Abstract
Cyberspace conflict involves activities that create physical, informational, and social effects at tactical, operational, strategic, and political levels, across the entire competition-war continuum. The actors range from nation-states to extremist organizations, insurgents, opposition groups, and activist organizations. The United States and its Western partners operate at a distinct disadvantage when it comes to cyberwarfare: First, it cannot be understood in the context of traditional force-on-force conflict which is the current foundation for joint military operations. Second, Western governments possess limited control over the Internet their citizens use, while many competitors exercise complete control. Third, the West maintains a clear separation between national security and commercial cyberspace, which creates an exploitable seam that does not exist with key competitors. To avoid US and partner adversaries achieving an overwhelming advantage in cyberspace, the United States and its partners must recognize their centers of gravity, the means available to an adversary to exploit these seams, and develop a comprehensive strategy leveraging both defensive and offensive lines of operation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Associated Press (2018, August 21). Microsoft uncovers more Russian attacks ahead of midterm elections. CNBC Online. Retrieved from https://www.cnbc.com/2018/08/21/microsoft-uncovers-more-russian-attacks-ahead-of-midterm-elections.html.
Astorino-Courtois, A. E. (2018). Contested space operations, space defense, deterrence and warfighting: Summary findings and integration report. Arlington: Strategic Multilayer Assessment (SMA).
Chakarian, P. (2011). The 2008 Russian cyber campaign against Georgia. Military Review, 91, 63–68.
Chilcot, J. (2016). Iraq inquiry. London. Retrieved from https://webarchive.nationalarchives.gov.uk/20160708115158/.
Cohen, M. (2015). Spying on friends: Germany’s BND scandal puts Snowden leaks in context. World Politics Review. Retrieved from https://www.worldpoliticsreview.com/articles/17182/spying-on-friends-germany-s-bnd-scandal-puts-snowden-leaks-in-context.
Council on Foreign Relations. (2010, January). Operation Aurora. Retrieved from CFR cyber operations tracker: https://www.cfr.org/interactive/cyber-operations/operation-aurora.
Department of the Army. (2017, April 11). Field manual 3-12: Cyberspace and electronic warfare operations. Retrieved from Federation of American Scientists: https://fas.org/irp/doddir/army/fm3-12.pdf.
Depository Trust & Clearing Corporation. (2018, March). Large-scale cyber-attacks on the financial system white paper. Retrieved from Oliver Wyman: https://www.oliverwyman.com/content/dam/oliver-wyman/v2/publications/2018/march/Large-Scale-Cyber-Attacks-DTCC-2018.pdf.
DeYoung, K. a. (2017). UAE orchestrated hacking of Qatari government sites. Washington Post, July 16.
Disinformation Operations in Cyber-space. (2017, June 15). Retrieved from European Union Agency for Network and Information Security (ENISA): https://www.enisa.europa.eu/publications/info-notes/disinformation-operations-in-cyber-space.
Dunlap, C. J. (2008, Winter). Lawfare today: A perspective. Retrieved from Yale Journal of International Affairs: https://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=5892&context=faculty_scholarship.
Elder, R., & Levis, A. (2017). A gray zone challenge: Intent and military response. In Conflicts in the gray zone: A challenge to adapt (pp. 89–108). Budapest: Hungarian Defence Forces General Staff Scientific Research Centre.
Faris, R. M. (2017). Partisanship, propaganda, and disinformation: Online media and the 2016 U.S. presidential election. Harvard University: Berkman Klein Center for Internet & Society Research.
FireEye. (2018). APT38: UN-USUAL SUSPECTS https://www.finextra.com/finextra-downloads/newsdocs/rpt-apt38-2018-web_v4.pdf. Retrieved from finextra.com: https://www.finextra.com/finextra-downloads/newsdocs/rpt-apt38-2018-web_v4.pdf.
Geer, D. E. (2010). Cybersecurity and national policy. Harvard National Security Journal, 1. 207–219
Hammes, T. (2019, February 25). Technology converges; non-state actors benefit. Retrieved from governance in an emerging New World, winter series, issue 319 (Hoover Institution): https://www.hoover.org/research/technology-converges-non-state-actors-benefit.
Hosmer, S. T. (2001). The conflict over Kosovo: Why Milosevic decided to settle when he did (MR-1351-AF). Santa Monica: RAND Corporation.
Howard, P. B. (2018). The IRA, social media and political polarization in the United States, 2012–2018. Oxford: University of Oxford Computational Propaganda Research Project.
Jaikaran, C. (2018). Cyber supply chain risk management: An introduction. Washington: Congressional Research Service.
Jamieson, P. D. (2015, September 30). Southern Iraq. Retrieved from Air Force Historical Research Agency, 30 Sept 2015: https://www.afhra.af.mil/Portals/16/documents/Airmen-at-War/Jamieson_SouthernIraq30Sep15.pdf?ver=2016-08-22-131406-023.
Joint Chiefs of Staff. (2018, June 8). JP 3-12, cyberspace operations, 8 June 2018–. Retrieved from joint chiefs of staff portal: https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12.pdf?ver=2018-07-16-134954-150.
Joint Staff. (2006). Deterrence operations joint operating concept, version 2.0. Washington, D.C.: Department of Defense. Retrieved from http://www.dtic.mil/futurejointwarfare.
Joint Staff. (2011, August 2011). Joint publication (JP) 5-0, Joint planning. Retrieved from joint chiefs of staff document portal: https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp5_0_20171606.pdf.
Lewis, J. A. (2018). Cognitive effect and state conflict in cyberspace. Washington: Center for Strategic and International Studies (CSIS.
Luna, D. M. (2012, October 26). The destructive impact of illicit trade and the illegal economy on economic growth, sustainable development, and global security. Retrieved from U.S. Department of State: https:f/2009-2017.state.gov/j/inl/rls/rm/199808.html.
Lynch, J. (2017). In South Sudan, Fake News Has Deadly Consequences. Slate, June 9. Retrieved from https://slate.com/technology/2017/06/in-south-sudan-fake-news-has-deadly-consequences.html.
McDonnell, C. J. (2009, December 6). National strategic planning: Linking DIMEFIL/PMESII to a theory of victory. Retrieved from Defense Technical Information Center: https://apps.dtic.mil/dtic/tr/fulltext/u2/a530210.pdf.
Mettis Global. (2017, July 17). UAE orchestrated hacking of Qatari government sites. Retrieved from MettisGlobal.com: https://mettisglobal.news/uae-orchestrated-hacking-of-qatari-government-sites.
Mitchell, A. (2018). China’s surveillance state should scare everyone. The Atlantic. Retrieved from https://www.theallanlic.com/international/archive/2018/02/china-surveillance/552203/.
Peritz, E. R. (2009, July). Confrontation or collaboration? Congress and the intelligence community: Intelligence basics, report for Belfer Center for Science and International Affairs. Retrieved from Harvard Kennedy School: https://www.belfercenter.org/sites/default/files/files/publication/intelligence-basics.pdf.
Pollard, N. A. (2018). Trust war: Dangerous trends in cyber conflict. Texas National Security Review, war on the rocks. Retrieved from https://warontherocks.com/2018/01/trust-war-dangerous-trends-cyber-conflict/.
Pruitt, S. (2018, August 8). How a five-day war with Georgia allowed Russia to reassert its military might. Retrieved from History.com: https://www.history.com/news/russia-georgia-war-military-nato.
Radio Free Europe and Radio Free Liberty. (2018, August 21). Microsoft reveals Russian hacking attempts ahead of U.S. elections. Retrieved from radio free Europe radio free liberty: https://www.rferl.org/a/microsoft-reveals-russian-hacking-attempts-ahead-of-u-s-elections/29445157.html.
Raitasalo, J. (2019, March 21). Shared Western notions of an ongoing hybrid war are corroding various societies and politics. Retrieved from National Interest: https://nationalinterest.org/feature/americas-constant-state-hybrid-war-48482.
REUTERS. (2016, Septermber 26). SWIFT banking system was hacked at least three times this summer. Retrieved from Fortune.com: http://fortune.com/2016/09/26/swift-hack/.
Robinson, T. (2019, February 1). Hacking Back. Retrieved from SCmagazine.com: https://www.scmagazine.com/home/security-news/cybercrime/hacking-back/.
Roughead, G. S. (2019, February 25). Information: The new Pacific coin of the realm. Retrieved from governance in an emerging New World, winter series issue 319, The Hoover Institution: https://www.hoover.org/research/information-new-pacific-coin-realm.
Sanger, D. E. (2017). Trump inherits a secret cyberwar against North Korean Missiles. Retrieved from New York Times, March 4: https://www.nytimes.com/2017/03/04/world/asia/north-korea-missile-program-sabotage.html.
Segal, A. (2017). Chinese cyber diplomacy in a new era of uncertainty. Stanford University. Retrieved from http://lawfareblog.com/chinese-cyber-diplomacy-new-era-uncertainty.
Steen, P. (2019, March). Economic Advisor. (R. J. Elder, Interviewer).
Sztipanovits, J., & Levis, A. (2008). Defending and operating in a contested cyber domain, SAB TR-08-01. Washington: Air Force Scientific Advisory Board.
Theohary, C. A. (2015, March 27). Cyberwarfare and cyberterrorism, congressional research service. Retrieved from Federation of American Scientists: https://fas.org/sgp/crs/natsec/R43955.pdf.
United States Army. (1993). Army field manual FM 100-5, Operations. Carlisle Barracks, PA: Department of the Army.
United States Strategic Bombing Survey. (1947). Summary reports. Maxwell Air Force Base: Reprinted by Air University Press, 1987. Retrieved from http://aupress.au.af.mil/Books/USSBS/USSBS.pdf.
Waltzman, R. (2017). The weaponization of information. Washington: Testimony presented before the Senate Armed Services Committee, Subcommittee on Cybersecurity. Retrieved from https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT473/RAND_CT473.pdf.
Wang, C. a. (2018). Cyber deception: Overview and the road ahead.. Retrieved from IEEE Security and Privacy: http://csa.eng.usf.edu/getsrc/?n=papers/18wl-sp.pdf.
Welch, L. (2008). Presentation to cyber warfare 2008 conference, London.
White, S. P. (2018). Understanding cyber warfare: Lessons from the Russia-Georgia war. West Point: Modern War Institute.
Zetter, M. (2010, January 14). Google hack attack was ultra sophisticated, new details show. Retrieved from Wired.com: https://www.wired.com/2010/01/operation-aurora/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this entry
Cite this entry
Elder, R.J. (2020). Cyberwarfare as Realized Conflict. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_64
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_64
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences