institute of International Affairs (Chatham House) in London, UK, as well as a regular contributor to research projects on Russian security issues in both the UK and Europe. Mr. Giles’s work has appeared in academic and military publications across Europe and in the United States.
ANDREW MONAGHAN is a Research Fellow in the Russia and Eurasia Programme at Chatham House and Academic Visitor at St Antony’s College, Oxford, UK. Additionally, he is the Founder and Director of the Russia Research Network, an independent organization for the generation of information and expertise on Russian politics, security, and economic issues based in London. In this capacity, he has served as an expert witness to the House of Commons Foreign Affairs Select Committee. Until late 2012, Dr. Monaghan directed Russia related research in the Research Division of the NATO Defense College in Rome. In this role, he was also the senior researcher on energy security matters. Prior to that, he held positions as a Senior Research Associate at the Advanced Research and Assessment Group, part of the Defence Academy of the UK, and a Visiting Lecturer in the Defence Studies Department of King’s College, London, the civilian academic arm of the Joint Services Command and Staff College at the Defence Academy. Dr. Monaghan holds an M.A. in war studies and a Ph.D. in Russian foreign policy (Russian perspectives of Russia-European Union security relations) from the Department of War Studies, King’s College.
Summary
Table of Contents
The United States and its allies are in general agreement on the legal status of conflict in cyberspace. Although key principles remain unresolved, such as what precisely constitutes an armed attack or use of force in cyberspace, overall there is a broad legal consensus among Euro-Atlantic nations that existing international law and international commitments are sufficient to regulate cyber conflict.
This principle is described in multiple authoritative legal commentaries. But these can imply misleadingly that this consensus is global and unchallenged. In fact, China, Russia, and a number of like-minded nations have an entirely different concept of the applicability of international law to cyberspace as a whole, including to the nature of conflict within it. These nations could therefore potentially operate in cyberspace according to entirely different understandings of what is permissible under international humanitarian law, the law of armed conflict, and other legal baskets governing conduct during hostilities.
U.S. policymakers cannot afford to underestimate the extent to which Russian concepts and approaches differ from what they may take for granted. This includes the specific question of when, or whether, hos- tile action in cyberspace constitutes an act or state of war. Recent Russian academic and military commentary stresses the blurring of the distinction between war and peace, and asks to what extent this distinction still exists. This suggestion of a shifting boundary between war and peace is directly relevant to consideration of at what point Russia considers itself to be at war and therefore subject to specific legal constraints on actions in cyberspace.
Conversely, actions that are considered innocent and friendly by the United States and European nations are parsed as hostile actions by Russia, leading to Russian attempts to outlaw interference in another state’s information space.
The Russian notion of what constitutes a cyber