Cyber warfare peacekeeping

被引:3
|
作者
Cahill, TP [1 ]
Rozinov, K [1 ]
Mulé, C [1 ]
机构
[1] Polytech Univ, Dept Comp & Informat Sci, Brooklyn, NY 11201 USA
关键词
D O I
10.1109/SMCSIA.2003.1232407
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper defines and analyzes a new concept in the field of Cyber Warfare-Cyber Warfare Peacekeeping. We identify that in some parts of the world low intensity Cyber Warfare has been conducted for over three years. The PRC and Taiwan (among others) have established independent elements in their armed forces devoted to Cyber Warfare. Recent events have shown that Cyber Warfare would have devastating effects well beyond the boundaries of the combatants. Such a war would have to be brought to an immediate conclusion and most likely would require a "peacekeeping" capability and agency. We identify the various current definitions of Cyber Warfare and its comparisons to traditional ("kinetic") warfare. We then examine the notion of peace keeping from its initiation in the 50's by the UN to the "robust" or proactive peacekeeping developed in the 90's principally in reaction to situations in Somalia, Bosnia, Kosovo, Sierra Leone and East Timor. We then suggest some principles of Cyber Warfare Peacekeeping and discuss possible practices and technologies to support such an activity. Finally we describe a Cyber Warfare Peacekeeping Laboratory Workbench, some early experiments and development concepts and some next steps.
引用
收藏
页码:100 / 107
页数:8
相关论文
共 50 条
  • [1] Cyber Peacekeeping
    Akatyev, Nikolay
    James, Joshua I.
    [J]. DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2015, 2015, 157 : 126 - 139
  • [2] An introduction to cyber peacekeeping
    Robinson, Michael
    Jones, Kevin
    Janicke, Helge
    Maglaras, Leandros
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 114 : 70 - 87
  • [3] CYBER WARFARE
    Solis, Gary D.
    [J]. MILITARY LAW REVIEW, 2014, 219 : 1 - 52
  • [4] Bastardizing Peacekeeping and the Birth of Hybrid Warfare
    Burkle, Frederick M., Jr.
    Goniewicz, Krzysztof
    Khorram-Manesh, Amir
    [J]. PREHOSPITAL AND DISASTER MEDICINE, 2022, 37 (02) : 147 - 149
  • [5] Cyber Warfare and Electronic Warfare Integration in the operational environment of the future: Cyber Electronic Warfare
    Askin, Osman
    Irmak, Riza
    Avsever, Mustafa
    [J]. CYBER SENSING 2015, 2015, 9458
  • [6] Cyber Alliances and Proxy Cyber Warfare
    Barbosa, Jorge
    [J]. PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 33 - 38
  • [7] Inside cyber warfare
    Zotti, Alexander
    [J]. GLOBAL CHANGE PEACE & SECURITY, 2011, 23 (03) : 437 - 438
  • [8] Is Cyber Warfare an Alternative?
    Barbosa, Jorge
    [J]. DEVELOPMENTS AND ADVANCES IN DEFENSE AND SECURITY, 2020, 152 : 65 - 75
  • [9] Encyclopedia of Cyber Warfare
    Davis, Evan
    [J]. REFERENCE & USER SERVICES QUARTERLY, 2018, 57 (03) : 225 - 225
  • [10] Ethics of cyber warfare
    Altmann, Juergen
    Vidal, Francesca
    [J]. INTERNATIONAL REVIEW OF INFORMATION ETHICS, 2013, 20 : 2 - 3