Cyber War Will Not Take Place

@article{Rid2012CyberWW,
  title={Cyber War Will Not Take Place},
  author={Thomas Rid},
  journal={Journal of Strategic Studies},
  year={2012},
  volume={35},
  pages={32 - 5}
}
  • Thomas Rid
  • Published 2012
  • Political Science
  • Journal of Strategic Studies
Abstract For almost two decades, experts and defense establishments the world over have been predicting that cyber war is coming. But is it? This article argues in three steps that cyber war has never happened in the past, that cyber war does not take place in the present, and that it is unlikely that cyber war will occur in the future. It first outlines what would constitute cyber war: a potentially lethal, instrumental, and political act of force conducted through malicious code. The second… Expand
Has Cyber War Happened
One of the key questions in the debates around the likelihood and seriousness of the cyber warfare threat is whether any of the attacks we have seen in recent years constitute solid examples of cyberExpand
What is Cyber Warfare
World War II ; Cold War ; War on Drugs ; War on Terrorism —these terms are undoubtedly familiar to most people today. One war-related term that may not be so familiar, though, is cyber war . PeopleExpand
A New Way of Conducting War: Cyberwar, Is That Real?
There are numerous discussions on both the reality and impact of cyberwar. Most of the critics are based on the Clausewitzian perspective of war in which its political nature must exist, an act ofExpand
Ethiek voor Cyberkrijg en Cyberkrijgers
  • P. Olsthoorn
  • Philosophy
  • Algemeen Nederlands Tijdschrift voor Wijsbegeerte
  • 2019
Ethics for Cyber War and Cyber Warriors Although some claim that the term cyber war is merely metaphorical, there are good reasons to see cyber war as a form of warfare – even if it is not warExpand
Cyber warfare: Issues and challenges
TLDR
There is no widely adopted definition of what cyber warfare is, and the terms cyber war and cyber warfare are not well enough differentiated, so a definition model is presented to help define both cyber warfare and cyber war. Expand
Cyber Warfare: New Dimension in Security and Strategy
For the last ten years major security thinkers are struggling to define cyber warfare as a part of military strategy and tactic. At times these attacks have been organized to weaken the war fightingExpand
Just cyber war?: Casus belli, information ethics, and the human perspective
  • Matt Sleat
  • Sociology
  • Review of International Studies
  • 2017
Abstract Does the advent of cyber war require us to abandon the traditional ethical framework for thinking about the morality of warfare – just war theory – and develop principles specific to theExpand
The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth
  • E. Gartzke
  • Political Science
  • International Security
  • 2013
Cyberwar has been described as a revolution in military affairs, a transformation of technology and doctrine capable of overturning the prevailing world order. This characterization of the threatExpand
Clausewitz and the Utility of Cyberattacks in War
  • J. T. Jacobsen
  • History, Computer Science
  • Int. J. Cyber Warf. Terror.
  • 2014
TLDR
Drawing on Clausewitz, the article finds that cyberattacks can be useful tools particularly in the initial phase of war, however cyberattacks remain inferior to conventional military weaponry, ultimately rendering cyberwar unlikely. Expand
Reality Check: Assessing the (Un)Likelihood of Cyberterrorism
This chapter argues that debates around the threat posed by cyberterrorism have been dominated by a focus on issues relating to technological potentialities. To balance this, it focuses on theExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 55 REFERENCES
FROM PITCHFORKS TO LAPTOPS: VOLUNTEERS IN CYBER CONFLICTS
The capability and mandate for organized violence in the interna‑ tional setting has normally been the domain of nation‑states. Cyberspace however provides an international arena where almost anyoneExpand
Cyberwar is coming
Abstract The information revolution and related organizational innovations are altering the nature of conflict and the kinds of military structures, doctrines, and strategies that will be needed.Expand
Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political
Essential systems providing water, electricity, healthcare, finance, food, and transportation are now increasingly software dependent, distributed, and interconnected. The detrimental consequences ofExpand
Defending a New Domain
TLDR
The Pentagon’s operation to counter the attack, known as Operation Buckshot Yankee, marked a turning point in U.S. cyberdefense strategy and highlighted the increasing frequency and sophistication of intrusions into U.s. military networks. Expand
Cyberdeterrence and Cyberwar
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems fromExpand
Politically Motivated Denial of Service Attacks
Cyberwarfare has been waged for well over a decade, utilizing methods such as website defacement, data leakage, and distributed denial of service attacks (DDoS). This paper focuses on the latter,Expand
The Terror Fringe
THE AFGHAN-PAKISTAN BORDER region is widely identified as a haven for jihadi extremists. But the joint between local insurgencies and global terrorism has been dislocated. A combination of newExpand
The Hunt For The Kill Switch
  • S. Adee
  • Engineering
  • IEEE Spectrum
  • 2008
This paper has described the issues on electronic circuits which are made for military equipments.The DoD of U.S. recently launched its most ambitious program yet to verify the integrity of theExpand
Counterinsurgency Warfare: Theory and Practice
Foreword Introduction Revolutionary War: Nature and Characteristics The Prerequisites for a Successful Insurgency The Insurgency Doctrine Counterinsurgency in the Cold Revolutionary WarExpand
But What Have You Done for Us Lately?
Cet article porte un regard critique sur la contribution de Abbott et Tsay contenue dans le present numero. Selon l'A., si la methode de l'assortiment optimal en analyse sequentielle fait desormaisExpand
...
1
2
3
4
5
...