Evolution of National Approaches to Cyber Warfare

P. A. Karasev
{"title":"Evolution of National Approaches to Cyber Warfare","authors":"P. A. Karasev","doi":"10.46272/2587-8476-2022-13-2-79-94","DOIUrl":null,"url":null,"abstract":"The latest information and communication technologies (ICTs) are increasingly considered by nation-states as a means to project their power and promote national interests. Over the past 20 years the major militarily signifi cant powers have created the doctrinal, logistical and organizational foundations for conducting military activities in the ICT environment and some states have already openly declared the priority of off ensive cyber operations, which increases the risks of crossing “red lines” and inadvertent escalation. The current situation related to the military-political exploitation of the ICT environment predetermines the urgent need for continuous analysis of current trends in this area and the search for approaches to reduce tension, which is the goal of this article. To achieve this goal, the fi rst part of the article considers in detail relevant doctrinal and strategic documents of the United States and other key countries and identifi es certain stages and aspects of evolution of their approaches. Further, the article considers and evaluates factors that infl uence military stability in the ICT environment, taking into account the previously obtained results. It is concluded that the identifi ed factors make the task of developing international frameworks to reduce the escalation in this area uncontested. This task is of particular urgency in the context of general international instability. Analysis of the current international environment in the relevant sphere allows to conclude that international community as a whole and the major players in particular (primarily Russia and the US) are aware of the danger of unintentional escalation in the ICT environment, especially when linked to strategic stability, and are ready to take steps towards developing the framework aimed at regulation and prevention of cyber confl icts. It is very actual now in new political reality but the question mostly is about fi nding the possible format.","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46272/2587-8476-2022-13-2-79-94","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The latest information and communication technologies (ICTs) are increasingly considered by nation-states as a means to project their power and promote national interests. Over the past 20 years the major militarily signifi cant powers have created the doctrinal, logistical and organizational foundations for conducting military activities in the ICT environment and some states have already openly declared the priority of off ensive cyber operations, which increases the risks of crossing “red lines” and inadvertent escalation. The current situation related to the military-political exploitation of the ICT environment predetermines the urgent need for continuous analysis of current trends in this area and the search for approaches to reduce tension, which is the goal of this article. To achieve this goal, the fi rst part of the article considers in detail relevant doctrinal and strategic documents of the United States and other key countries and identifi es certain stages and aspects of evolution of their approaches. Further, the article considers and evaluates factors that infl uence military stability in the ICT environment, taking into account the previously obtained results. It is concluded that the identifi ed factors make the task of developing international frameworks to reduce the escalation in this area uncontested. This task is of particular urgency in the context of general international instability. Analysis of the current international environment in the relevant sphere allows to conclude that international community as a whole and the major players in particular (primarily Russia and the US) are aware of the danger of unintentional escalation in the ICT environment, especially when linked to strategic stability, and are ready to take steps towards developing the framework aimed at regulation and prevention of cyber confl icts. It is very actual now in new political reality but the question mostly is about fi nding the possible format.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
国家网络战方法的演变
最新的信息和通信技术(ict)越来越被民族国家视为投射力量和促进国家利益的手段。在过去的20年里,主要的军事强国已经为在信息通信技术环境下开展军事活动创造了理论、后勤和组织基础,一些国家已经公开宣布将非进攻性网络行动作为优先事项,这增加了越过“红线”和无意升级的风险。与ICT环境的军事政治利用相关的当前形势预先决定了迫切需要对该领域的当前趋势进行持续分析,并寻求减少紧张局势的方法,这也是本文的目标。为了实现这一目标,文章的第一部分详细考虑了美国和其他主要国家的相关理论和战略文件,并确定了他们的方法演变的某些阶段和方面。此外,考虑到先前获得的结果,本文考虑并评估了影响ICT环境下军事稳定的因素。结论是,已查明的因素使制定国际框架以减少该地区局势升级的任务没有争议。在国际普遍不稳定的情况下,这项任务特别紧迫。通过分析当前相关领域的国际环境,我们可以得出这样的结论:整个国际社会,特别是主要参与者(主要是俄罗斯和美国)意识到信息通信技术环境中无意升级的危险,特别是在与战略稳定相关的情况下,并准备采取措施制定旨在监管和预防网络冲突的框架。在新的政治现实中,这是非常现实的,但问题主要是找到可能的形式。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1