Preview

International Trends / Mezhdunarodnye protsessy

Advanced search

The US Information Wars: Towards Defining a National Cyber Strategy

Abstract

Cyber security issues are becoming critically important due to the growing potential of ICT and the possibility of using it as an effective weapon by states. The United States, as the motherland of the Internet and one of the most technically developed countries, has been transforming its military forces since the mid-1980s by integrating cyber components into all the activities of the Department of Defense and other agencies responsible for national security. As one of the American strategic goals is the domination of cyberspace, the United States is interested in retaining all the possibilities necessary to conduct defensive as well as offensive information operations during the periods of both war and peace.

However, such a policy puts the national security of other countries under risk and threatens international security and stability by motivating other nations to work on crafting offensive cyber strategies and thus provoking an information arms race. The lack of international norms regulating conflicts in cyberspace, as well as of globally accepted rules of conduct, creates a legal vacuum. The author provides an overview of several alternative ways to further the development of an international legal regime for cyberspace, as well as the potential fields for international cooperation on cyber security issues.

The United States and Russia stand for different approaches when it comes to the main driving forces of multilateral negotiations on information security issues. U.S. officials are convinced that existing principles of international law serve as the appropriate framework that should govern the use of cyberspace in connection with hostilities, while Russia promotes the idea of a new complex global convention that would set an international information security regime. Despite differences in their approaches, Russia and the United States are consistently working on practical bilateral agreements that create an important basis for the further development of cyber issues on the multilateral level.

About the Author

Elena Batueva
MGIMO University
Russian Federation

Ms Elena Batueva – Expert on digital communications, Weber Shandwick International Public Relations and Communications Agency (IPG Group)

Moscow, 119454



References

1. Campen A. (1992) The First Information War: The Story of Communications, Computers, and Intelligence Systems in the Persian Gulf War. Afcea Intl Pr. 195 p.

2. Carr J. (2010) Inside Cyber Warfare. O’Reilly Media, Inc. 212 p.

3. Clapper J. (2013) US Intelligence Community Worldwide Threat Assessment. Statement for the record. Office of the Director of National Intelligence, 2013. 30 p. Available at: http://www.intelligence.senate. gov/130312/clapper.pdf (accessed 14.12.2013)

4. Clarke R., Knake R. (2010) Cyber War: The Next Threat to National Security and What to do about it. HarperCollins Publishers. 290 p.

5. Gellman B., Nakashima E. (2013) U.S. Spy Agencies Mounted 231 Offensive Cyber-operations in 2011 // The Washington Post. Available at: http://articles.washingtonpost.com/2013-08-30/world/41620705_1_computer-worm-former-u-s-officials-obama-administration (accessed 12.12.2013)

6. Kaminski P. and others. (2013) Task Force Report: Resilient Military Systems and the Advanced Cyber Threat. Department of Defense. Defense Science Board. 138 p. Available ay: http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf (accessed 15.12.2013)

7. Kerr P., Rollins J., Theohary C. (2010) The Stuxnet Computer Worm: Harbtinger of an Emerging Warfare Capability. Congressional Research Service. 9 p. Available at: https://www.fas.org/sgp/crs/natsec/R41524.pdf (accessed 16.12.2013)

8. Lynn W. III. (2010) Defending a New Domain. The Pentagon's Cyberstrategy. U.S. Department of Defense. Available at: http://www.defense.gov/home/features/2010/0410_cybersec/lynn-article1.aspx (accessed 05.03.2014)

9. Lynn W. III. (2011) The Pentagon’s Cyberstrategy, One Year Later. Foreign Affairs. Available at: http://www.foreignaffairs.com/articles/68305/william-j-lynn-iii/the-pentagons-cyberstrategy-oneyear-later (accessed 16.12.2013)

10. Nakashima E. (2012) Pentagon proposes more robust role for its cyber-specialists. The Washington Post. Available at: http://www.washingtonpost.com/world/national-security/pentagon-proposes-morerobust-role-for-its-cyber-specialists/2012/08/09/1e3478ca-db15-11e1-9745d9ae6098d493_story_1.html (accessed 16.12.2013)

11. Nye J. 2004. Soft Power: The Means to Success in World Politics. New York: Public Affairs, 2004. 208 p.

12. Pellerin C. (2013) Cyber Command Adapts to Understand Cyber Battlespace. U.S. Department of Defense News. Available at: http://www.defense.gov/news/newsarticle.aspx?id=119470 (accessed 14.12.2013)

13. Rona T. (1976) Weapons Systems and Information War. Boeing Aerospace Company. Seattle, Washington 98124. 71 p. Available at: http://www.dod.mil/pubs/foi/homeland_defense/missile_defense_ agency/09-F-0070WeaponSystems_and_Information_War.pdf (accessed 12.12.2013)

14. Sanger D. (2012) Confront and Conceal. Obama’s Secret Wars and Surprising Use of American Power. New York: Broadway Paperbacks. 485 p.

15. Schmidt E., Cohen J. (2013) Novyi tsifrovoi mir. Kak tekhnologii meniaiut zhizn' liudei, modeli biznesa i poniatie gosudarstv. [The New Digital Age: Reshaping the Future of People, Nations and Business]. Mann, Ivanov i Ferber. 368 p.


Review

For citations:


Batueva E. The US Information Wars: Towards Defining a National Cyber Strategy. International Trends / Mezhdunarodnye protsessy. 2014;12(1-2):117-127. (In Russ.)

Views: 1


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1728-2756 (Print)
ISSN 1811-2773 (Online)