Cyber Conflict – Disruption and Exploitation in the Digital Age (original) (raw)
Related papers
NON-STATE ACTORS IN CYBERSPACE OPERATIONS
The growing importance of cyberspace to modern society, and its increasing use as an arena for dispute, is becoming a national security concern for governments and armed forces globally. The special characteristics of cyberspace, such as its asymmetric nature, the lack of attribution, the low cost of entry, the legal ambiguity, and its role as an efficient medium for protest, crime, espionage and military aggression, makes it an attractive domain for nation-states as well as nonstate actors in cyber conflict. This paper studies the various non-state actors who coexist in cyberspace, examines their motives and incitements, and analyzes how and when their objectives coincide with those of nation-states. Literature suggests that many nations are currently pursuing cyberwarfare capabilities, oftentimes by leveraging criminal organizations and irregular forces. Employment of such non-state actors as hacktivists, patriot hackers, and cybermilitia in state-on-state cyberspace operations has also proved to be a usable model for conducting cyberattacks. The paper concludes that cyberspace is emerging as a new tool for state power that will likely reshape future warfare. However, due to the lack of concrete cyberwarfare experience, and the limited encounters of legitimate cyberattacks, it is hard to precisely assess future effects, risks and potentials.
The Use of Cyber Warfare and its Impact on International Security
Science For All Publications, 2023
The rise of technology has revolutionized warfare, giving birth to a new form of conflict known as cyber warfare. This article examines the use of cyber warfare and its profound implications for international security. Cyber warfare encompasses various activities, including cyber espionage, terrorism, and state-sponsored cyber attacks. These tactics pose significant challenges to governments, economies, critical infrastructures, and individuals. Additionally, attributing cyber attacks remains a complex issue, impacting international norms and regulations. Therefore, fostering international cooperation, strengthening defense mechanisms, and establishing comprehensive cybersecurity frameworks to mitigate the risks and ensure global security is crucial.
Review: 2017 Strategic Trends in the Global Cyber Conflict
The present paper reviews the main strategic trends in cyber policy and security for 2017, pointing out the emergence of a new "Cyber Escalation Cycle:" while states are investing significant resources to improve their offensive cyber capabilities, these capabilities are subsequently being stolen, publicized and used by hostile countries to launch devastating cyber-attacks. This has led governments to pursue legislation that controls incoming technology and changes the technological relations between countries. Given the development of enhanced capabilities and the effectiveness of the attacks, we believe that leakage followed by immediate use of the leaked offensive cyber weapons against rival countries will only increase, making this issue even more contentious.
A Critical Study On Major Issues And Implications Of Cyber Warfare
Science Research Society, 2021
The digital age has given rise to a new type of threat: cyberwar. "Cyberwar" denotes the use or targeting of computers, the internet of things (IOTs), and network-based systems in the context of warfare. Since information technology and the internet have evolved to the point where they are major components of national power, state militaries have been developing cyber weapons for use in national security preparation. An alarming number of states are engaging in cyber espionage, reconnaissance, or cyber-attacks, or both. There is considerable debate over whether such campaigns can be called "wars." Due to a lack of detailed knowledge in cybersecurity, those who are already in the industry have a difficult time meeting the cyberwarfare challenge. Despite several cyberattacks, the world has failed to keep up with the evolving threats of modern warfare. This research paper aims to examine the legal context of cyber warfare, i.e., the legislation that applies to cyber warfare, as well as case studies of cyber warfare events from around the world. It also focuses on issues like the use of force and the challenge of electronic warfare governance. This paper concludes with observations and recommendations for the future of cyber warfare.
Cyberwar and Rivalry: The Dynamics of Cyber Conflict between Antagonists, 2001-2011 by
The goal of this research is to exhaustively collect information on all cyber attacks in the last decade so that we can delineate the patterns of cyberwar as reflected by evidence. Much talk about the concept of cyberwar and the changing dynamic of future conflict is founded on the study of spectacular flights of imagination of what could be. Our theory is that deterrence and regionalism should be expected in cyber conflict, counterintuitive to conventional wisdom. We find here that the actual magnitude and pace of cyber attacks among rivals does not match up to popular perception. Only 20 of 124 active rivals engaged in cyber conflict between 2001 and 2011. The attacks that were uncovered were limited in terms of magnitude and frequency. The coming era of cyberwar should continue to exhibit these patterns despite fears mentioned by media pundits and government agencies. Cyberwar is a reality, but it is a little used tactic that has not changed the shape of international interactions.
The Palgrave Encyclopedia of Peace and Conflict Studies
Cyber warfare; International humanitarian law; ius ad bellum; ius in bello; Self-defense Definition/Description The development of cyber capabilities among state and non-state actors, as well as the increase of cyber dependency has made cyber conflict a plausible reality and no longer a hypothetical example. There is a general agreement among scholars and states that the traditional concept of conflict as set out in the Geneva Conventions and Additional Protocol remains the same and is applicable to any new technological weapons and thus also applicable to cyberspace. However, the sophistication of cyber capabilities of states and the amplification of power of non-state actors in cyberspace have shifted the paradigms and blurred the lines of the clear delineation between international and non-international armed conflict and when the use of cyber capabilities triggers a conflict. As such the article will aim to provide some insight on when the use of cyber weapons by state actors can result in a conflict if the requisite cyber operation reaches the threshold of an armed attack. Given the technical capacities of some non-state actors to conduct dangerous cyber operations that can amount to armed attacks, the question arises if these attacks can trigger a conflict and how that conflict would be classified and lastly how do the Laws of Armed Conflict (LOAC) apply to cyber conflict particularly with regard to non-state actors and non-international armed conflicts.
King's College London, 2024
In recent years, the threat of cyber warfare has emerged as a significant concern, targeting not only government entities but also civilian companies and critical infrastructure. Unlike traditional warfare, the insidious nature of cyberattacks instils fear and disrupts economies without warning. Despite this growing threat, there remains a noticeable gap in cybersecurity awareness and preparedness among civilian entities. This research aims to comprehensively evaluate the impact of cyber warfare on these sectors, focusing on periods of geopolitical tension to identify correlations and vulnerabilities. The study will employ an observational exploratory and longitudinal approach, analysing both quantitative and qualitative data to reveal patterns and trends. Furthermore, it will examine common attack vectors and their impacts, providing a detailed assessment of the methods used by cyber attackers and the resulting damages[3]. The research seeks to underscore the urgent need for robust cybersecurity measures and propose actionable recommendations for governments and companies to effectively mitigate these risks and foster greater resilience against evolving cyber threats. This study aspires to advance national security and protect civilian infrastructures through improved cybersecurity strategies and policy development.