Cyber War in Perspective: Russian Aggression Against Ukraine

Total Page:16

File Type:pdf, Size:1020Kb

Cyber War in Perspective: Russian Aggression Against Ukraine cyber war in perspective: russian aggression against ukraine Cyber War in Perspective: Russian Aggression against Ukraine Edited by Kenneth Geers This publication may be cited as: Kenneth Geers (Ed.), Cyber War in Perspective: Russian Aggression against Ukraine, NATO CCD COE Publications, Tallinn 2015. © 2015 by NATO Cooperative Cyber Defence Centre of Excellence. All rights reserved. No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear a full citation. NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org LEGAL NOTICE This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Print: EVG Print Cover design & content layout: Villu Koskaru ISBN 978-9949-9544-4-5 (print) ISBN 978-9949-9544-5-2 (pdf) NATO Cooperative Cyber Defence Centre of Excellence The Tallinn-based NATO Cooperative Cyber Defence Centre of Excel- lence (NATO CCD COE) is a NATO-accredited knowledge hub, think-tank and training facility. The international military organisa- tion focuses on interdisciplinary applied research and development, as well as consultations, trainings and exercises in the field of cyber security. The Centre’s mission is to enhance capability, cooperation and information-sharing between NATO, Allies and partners in cyber defence. Membership of the Centre is open to all Allies. The Czech Republic, Estonia, France, Germany, Greece, Hungary, Italy, Latvia, Lithuania, the Netherlands, Poland, Slovakia, Spain, Turkey, the United Kingdom and the USA have signed on as sponsoring nations. Austria and Fin- land have joined the Centre as contributing participants. The Centre is funded and staffed by these member nations. Contents Foreword .................................................................................................................8 Key Events .............................................................................................................10 1. Introduction: Cyber War in Perspective | Kenneth Geers, NATO CCD COE / Atlantic Council / Taras Shevchenko National University of Kyiv ................................................13 Strategic Framework 2. Russia and Its Neighbours: Old Attitudes, New Capabilities | Keir Giles, Conflict Studies Research Centre .................................................19 3. Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy | James J. Wirtz, Naval Postgraduate School .....................................................29 4. ‘Compelling Opponents to Our Will’: The Role of Cyber Warfare in Ukraine | James A. Lewis, Centre for Strategic and International Studies (CSIS) ......39 5. The Cyber War that Wasn’t | Martin Libicki, RAND ......................................................................................49 Tactical Viewpoints 6. Revolution Hacking | Nikolay Koval, CyS Centrum LLC ...................................................................55 7. Cyber Operations at Maidan: A First-Hand Account | Glib Pakharenko, ISACA Kyiv .........................................................................59 8. Beyond ‘Cyber War’: Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine | Jen Weedon, FireEye ..........................................................................................67 9. Cyber Proxies and the Crisis in Ukraine | Tim Maurer, New America ...............................................................................79 6 Information Warfare 10. Russian Information Warfare: Lessons from Ukraine | Margarita Levin Jaitner, Swedish Defense University ...................................87 11. Missing in Action: Rhetoric on Cyber Warfare | Liisa Past, NATO CCD COE ............................................................................95 12. Strategic Communications and Social Media in the Russia Ukraine Conflict | Elina Lange-Ionatamishvili & Sanda Svetoka, NATO Strategic Communications Centre of Excellence ..............................103 Policy and Law 13. Ukraine: A Cyber Safe Haven? | Nadiya Kostyuk, University of Michigan ......................................................113 14. A Legal Framework for Cyber Operations in Ukraine | Jan Stinissen, NATO CCD COE ....................................................................123 15. The Ukraine Crisis as a Test for Proposed Cyber Norms | Henry Rõigas, NATO CCD COE ...................................................................135 16. Northern European Cyber Security in Light of the Ukraine War | Jarno Limnéll, Aalto University .....................................................................145 The Future 17. What’s Next for Putin in Ukraine: Cyber Escalation? | Jason Healey & Michelle Cantos, Columbia University .............................153 18. Strategic Defence in Cyberspace: Beyond Tools and Tactics | Richard Bejtlich, The Brookings Institution .................................................159 Authors ............................................................................................................... 171 7 Foreword Sven Sakkov Director, NATO Cooperative Cyber Defence Centre of Excellence In mid-January 2014, the Ukrainian Rada passed tough anti-protest regulations that seemed to be designed to nip the emerging anti-government mood in the bud. Over the next months, in the harsh Ukrainian winter, opposition protests escalated and turned bloody. The ensuing turmoil included a runaway President, Russian occupa- tion of Crimea and an armed conflict in Eastern Ukraine. The world held its breath and many expected to see a full-fledged ‘cyber war’. However, although an increase in typical cyber skirmishes was reported throughout the crisis, prominent cyber operations with destructive effects have not yet occurred. The possible reasons for this seemingly low-level employment of cyber attacks in Ukraine characterise the particular role of cyber operations in modern conflicts. The case of Ukraine proves that the use of cyber operations has to be understood in the wider strategic context. In Ukraine we saw – in line with national doctrine – that Russian information warfare both included and relied upon cyber elements. Reported cyber incidents such as defacements, information leaks or DDoS attacks against media or governmental organisations were predominantly in support of the intense Russian information operation against Ukraine and the West. Furthermore, due to the historical interconnectedness of networks and sophisti- cated spyware tools applied by APT groups, it is widely presumed that Russia is actively leveraging the intelligence provided by its effective cyber espionage campaigns for strategic gain. As cyberspace functions as the main medium for disseminating and gathering information, destructive cyber operations hindering information flows in Ukraine would have been unreasonable from the Russian point of view. Another strategic consideration affecting Russian use of cyber attacks is the rel- ative effectiveness of traditional kinetic operations. If we look at the Russian actions in Crimea and the Donbass, there was no practical need to engage in destructive 8 offensive cyber operations to achieve the military objectives. For instance, one of the first targets during the occupation of Crimea was an Internet Exchange Point, which was taken over by Russian special forces in order to assure information superiority by disrupting cable connections with the mainland. In short, the case indicates that kinetic actions might in some circumstances be more effective and less costly than sophisticated cyber operations. This factor is even more relevant in Ukraine, where the infrastructure is often outdated and not highly IT-dependent. Even though highly visible and destructive attacks have not been reported, infor- mation-oriented cyber operations in Ukraine have nevertheless functioned as an essential strategic element of Russian whole spectrum warfare. In brief, the book reflects several mutually reinforcing reasons why we did not witness large-scale or massive cyber attacks with destructive effects: • Espionage and information campaigns conducted through cyberspace trumped other considerations for the Russian side; • It is reasonable to achieve results with less resources and effort involved, i.e. if a cable can be cut physically, there is no need to use sophisticated cyber attacks; • Both sides in the conflict have shown a considerable ability to control the escalation of the conflict. The cyber domain did not witness large- scale warfighting, but neither did the domain of air after the tragedy of MH17; • Ukraine did not offer very lucrative targets for destructive
Recommended publications
  • Nationalism; *Peace; Political Attitudes; Slvery; Terrorism; Violence; War; World Problems IDENTIFIERS *Africa; *Peace Education
    DOCUMENT RESUME ED 396 074 CE 070 196 AUTHOR Kisembo, Paul TITLE A Popular Version of Yash Tandon's Militarism and Peace Education in Africa. INSTITUTION African Association for Literacy and Adult Education. Nairobi (Kenya). PUB DATE 93 NOTE 52p. PUB TYPE Viewpoints (Opinion/Position Papers, Essays, etc.) (120) EDRS PRICE MF01/PC03 Plhs Postage. DESCRIPTORS Adult Education; *Civil Liberties; Civil Rights; *Colonialisn; Community Education; Conflict Resolution; Developing Nations; Economic Development; Foreign Countries; *Freedom; International Relations; *Nationalism; *Peace; Political Attitudes; Slvery; Terrorism; Violence; War; World Problems IDENTIFIERS *Africa; *Peace Education ABSTRACT This book is a briefer, simpler popular edition of "Militarism and Peace Education in Africa." It is intended to interest the African peoples in the problems of peace and allow them to discuss and debate the issues of militarism and peace for Africa and to suggest solutions. It is also intended to interest leading organizations and people working at the grassroots level in urban and rural areas in problems of militarism and peace education. The first two chapters show hoW, in former times, militarism was brought to Africa by the Europeans through slave trade and colonialism. Chapter 3 shows how militarism continued after independence under neocolonialism in these forms: state terrorism, militarism based on ethnic nationality/conflicts, militarism resulting from "pastoralist conflicts," militarism resulting from cultural and religious conflicts, and militarism based on ideological conflicts. Chapter 4 explores how militarism is still connected to the exploitation and oppression of Africa with the new strategy called "low intensity conflict" or "low intensity war." Chapter 5 considers developing types of peace education and proposed content of peace education.
    [Show full text]
  • The Kremlin Trojan Horses | the Atlantic Council
    Atlantic Council DINU PATRICIU EURASIA CENTER THE KREMLIN’S TROJAN HORSES Alina Polyakova, Marlene Laruelle, Stefan Meister, and Neil Barnett Foreword by Radosław Sikorski THE KREMLIN’S TROJAN HORSES Russian Influence in France, Germany, and the United Kingdom Alina Polyakova, Marlene Laruelle, Stefan Meister, and Neil Barnett Foreword by Radosław Sikorski ISBN: 978-1-61977-518-3. This report is written and published in accordance with the Atlantic Council Policy on Intellectual Independence. The authors are solely responsible for its analysis and recommendations. The Atlantic Council and its donors do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions. November 2016 TABLE OF CONTENTS 1 Foreword Introduction: The Kremlin’s Toolkit of Influence 3 in Europe 7 France: Mainstreaming Russian Influence 13 Germany: Interdependence as Vulnerability 20 United Kingdom: Vulnerable but Resistant Policy recommendations: Resisting Russia’s 27 Efforts to Influence, Infiltrate, and Inculcate 29 About the Authors THE KREMLIN’S TROJAN HORSES FOREWORD In 2014, Russia seized Crimea through military force. With this act, the Kremlin redrew the political map of Europe and upended the rules of the acknowledged international order. Despite the threat Russia’s revanchist policies pose to European stability and established international law, some European politicians, experts, and civic groups have expressed support for—or sympathy with—the Kremlin’s actions. These allies represent a diverse network of political influence reaching deep into Europe’s core. The Kremlin uses these Trojan horses to destabilize European politics so efficiently, that even Russia’s limited might could become a decisive factor in matters of European and international security.
    [Show full text]
  • GAIN-Tokyo-Workshop-Report.Pdf
    September 12th, 2018 Global AI Narratives – Tokyo Workshop 01 Table of Contents Summary ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・2 Welcome remarks ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・5 ・Dr Stephen Cave, Executive Director, CFI, University of Cambridge ・Professor Emeritus Shuji Hashimoto, Vice President, Waseda University Session 1: UK AI Narratives ・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 7 ・Dr Kanta Dihal, PI ‘Global AI Narratives’ CFI, University of Cambridge ・Dr Stephen Cave, Executive Director, CFI, University of Cambridge ・Dr Sarah Dillon, University Lecturer in Literature and Film and co-PI ‘AI Narratives’ at CFI, University of Cambridge Session 2: JAPAN AI Narratives ・・・・・・・・・・・・・・・・・・・・・・・・・・9 ・Professor Toshie Takahashi, Faculty of Letters, Arts and Sciences, Waseda University ・Mr Masayoshi Sakai, visiting research fellow, GLOCOM(Center for Global Communications, International University of Japan) ・Professor Osamu Sakura, the Interfaculty Initiative in Information Studies, University of Tokyo, and RIKEN Center for Advanced Intelligence Project (AIP) ・Dr Kentaro Watanabe, Planning Offcer, Research Planning Offce for Artifcial Intelligence, Department of Information Technology and Human Factors, National Institute of Advanced Industrial Science and Technology (AIST) Session 3: KOREA AI Narratives ・・・・・・・・・・・・・・・・・・・・・・・・・ ・13 ・Professor Kyung Sin Park, Korea University Law School, Director, Open Net Korea ・Professor Chihyoung Jeon, KAIST ・Professor So-Young Kim, Head of the Graduate School of Science & Technology Policy, KAIST ・Dr Kyoungmi Oh, Seoul National University of Science and Technology Session 4: Interactive Exercise on Global AI Narratives “Cultural Differences between East and West about AI Imaginings” ・・・・・・・・ ・16 Closing Remarks ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ ・20 Professor Hironori Kasahara, Waseda University, IEEE Computer Society 2018 President Speakers and Participants ・・・・・・・・・・・・・・・・・・・・・・・・・・・ ・22 September 12th, 2018 Global AI Narratives – Tokyo Workshop September 12th, 2018 Global AI Narratives – Tokyo Workshop 02 Summary Dr. Stephen Cave & Dr.
    [Show full text]
  • Tstable of Content
    ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 North Atlantic Treaty Organization London International Model United Nations 18th Session | 2017 tsTable of Content 1 ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 Table of Contents Table of Contents WELCOME TO THE NORTH ATLANTIC TREATY ORGANIZATION .............................................................. 3 INTRODUCTION TO THE COMMITTEE .................................................................................................................. 4 TOPIC A: FORMING A NATO STRATEGY IN CYBERSPACE ............................................................................. 5 INTRODUCTION ............................................................................................................................................................... 5 HISTORY OF THE PROBLEM ............................................................................................................................................. 6 Timeline of notable attacks ....................................................................................................................................... 7 1998 – 2001 “MOONLIGHT MAZE” ....................................................................................................................... 7 2005 – 2011 TITAN RAIN & BYZANTINE HADES .................................................................................................. 8 2007 Estonia DDoS Campaigns ...............................................................................................................................
    [Show full text]
  • Rebooting U.S. Security Cooperation in Iraq
    Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS POLICY FOCUS 137 Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY www.washingtoninstitute.org The opinions expressed in this Policy Focus are those of the author and not necessarily those of The Washington Institute, its Board of Trustees, or its Board of Advisors. All rights reserved. Printed in the United States of America. No part of this publica- tion may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2015 by The Washington Institute for Near East Policy The Washington Institute for Near East Policy 1828 L Street NW, Suite 1050 Washington, DC 20036 Design: 1000colors Photo: A Kurdish fighter keeps guard while overlooking positions of Islamic State mili- tants near Mosul, northern Iraq, August 2014. (REUTERS/Youssef Boudlal) CONTENTS Acknowledgments | v Acronyms | vi Executive Summary | viii 1 Introduction | 1 2 Federal Government Security Forces in Iraq | 6 3 Security Forces in Iraqi Kurdistan | 26 4 Optimizing U.S. Security Cooperation in Iraq | 39 5 Issues and Options for U.S. Policymakers | 48 About the Author | 74 TABLES 1 Effective Combat Manpower of Iraq Security Forces | 8 2 Assessment of ISF and Kurdish Forces as Security Cooperation Partners | 43 FIGURES 1 ISF Brigade Order of Battle, January 2015 | 10 2 Kurdish Brigade Order of Battle, January 2015 | 28 ACKNOWLEDGMENTS My thanks to a range of colleagues for their encouragement and assistance in the writing of this study.
    [Show full text]
  • ENGLISH Only
    The OSCE Secretariat bears no responsibility for the content of this document FSC.DEL/31/21 and circulates it without altering its content. The distribution by OSCE 29 January 2021 Conference Services of this document is without prejudice to OSCE decisions, as set out in documents agreed by OSCE participating States. ENGLISH only STATEMENT on the Joint Turkish-Azerbaijani Large-Scale Military Exercise as delivered by the Delegation of the Republic of Armenia at the 966th Plenary Meeting of the Forum for Security Co-operation 27 January 2021 Madam Chairperson, On 17 January the Ministry of Defense of Turkey announced through its official website about conducting the «Winter-2021» joint Turkish-Azerbaijani military exercise in Kars from 1 to 12 February. This was followed by information disseminated by the Ministry of Defense of Azerbaijan on the departure of the military personnel and equipment of the Nakhijevan Combined Army of Azerbaijan to Turkey to take part in the joint military exercise. According to the Turkish media reports, the planned exercise is expected to be one of the largest winter military drills of recent times aimed, among others, at improving cooperation and coordination during joint military operations and testing combat capabilities under extreme weather conditions. Reportedly, the military exercise will involve tank divisions, heavy artillery, sniper teams, helicopters and special forces. At the previous meeting of the FSC we drew the attention of the participating States to this exercise. In response to our inquiry Turkish delegation here in Vienna insisted that the exercise was not notified under the Vienna Document because of the small number of the military personnel and equipment to be engaged in it.
    [Show full text]
  • Tina GARABEDIAN ARM Simon PROULX-SENECAL
    ICE DANCE Date of birth: 13.06.1997 Tina GARABEDIAN Place of birth: Montreal CAN Height: 163 cm ARM Home town: Montreal CAN Profession: student Hobbies: swimming, music Start sk. / Club: 2002 / Armenia Internet / Social Media contact (couple): Facebook: Ice Dance Armenia.com Former Partners Alexandre Laliberte Date of birth: 06.12.1991 Simon PROULX-SENECAL Place of birth: Lasalle CAN Height: 186 cm ARM Home town: Montreal CAN Profession: student Hobbies: swimming, music, biking Start sk. / Club: 1998 / Armenia Internet / Social Media contact (couple): Facebook: Ice Dance Armenia.com Former Partners Melissandre Dumas Coach: Elise Hamel, Shawn Winter Choreographer: Former Coach: Shae Zukiwsky Practice low season: 25 h / week Montreal/CAN Practice high season: 25 h / week Montreal/CAN Music Short Program / Short Dance as of season 2016/2017 Blues Swing Music Free Skating / Free Dance as of season 2016/2017 Pearl Harbour (soundtrack) by Hans Zimmer Personal Best Total Score 139.28 07.12.2016 ISU CS Golden Spin 2016 Personal Best Score Short Dance 53.94 18.11.2016 ISU CS Warsaw Cup 2016 Personal Best Score Free Dance 87.54 07.12.2016 ISU CS Golden Spin 2016 09/10 10/11 11/12 12/13 13/14 14/15 15/16 16/17 Olympic Games World Champ. 27. European Champ. 18. 19. Four Continents World Juniors 16.(1) National Champ. 11.J(3) 11.J(3) 15.J(2) 9.J(1) / 11.S(4) 1.S(1) / 12.S(4) 1.S S=Senior; J=Junior; N=Novice International Competition Year Place Internation Competition Year Place ISU CS Ice Challenge 2015 Graz 2015 6.
    [Show full text]
  • Russia's Foreign Policy Change and Continuity in National Identity
    Russia’s Foreign Policy Russia’s Foreign Policy Change and Continuity in National Identity Second Edition Andrei P. Tsygankov ROWMAN & LITTLEFIELD PUBLISHERS, INC. Lanham • Boulder • New York • Toronto • Plymouth, UK Published by Rowman & Littlefield Publishers, Inc. A wholly owned subsidiary of The Rowman & Littlefield Publishing Group, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 http://www.rowmanlittlefield.com Estover Road, Plymouth PL6 7PY, United Kingdom Copyright © 2010 by Rowman & Littlefield Publishers, Inc. All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without written permission from the publisher, except by a reviewer who may quote passages in a review. British Library Cataloguing in Publication Information Available Library of Congress Cataloging-in-Publication Data Tsygankov, Andrei P., 1964- Russia's foreign policy : change and continuity in national identity / Andrei P. Tsygankov. -- 2nd ed. p. cm. Includes bibliographical references and index. ISBN 978-0-7425-6752-8 (cloth : alk. paper) -- ISBN 978-0-7425-6753-5 (paper : alk. paper) -- ISBN 978-0-7425-6754-2 (electronic) 1. Russia (Federation)--Foreign relations. 2. Soviet Union--Foreign relations. 3. Great powers. 4. Russia (Federation)--Foreign relations--Western countries. 5. Western countries--Foreign relations--Russia (Federation) 6. Nationalism--Russia (Federation) 7. Social change--Russia (Federation) I. Title. DK510.764.T785 2010 327.47--dc22 2009049396 ™ The paper used in this publication meets the minimum requirements of American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials, ANSI/NISO Z39.48-1992. Printed in the United States of America It is the eternal dispute between those who imagine the world to suit their policy, and those who arrange their policy to suit the realities of the world.
    [Show full text]
  • THE BLACK MARKET for SOCIAL MEDIA MANIPULATION NATO Stratcom COE Singularex
    COUNTERING THE MALICIOUS USE OF SOCIAL MEDIA THE BLACK MARKET FOR SOCIAL MEDIA MANIPULATION NATO StratCom COE Singularex ISBN 978-9934-564-31-4 ISBN: 978-9934-564-31-4 Authors: NATO StratCom COE Research: Singularex Project manager: Sebastian Bay Text editor: Anna Reynolds Design: Kārlis Ulmanis Riga, November 2018 NATO STRATCOM COE 11b Kalciema iela Riga LV1048, Latvia www.stratcomcoe.org Facebook/stratcomcoe Twitter: @stratcomcoe Singularex is a Social Media Intelligence and Analytics company based in Kharkiv, Ukraine. Website: www.singularex.com Email: [email protected] This publication does not represent the opinions or policies of NATO. © All rights reserved by the NATO StratCom COE. Reports may not be copied, reproduced, distributed or publicly displayed without reference to the NATO StratCom COE. The views expressed here are solely those of the author in his private capacity and do not in any way represent the views of NATO StratCom COE. NATO StratCom COE does not take responsibility for the views of authors expressed in their articles. Social media manipulation is undermining democracy, but it is also slowly undermining the social media business model. Introduction Around the turn of the decade, when the popularity of social media sites was really beginning to take off, few people noticed a secretly burgeoning trend — some users were artificially inflating the number of followers they had on social media to reap financial benefits. Even fewer noticed that organisations such as the Internet Research Agency were exploiting these new techniques for political gain. Only when this innovation in information warfare was deployed against Ukraine in 2014 did the world finally become aware of a practice that has now exploded into federal indictments,1 congressional hearings,2 and a European Union Code of Practice on Disinformation.3 At the heart of this practice, weaponised by states and opportunists alike, is a flourishing black market where buyers and sellers meet to trade in clicks, likes, and shares.
    [Show full text]
  • Montesquieu on Commerce, Conquest, War and Peace Robert Howse
    Brooklyn Journal of International Law Volume 31 | Issue 3 Article 3 2006 Montesquieu on Commerce, Conquest, War and Peace Robert Howse Follow this and additional works at: https://brooklynworks.brooklaw.edu/bjil Recommended Citation Robert Howse, Montesquieu on Commerce, Conquest, War and Peace, 31 Brook. J. Int'l L. (2006). Available at: https://brooklynworks.brooklaw.edu/bjil/vol31/iss3/3 This Article is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Journal of International Law by an authorized editor of BrooklynWorks. MONTESQUIEU ON COMMERCE, CONQUEST, WAR, AND PEACE * Robert Howse I. INTRODUCTION: COMMERCE AS THE AGENT OF PEACE: MONTESQUIEU AND THE IDEOLOGY OF LIBERALISM n the history of liberalism, Montesquieu, who died two hundred and I fifty years ago, is an iconic figure. Montesquieu is cited as the source of the idea of checks and balances, or separation of powers, and thus as an intellectual inspiration of the American founding.1 Among liberal internationalists, Montesquieu is known above all for the notion that international trade leads to peace among nation-states. When liberal international relations theorists such as Michael Doyle attribute this posi- tion to Montesquieu,2 they cite Book XX of the Spirit of the Laws,3 in which Montesquieu claims: “The natural effect of commerce is to bring peace. Two nations that negotiate between themselves become recipro- cally dependent, if one has an interest in buying and the other in selling. And all unions are based on mutual needs.”4 On its own, Montesquieu’s claim raises many issues.
    [Show full text]
  • Getting to Yes with China in Cyberspace
    Getting to Yes with China in Cyberspace Scott Warren Harold, Martin C. Libicki, Astrid Stuth Cevallos C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/rr1335 Library of Congress Cataloging-in-Publication Data ISBN: 978-0-8330-9249-6 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark Cover Image: US President Barack Obama (R) checks hands with Chinese president Xi Jinping after a press conference in the Rose Garden of the White House September 25, 2015 in Washington, DC. President Obama is welcoming President Jinping during a state arrival ceremony. Photo by Olivier Douliery/ABACA (Sipa via AP Images). Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors.
    [Show full text]
  • The Atlantic Council and Bellingcat Are Guilty of War Propaganda. As
    An essential dimension of humanitarian work is human rights investigations to identify violations and crimes. Human rights investigation organizations, in the digital age, are taking advantage of the growing prevalence of online citizen evidence and extractable data from what they often refer to as ‘open sources’ and social media TheThe AtlanticAtlantic CouncilCouncil andand BellingcatBellingcat areare guiltyguilty ofof warwar propaganda.propaganda. AsAs @ian56789@ian56789 wrotewrote toto mee in in a amessage: message: “The“The membersmembers ofof thethe AtlanticAtlantic CouncilCouncil andand DFRLabDFRLab shouldshould bebe indictedindicted asas accomplicesaccomplices toto WarWar Crimes,Crimes, forfor providingproviding actualactual materialmaterial supportsupport toto alal--QaedaQaeda terrorists,terrorists, andand forfor TreasonTreason (actively(actively supportingsupporting officialofficial enemiesenemies ofof thethe USUS && UK).UK). TheyThey shouldshould bebe spendingspending thethe restrest ofof theirtheir liveslives inin jailjail andand finedfined everyevery pennypenny they'vethey've got.”got.” AndAnd thosethose abusingabusing andand exploitingexploiting BanaBana alal--AbedAbed inin theirtheir ongoingongoing warwar propagandapropaganda shouldshould joinjoin themthem.. FromFrom https://www.rt.com/ophttps://www.rt.com/op--ed/431128ed/431128--banabana--alabedalabed--bellingcatbellingcat--atlanticatlantic--councilcouncil EvaEva Bartlett,Bartlett, JuneJune 29,29, 2018.2018. platforms. For the purpose of this discussion, we make use of the term ‘open source’ as it is specifically used by the organizations discussed here – we acknowledge that ‘open source’ as a term is often used in problematic ways in place of what is simply extractable, publicly available data – the term open source refers to accessible and editable software source code and in this paper’s context the term often misleadingly refers to datasets that have come at a high cost to the organization that procured them.
    [Show full text]