Cyberwarfare Research Papers - Academia.edu (original) (raw)

This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexities associated with the launch decision-making process. It managed to answer the question: Why were Stuxnet cyber-attack adopted, as a... more

This paper presented a realistic analysis of Stuxnet cyber-attack, aiming to uncover the complexities associated with the launch decision-making process. It managed to answer the question: Why were Stuxnet cyber-attack adopted, as a strategic choice for managing the conflict instead of traditional choices? It also gave an understanding for the security challenges and the strategic implications that cyber-attack had to pose. Finally, it reached a number of conclusions to the effect that: Realism, as a theory mostly concerned with issues of national security and power, can be a very suitable theoretical framework for analyzing and understanding cyber-attacks. The analysis confirmed that realism is an appropriate framework for identifying important issues related to security in the cyberspace and can provide useful insights into some of the enduring characteristics of international relations in the cyberspace.

Article on the history of cyberwarfare in Russia (1980 - late 1990s)

The purpose of this chapter is to review Russian Information Operations as exercised in recent years and analyze their significance as part of a broader grand strategy scheme. In order to do that, we will first analyze the way information... more

The purpose of this chapter is to review Russian Information Operations as exercised in recent years and analyze their significance as part of a broader grand strategy scheme. In order to do that, we will first analyze the way information war/operations are conceptualized by the Russian political and military elite. There is a distinction between the Russian approach to information warfare, which is employed during both peacetime and wartime, and the Western approach, which is limited to tactical information operations carried out during a military campaign. The Russian approach is broader, and the recent evidence from Ukraine demonstrates that the Russian state and Russian nonstate actors have exploited the Internet, social media and cyber tools in order to conduct a
type of warfare that largely avoids using traditional military force. Instead, it is focused on influencing the populations and decision-making processes of targeted countries. Though the direct results of such operations are hard to measure, there is speculation that they have had some effect in both operational terms (e.g., the case of the Ukraine-Crimea crisis) and strategic terms (e.g., eroding liberal democracy in Europe and weakening NATO’s cohesion). Having conceptualized a theoretical framework for how Russia perceives and utilizes information operations, we will make some suggestions on how to counter this new challenge.

This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals... more

This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL) with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and the implications of targeting non-state perpetrators under IHL. It concludes that current international law constructs are inadequate to address the implications of transnational cyber threats; the author recommends consequential amendments to the laws of war in order to address the challenges posed by transnational cyber threats.

Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations assail their political and economic interests. Repeatedly, Western leaders warn about the gravity of such actions. And yet repeatedly, the... more

Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations assail their political and economic interests. Repeatedly, Western leaders warn about the gravity of such actions. And yet repeatedly, the victims failed to punish to deter the offenders. This article examines why and how this situation arose and what to do about it. The Western approach to cyber conflict prevention emphasizes the centrality of existing international law and norms. The legal and normative framework is not adequate for this purpose, however, because it does not provide sufficient grounds to credibly respond to actions falling short of war. Consequently, the Western approach has failed spectacularly. It fails to grasp a central truth about contemporary security affairs: much of modern interstate rivalry fits neither the destructive criteria of war nor the acceptable boundaries of peaceful rivalry. Rather, it is unpeace, or mid-spectrum rivalry that is more damaging than traditional peacetime activity, but not physically violent like war. Nations use cyberspace to achieve some of the political and strategic objectives of war without firing a single gun. The lack of an effective Western response betrays not tolerance of aggression but a failure to devise a response strategy commensurate with the legal and doctrinal ambiguities of unpeace. Existing law and norms are a source of the problem, not its solution. An interim solution must be found instead in the development of new doctrine-in a consequentialist strategy that affects adversaries' material interests to deter actions which international law and security strategy do not ordinarily recognize as deserving a strong response.

China is one of the most pervasive actors conducting global cyber espionage, activities that have resulted in two indictments by the U.S. Department of Justice. One thing is clear-if a target or subject area is in China's strategic... more

China is one of the most pervasive actors conducting global cyber espionage, activities that have resulted in two indictments by the U.S. Department of Justice. One thing is clear-if a target or subject area is in China's strategic interest, it is likely that some level of cyber espionage is being levied against that target, as well as any organization involved in that subject. While reporting by the many countries bordering the Arctic on Chinese cyber-espionage has been limited, given China's high interest in the Arctic, and its espionage proclivities, China's activity may well be either undetected or under-reported. China's Arctic Aspirations-An Under-Reported Cyber Espionage Hot Spot? C hina has vociferously promoted itself as a legitimate "Arctic State"-it included the region in its strategic planning for the 2011 Twelfth Five-Year Plan, [1] and in a 2018 publication delineating its Arctic Policy. [2] China further demonstrated its commitment via a series of economic opportunities to attain influence in this area of rising strategic, economic, environmental, and maritime importance. Incorporating the Arctic into its strategic documents underscores China's elevation of this region to a national-level priority. The Arctic falls squarely within China's long-term global leadership and economic power goals and presents an opportunity to enhance China's presence in less-emphasized areas of the world, particularly where neither the US nor Russia have dedicated much time or attention. As it did in Africa, Beijing is resorting to its win-win playbook, [3] enticing local states via economic engagement and financial investment in return for support for Chinese projects.

In their recently released book 2034: A Novel of the Next World War, Elliot Ackerman and James Stavridis sketch out in detail what great power military conflict in the near-future will look like. Yet beyond being a mere Tom Clancy-style... more

In their recently released book 2034: A Novel of the Next World War, Elliot Ackerman and James Stavridis sketch out in detail what great power military conflict in the near-future will look like. Yet beyond being a mere Tom Clancy-style thriller, the book sends a cautionary message to its readers: in today’s digital age, there is a pressing need to find a way to avoid sleepwalking into war.

The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and... more

The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics
Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and Communication Technologies (ICT) have enhanced the human interactions and have contributed to “reinvent” classical concepts such as political participation, political debate, decision-making. However, their all-encom- passing, ubiquitous nature and their growing use for political and military purposes poses significant risks to international peace, stability and security. The low barrier of access to ICT capabilities, the speed of technological advances and the complexity of the cyberspace environment with regard to traditional legal definitions of borders have presented new challenges to States (the main actors of international relations) such as the inherent complexity of accurately attributing cyber-attacks. It is both this complexity and the frequent insistence of parties to attribute cyber-attacks and incidents “beyond a reasonable doubt” that gives one the ability to deny responsibility and frustrate attempts to build trust and political rapport in cyberspace. The purpose of this research is to analyze how cyberspace affects the international politics. The nature of the topic dictates the use of qualitative analysis of primary and secondary sources such as official reports, declarations and policy documents, and academic analysis, in order to understand effects and dynamics carried out by the cyber domain on classical concepts such as war, peace and international relations. The main idea of this research is that the development of Information and Communication Technolo- gies (ICTs) and the related (r)evolution of warfare have produced relevant effects on the dynamics of the contemporary international system highlighting, at the same time, how the militarization of the cyber domain has posed consequences on interna- tional security, peace and stability. However, the lack of specific research related to “cyberspace’s effects on international politics” highlights the need to devote more attention on this topic bearing in mind that, more extensive and enduring analysis on cyberspace’s dynamics might allowed policy makers the opportunity to improve
awareness related to cyber threats in order to governing challenges emerging from the digital sphere.

Applications of artificial intelligence in cyber warfare have been mainly postulated and studied in the context of defensive operations. This paper provides an introductory overview of the use of autonomous agents in offensive cyber... more

Applications of artificial intelligence in cyber warfare have been mainly postulated and studied in the context of defensive operations. This paper provides an introductory overview of the use of autonomous agents in offensive cyber warfare, drawing on available open literature. The study supplies an introduction to the taxonomy and science underlying intelligent agents and their strengths and weaknesses: the technological elements that autonomous agents should include are explained, as well as the economics involved. The paper also aims to explore possible legal implications of the use of autonomous agents and shows how they could fit into the legal context of warfare. The conclusion of the study is that the use of AI technologies will be an important part of cyber offensive operations, from both the technological and the economical aspects; however, the legal and doctrinal landscape is still uncertain and proper frameworks are still to be developed.

According to Kaspersky Lab research, APT – Advanced Persistent Threats – are one of the biggest threats in IT as of 2016. Organised groups, keeping contact in various languages, have attacked the IT systems of financial institutions,... more

According to Kaspersky Lab research, APT – Advanced Persistent Threats – are one of the biggest threats in IT as of 2016. Organised groups, keeping contact in various languages, have attacked the IT systems of financial institutions, government, military and diplomatic agencies, telecom and power supply companies, politicians and activists, and private companies, and these attacks were global in scope. APT should be seen as a complex phenomenon, an existing danger to companies, organisations and public entities. This article showcases the problem of APT, the biggest threats related to them, and chosen methods and tools that can be effectively used to counter APT attacks. An effective, multi- layered defence model is outlined in the article as well.

Analytical Study of Stuxnet Attacks on Iranian nuclear reactors . 1. Physical Weakness in industrial control systems in Iranian nuclear Bases. 2. Software Weakness and security in industrial control systems in Natanz nuclear Bases .... more

Analytical Study of Stuxnet Attacks on Iranian nuclear reactors .
1. Physical Weakness in industrial control systems in Iranian nuclear Bases.
2. Software Weakness and security in industrial control systems in Natanz nuclear Bases .
3. What is Stuxnet .
4. Reverse engineering of Stuxnet .

There is no shortage of books on all matters relating to information management and information technology. This booklet adds to this large collection and attempts to do a number of things: • offer non-technical readers an insight into... more

There is no shortage of books on all matters relating to information management and information technology. This booklet adds to this large collection and attempts to do a number of things:
• offer non-technical readers an insight into the few principles that are important and reasonably stable;
• present the material in a context relevant to the work of those involved in international relations;
• awaken the curiosity of readers enough that they will progress beyond this booklet and investigate
and experiment and thus develop knowledge and take actions that will meet their particular needs.

Over the last years there is a growing body of literature over exploiting cyberspace for offensive and defensive purposes. Cyber-conflict is after all the newest mode of warfare and cyber-weapons have been described as weapons of mass... more

Over the last years there is a growing body of literature over exploiting cyberspace for offensive and defensive purposes. Cyber-conflict is after all the newest mode of warfare and cyber-weapons have been described as weapons of mass disruption. Although the attention on the technical and military dimensions of cyberspace is justifiable, one needs also to look into the legal and ethical aspects of cyber-conflict, in order to comprehend the complex nature of cyberspace. The lack of an international legal framework that defines the use of force in cyberspace, operational difficulties in deterring and identifying cyber-attacks as well as the asymmetric dimension of cyber-conflicts pose without a doubt, great pressure on both theorists and practitioners of warfare. This paper will highlight the legal and ethical dilemmas regarding the use of force in cyberspace and question how the Law of War can be applied to cyber-threats.

In August 2008, the Russian Army invaded georgia. numerous, coordinated cyber attacks accompanied the military campaign. this represents the first instance of a large-scale computer network attack (CNA) conducted in tandem with major... more

In August 2008, the Russian Army invaded georgia. numerous, coordinated cyber attacks accompanied the military campaign. this represents the first instance of a large-scale computer network attack (CNA) conducted in tandem with major ground combat operations. The attack had no direct connection to the Russian government, but had a significant informational and psychological impact on Georgia: it effectively isolated the Caucasus state from the outside world.

Over the last two decades there is a growing body of literature over exploiting cyberspace for offensive and defensive purposes. Cyber-conflict is after all the newest mode of warfare and cyber-weapons have been described as weapons of... more

Over the last two decades there is a growing body of literature over exploiting cyberspace for offensive and defensive purposes. Cyber-conflict is after all the newest mode of warfare and cyber-weapons have been described as weapons of mass disruption. Although the attention on the technical and military dimensions of cyberspace is justifiable, one needs also to look into the legal and ethical aspects of cyber-conflict, in order to comprehend the complex nature of cyberspace. Conflict in cyberspace raises many ethical questions for both theorists and practitioners of warfare. In particular, the lack of an international legal framework that defines the use of force in cyberspace, operational difficulties in deterring and identifying cyber-attacks as well as the asymmetric dimension of cyber-conflicts pose without a doubt, great pressure on the just war tradition. This paper applies just war theory (jus ad bellum, jus in bello and jus post bellum) in cyberspace and explores when and how states may justly resort to cyber-conflict, operate during such a conflict and terminate it. Cyberspace is accessible to all and there are no rules or norms providing guidelines for the use of force. In addition to that, cyber-conflict appears to be less lethal and has a global reach. As a result, cyberspace makes conflict more thinkable, but that does not mean that it must also be unjust.

In the last decade of the proliferation of the World Wide Web (www), there has been a shift from normal human combat warfare to electronic warfare, where a person with a computer can do more damage to the infrastructure of a country than... more

In the last decade of the proliferation of the World Wide Web (www), there has been a shift from normal human combat warfare to electronic warfare, where a person with a computer can do more damage to the infrastructure of a country than thousands of soldiers. The amount of data, intelligence, and damage generated by such warfare is astronomical. This type of warfare requires artificial intelligence (AI) and Expert Systems to go to the forefront of the battlefield in order to analyze data and trends to identify potential attacks and provide countermeasures to such attack. This paper will serve as a summary of the review of literature of 26 articles regarding cyberwarfare in an effort to synthesize the current research on the topic. AI has put in a new perspective how Decision Support Systems (DSS) improve defense. DSS implemented today are in place to stop and deter in the shortest possible amount of time a cyberattack, and assist cyber defenders in finding the correct response that can only happen with the different types of DSS available. Copyright©2017, Juan M. Padrón. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original work is properly cited.

Il termine guerra ibrida è balzato agli onori delle cronache del 2014 ed oramai viene ampiamente usato anche al di fuori dell'ambito degli esperti in materia di sicurezza, ma cosa si intenda realmente con questo termine in realtà c'è... more

Il termine guerra ibrida è balzato agli onori delle cronache del 2014 ed oramai viene ampiamente usato anche al di fuori dell'ambito degli esperti in materia di sicurezza, ma cosa si intenda realmente con questo termine in realtà c'è piuttosto confusione. Nella stampa generalista il termine guerra ibrida viene usato come sinonimo di cyber warfare e pure in ambito accademico la discussione è stata, qualche tempo addietro, accesa sull'uso o meno del termine ibridaocome verrà brevemente accennato più avanti. Si pone quindi un primo problema di definire quindi cosa sia la guerra ibrida. Innanzittuto si può dire che non è una forma di guerra totalmente 'nuova', ma ne è una definizione dottrinaria, pure applicata sul terreno, come mai era stata messa nero su bianco da un attore statale nell'ambito di conflitti verso altri attori statali pur con alcune sostanziali novità concettuali. Nell'immaginario collettivo due stati si confrontano solitamente su un campo di battaglia con le unità ben identificabili. Al più possono esserci guerre di prossimità tra due attori statali che in realtà combattono per conto 'terzi'. Questa è quella che nel grande pubblico viene vista come guerra convenzionale, per quanto la realtà sia poi ovviamente molto più sfumata. Una guerra definitiva non convenzionale (o assimetrica o di quarta generazione, anche in questo caso le definizioni si sprecano e sono ricche di sfumature) solitamente vede coinvolti un attore statale contro attori irregolari o addirittura una guerra tra soli attori irregolari. Una guerra lontana dalle battaglie campali, ma fatta di scontri veloci, sabotaggi e via dicendo. La guerra ibrida vorrebbe, come si intuisce dal termine ibrido, porsi nel mezzo di questi antipodi (in realtà più immaginari che pratici). Il termine in tempi recenti si diffonde giornalisticamente in occidente fino all'ambito NATO a partire da 2014 inoltrato; ancora durante l'annessione della Crimea, su Foreign Policy, si usava 'guerra non lineare' (altro contendente al termine ibrido per definire questa tipologia di scontro) per indicare quanto stava accadendo, per giunta rifacendosi ad un articolo di Vladislav Surkov, consigliere di Putin, pubblicato il 12 marzo 2014 in coincidenza proprio con l'annessione della Crimea. Il termine guerra ibrida (o non lineare) viene usato oggigiorno per indicare una precisa tipologia di operazioni russe che si basano su una chiara dottrina che poi verrà illustrata, ma il termine è stato coniato in tempi meno recenti dal Maggiore statunitense William J. Nemeth in un suo testo intitolato Future War and Chechnya: A case of Hybrid Warfare del 2002. Scritto nel quale si analizzava la condizione ibrida della società cecena divisa tra elementi pre-moderni ed uno stato contemporaneo, una società ibrida che fece sorgere un modo di condurre la guerra originale con elementi regolari ed irregolari mixati in maniera molto efficace. Senza entrare nei dettagli dello 1 Ad esempio si prenda questo articolo del NYT dove il caso che riguardò la Clinton in campagna elettorale viene identificato-erroneamente-con la hybrid warfare confondendo uno dei possibili strumenti della cyber warfare che possono essere usati all'interno della guerra ibrida con la guerra ibrida stessa.

Political, economic, and military conflicts are increasingly also being carried out in cyberspace. However, conceptually, the notion of “cyberwar” only includes a narrow sub-section of all conflicts in cyberspace. At the operative level,... more

Political, economic, and military conflicts are increasingly also being carried out in cyberspace. However, conceptually, the notion of “cyberwar” only includes a narrow sub-section of all conflicts in cyberspace. At the operative level, capabilities for cyberwarfare are becoming increasingly important. Nevertheless, the prospects for strategic IT wars that only take place in the virtual space remain extremely unlikely. For many states, there is a particular need for action in the area of cyberdefence.

The Internet has been a counter-public space for Palestinian liberation politics for over a decade, and digital technologies have become an increasingly important tool for solidarity groups across the world. However, the Israeli state and... more

The Internet has been a counter-public space for Palestinian liberation politics for over a decade, and digital technologies have become an increasingly important tool for solidarity groups
across the world. However, the Israeli state and Zionist supporters worldwide are harnessing the same technologies and platforms to mobilize technology primarily to increase pro-Israel sentiments.
The aims of this article are to examine hasbara [Israeli public diplomacy] through an exploration of similar diplomacy programmes; to illustrate how social media have affected the basic algorithms of hasbara; and to probe the assertions of hasbara in the light of pro-Palestinian solidarity. Through
a study of public diplomacy, this article critically analyzes hasbara as a site of contestation and a method that is hampered by contradictions. On the one hand, there has been a massive growth in hasbara in recent years—indicated by the increase in funding for it and by its professionalized and centralized character; and on the other hand, hasbara has attracted sharp critiques in Israel for
its reputed failures. To understand this contradiction, hasbara must be placed within the context of Israel’s settler-colonialism, which sets the state apart from other ‘post-conflict’ states. This article reviews the methods utilized in hasbara, as well as their readjustment in the context of recent wars. Events in 2014 illustrate that hasbara actually destabilizes Israel’s diplomacy. Online journalism and the suppression of solidarity for Palestine together stimulate more criticism and, in turn, help to shift
public opinion. Paradoxically, therefore, adjustments (‘hasbara 2.0’) have underlined the image of Israel as a colonial power engaged in violent occupation.
KEY WORDS: BDS; Gaza; Internet; Israel; Palestinian Liberation; Propaganda; Public diplomacy; Zionism

Cyber-security has been approached by various disciplines. Information technology experts, lawyers, strategists and state officials have enriched the debate about the nature of cyber-security. The dominant trend - regardless of its... more

Cyber-security has been approached by various disciplines. Information technology experts, lawyers, strategists and state officials have enriched the debate about the nature of cyber-security. The dominant trend - regardless of its theoretical origin - is state-centric. This approach is to a large extent legitimate, but at the same time inadequate. Cybersecurity relates directly to the threats posed to the nation’s critical infrastructure, but should not be limited to the traditional concept of national security. The militarization of the cyber-security discourse has produced a security dilemma, which is not addressing sufficiently the needs of the people. The purpose of this paper is to highlight this shortcoming and view cybersecurity, through a human-centric prism. The paper will address the way state and non-state practices violate human rights in cyberspace. Over the past years, the development of internet censorship techniques and Edward Snowden revelations about the global surveillance carried out by the United States National Security Agency (NSA), vividly demonstrate that Internet freedom, anonymity and data protection are constantly under attack. The challenge ahead is to establish a governance regime for cyberspace that successfully addresses human rights norms and standards.

we will investigate an assortment of cyber-attacks and diverse security strategies. We try to make an investigation into the branch of knowledge. This paper investigates how cybercrime has become a genuine danger in our lives and we will... more

we will investigate an assortment of cyber-attacks and diverse security strategies. We try to make an investigation into the branch of knowledge. This paper investigates how cybercrime has become a genuine danger in our lives and we will take a gander at a couple of the diverse security strategies that are being utilized in this field and their different shortcomings. Innovation is quickly advancing in a world driven by informal communities, online exchanges, distributed computing, and robotized measures. Yet, with the innovative advancement comes the advancement of cyber-crime, which ceaselessly grows new assault types, apparatuses, and strategies that permit aggressors to enter more intricate or very much controlled conditions, produce expanded harm and even stay untraceable. The current article plans to get an outline of the cyber-crime as it is characterized and uncovered by particular writing, worldwide enactment, and chronicled realities, and play out an investigation of attacks revealed from one side of the planet to the other throughout the most recent three years to decide examples and patterns in cyber-crime. Because of the consequences of the examination, the article presents countermeasures that organizations may embrace to guarantee improved security that would uphold in safeguarding their business from assailants from a data security point of view.

w: Wybrane problemy bezpieczeństwa państwa, t. II.

A Cybersecurity guide (in Italian) edited by Barbara Carfagna
My Chapter is the last one

Ce 21e siècle assiste à l’aboutissement des technologies numériques, comme le 19e siècle a vu celui de la révolution industrielle. En effet, le monde est désormais ancré dans un contexte de cyberguerre, marqué par la hausse de la... more

Ce 21e siècle assiste à l’aboutissement des technologies numériques, comme le 19e siècle a vu celui de la révolution industrielle. En effet, le monde est désormais ancré dans un contexte de cyberguerre, marqué par la hausse de la cybercriminalité. Le Gabon ne doit pas se laisser surprendre. D’autant plus qu’avec la mise en place progressive d’un certain nombre de projets de développement basés sur une connexion Internet par fibre optique, destinés à faire du pays un « hub des Technologies de l’Information et de la Communication (TIC) » en Afrique Centrale, il est clair que le pays est promis à un bel avenir. Il n’en demeure pas moins qu’il doit aujourd’hui anticiper les évolutions à venir. C’est pourquoi, le rythme d’avancement de la cybercriminalité dans le pays, impose aux décideurs publics une révision complète des fondements de la doctrine en matière de numérique à l’aune du développement fulgurant des TIC. Il est plus qu’urgent pour le Gabon, de revoir ses concepts sur la sécurité et la défense, de décloisonner les savoirs sur la cybercriminalité et surtout d’envisager les nouveaux défis de façon résolument prospective.

Information warfare is an emerging threat which is developing into a significant future global security challenge, especially as the relationship between information and power is strengthened. Futures studies generate foresight about the... more

Information warfare is an emerging threat which is developing into a significant future global security challenge, especially as the relationship between information and power is strengthened. Futures studies generate foresight about the manifestation of information warfare in the 2030s as an upcoming national security threat in Africa. The four scenarios developed provide plausible futures which offer early warning insights on the manifestation of information warfare as a national security threat confronting Africa during the 2030s. Polarisation poses a significant future risk in terms of leveraging information warfare as a future weapon of mass-disruption.

"L'accélération fulgurante des cyberattaques contre les infrastructures électriques est aujourd'hui une réalité préoccupante qui nécessite de prendre des mesures d'urgence pour se protéger. Et cela d'autant plus, lorsque leurs... more

"L'accélération fulgurante des cyberattaques contre les infrastructures électriques est aujourd'hui une réalité préoccupante qui nécessite de prendre des mesures d'urgence pour se protéger. Et cela d'autant plus, lorsque leurs conséquences peuvent être catastrophiques pour l'ensemble de la population."

In this chapter, I argue that the notion which Michael Walzer calls jus ad vim might improve the moral evaluation for using military lethal force in conflicts other than war, particularly those situations of conflict short-of-war. First,... more

In this chapter, I argue that the notion which Michael Walzer calls jus ad vim might improve the moral evaluation for using military lethal force in conflicts other than war, particularly those situations of conflict short-of-war. First, I describe his suggested approach to morally justifying
the use of lethal force outside the context of war. I argue that Walzer’s jus ad vim is a broad concept that encapsulates a state’s mechanisms for exercising power short-of-war. I focus on his more narrow use of jus ad vim which is the state’s use of lethal force. Next I address Tony
Coady’s critique of jus ad vim.16 I argue that Coady highlights some important problems with jus ad vim, but these concerns are not sufficient to dismiss it completely. Then, in the final section, I argue that jus ad vim provides an appropriate “hybrid” moral framework for judging the ethical decision-making outside of war by complementing other conventional just war distinctions. A benefit of jus ad vim is that it stops us expanding the definition of war while still providing the necessary ethical framework for examining violent conflict outside that context

We must advance old think SOC operations and strategies. The global threat and new technologies implore us to engage in a Cyber warfare evolution and replace the Security Operations Center with a big data focused analytics Cyber... more

We must advance old think SOC operations and strategies. The global threat and new technologies implore us to engage in a Cyber warfare evolution and replace the Security Operations Center with a big data focused analytics Cyber Intelligence Operations Center or CIOC.

Rapports de forces, cyberattaques sur les infrastructures, hacking, espionnage, fake news, le cyberespace est devenu en quelques décennies un champ privilégié des relations internationales où coopèrent et s’affrontent anciens et nouveaux... more

Rapports de forces, cyberattaques sur les infrastructures, hacking, espionnage, fake news, le cyberespace est devenu en quelques décennies un champ privilégié des relations internationales où coopèrent et s’affrontent anciens et nouveaux acteurs de la conflictualité, étatiques et non étatiques, publics et privés, civils et militaires.
Les enjeux sont considérables car la plupart des activités humaines dépendent aujourd’hui de l’interconnexion des systèmes de traitement de l’information permise par les réseaux numériques. Or, les menaces associées à la digitalisation de la société ont profondément transformé la manière de concevoir les conflits contemporains. Elles ont amené les États et les principaux acteurs de la sécurité à repenser leurs politiques, leurs architectures et leurs stratégies de défense sur la scène internationale.
Ce domaine doit être appréhendé de manière globale, au croisement des approches politiques et géopolitiques, stratégiques et juridiques, économiques, techniques et sociotechniques. Cet ouvrage présente de manière concise et accessible l’ensemble des connaissances disponibles aujourd’hui sur le sujet de la cyberdéfense et de la gestion de crise dans l’espace numérique. Rédigé par de nombreux spécialistes, universitaires et praticiens, il offre une vision large et pluridisciplinaire des enjeux de la cyberconflictualité.

A group of eighty six nations has published National Cyber Security Strategies (NCSS). The NCSSs present similarities in basic concepts, in the identification of cyber threats and in the delimitation of strategic objectives. The present... more

A group of eighty six nations has published National Cyber Security Strategies (NCSS). The NCSSs present similarities in basic concepts, in the identification of cyber threats and in the delimitation of strategic objectives. The present article analyzes and compares the NCSSs in respect to the similarities shown within the scope of protection of critical infrastructures (CI). The convergence points identified in the article are: the protection of CIs as a strategic objective; the definition of what constitutes a CI; the services and facilities deemed CI; the existence of a national CI protection program; the need to congregate public and private stakeholders; and the need to build resilience into CI systems. The conclusion points out the countries that have shown through their NCSSs interest in international cooperation for the protection of CIs. This can be achieved by means of joint training, information exchange on threats and incidents against CIs, and in the medium term, the regulation of the use of cyberweapons against CIs.