Cyberspace

Exploring the Complexity of Cyberspace Governance: State Sovereignty, Multi-stakeholderism, and Power Politics

Abstract:

Cyberspace is a socio-political and technological domain with unique characteristics. Its decentralized nature and the fact that it is mostly owned and managed by the private sector raise a number of questions regarding the most effective model of governance. Viewing cyberspace as a global commons, balancing between state sovereignty and the fragmentation of cyberspace, and debating between multilateralism and multi-stakeholderism makes discussions of cyberspace governance quite complex. The cases of ITU, ICANN, IGF, UN GGE, and NETmundial raise issues of legitimacy and accountability and offer a pragmatic insight into the power politics of cyberspace

Applying Principles of Reflexive Control in Information and Cyber Operations

Abstract:

According to Russian methodologies, the theory of Reflexive Control (RC) allows an initiator to induce an adversary to take a decision advantageous to the initiator through information manipulation. The RC theory encompasses a methodology where specifically prepared information is conveyed to an adversary, which would lead that adversary to make a decision desired by the initiator. The methodology is generally understood by Russian planners to be applicable in a wide variety of situations, and is deeply rooted within Russian Information Warfare concepts. Because theory envelops the Russian understanding of information as both technical data and cognitive content, ‘information resources’ are understood as technological as well as human.

Cyberspace—Making Some Sense of It All

Abstract:

This paper provides a framework describing the characteristics and implications of cyberspace which the author defines as the meld of technology, people, and the procedures that bind the two. Taken in sum, these elements comprise a dynamic environment that hosts a global information repository of incalculable value and the means to inform and coordinate the actions of individuals, governments, critical infrastructure, and militaries.

The Role of the U.S. Military in Cyberspace

Abstract:

As the United States has grown dependent on cyberspace, the U.S. military has come to have an increasingly important role to play in protecting U.S. national interests in the cyber domain. In addition to operating and defending its own cyberspace resources and supporting other military missions, the U.S. military must now be prepared to defend the country as a whole. These missions require the military to innovate and to collaborate effectively with a whole host of international, governmental, and private sector actors.

Information War and Rethinking Phase 0

Abstract:

In the Department of Defense, both military and civilian planners use a framework that divides military operations into six distinct phases. This type of framework may no longer have the utility it once enjoyed. This shift has less to do with technology changing the nature of war and more to do with how the United States differs from its adversaries in its understanding of war. Adversaries of the U.S. understand the state of the world to be one of conflict and competition and look to strategy to impose order through hierarchy. This article considers the Russian and Chinese approaches to the use of information in war and makes recommendations on how the U.S. might respond.

Cyberspace Offense and Defense

Abstract:

As the newest domain of military operations, cyberspace presents new challenges and learning opportunities. The fundamental military concepts operations apply, but often in ways different from the other domains. This paper examines military concepts of offense and defense in the cyberspace domain. Much previous work attempts to map military concepts into cyberspace while avoiding the technological reality of the domain. This paper applies foundational principles from the established field of information security to make a more technologically grounded examination of cyberspace offense and defense, their relationship, and how their nature here differs from the other operational domains.

Qualifying the Information Sphere as a Domain

Abstract

Neither the U.S. Department of Defense nor NATO has an official definition of a domain, nor a set of criteria for what constitutes a domain. The authors propose a definition of a domain, define what constitutes a domain, posit how new domains are created over time, and describe six features or criteria for how to qualify what is and is not a domain. These definitions lead to our proposal that the ‘Information Sphere’ (which includes cyberspace) qualifies as a new domain, with features both similar to and different from the four existing physical domains.

Using a layered model to place EW in context within the information sphere

ABSTRACT

In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer.

Exercising State Sovereignty in Cyberspace: An International Cyber-Order under Construction?

ABSTRACT

Cyberspace is erroneously characterized as a domain that transcends physical space and thereby is immune to state sovereignty and resistant to international regulation.  The purpose of this paper is to signify that cyberspace, in common with the other four  domains (land, sea, air and outer space) and despite its unique characteristics, is just a reflection of the current international system and, thereby, is largely affected by the rules that characterize it. The issue of state sovereignty in cyberspace raises critical questions about the need to regulate the cyber domain and gradually reach an international cyber-order.

Retrospective Evaluation of Cyber-security Strategic Reports for the Next Two Decades: From 2000 to 2030

ABSTRACT

Retrospective taxonomical evaluation of the strategic cyber-security reports of the last decade is important to appreciate how the very concept of Cyberspace has evolved along with other important concepts and definitions such as cyber security, cyber terrorism, cyber warfare, and information warfare. For that reason, this paper first evaluates, compares, and contrasts seven cyber-security strategy reports covering the decade from 2002 to 2011. Secondly, armed with the strategic cyber-security reports of the last decade, the paper attempts to ascertain whether the near future cyber-security strategies will continue to be valid.

Cyberspace from the Hybrid Threat Perspective

ABSTRACT

Hybrid threats use conventional and unconventional means to achieve their goals. This paper explores the cyber threats as one possible aspect of hybrid threats. It describes three ways of approaching cyberspace (operations) from the hybrid threats perspective: supporting conventional operations, exploiting non-military systems, and exploring the opportunities provided by this environment. In particular, it highlights the aspects that are or likely will be relevant to the military community.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com