Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa Trevorrow,
David C. Webb and Steve Wright
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
HUMAN RIGHTS AND THE INTERNET (co-editor with S. Hick and S. Hoskins, 2000)
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
Dr Philippa Trevorrow,
Leeds Metropolitan University, UK
and
Dr Steve Wright
Leeds Metropolitan University, UK
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
Dr Edward Halpin,
9
14
8
13
7
12
6
11
5
10
4
09
3
08
2
07
1
06
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
Contents
Preface
Gary Chapman, Diego Latella and Professor Carlo Schaerf
xi
xiii
Glossary
xvii
Introduction
Gaming platforms
Definition and historical context
Computer game genres
Realism versus reality
Games and professional military simulations
Conclusion
Introduction
Context
Critical infrastructures
Vulnerabilities
Actors: how and who
Open questions and comments
Conclusions
12
12
13
15
17
21
25
27
32
32
33
35
37
41
43
45
v
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
List of Tables
Contents
Part II:
Introduction
Theory, information technology and accident
War on terrorism the state of emergency
The necessity and problematics of an enemy
War on Afghanistan from postmodern moments
to information isolation
4.6 Battle for the strategic truth
4.7 War on Iraq differences in perceptions
4.8 The fog of peace
5 Risks of Computer-Related Technology
Dr Peter G. Neumann
5.1 Introduction
5.2 Roles of technology
6 Missile Defence The First Steps Towards War in Space?
Professor David Webb
6.1
6.2
6.3
6.4
6.5
51
51
52
55
56
58
60
61
67
72
72
78
82
82
84
87
89
92
98
Introduction
Realistic and neorealistic approaches to technology
Interdependent globalism
Technology and IR/IPE from a constructivist point of view
Arguments for a broader perspective on technology
Multidimensional effects of technology
Conclusion
98
99
100
102
103
104
106
113
114
115
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
vi
Contents vii
8.3
Part III:
Introduction
Information Warfare (IW)
Laws of war
Key issues
10.3
10.4
Historical overview
The current Russian RMA and its international
consequences
Conclusion and evaluation
Perspectives
119
120
121
123
124
125
130
139
139
141
144
151
Country Perspectives
116
117
Introduction
Theoretical research on Information Warfare in China
Current IW development in China
IW tactics that could be used by Beijing to
attack Taiwan
Combination of US and Taiwanese resistance to IW
from Beijing
157
157
159
166
167
173
173
174
182
189
191
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
Contents
Part IV:
191
193
Global engagement
A space Pearl Harbor?
Space cop
The security dilemma
A mind experiment
Velvet glove, steel fist
Unintended consequences
Last, best hope
Introduction
The AsiaEurope Meeting (ASEM) framework
Cyber terrorism: an urban legend?
A taxonomy of real cyber threats
Advanced defensive methods and different
regional priorities
13.6 International and regional cooperation against
cyber terrorism
13.7 Concluding statement
199
201
204
206
208
210
212
213
216
219
219
219
220
222
224
224
225
228
228
230
232
234
236
239
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
viii
Contents ix
242
Index
246
15 Conclusion
Dr Steve Wright, Dr Philippa Trevorrow,
Professor David Webb and Dr Edward Halpin
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
List of Tables
144
150
x
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
Preface
The subject of this volume relates to the work of the International School
on Disarmament and Research on Conflicts (ISODARCO).
There is no unique definition for such things as Information Warfare
(IW). For instance, according to the US Department of Defense (DoD), it could
be defined as: those actions taken for achieving information superiority by
means of acting on the information of the adversary, on their informationbased processes, on their information systems and on their computer
networks, while at the same time levering on and defending ones own
information. In a more explicit way, the Ministry of Defence in the UK defines
Information Warfare as the deliberate and systematic attack on critical
information activities, which aims at exploiting, modifying and compromising
information and at interrupting services. Despite the lack of unique definitions for IW/CW, NW and RMA, a lively discussion on their nature, the threats
they bring, the possible countermeasures to be undertaken by nation-states, as
well as other organizations, is taking place in political and military circles as
well as academia. Issues of major importance in such discussions are: the relation between computers and regional defence; the threat of cyber terrorism as
well as cyberwar; new forms of group organization like networks and how
information technology supports them; the impact of information technology
developments on military doctrine and organization of military forces.
Without any doubt, some of the above issues are connected to real
threats, but the dimension of such threats is far from being fully assessed
and understood. Thus, as often happens when new scenarios are elaborated,
a proliferation of myths related to CW, NW and RMA are also taking place
and they bring with them a possible real threat of widespread global surveillance. Ironically enough, information technology is itself supporting the
proliferation of such myths by providing a virtual space where a great deal
of the ongoing discussion on the above issues is taking place.
ISODARCO work in this area has been made possible by the generous
contributions of several Foundations and Institutions. It is a pleasure to
thank: The John D. and Catherine MacArthur Foundation, and, in particular,
Dr Kennette Benedict; The Fondazione Opera Campana dei Caduti, Rovereto,
and in particular its Reggente Dr Pietro Monti; the Giunta della Provincia
Autonoma di Trento; the Universit degli Studi di Roma Tor Vergata,
Dipartimento di Fisica; the Istituto Trentino di Cultura-irst, Trento; the
Universit degli Studi di Trento; and the CNR Istituto di Scienza e Tecnologie
dellInformazione A. Faedo, Pisa.
xi
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
xii
Preface
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
xiv
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
the Internet (Palgrave Macmillan) and has published many articles in this
subject area. In addition to working on social informatics within the School
of Information Management, he is involved in teaching peace and conflict
resolution in the School of Applied Global Ethics at Leeds Metropolitan
University.
xv
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
xvi
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
ABL
ABM
ALMV
AMHS
APS
ARP
ASAT
ASEM
ASW
ATM
BINAC
BMC3
BMD
C3I
C4I
C4ISR
CAVE
cbICT
CDI
CERT
CIAO
CIMIC
CIS
CMR
COE
CoE
COP
COTS
CPU
CSRS
CW
DARPA
DDA
DDoS
DG
DISN
Air-Borne Laser
Anti-Ballistic Missile
Air-Launched Miniature Vehicle
Automated Message Handling System
American Physical Society
Address Resolution Protocol
Anti-Satellite
AsiaEurope Meeting
Anti-Submarine Weapon
Asynchronous Transfer Mode
Binary Automatic Computer
Battle Management, Command, Control and Communication
Ballistic Missile Defence
Command, Control, Communications and Intelligence
Command, Control, Communications, Computers and
Intelligence
Command, Control, Communications, Computing, Intelligence,
Surveillance and Reconnaissance
Computer-Aided Virtual Environment
Computer-Based Information and Communications Technology
Center for Defense Information
Computer Emergency Response Team
Critical Infrastructure Assurance Centre
CivilMilitary Cooperation
Commonwealth of Independent States
CivilMilitary Relations
Common Operating Environment
Council of Europe
Common Operational Picture
Commercial Off-The-Shelf
Central Processing Unit
Counter Surveillance Reconnaissance System
Cyberwar
Defence Advanced Research Projects Agency
Department of Disarmament Affairs
Distributed Denial of Service
Directorate General
Defence Information System Network
xvii
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
Glossary
Glossary
DNS
DoD
DPS
DSCS
DSWA
ECHR
EDSAC
ELINT
EMP
ENIAC
ESA
EW
FIDNet
G8
GATT
GBR
GCCS
GCCS-T
Glonass
GPS
HPM
ICAO
ICBM
ICJ
ICT
IGO
II
IP
IPE
IPTF
IR
ISP
IST
IW
JCS
JDAM
JOPES
JWID
KE-ASAT
KEW
LEO
MDA
MHV
MIC
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
xviii
MILREP
MILSTAR
MIME
MIRACL
MNC
MS
MTR
NAS
NATO
NCW
NES
NGO
NIAC
NIPC
NIPRNET
NMCC
NMCI
NMD
NOC
NSA
NSF
NW
OECD
OSI
PCCIP
PDD
PGM
PLA
PoWs
PSTN
R&D
RMA
RSTA
SAIC
SAM
SAR
SATCOM
SBIRS
SBL
SBR
SCADA
SCP
SDI
SHF
xix
Military Representative
Military Communications Satellites
Military Industrial Media Entertainment
Mid-Infrared Advanced Chemical Laser
Multinational Corporations
Micro Satellite
Military-Technological Revolution
National Airspace System
North Atlantic Treaty Organization
Network-Centric Warfare
Network Encryption System
Nongovernmental organization
National Infrastructure Assurance Council
National Infrastructure Protection Centre
Non-classified Internet Protocol Network
National Military Command Centre
Navy Marine Corps Intranet
National Missile Defence
Network Operations Centre
National Security Agency
National Science Foundation
Netwar
Organization for Economic Cooperation and Development
Office of Strategic Influence
Presidents Commission on Critical Infrastructure Protection
Presidential Decision Directive
Precision Guided Munitions
Peoples Liberation Army
Prisoners of War
Public Switched Telephone Networks
Research and Development
Revolution in Military Affairs
Reconnaissance, Surveillance and Target Acquisition
Science Applications International Corporation
Surface-to-Air Missile
Synthetic Aperture Radar
Satellite Communications System
Space-Based Infrared System
Space-Based Lasers
Space-Based Radar
Supervisory Control and Data Acquisition
Strategic Computing Program
Strategic Defence Initiative
Super High Frequency
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
Glossary
Glossary
SIOP
SIPRNet
SLBM
SONET
SRAM
STA
STOA
STSS
SWPS
TFAP
THAAD
TRADOC
T-SAT
UAV
VPN
WAN
WEP
WMD
WTC
WTO
WWMCCS
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
xx
Part I
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
1
Defining the Issues
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
repaired and soldiers are legally obliged to take care of civilians, not blast
prisoners of war (PoWs) or refugees at every opportunity. In the future, the
key military targets will not be personnel, but the electronic nervous system
used to coordinate and control their behaviour including computer networks
and the Internet. Clearly, the international community needs to be prepared
to meet more professional threats to the infrastructure of the Internet, individual networks, servers and so on. The question then arises as to who the
key players are in the arena of electronic conflict.
Gian Piero Siroli answers this question with a perceptive introduction to
IW. The dependency on information infrastructures is emphasized with the
targeting of information systems and telecommunication networks becoming
an important element in the defence policies of many countries. Siroli sees
the exploitation of advanced IT by the military as an important driver in the
quest for new warfighting techniques. For Siroli, information warfare is the
set of activities intended to deny, corrupt or destroy an adversarys information resources including both offensive and defensive operations.
The second substantive part of the book examines the implications of the
problem of the ubiquitous dependency on information technology and the
various vulnerabilities and raises many value-laden issues.
Jari Rantapelkonen cautions us about the presentation of Virtuous Virtual
War. The war against terrorism is not an issue of territory, he argues; rather,
it is a media creation in which virtual world technology is bestowed with a
virtuous or ethical dimension. It is no coincidence that in 2001 the Rendon
group was hired by the Pentagon to create a positive image of new forms of
warfare. Virtuous war is equated with virtual war as presented on computer
networks essentially a Military Industrial Media Entertainment (MIME)
approach which disarranges reality. Information bombs do not simply
destroy capacity; they can also wipe out social memories, relations and
international communities. Within the RMA are advanced information
networks which can misinform as well as inform, large numbers of people
and can facilitate the rapid dissemination of myths and rumours which
cannot be verified. The literal 24/7 coverage of the Iraq War blurred the
boundaries between reality and fiction. Rather than providing useful
information and analysis which can be applied to establish verisimilitude,
repetition can be used to reinforce one particular set of perceptions.
Peter G. Neumann in his chapter on the Risks of Computer-Related Technology draws our attention to the fact that almost everything we do nowadays is dependent on computer technology. How should we deal with this?
We need reliable, secure, highly available systems. What we have in fact are
networks which are highly vulnerable and have many weak links. The
Internet, he reasons, is a source of tremendous benefit and yields increasing
opportunities for third world development, world wide commerce, education,
and information flow. And yet it can offer very little resistance to coordinated
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
attacks since little effort has been spent on making its architecture robust.
Other threats to future availability and integrity include the desire of many
governments to control and regulate the Web, corporations to profit from it
and a general lack of management to smooth out glitches and thwart spam
and the multiplicity of pornographers, swindlers, identity thieves and
snoopers who increasingly inhabit cyberspace. For Neumann, the challenge
is how to retain the rich opportunities offered by the Internet, whilst
restraining its risks, hazards and failures.
Neumann offers us examples of computer-based failures in defence, space,
aviation, environment, telecommunications, transportation, medical
systems, elections, security, privacy and law enforcement, to name but a
few. If we recognise that these risks are an inherent part of new systems
then we might be able to build robust systems, deal with our dependencies
and prevent system failure. This could become critical when algorithmic
and identity recognition systems give us access to many of the goods and
services we take for granted. So far, research on robust systems has been
ignored in favour of market-driven developments. This lack of vision will
become critical as our defence postures are underpinned by their increasing
reliance on vulnerable ICT systems.
However, despite failures, and financial and technological setbacks, many
US defence programmes are continuing apace.
Dave Webb takes a look at Missile Defence and asks whether this system is
merely a by-product of the first steps towards war in space? Webb also takes
note of the increasing reliance of the military on space-based systems and
examines the vulnerability of these systems to attack. It is this vulnerability
that leads to the desire of the US Space Command to control space and position itself so that it can deny access of space to others when it deems necessary. The accelerating US investment in military space technology generally,
and anti-satellite systems in particular, are indicators of this aspect of RMA,
although, as Webb points out, the increase in traffic may be too demanding
on the available bandwidth and it may not be possible to accomplish everything desired to make such plans work. Furthermore, all space-based satellite
systems, as well as being costly, remain vulnerable to attack from anti-satellite
systems. However, that has not stopped the USA from cultivating cooperation
with the UK, Denmark, Greenland and Alaska, Poland, the Czech Republic,
Hungary, Romania, Bulgaria, Australia, Russia and Japan. The promise of
research and development (R&D) contracts have provided powerful incentives and only Canada has pulled away from involvement.
Stefan Fritsch develops the consequences of this idea further by identifying
Information and Communication Technologies as a Source of Turbulence.
He uses three theoretical approaches based on IR/IPE (International Relations/International Political Economy) theory, namely: (i) realism/neorealism; (ii) interdependent globalism; and (iii) constructivism, to model the
power of modern Information and Communication Technologies (ICTs) to
10.1057/9780230625839preview - Cyberwar, Netwar and the Revolution in Military Affairs, Edited by Edward F. Halpin, Philippa
Trevorrow, David C. Webb and Steve Wright
You have reached the end of the preview for this book /
chapter.
You are viewing this book in preview mode, which allows selected pages
to be viewed without a current Palgrave Connect subscription. Pages
beyond this point are only available to subscribing institutions. If you
would like access the full book for your institution please:
Contact your librarian directly in order to request access, or;
Use our Library Recommendation Form to recommend this book to
your library
(http://www.palgraveconnect.com/pc/connect/info/recommend.html),
or;
Use the 'Purchase' button above to buy a copy of the title from
http://www.palgrave.com or an approved 3rd party.
If you believe you should have subscriber access to the full book please
check you are accessing Palgrave Connect from within your institution's
network, or you may need to login via our Institution / Athens Login page:
(http://www.palgraveconnect.com/pc/nams/svc/institutelogin?
target=/index.html).
preview.html[22/12/2014 16:51:21]