Cyberwarfare and Critical Infrastructure

Total Page:16

File Type:pdf, Size:1020Kb

Cyberwarfare and Critical Infrastructure CYBERWARFARECenter for European Policy Analysis AND CRITICAL INFRASTRUCTURE w . c e p a o r g Assessing the New Threat Facing the Baltic States and the NATO Alliance Sebastiano Dina September 2019 2 Center for European Policy Analysis All opinions are those of the author(s) and do not necessarily represent the position or views of the institutions they represent or the Center for European Policy Analysis. About CEPA The Center for European Policy Analysis (CEPA) is a 501(c)(3), non-profit, non-partisan, public policy research institute. Our mission is to promote an economically vibrant, strategically secure, and politically free Europe with close and enduring ties to the United States. Our analytical team consists of the world’s leading experts on Central-East Europe, Russia, and its neighbors. Through cutting- edge research, analysis, and programs we provide fresh insight on energy, security, and defense to government officials and agencies; we help transatlantic businesses navigate changing strategic landscapes; and we build networks of future Atlanticist leaders. © 2019 by the Center for European Policy Analysis, Washington, DC. All rights reserved. No part of this publication may be used or reproduced in any manner whatsoever without permission in writing from the Center for European Policy Analysis, except in the case of brief quotations embodied in news articles, critical articles, or reviews. Center for European Policy Analysis 1275 Pennsylvania Ave NW, Suite 400 Washington, DC 20004 E-mail: [email protected] www.cepa.org Cover image: “The port of Klaipėda handled more than 46 million tons of cargo in 2018” by Lettered under CC BY-SA 4.0. 2 Center for European Policy Analysis CYBERWARFARE AND CRITICAL INFRASTRUCTURE Assessing the New Threat Facing the Baltic States and the NATO Alliance Sebastiano Dina 2019 Title VIII CEE Area Studies Fellow September 2019 2 Center for European Policy Analysis The Issue From the Editor: In Russian military thinking it is often difficult to discern a formalized doctrine of cyber warfare, but the totality of writing on the subject suggests that for Moscow, cyber is not an independent domain of operations but a subordinate part of the wider concept of information warfare. The term “cyber” as used in the West to denote computer network operations is alien to Russian thinking. For the Kremlin the key objective is information, and cyber is merely a tool to achieve that objective. In this brief, Title VIII Fellow Sebastiano Dina explores the threat of Russian CI cyberwarfare, as well as its implications for Baltic energy security and NATO’s deterrence posture. ussia is engaging in unrelenting cyberwarfare against the critical infrastructure of the United R States and its allies. As the United States moves to secure its domestic infrastructure, it must also coordinate efforts with NATO to protect vital Allied infrastructure and curtail Russian cyber-enabled influence operations. Due to their strategic position on NATO’s frontline, cooperation must begin with the three Baltic states: Estonia, Latvia, and Lithuania. Cyberwarfare and Critical2 Infrastructure, 1 Center for European Policy Analysis INTRODUCTION and others like them, highlight an inescapable fact: the CI of allies is inextricably tied to the Modern states depend on reliable infrastructure security and prosperity of the United States. to function. From roads and power stations, to oil pipelines and railways, infrastructure is Prime targets of Russian cyberwarfare—and inextricably tied to the economic prosperity U.S. allies whose critical infrastructure is of and national security of states. Among these paramount importance to the United States— infrastructure assets, some are considered so are the Baltic states. Due to their strategic vital to national interests that their destruction or position on or close to Russia’s border and incapacitation would have severe, debilitating effects on state function. These vital assets are commonly referred to as Critical Infrastructure (CI) and include the chemical, communications, energy, financial, transportation, nuclear, and wastewater sectors, among others.1 Since at least Since at least 2013, Russia has launched a 2013, Russia ceaseless cyberwarfare campaign to gain “ entry, survey, and take control of the CI of the has launched United States and its allies.2 To the Russian regime, the mere appearance of launching a a ceaseless cyberattack is a cost-effective, high-impact, and difficult-to-attribute tool to influence, cyberwarfare intimidate, and blackmail its opponents. In the campaign to gain event of a military confrontation, Russia could use full-fledged cyberattacks to temporarily entry, survey, and incapacitate the vital infrastructure of its adversaries.3 And left unchecked, Russia take control of the CI will continue to develop this capability, endangering the U.S. homeland, economy, of the United States international interests, and global military and its allies. logistics network, as well as those of its allies. With forces deployed abroad, and wide-ranging economic and strategic interests overseas, the United States relies on the CI of its allies.4 ” American logistics lines to Europe run through allied ports like Bremerhaven in Germany.5 U.S. their significant Russian-speaking minority military aircraft in Europe fly through airspace populations, the Baltic states are a constant regulated by NATO Allies and Partners.6,7 And target of Russian influence operations and at U.S. defense manufacturing, as in the case of perennial risk of Russian incursion.10,11 From the F-35, relies on parts and spares built in the U.S. perspective, the Baltic states are NATO member states.8,9 These dependencies, valuable allies whose position on NATO’s Cyberwarfare and Critical2 Infrastructure, 2 Center for European Policy Analysis frontline makes their CI essential for the RUSSIA’S APPROACH TO sustainment and rapid deployment of Allied forces. Additionally, the Baltic states’ smaller CYBERWARFARE economies and limited cyber recruitment pool may create gaps in their future capacity It is often difficult to discern a formalized doctrine to counter Russian cyberattacks. By sharing in Russian military writing.12 But an inescapable cybersecurity expertise with the Baltic states, concept nonetheless emerges from analysis of the United States can help close these gaps, government, military, and academic sources: thwart Russian cyber-enabled influence for Moscow, cyber is not an independent operations, and deter Russian incursions into domain of operations but a subordinate Baltic territory. part of the wider concept of information warfare (informatsionaya voyna).13,14 More This policy brief explores the threat of Russian CI fundamentally, the term “cyber” as used in the cyberwarfare, its implications for Baltic energy West to denote computer network operations security, and NATO’s deterrence posture. The (CNO) is not a “Russian concept,” and terms like first section traces Russia’s unique approach “cyber warfare” are only ever used in Russian to cyberwarfare. The second offers a technical sources to describe “foreign concepts and primer on Russian CI attack methods. The third activities.”15 To Russian experts, the difference analyses the threat of Russian cyberattacks to between CNO (cyber) and any other tool to Baltic energy security. It concludes with policy collect, spread, and amplify disinformation— and technical recommendations to counter like bot networks or propaganda websites—is this emergent threat. negligible and spurious.16 The key objective is “NATO Secretary General visits Estonia” by NATO North Atlantic Treaty Organization under CC BY-NC-ND 2.0. Cyberwarfare and Critical82 Infrastructure, 3 Center for European Policy Analysis information. Cyber is merely a tool to achieve Second, for maximum psychological effect, that objective. Russian cyberattacks are often carried out at symbolic times. For instance, cyberattacks More broadly, information warfare is the use of against Ukraine—including the 2015 attack— “informational-technical” and “informational- often correspond with national holidays like psychological” means, such as electronic Constitution Day, Independence Day, and warfare, psychological operations, and disinformation to “dominate the information landscape” and “reduce the fighting potential of the enemy.”17,18 Russian information warfare manipulates, distorts, destroys, and fabricates information which it then proliferates into the Past Russian press, academia, and social media to control international narratives, foment dissent, and cyberattacks incapacitate an adversary’s decision-making. “ Contrary to Western doctrine on information have been as much warfare, the Russian approach—which harkens back to Soviet methods—is for information about achieving the warfare to be conducted at all times and aims of information against any target, regardless of the state of hostilities.19 warfare through Past Russian cyberattacks have been as influence and much about achieving the aims of information intimidation as warfare through influence and intimidation as they have been about physical destruction. they have been A telling example was the 2015 cyberattack against Ukraine’s electrical grid.20 During this about physical operation, Russian hackers infiltrated the control systems of three Ukrainian power destruction. companies and caused a six-hour blackout that affected an estimated 225,000 customers in the Ivano-Frankivsk, Chernivtsi, and Kyiv 21 Oblasts. Christmas.23 Finally, by tauntingly”
Recommended publications
  • The Erosion of Strategic Stability and the Future of Arms Control in Europe
    Études de l’Ifri Proliferation Papers 60 THE EROSION OF STRATEGIC STABILITY AND THE FUTURE OF ARMS COntrOL IN EUROPE Corentin BRUSTLEIN November 2018 Security Studies Center The Institut français des relations internationales (Ifri) is a research center and a forum for debate on major international political and economic issues. Headed by Thierry de Montbrial since its founding in 1979, Ifri is a non- governmental, non-profit organization. As an independent think tank, Ifri sets its own research agenda, publishing its findings regularly for a global audience. Taking an interdisciplinary approach, Ifri brings together political and economic decision-makers, researchers and internationally renowned experts to animate its debate and research activities. The opinions expressed in this text are the responsibility of the author alone. ISBN: 978-2-36567-932-9 © All rights reserved, Ifri, 2018 How to quote this document: Corentin Brustlein, “The Erosion of Strategic Stability and the Future of Arms Control in Europe”, Proliferation Papers, No. 60, November 2018. Ifri 27 rue de la Procession 75740 Paris Cedex 15 – FRANCE Tel.: +33 (0)1 40 61 60 00 – Fax: +33 (0)1 40 61 60 60 Email: [email protected] Website: Ifri.org Author Dr. Corentin Brustlein is the Director of the Security Studies Center at the French Institute of International Relations. His work focuses on nuclear and conventional deterrence, arms control, military balances, and U.S. and French defense policies. Before assuming his current position, he had been a research fellow at Ifri since 2008 and the head of Ifri’s Deterrence and Proliferation Program since 2010.
    [Show full text]
  • Does It Promote Pakistan's Strategic Interests?
    07 “Strategic Depth”: Does It Promote Pakistan’s Strategic Interests? : Raheem ul Haque fied Pakistan's insecurity syndrome leading to an illusive In assessing Pakistan's response to the ongoing 'global search for Strategic Depth , third, although it shook the war on terrorism' in Afghanistan, this paper presents two foundations of "Two Nation Theory", Pakistan still began sets of arguments; first, I argue that Pakistan's strategic to drift towards Islamization through invoked fears of interests constituting secure and peaceful borders along 'Hindu India'. All this obliterated Jinnah's vision of liberal, with internal strength, development and prosperity, are secular and democratic Pakistan. Although the process annulled rather than furthered by the Strategic Depth had begun with the adoption of Objectives Resolution in policy framework, adopted and pursued for the last three 1949, anti-Ahemdia riots in 1953, Pakistan's joining of decades. Although this framework has allowed Pakistan anti- Communist block, SEATO and CENTO pacts, how­ to maintain a semblance of regional military power bal­ ever, it accelerated through State sanction in post 1971 ance with India, yet it has led to a rise of extremism and Pakistan with the passage of bill (1974) declaring Ahmedis militancy within Pakistani society and to a loss of internal as 'non-Muslim', the religious parties led PNA movement sovereignty. Today, this flawed policy has created condi­ against the PPP government in March-April 1977 and tions that have made Pakistan a sanctuary for ideologi­ General Zia- ul Haq's military coup in July—who was quick cal non-state actors. Second, with an in-depth analysis to announce that Pakistan was an 'Ideological State'2, and scrutiny of factors and actors in the three decades thus Jinnah's vision of Pakistan was deconstructed3.
    [Show full text]
  • Pakistan's Future Policy Towards Afghanistan. a Look At
    DIIS REPORT 2011:08 DIIS REPORT PAKISTAN’S FUTURE POLICY TOWARDS AFGHANISTAN A LOOK AT STRATEGIC DEPTH, MILITANT MOVEMENTS AND THE ROLE OF INDIA AND THE US Qandeel Siddique DIIS REPORT 2011:08 DIIS REPORT DIIS . DANISH INSTITUTE FOR INTERNATIONAL STUDIES 1 DIIS REPORT 2011:08 © Copenhagen 2011, Qandeel Siddique and DIIS Danish Institute for International Studies, DIIS Strandgade 56, DK-1401 Copenhagen, Denmark Ph: +45 32 69 87 87 Fax: +45 32 69 87 00 E-mail: [email protected] Web: www.diis.dk Cover photo: The Khyber Pass linking Pakistan and Afghanistan. © Luca Tettoni/Robert Harding World Imagery/Corbis Layout: Allan Lind Jørgensen Printed in Denmark by Vesterkopi AS ISBN 978-87-7605-455-7 Price: DKK 50.00 (VAT included) DIIS publications can be downloaded free of charge from www.diis.dk Hardcopies can be ordered at www.diis.dk This publication is part of DIIS’s Defence and Security Studies project which is funded by a grant from the Danish Ministry of Defence. Qandeel Siddique, MSc, Research Assistant, DIIS [email protected] 2 DIIS REPORT 2011:08 Contents Abstract 6 1. Introduction 7 2. Pakistan–Afghanistan relations 12 3. Strategic depth and the ISI 18 4. Shift of jihad theatre from Kashmir to Afghanistan 22 5. The role of India 41 6. The role of the United States 52 7. Conclusion 58 Defence and Security Studies at DIIS 70 3 DIIS REPORT 2011:08 Acronyms AJK Azad Jammu and Kashmir ANP Awani National Party FATA Federally Administered Tribal Areas FDI Foreign Direct Investment FI Fidayeen Islam GHQ General Headquarters GoP Government
    [Show full text]
  • Cyber Law and Espionage Law As Communicating Vessels
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
    [Show full text]
  • Won't You Be My Neighbor
    Won’t You Be My Neighbor: Syria, Iraq and the Changing Strategic Context in the Middle East S TEVEN SIMON Council on Foreign Relations March 2009 www.usip.org Date www.usip.org UNITED STATES INSTITUTE OF PEACE – WORKING PAPER Won’t You Be My Neighbor UNITED STATES INSTITUTE OF PEACE 1200 17th Street NW, Suite 200 Washington, DC 20036-3011 © 2009 by the United States Institute of Peace. The views expressed in this report do not necessarily reflect the views of the United States Institute of Peace, which does not advocate specific policy positions. This is a working draft. Comments, questions, and permission to cite should be directed to the author ([email protected]) or [email protected]. This is a working draft. Comments, questions, and permission to cite should be directed to the author ([email protected]) or [email protected]. UNITED STATES INSTITUTE OF PEACE – WORKING PAPER Won’t You Be My Neighbor About this Report Iraq's neighbors are playing a major role—both positive and negative—in the stabilization and reconstruction of post-Saddam Iraq. In an effort to prevent conflict across Iraq's borders and in order to promote positive international and regional engagement, USIP has initiated high-level, non-official dialogue between foreign policy and national security figures from Iraq, its neighbors and the United States. The Institute’s "Iraq and its Neighbors" project has also convened a group of leading specialists on the geopolitics of the region to assess the interests and influence of the countries surrounding Iraq and to explain the impact of these transformed relationships on U.S.
    [Show full text]
  • Deterrence and First-Strike Stability in Space
    THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Project AIR FORCE View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Deterrence and First-Strike Stability in Space A Preliminary Assessment Forrest E.
    [Show full text]
  • Glenn Snyder's Deterrence Theory and NATO's Deterrence Strategy
    Glenn Snyder’s Deterrence Theory and NATO’s Deterrence Strategy during the Cold War (YAMASHITA Aihito) Glenn Snyder’s Deterrence Theory and NATO’s Deterrence Strategy during the Cold War Col. YAMASHITA Aihito Director, Center for Air and Space Power Strategic Studies Introduction The main strategic issues on NATO that the U.S. and Europe faced during the Cold War, when they are marshaled from the perspective of deterrence particularly for Europe, should be summarized as the questions of how to deter invasion by the Soviet Union, how to secure extended deterrence by the U.S., and in particular, how to enhance the credibility of the U.S. deterrence by punishment.1 NATO’s conventional military forces dominated by NATO’s ground troops were extremely vulnerable to those of the Soviet Union, which meant a significant disparity.2 Therefore, extended deterrence by the U.S. was thought to be essential for NATO in order to produce deterrent effect on the Soviet Union in the circumstances of the significant disparity in the conventional military forces dominated by ground troops. However, after the Soviet Union acquired the ability to attack the U.S. mainland with its nuclear weapons (typically represented by the situation of mutual assured destruction), Europe began to doubt the effectiveness of extended deterrence by the U.S. In this context, various theories including “stability-instability paradox” and “entrapment-abandonment” were discussed. 69 Air Power Studies (vol. 6) The concern Europe felt was connected with the controversy over the positioning theory of nuclear weapons in the U.S., that is, how the nature of nuclear weapons should be defined.
    [Show full text]
  • Pakistani Nuclear Doctrine and the Dangers of Strategic Myopia
    PAKISTANI NUCLEAR DOCTRINE AND THE DANGERS OF STRATEGIC MYOPIA Timothy D. Hoyt The formal introduction of nuclear weapons into South Asian regional security raises important questions about the stability of the region. As two traditionally hostile states induct nuclear weapons and so- phisticated delivery systems into their militaries, what will keep them from utilizing these new weapons for coercion or warfare? Proliferation “opti- mists” argue that states will be deterred from destabilizing actions by the inherent mismatch in costs and benefits or risks and potential gains from challenging a nuclear-armed adversary.1 Proliferation “pessimists” point to the dangers of the spread of nuclear weapons; the myriad of things that can go wrong once nuclear weapons are introduced into an already heated con- flict situation; and the lack of careful thought and planning that might go into the development, deployment, and use of nuclear forces.2 Timothy D. Hoyt is Visiting Assistant Professor for the Security Stud- ies Program, Georgetown University, Washington, D.C., and Professor of Strategy in the College of Continuing Education, a nonresident program of the U.S. Naval War College, Newport, Rhode Island. The conclusions expressed here are the author’s own and do not reflect the opin- ions of the Naval War College or any other official organization. Asian Survey, 41:6, pp. 956–977. ISSN: 0004–4687 Ó 2001 by The Regents of the University of California. All rights reserved. Send Requests for Permission to Reprint to: Rights and Permissions, University of California Press, Journals Division, 2000 Center St., Ste. 303, Berkeley, CA 94704–1223.
    [Show full text]
  • Understanding Strategic Interaction in the Second Nuclear Age
    UNDERSTANDING STRATEGIC INTERACTION IN THE SECOND NUCLEAR AGE THOMAS G. MAHNKEN GILLIAN EVANS TOSHI YOSHIHARA ERIC S. EDELMAN JACK BIANCHI UNDERSTANDING STRATEGIC INTERACTION IN THE SECOND NUCLEAR AGE THOMAS G. MAHNKEN GILLIAN EVANS TOSHI YOSHIHARA ERIC EDELMAN JACK BIANCHI 2019 ABOUT THE CENTER FOR STRATEGIC AND BUDGETARY ASSESSMENTS (CSBA) The Center for Strategic and Budgetary Assessments is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s analysis focuses on key questions related to existing and emerging threats to U.S. national security, and its goal is to enable policymakers to make informed decisions on matters of strategy, security policy, and resource allocation. ©2019 Center for Strategic and Budgetary Assessments. All rights reserved. ABOUT THE AUTHORS Thomas G. Mahnken is President and Chief Executive Officer of the Center for Strategic and Budgetary Assessments. He is a Senior Research Professor at the Philip Merrill Center for Strategic Studies at The Johns Hopkins University’s Paul H. Nitze School of Advanced International Studies (SAIS) and has served for over 20 years as an officer in the U.S. Navy Reserve, to include tours in Iraq and Kosovo. He currently serves as a member of the Congressionally-mandated National Defense Strategy Commission and as a member of the Board of Visitors of Marine Corps University. His previous government career includes service as Deputy Assistant Secretary of Defense for Policy Planning from 2006–2009, where he helped craft the 2006 Quadrennial Defense Review and 2008 National Defense Strategy. He served on the staff of the 2014 National Defense Panel, 2010 Quadrennial Defense Review Independent Panel, and the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction.
    [Show full text]
  • 10Th International Conference on Cyber Conflict Cycon X: Maximising Effects
    2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, or for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström, (Eds.) 2018 © NATO CCD COE Publications NATO CCD COE Publications LEGAL NOTICE: This publication contains the opinions of the respective authors only. They do not Filtri tee 12, 10132 Tallinn, Estonia necessarily reflect the policy or the opinion of NATO Phone: +372 717 6800 CCD COE, NATO, or any agency or any government. NATO CCD COE may not be held responsible for Fax: +372 717 6308 any loss or harm arising from the use of information E-mail: [email protected] contained in this book and is not responsible for the Web: www.ccdcoe.org content of the external sources, including external websites referenced in this publication.
    [Show full text]
  • Cyber-Attacks to Critical Energy Infrastructure
    Cyber-attacks to critical energy infrastructure and management issues: overview of selected cases Tomas Plėta, Manuela Tvaronavičienė, Silvia Casa, Konstantin Agafonov To cite this version: Tomas Plėta, Manuela Tvaronavičienė, Silvia Casa, Konstantin Agafonov. Cyber-attacks to critical en- ergy infrastructure and management issues: overview of selected cases. Insights into Regional Develop- ment, Entrepreneurship and Sustainability Center, 2020, 2 (3), pp.703 - 715. 10.9770/ird.2020.2.3(7). hal-03271856 HAL Id: hal-03271856 https://hal.archives-ouvertes.fr/hal-03271856 Submitted on 27 Jun 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. INSIGHTS INTO REGIONAL DEVELOPMENT ISSN 2669-0195 (online) http://jssidoi.org/IRD/ 2020 Volume 2 Number 3 (September) http://doi.org/10.9770/IRD.2020.2.3(7) Publisher http://jssidoi.org/esc/home CYBER-ATTACKS TO CRITICAL ENERGY INFRASTRUCTURE AND MANAGEMENT ISSUES: OVERVIEW OF SELECTED CASES* Tomas Plėta ¹, Manuela Tvaronavičienė ², Silvia Della Casa ³, Konstantin Agafonov 4 1,2 Vilnius Gediminas Technical University, Saulėtekio al. 11, LT-10223 Vilnius, Lithuania 2General Jonas Zemaitis Military Academy of Lithuania, Šilo 5a, LT-10322, Vilnius, Lithuania 3Daugavpils University, Parades Str. 1-421, Daugavpils, LV-5401, 3 NATO Energy Security Center Of Excellence, Šilo g.
    [Show full text]
  • Nuclear-Conventional-Firebreaks
    NUCLEAR-CONVENTIONAL FIREBREAKS AND THE NUCLEAR TABOO BARRY D. WATTS NUCLEAR-COnVEnTIOnAL FIREBREAKS AnD THE NUCLEAR TABOO BY BARRy D. WATTS 2013 Acknowledgments The idea of exploring systematically why the leaders of various nations have chosen to maintain, or aspire to acquire, nuclear weapons was first suggested to me by Andrew W. Marshall. In several cases, the motivations attributed to national leaders in this report are undoubtedly speculative and open to debate. Nevertheless, it is a fact that the rulers of at least some nations entertain strong reasons for maintaining or acquiring nuclear weapons that have nothing to do with the nuclear competition between the United States and the former Soviet Union, either before or after 1991. Eric Edelman provided valuable suggestions on both substance and sources. At the Center for Strategic and Budgetary Assessments, Abby Stewart and Nick Setterberg did the majority of the editing. I am especially grateful to Nick for vetting the footnotes. Last but not least, Andrew Krepinevich’s suggestions on the narrative flow and the structure of the paper’s arguments greatly clarified the original draft. © 2013 Center for Strategic and Budgetary Assessments. All rights reserved. COnTEnTS 1 INTRODUCTION AND SUMMARY 5 THE AMERICAN SEARCH FOR ALTERNATIVES TO GENERAL NUCLEAR WAR 5 Context 7 Atomic Blackmail and Massive Nuclear Retaliation 11 Flexible Response and Assured Destruction 15 The Long Range Research and Development Planning Program 19 Selective Nuclear Options and Presidential Directive/NSC-59 23 The Strategic Defense Initiative 26 The Soviet General Staff, LNOs and Launch on Warning 29 POST-COLD WAR DEVELOPMENTS IN THE UNITED STATES AND RUSSIA 29 Evolving U.S.
    [Show full text]