A new and better quiet option? Strategies of subversion and cyber conflict

IF 1.3 2区 社会学 Q2 INTERNATIONAL RELATIONS Journal of Strategic Studies Pub Date : 2022-07-27 DOI:10.1080/01402390.2022.2104253
Lennart Maschmeyer
{"title":"A new and better quiet option? Strategies of subversion and cyber conflict","authors":"Lennart Maschmeyer","doi":"10.1080/01402390.2022.2104253","DOIUrl":null,"url":null,"abstract":"ABSTRACT Theorizing on cyber conflict has moved from warfare to conflict short of war, but strategic thought has not kept pace. This article argues cyber conflict is subversive, builds on intelligence scholarship to identify strategies of subversion, and examines their applicability in cyber conflict. It distinguishes three subversive strategies: manipulation, erosion and overthrow. The analysis shows cyber operations can only implement one of these strategies (erosion), indicating they offer less strategic value than traditional counterparts. Accordingly, although cyber operations offer superior scale, I argue their scope of influence is more limited. Finally, the article discusses strategic implications and identifies possible counterstrategies.","PeriodicalId":47240,"journal":{"name":"Journal of Strategic Studies","volume":"30 1","pages":"570 - 594"},"PeriodicalIF":1.3000,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Strategic Studies","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1080/01402390.2022.2104253","RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 8

Abstract

ABSTRACT Theorizing on cyber conflict has moved from warfare to conflict short of war, but strategic thought has not kept pace. This article argues cyber conflict is subversive, builds on intelligence scholarship to identify strategies of subversion, and examines their applicability in cyber conflict. It distinguishes three subversive strategies: manipulation, erosion and overthrow. The analysis shows cyber operations can only implement one of these strategies (erosion), indicating they offer less strategic value than traditional counterparts. Accordingly, although cyber operations offer superior scale, I argue their scope of influence is more limited. Finally, the article discusses strategic implications and identifies possible counterstrategies.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一个新的更好的安静的选择?颠覆战略和网络冲突
网络冲突的理论化已经从战争走向非战争冲突,但战略思想却没有跟上。本文认为网络冲突具有颠覆性,并在情报学术的基础上识别颠覆策略,并考察其在网络冲突中的适用性。它区分了三种颠覆性策略:操纵、侵蚀和推翻。分析显示,网络作战只能实施这些战略中的一种(侵蚀),这表明它们提供的战略价值不如传统战略。因此,尽管网络行动提供了更大的规模,但我认为它们的影响范围更为有限。最后,本文讨论了战略意义,并确定了可能的对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
4.00
自引率
5.30%
发文量
40
期刊介绍: The defining feature of The Journal of Strategic Studies is its commitment to multi-disciplinary approach. The editors welcome articles that challenge our historical understanding of man"s efforts to achieve political ends through the application of military and diplomatic means; articles on contemporary security and theoretical controversies of enduring value; and of course articles that explicitly combine the historical and theoretical approaches to the study of modern warfare, defence policy and modern strategy. In addition to a well-established review section, The Journal of Strategic Studies offers its diverse readership a wide range of "special issues" and "special sections".
期刊最新文献
How dawn turned into dusk: Scoping and closing possible nuclear futures after the Cold War Going nuclear: The development of American strategic conceptions about cyber conflict Aligning tactics with strategy: Vertical implementation of military doctrine How small states break oil sanctions: Israel’s oil import strategy in the 1970s Information security in the space age: Britain’s Skynet satellite communications program and the evolution of modern command and control networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1