Distinguishing Acts of War in Cyberspace

Monday, October 27, 2014

Stefano Mele


Determining an act of war in the traditional domains of land, sea, and air often involves sophisticated interactions of many factors that may be outside the control of the parties involved. This monograph seeks to provide senior policymakers, decisionmakers, military leaders, and their respective staffs with essential background on this topic as well as introduce an analytical framework for them to utilize according to their needs.

It develops this theme in four major sections:

1. it presents the characterization of cyberspace to establish terms for broader dialogue as well as to identify unique technical challenges that the cyberspace domain may introduce into the process of distinguishing acts of war. 

2. it explores assessment criteria involved with assaying cyber incidents to determine if they represent aggression and possible use of force; and if so, to what degree? 

3. it looks at the policy considerations associated with applying such criteria by examining relevant U.S. strategies as well as the strategies of other key countries and international organizations, and considers how nonstate actors may affect U.S. deliberations. 

4. it examines the influences that course of action development and implementation may have on the assessment of cyberspace incidents, such as reliable situational awareness, global and domestic environment considerations, and options and their related risks and potential consequences. It argues that the United States must also expect and accept that other nations may reasonably apply the criteria we develop to our own actions in cyberspace.

In conclusion, this monograph examines the question of what constitutes an act of war, or aggression, in the cyberspace domain. The author also provides a set of recommendations to US policymakers to help them better understand and mitigate the fog and friction surrounding the distinction of acts of war in cyberspace.

Download the monograph here: http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1229  

This was cross-posted from here.

Budgets Enterprise Security Policy Security Awareness Security Training Breaches CVE DB Vulns US-CERT
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.