View/Open (13.5MB)

Total Page:16

File Type:pdf, Size:1020Kb

View/Open (13.5MB) Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 ContemporaryIssues in International Security and Strategic Studies Volume 1 Edited by James Bindenagel, Matthias Herdegen and Karl Kaiser Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 James Bindenagel /Matthias Herdegen / Karl Kaiser (eds.) International Securityinthe 21st Century Germany’s International Responsibility With 2figures V&Runipress Bonn UniversityPress Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available online: http://dnb.d-nb.de. ISSN 2513-1591 ISBN 978-3-7370-0762-7 You can find alternative editions of this book and additional material on our website: www.v-r.de Publications of Bonn University Press are published by V& R unipress GmbH. 2017, V&R unipress GmbH, Robert-Bosch-Breite 6, 37079 Gçttingen, Germany / www.v-r.de This publication is licensed under a Creative Commons Attribution-Non Commercial- No Derivatives 4.0 International license, at DOI 10.14220/9783737007627. For a copy of this license go to http://creativecommons.org/licenses/by-nc-nd/4.0/. Any use in cases other than those permitted by this license requires the prior written permission from the publisher. Cover image: Euromaidan ( Nessa Gnatoush), Backlit keyboard ( User: Colin / Wikimedia Commons), Containerschiff Colombo Express ( User: Wmeinhart / Wikimedia Commons), EU-Flag ( Håkan Dahlstrçm), Collage: Center for International Security and Governance (CISG) Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 Contents Preface ..................................... 9 Introduction .................................. 11 I. Security and International Legal System:Collective and National Security Policy Matthias Herdegen SecurityinModernInternational Law.................... 15 Ulrich Schlie World Order:The Futureofthe State System ................ 27 Joerg Forbrig Russia and the West:FromDifficultPartner to Adversary......... 39 Xuewu Gu China’s Rise to Major Power Status and its Challenges for the West ... 51 Jackson Janes Principle, Policy, and Purpose:The BalanceofValues and Interests ... 59 Christoph Raab Germany’s SecurityRole in the 21st Century................ 67 Karl-Heinz Kamp The Power of Institutions:NATO, the EU,and OSCE ............ 77 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 6 Contents II. Global Challenges Wolfgang Ischinger The Ukraine Crisis and the European SecurityOrder ........... 85 Harald Müller SecurityPolicyToday ............................. 91 August Hanning The WaronTerror .............................. 99 Oliver Gnad Is GermanyCapable of Strategic Planning?AnticipatoryGovernanceas the Foundation for Future-ProofDecisions .................107 Stefan Heumann SecurityinCyberspace:the Limits of Nation-State centric Approaches to SecurityinGlobal Networks .........................121 Matthew Smith /Matthew Green ADiscussion of Surveillance Backdoors:Effectiveness, Collateral Damage, and Ethics ..............................131 JakobRhyner Environmental Risks and Human Securityinthe Context of Global Change ....................................143 FriedbertPflüger Europe’s Natural Gas Sector and the Quest for EnergySecurity– Geopolitics, CurrentDevelopments, and Implications for the Broader SecurityDebate................................149 Lena Guesnet Conflict Resources and Human Security..................157 Christian Schmidt FoodSecurityasaContributiontoSecurityPolicy.............165 Stephan Klingebiel /Annamarie Bindenagel Sˇehovic´ Making Global Health Governance Work:Recommendations for Howto Respond to Global Health Post-Ebola....................171 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 Contents 7 III. Implications for Germany Herfried Münkler Germany’s International Responsibility ...................183 NorbertRöttgen Strategic Challenges for Germany’s ForeignPolicy.............189 Hans-Dieter Heumann Germany’s Responsibilityfor International Security............199 Karl Kaiser Responsibility for TransatlanticSecurity..................205 Joachim Krause WhatAre the Tasks Facing the German Defense Policy? ..........213 Christoph Schwegmann The White Paper 2016 –Defining Germany’s new Role ..........219 Stefan Mair Economic Interests in Germany’s SecurityPolicy.............225 Tilman Mayer Demographics as aSecurityChallenge ...................235 Maximilian Terhalle /Bastian Giegerich The Munich Consensus and the Purpose of German Power ........241 IV.Conclusion JamesBindenagel SecurityPolicyResponsibilities and Strategic Studies in the 21st Century 253 Index of Authors ...............................259 The Center for International Securityand Governance..........263 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 Preface WhatdoesInternational Securitymean in the 21st century?Representatives from academiaand politics are facing avarietyofnew challenges that threaten the stabilityoftoday’s world order as well as the cohesion of our society. These challenges comprisefailing states, massiveviolations of human rights, terror- ism, increasing migration and conflictsoverthe distribution of resources. Some of the underlying causes include weak rule of law, lack of educationaloppor- tunities, global health issues, food insecurity, authoritarian rule over resources and shortcomingsincyber security. Manyofthese underlying causes and resulting uncertainties are however not anchored in public consciousness.Asaresult, the German debate on security policyislagging behind current developments. In pursuance of breaching thatgap the Center for International Securityand Governance (CISG) was established at the Rheinische Friedrich-Wilhelms- Universitätin2014. Creating aframework to enable avital dialogue between academiaand politics, the CISG decisively contributes to further developing policy-relevantresearch and teaching.Concurrent, the CISG’s objective is to actively contribute to agreater understanding of Germany’s growing role and responsibilityinEurope and the world. The book at hand should create an analytical basis as well as providing afresh impetustothe public securitydebate in Germany, formulating new questions, analyses and problem-solving approaches. Simultaneously,the articles in this book aim at contributing to the global debate on securitypolicy–corresponding to the strategic orientation of Bonn University as alocally embedded as well as a globally linked research institution. Michael Hoch Rector of Bonn University Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 Open-Access-Publikation im Sinne der CC-Lizenz BY-NC-ND 4.0 © 2017, V&R unipress GmbH, Göttingen ISBN Print: 9783847107620 – ISBN E-Lib: 9783737007627 Introduction Europe seemed to have reached a“postmodern” paradise (RobertCooper) at the “end of history”(Francis Fukuyama) when the 21st centurystarted with the Charter of Parisasaguide. The Balkan wars, the last violentclashes on the old continent, had ended. The enlargementofthe European Union and the NATO establishedaviable peace and securityarchitecture for the continent that ex- tended beyond the former ideological blocks of the Cold War. These hopes for peace and securitywere,however,shattered by Russia’s an- nexation of the Crimea and Russia’s militaryintervention in the EasternUk- raine, which defied international lawand agreements concluded at the end of the Cold War. The Middle East has become rife with conflicts that are difficult to unravel. The threatofterrorism increased with the rise of ISIS. The uncertaintyof China’s peacefulrisethreatens Asian stability. Politically and economically, tectonic change shifts the balance of power in favor of the Pacific region. During the Cold Warnuclear bombs and tank divisions represented the greatest threattothe securityofthe West. Today, however,threats are much more diverse. In addition to terrorism, there are refugee flows, resource conflicts, as well as underdevelopment, global issues of epidemics, climate change, food safety, the rule of lawand information technology, presentchallenges to security policy. Twenty-sevenyears after the end of the East-West conflict, Europe is no longer regarded as ahaven of stabilityand arole model for other regions of the world but increasingly as asource of trouble spots and crises. Waristaking place on European soil again, even if some do not wanttocall it awar. The Euro crisis unleashed by Greece and Brexit severely damaged the Euro- pean Union’s unification and integration process. Added to these uncertainties
Recommended publications
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Belling the BEAR
    2016/12/21 Russia Hacks Bellingcat MH17 Investigation | ThreatConnect SEPTEMBER 28, 2016 Belling the BEAR IN BLOG, FEATURED ARTICLE, RESEARCH BY THREATCONNECT RESEARCH TEAM ThreatConnect reviews activity targeting Bellingcat, a key contributor in the MH17 investigation. Read the full series of ThreatConnect posts following the DNC Breach: “Rebooting Watergate: Tapping into the Democratic National Committee [https://www.threatconnect.com/tapping-into-democratic-national-committee/] ”, “Shiny Object? Guccifer 2.0 and the DNC Breach [https://www.threatconnect.com/guccifer-2-0-dnc-breach/] “, “What’s in a Name Server? [https://www.threatconnect.com/whats-in-a-name-server/] “, “Guccifer 2.0: the Man, the Myth, the Legend? [https://www.threatconnect.com/reassesing-guccifer-2-0-recent-claims/] “, “Guccifer 2.0: All Roads Lead to Russia [https://www.threatconnect.com/guccifer-2-all-roads-lead-russia/] “, “FANCY BEAR Has an (IT) Itch that They Can’t Scratch [https://www.threatconnect.com/fancy-bear-it-itch-they-cant-scratch/] “, “Does a BEAR Leak in the Woods? [https://www.threatconnect.com/blog/does-a-bear-leak-in-the-woods/] “, and “Russian Cyber Operations on Steroids [https://www.threatconnect.com/blog/fancy-bear-anti-doping-agency-phishing/] “. [UPDATE] October 7th 2016 [/russia-hacks-bellingcat-mh17-investigation#update] Introduction Since posting about the DNC hack [https://threatconnect.com/blog/tapping-into-democratic-national-committee/] , each time we published a blog post on a BEAR-based topic we thought it was going to be our last. But like the Death Star’s gravitational pull, the story keeps drawing us back in as new information comes to light.
    [Show full text]
  • Date 1.1.2015 1.1.2015 1.1.2015 1.1.2015 1.1.2015 1.1
    Date 1.1.2015 1.1.2015 1.1.2015 1.1.2015 1.1.2015 1.1.2015 1.1.2015 2.1.2015 2.1.2015 2.1.2015 2.1.2015 3.1.2015 3.1.2015 4.1.2015 4.1.2015 4.1.2015 5.1.2015 5.1.2015 5.1.2015 6.1.2015 6.1.2015 6.1.2015 7.1.2015 7.1.2015 7.1.2015 7.1.2015 7.1.2015 8.1.2015 9.1.2015 10.1.2015 11.1.2015 11.1.2015 11.1.2015 11.1.2015 11.1.2015 11.1.2015 11.1.2015 12.1.2015 12.1.2015 12.1.2015 12.1.2015 12.1.2015 12.1.2015 14.1.2015 14.1.2015 14.1.2015 14.1.2015 14.1.2015 15.1.2015 15.1.2015 15.1.2015 16.1.2015 16.1.2015 16.1.2015 16.1.2015 16.1.2015 16.1.2015 17.1.2015 17.1.2015 17.1.2015 19.1.2015 19.1.2015 20.1.2015 20.1.2015 20.1.2015 21.1.2015 21.1.2015 22.1.2015 23.1.2015 23.1.2015 24.1.2015 24.1.2015 24.1.2015 25.1.2015 25.1.2015 26.1.2015 27.1.2015 27.1.2015 27.1.2015 27.1.2015 27.1.2015 28.1.2015 28.1.2015 29.1.2015 29.1.2015 29.1.2015 29.1.2015 30.1.2015 30.1.2015 30.1.2015 31.1.2015 1.2.2015 1.2.2015 1.2.2015 1.2.2015 1.2.2015 2.2.2015 2.2.2015 2.2.2015 2.2.2015 2.2.2015 4.2.2015 5.2.2015 5.2.2015 5.2.2015 6.2.2015 6.2.2015 7.2.2015 8.2.2015 8.2.2015 9.2.2015 9.2.2015 10.2.2015 10.2.2015 10.2.2015 10.2.2015 10.2.2015 10.2.2015 10.2.2015 10.2.2015 12.2.2015 12.2.2015 12.2.2015 12.2.2015 12.2.2015 13.2.2015 13.2.2015 14.2.2015 14.2.2015 14.2.2015 14.2.2015 14.2.2015 14.2.2015 14.2.2015 15.2.2015 16.2.2015 16.2.2015 16.2.2015 17.2.2015 17.2.2015 17.2.2015 17.2.2015 17.2.2015 17.2.2015 18.2.2015 18.2.2015 18.2.2015 18.2.2015 19.2.2015 21.2.2015 21.2.2015 22.2.2015 23.2.2015 23.2.2015 23.2.2015 23.2.2015 23.2.2015 23.2.2015 24.2.2015 24.2.2015 24.2.2015
    [Show full text]
  • Revolution Hacking
    Revolution Hacking by Nikolay Koval Chapter 6 in Kenneth Geers (Ed.), Cyber War in Perspective: Russian Aggression against Ukraine, NATO CCD COE Publications, Tallinn 2015 Nikolay Koval, head of Ukraine’s Computer Emergency Response Team (CERT-UA) during the revolution, describes in Chapter 6 how cyber attacks rose in parallel with ongoing political events, in both number and severity. In 2012, hackers ‘defaced’ Ukrainian government websites with politically motivated digital graffiti. In 2013, network defenders discovered new and more menacing forms of malware, such as RedOctober, MiniDuke, and NetTraveler. In 2014, hacktivist groups such as CyberBerkut published stolen Ukrainian Government docu- ments. Koval analyses in detail the most technically advanced attack investigated by CERT-UA: the May 2014 compromise of Ukraine’s Central Election Commission (CEC). He closes by appealing to the Ukrainian Government to allocate greater funds to hire and retain qualified personnel. Disclaimer This publication is a product of the NATO Cooperative Cyber Defence Centre of Ex- cellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publica- tion. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non-profit and non-commercial purpose, provided that copies bear a full citation. Please contact publications@ccdcoe. org with any further queries.
    [Show full text]
  • State-Sponsored Hackers: Hybrid Armies? by Patryk Pawlak and Gergana Petkova
    5 2015 SU P ER S TOCK/AP/SIPA State-sponsored hackers: hybrid armies? by Patryk Pawlak and Gergana Petkova Cyber-attacks are rarely disconnected from politi- 2010, the collision of a Chinese fishing boat with cal realities. CyberBerkut – a pro-Russian group a Japanese coast guard vessel and the subsequent of ‘patriot’ hackers – has, for example, hacked detainment of its Chinese captain and crew caused German government websites in retaliation for a flurry of malicious cyber activity. Attacks in lat- the political support offered to Kiev by Berlin. er years were triggered by the 80th anniversary The Syrian Electronic Army – a hacker collective of the 1931 Manchuria incident or the ongoing thought to be linked to Syrian President Bassar controversy over the Senkaku/Diaoyu islands. al-Assad – regularly targets Western media out- lets, most recently Le Monde. Non-state cyber armies have also been employed in ongoing conflicts. CyberBerkut is but the Due to this blurring of the virtual and most recent example: the group not only man- physical worlds, governments, which aged to hack governmental websites in Germany, are familiar with stateless actors such as Ukraine and Poland, but also successfully took al-Qaeda or the Islamic State of Iraq and the down three NATO websites, including that of the Levant (ISIL), may now have to learn to deal Cooperative Cyber Defence Centre of Excellence with equally hostile, amorphous and often in Tallinn. state-sponsored ‘hacktors’. Other Russian political movements, which are or- ganised and partially sponsored by the state, also Using the past but shaping the present have an important role in non-state cyber offensive capabilities.
    [Show full text]
  • Are Cyber Operations Having an Impact on State Electoral Processes?
    City University of New York (CUNY) CUNY Academic Works Dissertations and Theses City College of New York 2018 Are Cyber Operations Having an Impact on State Electoral Processes? Sean Joseph McNicholas CUNY City College How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/cc_etds_theses/748 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] Are Cyber Operations Having an Impact on State Electoral Processes? Sean McNicholas May 2018 Master’s Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of International Affairs at the City College of New York COLIN POWELL SCHOOL FOR CIVIC AND GLOBAL LEADERSHIP Advisor: Professor Jean Krasno Second Advisor: Professor Bruce Cronin 1 Table of Contents Abstract: ………………………………………………………………………….. 3 Chapter One: Introduction: ………………………………………………………. 4 Chapter Two: Literature Review: ………………………………………...……… 7 Chapter Three: Overcoming Definitional Fog: ………………………………...... 17 Chapter Four: Types of Cyber Operations: …………………………………….... 29 Chapter Five: Purposes behind the Cyber Operations: ………………………….. 48 Chapter Six: Quantifying the Effects: ………………………………………...…. 62 Chapter Seven: Russia’s International Meddling and Active Measures – An Interview with a Former Eastern European Official: .……………………………………… 75 Chapter Eight: Conclusions and Recommendations: ……………………………. 88 Bibliography: …………………………………………………………………… 100 Annex A: ………………………………………………………………………... 111 Annex B: ………………………………………………………………...……… 121 2 Abstract Cyber-attacks have become common occurrences which have an impact on all aspects of life ranging from business transactions to personal communications. Alarmingly, coordinated cyber-attacks are increasingly targeting politicians and their associates, political campaigns, political organizations and the broader public with political messaging.
    [Show full text]
  • 2015 7Th International Conference on Cyber Conflict: Architectures in Cyberspace
    2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace M.Maybaum, A.-M.Osula, L.Lindström (Eds.) 26-29 MAY 2015, TALLINN, ESTONIA 2015 7TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: ARCHITECTURES IN CYBERSPACE Copyright © 2015 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1526N-PRT ISBN (print): 978-9949-9544-2-1 ISBN (pdf): 978-9949-9544-3-8 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace M. Maybaum, A.M. Osula, L. Lindström (Eds.) 2015 © NATO CCD COE Publications PrinteD copies of THIS publication are AVAILABLE from: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Understanding Russian Subversion Patterns, Threats, and Responses
    February 2020 Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE ANDREW RADIN, ALYSSA DEMUS, KRYSTYNA MARCINEK Understanding Russian Subversion Patterns, Threats, and Responses ussia is suspected of having undertaken a wide range of subversive activities against the United States and its partners and allies since 2014—examples include military support for the separatist republics in eastern Ukraine, Ran attempted coup in Montenegro, and influence campaigns in the 2016 U.S. and 2017 French elections. Responding to Russian subversion is difficult, in part because the threat is, by its very nature, not clearly known. In this Perspective, we review past RAND Corporation and other relevant work and synthesize overall insights about why and how Russia undertakes subversion. This review and synthe- sis offer insights about the likely threat of Russian subversion to the United States and its partners and allies. Russia likely finds subversion—which we define as efforts intended to influence the domestic politics of other countries—attractive because it could help achieve multiple Russian foreign policy interests at relatively low cost. The threat of Russian subversion to different countries varies based on the intensity of Russia’s interests and the resources available to undertake subversion. In western Europe and the C O R P O R A T I O N United States, Russian subversive tools appear to be limited political warfare, or sharp power (Cardenal et al., 2017; to information, cyber, and political ones. In neighboring Cohen and Radin, 2019; Robinson et al., 2018). There is former communist countries, Russia uses a wider range substantial debate about these terms—for example, crit- of military and economic tools.
    [Show full text]
  • Hacking the Voter Lessons from a Decade of Russian Military Operations
    Hacking the Voter Lessons From a Decade of Russian Military Operations Nate Beach-Westmoreland Agenda • “Why,” not just “how” • Information conflict • Tactics in context • What’s next Who Am I? • Head of Strategic Cyber Threat Intelligence @ Booz Allen Hamilton • Prior experience in elections, diplomacy, & law • CTI by way of social sciences • B.A. History @ Cornell • M.A. International Relations @ Yale Now Just How, but Why? • Why conduct an operation? • Why act at this time? • Why use these tactics? • What was the objective? • How do operations relate to each other? Background Reading • Russia’s Military Doctrine explains the tactics, targets, and timing of GRU cyber operations • TL;DR: the GRU has often done exactly what it said it would do Soviet-Era Election Interference Image Source: Everett Herald Familiar Tactics, but Shifting Responsibilities Image Source: U.S. Senate Intelligence Committee (1985) Information “So, tell me more about how bad life is here! (translation) Confrontation The continuous competition over beliefs, opinions, perceptions, and feelings to enable the furthering of states’ agendas Image Source: Unknown Russian Military Bought Into Information Confrontation • Codified into core military doctrinal documents since 2000 • Addition of new missions like protecting “historical, spiritual, and patriotic traditions” “Information Confrontation – a Strategic Challenge” - National Defense (March 3, 2013) Information Confrontation’s Two Sides “Informational-Psychological” Capabilities “Informational-Technical” ≈ Capabilities
    [Show full text]
  • King's College, London: Department of War Studies
    UNIVERSITY OF READING U.S. Strategic Cyber Deterrence Options Doctor of Philosophy in Politics Department of Politics & International Relations Scott Jasper March 2018 1 Contents Abstract......................................................................................................................... 3 List of Abbreviations..................................................................................................... 4 Introduction................................................................................................................... 7 Section One: Thinking about Deterrence Chapter I: Literature Review........................................................................................59 Chapter II: Global Cybered Conflict...........................................................................120 Chapter III: Theoretical Foundations..........................................................................158 Section Two: Contemporary Deterrence Strategies Chapter IV: Deterrence by Retaliation.........................................................................198 Chapter V: Deterrence by Denial................................................................................. 234 Chapter VI: Deterrence by Entanglement.....................................................................269 Section Three: A New Strategic Option Chapter VII: Active Cyber Defense..............................................................................307 Conclusion.....................................................................................................................343
    [Show full text]