SMALL WARS COUNCIL
Go Back   Small Wars Council > Small Wars Participants & Stakeholders > Media, Information & Cyber Warriors

Media, Information & Cyber Warriors Getting the story, dealing with those who do, and operating in the information & cyber domains. Not the news itself, that's here.

Reply
 
Thread Tools Display Modes
Old 12-22-2011   #201
Fuchs
Council Member
 
Fuchs's Avatar
 
Join Date: May 2008
Posts: 3,189
Default

Quote:
Originally Posted by tequila View Post
I'm a bit confused. How come normal espionage is just espionage, but cyber-espionage (against private entities!) somehow equals war?
It's not, but electronic sabotage of commercial or government systems is just like normal sabotage quite an offence against a state.
Fuchs is offline   Reply With Quote
Old 12-23-2011   #202
Brett Patron
Council Member
 
Brett Patron's Avatar
 
Join Date: Dec 2009
Location: Yorktown, Virginia
Posts: 45
Default

Quote:
Originally Posted by tequila View Post
I'm a bit confused. How come normal espionage is just espionage, but cyber-espionage (against private entities!) somehow equals war?
We need an answer to this if cyberspace is going to be credibly dubbed a "warfighting" domain.
Brett Patron is offline   Reply With Quote
Old 09-04-2012   #203
AdamG
Council Member
 
AdamG's Avatar
 
Join Date: Dec 2005
Location: Hiding from the Dreaded Burrito Gang
Posts: 1,400
Default Cybersecurity manual examines how international law applies to cyberwarfare

Quote:
A cybersecurity think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply.

The manual comes from experts working with the Cooperative Cyber Defense Center of Excellence (CCDCOE), an institute based in Tallinn, Estonia, founded in 2008 that assists NATO with technical and legal issues associated with cyberwarfare-related issues.

The centre's 215-page study, the 'Tallinn Manual on the International Law Applicable to Cyber Warfare', is intended as a reference for legal advisers for government agencies. It examines existing international law that allows countries to legally use force against other nations, as well as laws governing the conduct of armed conflict.
http://news.techworld.com/security/3...-cyberwarfare/
__________________
A scrimmage in a Border Station
A canter down some dark defile
Two thousand pounds of education
Drops to a ten-rupee jezail
AdamG is offline   Reply With Quote
Old 10-11-2012   #204
pvebber
Council Member
 
pvebber's Avatar
 
Join Date: May 2007
Location: Rho Dyelan
Posts: 130
Default Is Cyber a new warfare? Debate (catch all)

Given the recent manifesto by VADM's Card and Rogers in USNI Proceedings
("The Navy's Newest Warfighting Imperative") regarding the criticality of
cyberspace to the Navy's future, done in breathless metaphors to military
operations in the "other" domains, Dr. Libicki offers an important
"minority report" questioning the appropriateness of those metaphors, and
the overall philosophy behind our emerging doctrine for using cyberspace
(and information more generally) to relative advantage.

I think it unfortunate that this important essay languishes in a somewhat
obscure Law Journal, at least from the point of view of the military
audience that it could benefit. I think we are in danger of going down the
primrose path of wishful thinking we did with JV2010 in painting the
picture the good VADM's Proceedings article does about how to realize the
benefits and mitigate the risks associated with cyberspace, in terms of how
we deal with physical domains. The deja vu associated with the siren song
of "information dominance" harkens back to how the "fog of war" was going to
be lifted in JV2010 if only we interconnected everything and Metcalf's law
paid us the bonanza. Dr. Libicki makes a strong argument that leveraging
cyberspace may best be done on its own terms, and not through treating it
as another peg to be mashed into an ill-fitting doctrinal "domain" hole.

http://moritzlaw.osu.edu/students/gr.../4.Libicki.pdf

Hat tip to my colleague Bob Manke for bringing this to my attention.
__________________
"All models are wrong, but some are useful"

-George E.P. Box
pvebber is offline   Reply With Quote
Old 02-24-2013   #205
Bill Moore
Council Member
 
Join Date: Oct 2005
Posts: 2,281
Default Chinese army hackers are the tip of the cyberwarfare iceberg

http://www.guardian.co.uk/technology...ing?CMP=twt_gu

Quote:
This is what Unit 61398 really represents: not just the ambitions of a stirring China, but the growing to maturity of a new ecosystem of warfare, espionage, activism and criminality. Last week a retired CIA director, Michael Hayden, compared it to the dawning of the atomic age at Hiroshima, saying: "This has the whiff of August 1945."
Bill Moore is offline   Reply With Quote
Old 05-19-2013   #206
Bill Moore
Council Member
 
Join Date: Oct 2005
Posts: 2,281
Default

http://www.theatlantic.com/technolog...ors_picks=true

Will 'Digital Ethnic Cleansing' Be Part of the Internet's Future?

Eric Schmidt, Jared Cohen, and Steve Clemons discuss the political limitations of the Internet.

Quote:
And they might ultimately engage, Cohen continued, in a kind of "digital ethnic cleansing." Traditional legal and political checks on mass criminality have been developed within and for the physical world, he noted; in the digital, however, those checks are less developed. The web is simply too new. And you could imagine autocratic regimes or other communities taking advantage of that, creating a scenario in which one group finds a way to, for example, filter another group's content from the web. Or to shut down -- or severely slow down -- their Internet access. Or to infiltrate them with malware and/or orchestrate elaborate denial-of-service (DDoS) attacks. One group, in other words, could essentially annihilate the digital existence of another.
Quote:
When people in the virtual community begin to misbehave, committing crimes that wouldn't be legal in the physical space, we currently have very few mechanisms for correction. As that reality plays out on the geopolitical stage, he said, you could have "this bizarre situation" in which, say, the U.S. and China have a generally good relationship in the physical world: cash flow, open communications, travel between the two countries, etc. And yet behind the scenes -- in the digital world -- those countries could be, effectively, waging war on each other through their digital infrastructure.
Their new book looks promising.

"The New Digital Age: Reshaping the Future of People, Nations and Business"

http://www.amazon.com/The-New-Digita.../dp/0307957136

Much of it is focused on the future of States, Terrorism, War, etc., and they don't paint a rosy picture.
Bill Moore is offline   Reply With Quote
Old 06-09-2013   #207
bourbon
Council Member
 
bourbon's Avatar
 
Join Date: Jun 2007
Location: Boston, MA
Posts: 898
Default

Quote:
Originally Posted by Bill Moore View Post
Their new book looks promising.
"The New Digital Age: Reshaping the Future of People, Nations and Business"
Evgeny Morozov has become notorious for his takedowns of technology pundits and giants - he is the intellectual equivalent of a Mongol horde unleashed upon Silicon Valley. He gave no quarter Schmidt and Cohen in his review The New Digital Age:

Future Shlock - Meet the two-world hypothesis and its havoc, by Evgeny Morozov. New Republic, 27 May 2013.
Quote:
Schmidt and Cohen are at their most shallow in their discussion of the radicalization of youth (which was Cohen’s bailiwick at the State Department before he discovered the glorified world of futurology). “Reaching disaffected youth through their mobile phones is the best possible goal we can have,” they announce, in the arrogant voice of technocrats, of corporate moguls who conflate the interests of their business with the interests of the world. Mobile phones! And who is “we”? Google? The United States?

The counter-radicalization strategy that Schmidt and Cohen proceed to articulate reads like a parody from The Onion. Apparently, the proper way to tame all those Yemeni kids angry about the drone strikes is to distract them with—ready?—cute cats on YouTube and Angry Birds on their phones. “The most potent antiradicalization strategy will focus on the new virtual space, providing young people with content-rich alternatives and distractions that keep them from pursuing extremism as a last resort,” write Cohen and Schmidt. For—since the technology industry

" produces video games, social networks, and mobile phones—it has perhaps the best understanding of how to distract young people of any sector, and kids are the very demographic being recruited by terror groups. The companies may not understand the nuances of radicalization or the differences between specific populations in key theaters like Yemen, Iraq, and Somalia, but they do understand young people and the toys they like to play with. Only when we have their attention can we hope to win their hearts and minds."

Note the substitution of terms here: “we” are no longer interested in creating a “sea of newly informed listeners” and providing the Yemeni kids with “facts.” Instead, “we” are trying to distract them with the kinds of trivia that Silicon Valley knows how to produce all too well. Unfortunately, Cohen and Schmidt do not discuss the story of Josh Begley, the NYU student who last year built an app that tracked American drone strikes and submitted it to Apple—only to see his app rejected. This little anecdote says more about the role of Silicon Valley in American foreign policy than all the futurology between the covers of this ridiculous book.

When someone writes a sentence that begins “if the causes of radicalization are similar everywhere,” you know that their understanding of politics is at best rudimentary. Do Cohen and Schmidt really believe that all these young people are alienated because they are simply misinformed? That their grievances can be cured with statistics? That “we” can just change this by finding the digital equivalent of “dropping propaganda flyers from an airplane”? That if we can just get those young people to talk to each other, they will figure it all out? “Outsiders don’t have to develop the content; they just need to create the space,” Schmidt and Cohen smugly remark. “Wire up the city, give people basic tools and they’ll do most of the work themselves.” Now it’s clear: the voice of the “we” is actually the voice of venture capital.
The whole review is just brutal.
__________________
“[S]omething in his tone now reminded her of his explanations of asymmetric warfare, a topic in which he had a keen and abiding interest. She remembered him telling her how terrorism was almost exclusively about branding, but only slightly less so about the psychology of lotteries…” - Zero History, William Gibson
bourbon is offline   Reply With Quote
Old 01-15-2014   #208
AdamG
Council Member
 
AdamG's Avatar
 
Join Date: Dec 2005
Location: Hiding from the Dreaded Burrito Gang
Posts: 1,400
Default

Quote:
Even if cybersecurity isn't a subject you think about a lot, the data breach of credit card information from and customers has probably increased your level of cyber-anxiety.

In Cybersecurity And Cyberwar: What Everyone Needs to Know, P.W. Singer looks at cybersecurity issues faced by the military, government, businesses and individuals, and what happens when you try to balance security with freedom of speech and the ideals of an open Internet.
http://www.npr.org/2014/01/14/262387...s-cyberthreats
__________________
A scrimmage in a Border Station
A canter down some dark defile
Two thousand pounds of education
Drops to a ten-rupee jezail
AdamG is offline   Reply With Quote
Reply

Bookmarks

Tags
cyberwar

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
USAF Cyber Command (catch all) selil Media, Information & Cyber Warriors 150 03-15-2011 09:50 PM
Information Operations SWJED Media, Information & Cyber Warriors 152 08-28-2009 09:47 AM
A Few Cyber Warfare Resources JeffC Media, Information & Cyber Warriors 10 12-18-2007 01:01 PM
Recognizing and Understanding Revolutionary Change in Warfare SWJED Futurists & Theorists 0 03-01-2006 08:59 PM


All times are GMT. The time now is 07:41 AM.


Powered by vBulletin® Version 3.8.7. ©2000 - 2014, Jelsoft Enterprises Ltd.
Registered Users are solely responsible for their messages.
Operated by, and site design © 2005-2009, Small Wars Foundation