While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence of major cyber attacks.
'Tweets and the Streets' analyses the culture of the new protest movements of the 21st century. From the Arab Spring to the 'indignados' protests in Spain and the Occupy movement, Paolo Gerbaudo examines the relationship between the rise of social media and the emergence of new forms of protest. Gerbaudo argues that activists' use of Twitter and Facebook does not fit with the image of a 'cyberspace' detached from physical reality. Instead, social media is used as part of a project of re-appropriation of public space, which involves the assembling of different groups around 'occupied' places such as Cairo’s Tahrir Square or New York’s Zuccotti Park. An exciting and invigorating journey through the new politics of dissent, Tweets and the Streets points both to the creative possibilities and to the risks of political evanescence which new media brings to the contemporary protest experience.
This book examines cyberspace superiority in nation-state conflict from both a theoretical and a practical perspective.
This volume analyses superiority concepts from the domains of land, maritime, and air to build a model that can be applied to cyberspace. Eight different cyberspace conflicts between nation states are examined and the resulting analysis is combined with theoretical concepts to present the reader with a conclusion. Case studies include the conflict between Russia and Estonia (2007), North Korea and the US and South Korea (2009) and Saudi Arabia and Iran in the Aramco attack (2012). The book uses these case studies to examine cyberspace superiority as an analytical framework to understand conflict in this domain between nation-states. Furthermore, the book makes the important distinction between local and universal domain superiority, and presents a unique model to relate this superiority in all domains, as well as a more detailed model of local superiority in cyberspace. Through examining the eight case studies, the book develops a rigorous system to measure the amount of cyberspace superiority achieved by a combatant in a conflict, and seeks to reveal if cyberspace superiority proves to be a significant advantage for military operations at the tactical, operational, and strategic levels.
Continue reading “International Conflict and Cyberspace Superiority: Theory and Practice (Routledge Studies in Conflict, Security and Technology)”
Adopting a multidisciplinary perspective, this book explores the key challenges associated with the proliferation of cyber capabilities.
Over the past two decades, a new man-made domain of conflict has materialized. Alongside armed conflict in the domains of land, sea, air, and space, hostilities between different types of political actors are now taking place in cyberspace. This volume addresses the challenges posed by cyberspace hostility from theoretical, political, strategic and legal perspectives. In doing so, and in contrast to current literature, cyber-security is analysed through a multidimensional lens, as opposed to being treated solely as a military or criminal issues, for example. The individual chapters map out the different scholarly and political positions associated with various key aspects of cyber conflict and seek to answer the following questions: do existing theories provide sufficient answers to the current challenges posed by conflict in cyberspace, and, if not, could alternative approaches be developed?; how do states and non-state actors make use of cyber-weapons when pursuing strategic and political aims?; and, how does the advent of conflict in cyberspace challenge our established legal framework? By asking important strategic questions on the theoretical, strategic, ethical and legal implications and challenges of the proliferation of cyber warfare capabilities, the book seeks to stimulate research into an area that has hitherto been neglected.
Continue reading “Conflict in Cyber Space: Theoretical, Strategic and Legal Pespectives (Routledge Studies in Conflict, Security and Technology)”
The Use of Force, long considered a classic in its own right, brings together enduring, influential works on the role of military power in foreign policy and international politics. Now in its eighth edition, the reader has been significantly revised; with twenty innovative and up-to-date selections, this edition is 60 percent new. Meticulously chosen and edited by leading scholars Robert J. Art and Kelly M. Greenhill, the selections are grouped under three headings: theories, case studies, and contemporary issues. The first section includes essays that cover the security dilemma, terrorism, the sources of military doctrine, the nuclear revolution, and the fungibility of force. A new subsection of Part I also deals with ethical issues in the use of force. The second section includes case studies in the use of force that span the period from World War I through the war in Afghanistan. The final section considers issues concerning the projection of US military power; the rising power of China; the spread of biological and nuclear weapons and cyberwarfare; intervention in internal conflicts and insurgencies; and possible future developments in terrorism, nuclear abolition, and robotic warfare. Continuing the tradition of previous editions, this fully updated reader collects the best analysis by influential thinkers on the use of force in international affairs.
Contributions by: Bruce J. Allyn, Kenneth Anderson, Robert J. Art, Mark S. Bell, Richard K. Betts, Laurie R. Blank, James G. Blight, Stephen G. Brooks, Seyom Brown, Daniel Byman, Audrey Kurth Cronin, Patrick M. Cronin, Alexander B. Downes, Karl W. Eikenberry, John Lewis Gaddis, Erik Gartke, Alexander L. George, Avery Goldstein, Kelly M. Greenhill, G. John Ikenberry, Robert Jervis, Gregory Koblentz, Peter R. Mansoor, John J. Mearsheimer, Nicholas L. Miller, Louis C. Morton, Barry R. Posen, Louise Richardson, George B. Samson, Thomas C. Schelling, Jack L. Snyder, Paul Staniland, Barbara F. Walter, Kenneth N. Waltz, Matthew Waxman, David A. Welch, Jon Western, and William C. Wohlforth.