Search

You searched for: Content Type Working Paper Remove constraint Content Type: Working Paper Publishing Institution The Strategic Studies Institute of the U.S. Army War College Remove constraint Publishing Institution: The Strategic Studies Institute of the U.S. Army War College Political Geography United States Remove constraint Political Geography: United States Publication Year within 5 Years Remove constraint Publication Year: within 5 Years Topic Science and Technology Remove constraint Topic: Science and Technology
Number of results to display per page

Search Results

  • Author: Dr. Mary Manjikian
  • Publication Date: 04-2015
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: An analysis of weapons-based confidence-building measures shows how academics can work together to self-police their research for national security implications, socialize new members of the academic community into the importance of considering security issues, and develop and disseminate norms regarding what is and is not a moral and ethical use of these technologies. It may be possible for academics and policymakers to come together to work for a ban or build-down on cyber weapons patterned on international efforts to ban chemical and biological weapons and implement export regimes to control the export of code which may form the components of cyber weapons. If we conceptualize cyberspace as territory, we can also learn from the example of territorially-based confidence-building measures such as those implemented along the Indo-Pakistan border. This approach stresses the importance of developing notification procedures to prevent misperceptions and the escalation spiral, as well as communicating regularly to establish trust between all parties. The case studies presented here illustrate the promises and pitfalls of each approach and offer valuable warnings to policymakers seeking to implement such measures in cyberspace. They show what happens when not everyone in a regime is equally committed to a specific outcome by illustrating the difficulties of monitoring compliance in confidence-building regimes, and show the ways in which doctrines and confidence-building measures may not be perfectly aligned.
  • Topic: Security, National Security, Science and Technology, War, Weapons of Mass Destruction, Cybersecurity
  • Political Geography: United States, Global Focus
  • Author: Andrew Monaghan, Keir Giles
  • Publication Date: 03-2014
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: The United States and its allies are in general agreement on the legal status of conflict in cyberspace. Although key principles remain unresolved, such as what precisely constitutes an armed attack or use of force in cyberspace, overall there is a broad legal consensus among Euro-Atlantic nations that existing international law and international commitments are sufficient to regulate cyber conflict.
  • Topic: International Relations, Security, Science and Technology
  • Political Geography: Russia, United States, North America
  • Author: Jeffery L. Caton
  • Publication Date: 10-2014
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: The monograph is comprised of four main sections: Characterization. This section provides the notional foundation necessary to avoid any devolution of the analysis to mere semantic arguments. It presents how cyberspace is defined and characterized for this discussion, as well as how this compares to existing concepts of the traditional domains of land, sea, air, and space. Also, it identifies some of the unique technical challenges that the cyberspace domain may introduce into the process of distinguishing acts of war. Assessment Criteria. This section explores the de jure and the de facto issues involved with assaying cyber incidents to determine if they represent aggression and possible use of force; and, if so, to what degree? It reviews the traditional legal frameworks surrounding military action to include the United Nations (UN) Charter and the Law of Armed Conflict. It also examines how these compare to the recently published Tallinn Manual on the International Law Applicable to Cyber Warfare. From these sources, it proposes a cyberspace incident assessment methodology. Policy Considerations. Having identified viable criteria to aid with the assessment of cyber-space incidents, this section looks at the policy considerations associated with applying such principles. First, it examines the relevant U.S. strategies; next, it investigates the strategies of other key countries and international organizations and how they compare to U.S. tenets; and finally, it evaluates how nonstate actors may affect U.S. deliberations. Courses of Action. This section examines the influences that course of action development and implementation may have on the assessment of cyberspace incidents. It first looks at the President's role as the primary decisionmaker in U.S. national matters regarding cyber-space. It then surveys key influences affecting subordinate decisionmakers and their staffs that may be advising the Commander-in-Chief: reliable situational awareness, global and domestic environment considerations, and options and their related risks and potential consequences.
  • Topic: Security, Defense Policy, Intelligence, Science and Technology, War
  • Political Geography: United States, United Nations