Preview

Journal of International Analytics

Advanced search

Evolution of National Approaches to Cyber Warfare

https://doi.org/10.46272/2587-8476-2022-13-2-79-94

Abstract

The latest information and communication technologies (ICTs) are increasingly considered by nation-states as a means to project their power and promote national interests. Over the past 20 years the major militarily signifi cant powers have created the doctrinal, logistical and organizational foundations for conducting military activities in the ICT environment and some states have already openly declared the priority of off ensive cyber operations, which increases the risks of crossing “red lines” and inadvertent escalation. The current situation related to the military-political exploitation of the ICT environment predetermines the urgent need for continuous analysis of current trends in this area and the search for approaches to reduce tension, which is the goal of this article. To achieve this goal, the fi rst part of the article considers in detail relevant doctrinal and strategic documents of the United States and other key countries and identifi es certain stages and aspects of evolution of their approaches. Further, the article considers and evaluates factors that infl uence military stability in the ICT environment, taking into account the previously obtained results. It is concluded that the identifi ed factors make the task of developing international frameworks to reduce the escalation in this area uncontested. This task is of particular urgency in the context of general international instability. Analysis of the current international environment in the relevant sphere allows to conclude that international community as a whole and the major players in particular (primarily Russia and the US) are aware of the danger of unintentional escalation in the ICT environment, especially when linked to strategic stability, and are ready to take steps towards developing the framework aimed at regulation and prevention of cyber confl icts. It is very actual now in new political reality but the question mostly is about fi nding the possible format.

About the Author

P. A. Karasev
Primakov National Research Institute of World Economy and International Relations, Russian Academy of Sciences
Russian Federation

Pavel A. Karasev, Ph.D. Political sciences, Senior researcher

Moscow, Leninskie Gory, Lomonosov Moscow State University, 1, p. 52


Competing Interests:

No potential confl ict of interest was reported by the author.



References

1. Karasev, Pavel A. “Militarizaciya Kiberprostranstva.” In Security And Arms Control 2017–2018: Overcoming The Imbalance Of The International Stability, edited by Alexey Arbatov, and Natalia Bubnova, 247–259. Moscow: IMEMO, 2018 [In Russian].

2. Krutskikh, A. “On Legal and Political Foundations of Global Information Security.” International Trends (Mezhdunarodnyye protsessy), no. 1 (2007): 28–37 [In Russian].

3. Lobach, Dmitriy V., and Evgeniya A. Smirnova. “Computer Network Attacks as an Act of Aggression in the Context of the Development of Modern International Relations: Pros and Cons.” Russian Journal of Legal Studies (Moscow) 7, no. 4 (March 14, 2021): 59–65. [In Russian].

4. Streltsov, Anatoliy. “Suverenitet i yurisdikciya gosudarstva v srede informacionno-kommunikacionnyh tekhnologij v kontekste mezhdunarodnoj bezopasnosti.” International Aff airs. no. 4 (2017) [In Russian].

5. Armistead, Leigh. Information Operations: The Hard Reality of Soft Power. Washington, D.C.: Potomac Books, 2004.

6. Futter, Andrew. Cyber Threats and Nuclear Weapons New Questions For Command And Control, Security And Strategy. London: RUSI, 2016.

7. Maurer, Tim, and Robert Morgus. Compilation of Existing Cybersecurity and Information Security Related Defi nitions. New America, 2014. http://www.jstor.org/stable/resrep10487.

8. Molander, Roger, Andrew Riddile, and Peter Wilson. Strategic Information Warfare: A New Face of War. RAND Corporation, 1996. https://doi.org/10.7249/MR661.

9. Rauscher, Karl, and Valeriy Yashchenko. Critical Terminology Foundations 1. Ebook. New York: EWI/IISI, 2011.

10. Rauscher, Karl, and Valeriy Yashchenko. Critical Terminology Foundations 2. Ebook. New York: EWI/IISI, 2014.

11. Unal, Beyza, and Patricia Lewis. Cybersecurity Of Nuclear Weapons Systems: Threats, Vulnerabilities And Consequences. London: The Royal Institute of International Aff airs, 2018. https://www.chathamhouse.org/publication/cybersecurity-nuclear-weaponssystems-threats-vulnerabilities-and-consequences.

12. Voo, Julia, Hemani, Ifran, Jones, Simon, DeSombre, Winnona, Cassidy, Dan, and Anina Schwarzenbach. Reconceptualizing Cyber Power. Cambridge, MA: Belfer Center for Science and International Aff airs, Harvard Kennedy School, 2020.


Review

For citations:


Karasev P.A. Evolution of National Approaches to Cyber Warfare. Journal of International Analytics. 2022;13(2):79-94. (In Russ.) https://doi.org/10.46272/2587-8476-2022-13-2-79-94

Views: 914


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2587-8476 (Print)
ISSN 2541-9633 (Online)