Introduction: Cyber and the Changing Face of War
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Analysis of Cyberwarfare Ethics As It Pertains to Civilian Computer Networks/Infrastructures
Analysis of Cyberwarfare Ethics as It Pertains to Civilian Computer Networks/Infrastructures Vanessa Paradine Terms of Reference and Scope The Department of Defense (DoD) currently operates more than fifteen thousand different computer networks across four thousand military installations around the world, with as many as seven million DoD computers and telecommunications tools in use in eighty-eight countries.1 These networks experience over six million unauthorized probes per day.2 Due to the close integration of DoD and commercial networks, an attack within the cyber domain may significantly impact critical civilian infrastructures and networks. For the purpose of this article, the following definitions are pro vided: • Cyberspace, as defined by the National Security Presidential Di rective 541H0meland Security Presidential Directive 23, is "the interdependent network of information technology infrastruc tures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries."3 • Cyberspace operations is defined as "the employment of cy berspace capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace."4 • Cyberwarfare/cyberattack has not been defined by the Depart ment of the Defense (DoD); however, according to Deputy Defense Secretary William J. Lynn III, it can include a range of things-"from exploitation and exfiltration of data to degrada tion of networks to destruction of networks or even physical equipment, physical property."5 • Cyber Threats6 o Virtual-nonkinetic threats to DoD information networks that are just as real and damaging as physical threats. 34 Internatianal Journal of Intelligence Ethics, Vol. 4, No. 1 / Spring/Summer 2013 Analysis of Cyberwarfare Ethics 35 o Physical-kinetic threats mixed with nonkinetic threats; can severely impact the effectiveness of military joint operations. -
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
Cognitive Warfare.Pdf
1 Table of Contents Executive Summary 3 Introduction 5 Evolution of Non-Kinetic Warfare 6 Origins 6 Psychological Warfare (PsyOps) 7 Electronic Warfare (EW) 7 Cyberwarfare 8 Information Warfare 8 Cognitive Warfare 9 Goals of Cognitive Warfare 11 Destabilization 12 Case 1: Destabilization through Confusion 13 Case 2: Destabilization by Sowing Division 15 Case 3: Destabilization as a Means to Influence 17 Influence 20 Case 1: Influencing to Recruit 21 Case 2: Influencing Policy Enactment 22 Case 3: Influencing as a Means to Destabilize 23 Future Threats 27 Looking Ahead 27 Threat 1: Ease of Selection and Virality 29 Threat 2: A New Age of Truth 30 Threat 3: Cyber-induced Institutional Discomfort and Distrust 31 Threat 4: Biological and Therapeutic Emotional Manipulation 32 Threat 5: Enhanced Recruitment of Agents 33 Strategy Recommendations 35 Threat Recognition Framework and Criteria 35 Risk Assessment 36 Organizational Implementations 37 Offensive Considerations 39 Closing Thoughts 40 Bibliography 41 2 Executive Summary Warfare has shifted dramatically over the past several decades, moving away from the physical threats of conventional warfare. War now moves towards the social and ideological threats brought about by mass media and advances in technology. The advent of this new type of warfare is different from anything we have seen before. Although it takes elements from previous types of hybrid warfare, the reach and level of impact it possesses make it far more dangerous than its predecessors. We have dubbed this new way of war cognitive warfare. Cognitive warfare, although sharing various similarities to other non-conventional and non-kinetic types of warfare/operations, is ultimately unique in its execution and purpose. -
Uncertainty and Civil War Onset
Uncertainty and Civil War Onset Iris Malone∗ Abstract Why do some armed groups escalate their campaigns to civil war, while others do not? Only 25% of the 960 armed groups formed between 1970 and 2012 became violent enough to surpass the 25-battle death threshold, often used to demarcate \civil conflict.” I develop a new theory that argues this variation occurs because of an information problem. States decide how much counterinsurgency effort to allocate for repression on the basis of observable characteristics about an armed group's initial capabilities, but two scenarios make it harder to get this decision right, increasing the risk of civil war. I use fieldwork interviews with intelligence and defense officials to identify important group characteristics for civil war and apply machine learning methods to test the predictive ability of these indicators. The results show that less visible armed groups in strong states and strong armed groups in weak states are most likely to lead to civil war onset. These findings advance scholarly understanding about why civil wars begin and the effect of uncertainty on conflict. ∗Department of Political Science, 100 Encina Hall West, Stanford University, Stanford, CA 94305. ([email protected], web.stanford.edu/~imalone). 1 Introduction Why do some armed groups escalate their campaigns to civil war, while most do not? Using an original dataset, I show that only 25% of the 960 armed groups formed between 1970 and 2012 became violent enough to surpass the 25-battle death threshold, often used to demarcate \civil conflict.”1 Only 8% of armed groups surpassed the higher \civil war" threshold of 1000 fatalities per year. -
Social-Property Relations, Class-Conflict and The
Historical Materialism 19.4 (2011) 129–168 brill.nl/hima Social-Property Relations, Class-Conflict and the Origins of the US Civil War: Towards a New Social Interpretation* Charles Post City University of New York [email protected] Abstract The origins of the US Civil War have long been a central topic of debate among historians, both Marxist and non-Marxist. John Ashworth’s Slavery, Capitalism, and Politics in the Antebellum Republic is a major Marxian contribution to a social interpretation of the US Civil War. However, Ashworth’s claim that the War was the result of sharpening political and ideological – but not social and economic – contradictions and conflicts between slavery and capitalism rests on problematic claims about the rôle of slave-resistance in the dynamics of plantation-slavery, the attitude of Northern manufacturers, artisans, professionals and farmers toward wage-labour, and economic restructuring in the 1840s and 1850s. An alternative social explanation of the US Civil War, rooted in an analysis of the specific path to capitalist social-property relations in the US, locates the War in the growing contradiction between the social requirements of the expanded reproduction of slavery and capitalism in the two decades before the War. Keywords origins of capitalism, US Civil War, bourgeois revolutions, plantation-slavery, agrarian petty- commodity production, independent-household production, merchant-capital, industrial capital The Civil War in the United States has been a major topic of historical debate for almost over 150 years. Three factors have fuelled scholarly fascination with the causes and consequences of the War. First, the Civil War ‘cuts a bloody gash across the whole record’ of ‘the American . -
Law of Armed Conflict
Lesson 1 THE LAW OF ARMED CONFLICT Basic knowledge International Committee of the Red Cross Unit for Relations with Armed and Security Forces 19 Avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org Original: English – June 2002 INTRODUCTION TO THE LAW OF ARMED CONFLICT BASIC KNOWLEDGE LESSON 1 [ Slide 2] AIM [ Slide 3] The aim of this lesson is to introduce the topic to the class, covering the following main points: 1. Background: setting the scene. 2. The need for compliance. 3. How the law evolved and its main components. 4. When does the law apply? 5. The basic principles of the law. INTRODUCTION TO THE LAW OF ARMED CONFLICT 1. BACKGROUND: SETTING THE SCENE Today we begin a series of lectures on the law of armed conflict, which is also known as the law of war, international humanitarian law, or simply IHL. To begin, I’d like to take a guess at what you’re thinking right now. Some of you are probably thinking that this is an ideal opportunity to catch up on some well-earned rest. “Thank goodness I’m not on the assault course or on manoeuvres. This is absolutely marvellous. I can switch off and let this instructor ramble on for 45 minutes. I know all about the Geneva Conventions anyway – the law is part of my culture and our military traditions. I really don't need to listen to all this legal ‘mumbo jumbo’.” The more sceptical and cynical among you might well be thinking along the lines of a very famous orator of ancient Rome – Cicero. -
Cyber War, Cybered Conflict, and the Maritime Domain Peter Dombrowski
Naval War College Review Volume 67 Article 7 Number 2 Spring 2014 Cyber War, Cybered Conflict, and the Maritime Domain Peter Dombrowski Chris C. Demchak Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Dombrowski, Peter and Demchak, Chris C. (2014) "Cyber War, Cybered Conflict, and the Maritime Domain," Naval War College Review: Vol. 67 : No. 2 , Article 7. Available at: https://digital-commons.usnwc.edu/nwc-review/vol67/iss2/7 This Article is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Dombrowski and Demchak: Cyber War, Cybered Conflict, and the Maritime Domain CYBER WAR, CYBERED CONFLICT, AND THE MARITIME DOMAIN Peter Dombrowski and Chris C. Demchak t has been well over a decade since the first “prophets” of information warfare proclaimed a new age of conflict fought not just on air, sea, and land but with 1 Ielectrons in what came to be known as “cyberspace�” Since these early predic- tions, many incidents have confirmed that criminals, random hackers, and government-sanctioned specialists can wreak havoc on governments, military communications systems, and corporations� The Stuxnet worm alone helped delay—by months, perhaps years—the long-standing efforts of Iran to acquire sufficient nuclear material to build nuclear weapons�2 Recent -
American War and Military Operations Casualties: Lists and Statistics
American War and Military Operations Casualties: Lists and Statistics Updated July 29, 2020 Congressional Research Service https://crsreports.congress.gov RL32492 American War and Military Operations Casualties: Lists and Statistics Summary This report provides U.S. war casualty statistics. It includes data tables containing the number of casualties among American military personnel who served in principal wars and combat operations from 1775 to the present. It also includes data on those wounded in action and information such as race and ethnicity, gender, branch of service, and cause of death. The tables are compiled from various Department of Defense (DOD) sources. Wars covered include the Revolutionary War, the War of 1812, the Mexican War, the Civil War, the Spanish-American War, World War I, World War II, the Korean War, the Vietnam Conflict, and the Persian Gulf War. Military operations covered include the Iranian Hostage Rescue Mission; Lebanon Peacekeeping; Urgent Fury in Grenada; Just Cause in Panama; Desert Shield and Desert Storm; Restore Hope in Somalia; Uphold Democracy in Haiti; Operation Enduring Freedom (OEF); Operation Iraqi Freedom (OIF); Operation New Dawn (OND); Operation Inherent Resolve (OIR); and Operation Freedom’s Sentinel (OFS). Starting with the Korean War and the more recent conflicts, this report includes additional detailed information on types of casualties and, when available, demographics. It also cites a number of resources for further information, including sources of historical statistics on active duty military deaths, published lists of military personnel killed in combat actions, data on demographic indicators among U.S. military personnel, related websites, and relevant CRS reports. Congressional Research Service American War and Military Operations Casualties: Lists and Statistics Contents Introduction .................................................................................................................................... -
Civilians in Cyberwarfare: Conscripts
Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION ............................................................. -
The Ethics of Cyberwarfare Randall R
This article was downloaded by: [University of Pennsylvania] On: 28 February 2013, At: 08:22 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Journal of Military Ethics Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/smil20 The Ethics of Cyberwarfare Randall R. Dipert a a SUNY (State University of New York) at Buffalo, NY, USA Version of record first published: 16 Dec 2010. To cite this article: Randall R. Dipert (2010): The Ethics of Cyberwarfare, Journal of Military Ethics, 9:4, 384-410 To link to this article: http://dx.doi.org/10.1080/15027570.2010.536404 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/terms-and- conditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae, and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. Journal of Military Ethics, Vol. 9, No. 4, 384Á410, 2010 The Ethics of Cyberwarfare RANDALL R. -
Law of War Handbook 2005
LAW OF WAR HANDBOOK (2005) MAJ Keith E. Puls Editor 'Contributing Authors Maj Derek Grimes, USAF Lt Col Thomas Hamilton, USMC MAJ Eric Jensen LCDR William O'Brien, USN MAJ Keith Puls NIAJ Randolph Swansiger LTC Daria Wollschlaeger All of the faculty who have served before us and contributed to the literature in the field of operational law. Technical Support CDR Brian J. Bill, USN Ms. Janice D. Prince, Secretary JA 423 International and Operational Law Department The Judge Advocate General's Legal Center and School Charlottesville, Virginia 22903 PREFACE The Law of War Handbook should be a start point for Judge Advocates looking for information on the Law of War. It is the second volume of a three volume set and is to be used in conjunction with the Operational Law Handbook (JA422) and the Documentary Supplement (JA424). The Operational Law Handbook covers the myriad of non-Law of War issues a deployed Judge Advocate may face and the Documentary Supplement reproduces many of the primary source documents referred to in either of the other two volumes. The Law of War Handbook is not a substitute for official references. Like operational law itself, the Handbook is a focused collection of diverse legal and practical information. The handbook is not intended to provide "the school solution" to a particular problem, but to help Judge Advocates recognize, analyze, and resolve the problems they will encounter when dealing with the Law of War. The Handbook was designed and written for the Judge Advocates practicing the Law of War. This body of law is known by several names including the Law of War, the Law of Armed Conflict and International Humanitarian Law. -
Race, Class, and Slavery During the American Civil
UC Santa Barbara UC Santa Barbara Previously Published Works Title Marx’s Intertwining of Race and Class During the Civil War in the U.S. Permalink https://escholarship.org/uc/item/6238s7h2 Journal Journal of Classical Sociology, 17(1) Author Anderson, Kevin Publication Date 2017 Peer reviewed eScholarship.org Powered by the California Digital Library University of California Marx’s Intertwining of Race and Class During the Civil War in the U.S. Kevin B. Anderson, University of California, Santa Barbara [author’s last version of article published in Journal of Classical Sociology 17:1 (2017), pp. 24-36] As the U.S. marked the 150th anniversary of the Civil War, some attention was given to African-American resistance to slavery and to the northern radical abolitionists. Increasingly, it was admitted, even in the South, that the Confederacy’s supposedly “noble cause” was based upon the defense of slavery. Yet to this day U.S. public opinion continues to deny the race and class dimensions of the war. There is also a denial, sometimes even among critical sociologists, of the war’s revolutionary implications, not only for African-Americans, but also for white labor and for the U.S. economic and political system as a whole. And there is still greater ignorance of the fact that Karl Marx and Friedrich Engels wrote extensively on the dialectics of race and class in the American Civil War, something I have tried to remedy in my recent book, Marx at the Margins: On Nationalism, Ethnicity, and Non-Western Societies. Marx on Ireland: Class, Ethnicity, and National Liberation Sometimes, as I have tried to show in Marx at the Margins, Marx conceptualized the pathway to class-consciousness and to socialist revolution as direct rather than indirect.