• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

BATTLESPACE BOOK CLUB

June 7, 2013 by

Web Page sponsored by IT Governance

www.itgovernance.co.uk

————————————————————–
05 Jun 13. Experts debate the meaning and inevitability of cyber warfare
‘Cyber War Will Take Place!’ and other research from the digital battlefield in the Journal of Strategic Studies. In 2012 the Journal of Strategic Studies published several ground-breaking articles on the emerging threat of cyber warfare. These articles, and indeed the concept of cyber warfare per se, proved controversial. Twelve months on, a recent issue of the Journal of Strategic Studies presents a “cyber roundtable” where experts respond to criticisms and further expand the debate to develop a clearer definition of “cyber warfare” and to explore whether or not it is a significant threat. Not so long ago, cyber warfare was the stuff of science fiction; but there is growing evidence of the potential risk posed by deliberate militaristic attacks on computer systems and networks. Writing in the current issue of the Journal of Strategic Studies, John Stone, Senior Lecturer in the Department of War Studies, King’s College London, is in little doubt that cyber attacks could constitute acts of war – as the title of his article “Cyber war will take place!” clearly suggests. However, he raises the very pertinent point that the new threat of cyber attack should make academics – and indeed all citizens – question current perceptions of “war”: “Efforts to determine whether cyber attacks should be considered acts of war, or whether they are better understood as criminality, espionage, or sabotage etc., are hampered by our loose understanding of what war itself amounts to. More specifically the means of war, whether construed as force or violence, remain under-explored and under-specified by strategic theorists. As a result, these terms are typically used both loosely and interchangeably, undermining their value as conceptual tools in the process.” Without a clear definition of this new phenomenon there is a real risk that the media and politicians, and therefore also the general public, will label any malicious act involving a computer and a network “cyber warfare”. That could result in an apparent escalation in attacks, whereas in reality the risk of cyber warfare is considerably smaller.
In “The Proliferation of Cyberwarfare Capabilities and Interstate War, Redux: Liff Responds to Junio”, a response to critics of a previous article, Adam Liff maintains that cyber warfare is
“… computer network attacks with direct political and/or military objectives … distinct from cyber espionage, hacking, and crime”. The Journal’s “cyber roundtable” also includes:
* “Cyber War is Inevitable (Unless We Build Security In)”, by Gary McGraw (pp. 109–119)
* “Offensive Cyber Weapons: Construction, Development, and Employment”, by Dale Peterson (pp. 120–124)
* “How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate”, by Timothy J. Junio (pp. 125–133)
* “More Attacks, Less Violence”, by Thomas Rid (pp. 139–142)
These, together with the articles by Stone and Liff, represent an excellent example of the Journal’s groundbreaking and influential approach to the subject. As Liff writes:
“I hope that future writings on cyber warfare within and outside the academy will be explicit about their definitions and employ similar conceptual bounds in their discussions of cyber warfare.”
The peer-reviewed Journal of Strategic Studies, launched in 1978, has a reputation for taking the lead in promoting fresh thinking in the field of strategic studies among practitioners and academics alike, in particular taking a multi-disciplinary approach to topics such as contemporary security, modern warfare, defence policy and modern strategy.

—————————————————————
IT Governance is a unique organisation.

We source, create and deliver products and services to meet the real-world, evolving IT gove

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    May 20, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    May 20, 2022
    Read more
  • CONTRACT NEWS IN BRIEF

    May 20, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT