Academia.eduAcademia.edu

Cyber Conflict

description158 papers
group8,069 followers
lightbulbAbout this topic
Cyber conflict refers to the use of digital attacks by state or non-state actors to disrupt, damage, or gain unauthorized access to information systems, networks, or data, often with the intent to achieve strategic objectives, influence political outcomes, or inflict harm on adversaries.
lightbulbAbout this topic
Cyber conflict refers to the use of digital attacks by state or non-state actors to disrupt, damage, or gain unauthorized access to information systems, networks, or data, often with the intent to achieve strategic objectives, influence political outcomes, or inflict harm on adversaries.

Key research themes

1. How do states develop and operationalize cyber forces amidst strategic culture, bureaucratic challenges, and threat perceptions?

This theme explores the complexities involved in the creation and operationalization of cyber military capabilities by states, with particular emphasis on internal institutional dynamics, strategic cultural understandings, and threat assessments that shape cyber force development. Understanding these factors is crucial for grasping why some states lag in cyber force development despite growing cyber threats and why cyber power remains inconsistently integrated into national defense strategies.

Key finding: This article asserts the foundational necessity of cyber capabilities for emerging military domains such as space forces, emphasizing that cyber domain control is a prerequisite for operational dominance in other... Read more

2. What frameworks and normative proposals exist to govern state conduct and deter escalation in cyberspace?

This theme investigates the theoretical and policy-oriented efforts to define ethics, laws, norms, and deterrence strategies regulating state behavior in cyberspace to maintain international stability and avoid uncontrolled escalation. It emphasizes the challenges posed by the unique features of cyber conflict—such as ambiguity of attack attribution, low barriers to entry, and continuity between peace and war—and the necessity for bespoke normative and strategic responses.

Key finding: The chapter proposes a theory of cyber deterrence and policy recommendations grounded in nuanced understanding of cyber attacks' nature and moral considerations distinct from kinetic warfare. It highlights the insufficiency... Read more
Key finding: This monograph critically examines the rapidly evolving interpretations surrounding cyber conflict episodes and highlights the emergent epistemological crisis in understanding cyberwarfare. It critiques existing international... Read more
Key finding: The article introduces the concept of cyber-peacekeeping as a novel mechanism to regulate state behavior and manage cyber conflicts within the UN framework. It identifies operational, legal, and logistical... Read more

3. How are cyber conflict and cybercrime transforming security dynamics in critical infrastructure and civil protection?

This theme focuses on the intersection of cyber conflict and cybercrime as they pertain to the security of national critical infrastructures and civil protection. It explores how cyber threats have evolved to target vital systems, the societal and economic impacts of these threats, and the governmental and institutional strategies developed to enhance resilience, risk reduction, and national security in the cyber age.

Key finding: This empirical study examines the impact of cybersecurity technologies, risk reduction practices, and government roles on civil protection in Greece, highlighting that cybersecurity is an essential prerequisite for protecting... Read more
Key finding: Through comparative analysis of 86 national cybersecurity strategies, this article identifies common convergence points regarding critical infrastructure protection, such as the integration of public and private stakeholders... Read more
Key finding: The updated overview documents the technological advancements—such as social media, cloud computing, IoT, and botnets—that have expanded cybercrime modalities and increased their systemic impact on critical infrastructures... Read more

All papers in Cyber Conflict

by Luigi Martino and 
1 more
Building up on the following draft we welcome comments and suggestions and would like to elaborate with you a fully shared definition for academics and practitioners.
In August 2008, the Russian Army invaded georgia. numerous, coordinated cyber attacks accompanied the military campaign. this represents the first instance of a large-scale computer network attack (CNA) conducted in tandem with major... more
Moonlight Maze is the code name given to a highly classified incident. Experts in information security and intelligence think that Moonlight Maze is an example of the longest lasting advanced persistent threat in recent history. Security... more
In this article, I analyse deterrence theory and argue that its applicability to cyberspace is limited and that these limits are not trivial. They are the consequence of fundamental differences between deterrence theory and the nature of... more
Since 9/11, intelligence has evolved within a changing atmosphere of modern tactics and techniques for information collection. This atmosphere, coupled with massive leaps in technological advancement such as social media, mobile... more
Given the tone of cyber security debate and coverage in the news media, the assumption would be that we have entered an era of constant cyber warfare. Yet, the idea that cyber conflict is prevalent and normal flies against all evidence... more
Recent cyberattacks, such as those carried out against Estonia and Georgia, have grayed the line between political hackers and legitimate combatants involved in cyberconflicts. There has been fierce debate as to whether these attacks are... more
Over the last years there is a growing body of literature over exploiting cyberspace for offensive and defensive purposes. Cyber-conflict is after all the newest mode of warfare and cyber-weapons have been described as weapons of mass... more
Political hackers and cyber militias have begun to play an increasingly significant role in cyber conflict. Non-state actors, hacktivist groups and patriotic hackers often participate in online hacking battles based on political,... more
Dābiq is an electronic magazine (e-zine) utilising strategic utopianism and savagery messages supported by exemplary leadership, eschatology, and current events reports. This project analyses narrative themes present within Dābiq and... more
Paper on evolution of Iran's cyber warfare capabilities, institutions; key attacks on the United States and allies; security implications for the US.

Written for Dynamics of Cyber Conflict course at Columbia SIPA
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, conceptual, normative, and strategic framework. To be successful, cyber deterrence needs to shift from threatening to prevailing. I argue... more
Cyber-attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber-attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber-attacks that can... more
With the U.S. government acknowledgement of the seriousness of cyber threats, particularly against its critical infrastructures, as well as the Department of Defense officially labeling cyberspace as a war fighting domain, the Cold War... more
"In today’s information-driven business environment, enterprise systems and processes capture an ever-increasing amount of data. To derive meaningful and actionable information from this data, businesses are compelled to commit... more
The paper explores the application of digital forensics techniques to cyber warfare scenarios. A common accepted taxonomy for digital forensics (and anti- forensics) activities, techniques, procedures and work flows does not yet exist... more
The growing frequency of state-associated cyberattacks has led to calls for the establishment of rules of behaviour in this increasingly relevant domain. While there has been no shortage of such initiatives over the past decade, their... more
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, conceptual, normative, and strategic framework. To be successful, cyber deterrence needs to shift
from threatening to prevailing.
The U.S.-China bilateral agenda is dominated by issues like trade, intellectual property rights, monetary policy, human rights and security issues. However, given the fact that critical national infrastructures and the private sector are... more
There are few more critical questions in the field of cyber security than the issue of how to prevent malicious cyber actions and the utility of deterrence in the cyber domain. For many, deterrence will protect us from an uncertain cyber... more
The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and... more
This paper seeks to argue for the development of a global and multileveled management of cybersecurity. To do so we first define cybersecurity by situating it within the broader framework of the changing concept of security. To this end... more
It is now well-established that the rapid evolution of cyberspace has impacted upon almost every aspect of our lives. The dramatic increase in the speed, volumes and range of communications that it offers has undoubtedly changed the ways... more
This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by states and non-state actors. The book examines in depth the nature and dynamics of conflicts in the cyberspace, the... more
This article proposes a theoretical assessment of discourses on cyberconflict, and of their relation to the current perception of the state of cyberspace. By contrasting the “battlefield” approaches to cyberconflict with theoretical and... more
A relation of mutual influence exists between the way conflicts are waged and the societies waging them. As Clausewitz remarked, more than an art or a science, conflicts are a social activity. And much like other social activities,... more
In cyberspace, I argue, a powerful political actor is the one able to resolve, more than win, conflicts, as the China vs USA example indicates. This is because of the nature of cyber conflicts and the power dynamics of the information... more
Types of Cyber Crimes & Cyber Law in India is the second part of article, which covers cyber crimes and law associated in India
Cyber attacks are escalating in frequency, impact, and sophistication. For this reason, it is crucial to identify and define regulations for state behaviour and strategies to deploy countering measures that would avoid escalation and... more
Efforts to regulate cyber conflicts—and cyber-defence postures more generally— rose to prominence almost a decade ago, when the risks for national and international security and stability arising from the cyber domain became clear.1 As I... more
This article focuses on the ethical analysis of cyber warfare, the warfare characterised by the deployment of ICTs. It addresses the vacuum of ethical principles surrounding this phenomenon by providing an ethical framework for the... more
This paper seeks to create a practical taxonomy to describe cyber conflict events and the actors involved in them in a manner that is useful to security practitioners and researchers working in the domain of cyber operations. The proposed... more
This chapter is divided into three main sections. The first discusses the political environment in China to provide the context for dissent and involves a broad stroke on neoliberalism in China with a further discussion on censorship and... more
The world's perception of cyberspace has evolved from the libertarian promises of the 1990s to the current situation, where nation-states seek to reestablish their sovereignty. This paper explores the history of our conceptions of... more
This article analyses various cyber conflicts and cyber crime incidents attributed to Russian hackers, such as the Estonian and Georgian cyber conflicts and the ‘Climategate hack’. The article argues that Russian hackers were blamed by... more
Implementing an active defence strategy in cyberspace, means reacting to cyber attacks reaching out beyond the boundaries of the attacked networks, up to the point of counterattacking and disabling servers or other infrastructures... more
Along with the USA and Russia, China is often considered one of the leading cyber-powers in the world. In this excerpt, we explore how Chinese military thought, developed in the 1990’s, influenced their cyber-operations in the early... more
The increase in frequency of cyber attacks launched against the Association of South East Asian Nations (ASEAN) regional bloc that have been attributed to the People’s Republic of China (PRC) sets a precedent for the future of low impact... more
The rhetoric over the rate with which state-sponsored or state-endorsed cyber attacks has grown dramatically in the past years. Increasing dependence on information communication technologies by both state and non-state actors; compounded... more
The Boko Haram terrorism, which began in 2009 has had a devastating impact on the society. So far, it has triggered one of the worst humanitarian crises in history and has been responsible for over 30 thousand deaths with over two million... more
Download research papers for free!