Origin of Cyber Warfare and How the Espionage Changed: A Historical Overview

Origin of Cyber Warfare and How the Espionage Changed: A Historical Overview

Maria Luisa Nardi
DOI: 10.4018/978-1-7998-4339-9.ch011
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

International politics is faced with new and vital issues, linked to aspects such as individual rights, the holding of democracy, the effects of worldwide policies, as well as the geopolitics of technology. The intertwining of technology and international relations is now a fact. Exploring the new and different political challenges posed by new technologies is a factor of transformation of the global society that influence on its actors. Today, an application of technological innovation, digital technology, and artificial intelligence is a steady political field. The focus of this work is to describe over time the notion of information warfare, which has matured and manifested into a form that has a colossal impact on how the contemporary wars are fought, but this has also resulted in the downgrading of strategic side of information warfare or cyber warfare to a decisive tactical force multiplier capable of turning the tides in war.
Chapter Preview
Top

Introduction

The benefits of the information age are numerous. Cyber-space is a type of communication, indipendent from physical distance. It's an imaginary area without limits where you can meet people and discover information about any subject. It's an electronic medium used to form a global computer network and to facilitate online communication.

The threats and risks relating to cybernetic and space domains, the possible responses and strategies by national and international governments, the technological and industrial capacities necessary to support these responses, are analyzed by experts and representatives of public and private subjects involved in the two sectors. Nascent threats like transnational cyber terrorism and information warfare exist alongside the positive aspects of globalization. A new challenge has emerged for free societies: democracies must find ways to strike a balance between allowing Internet freedom on one hand and maintaining adequate early warning and monitoring systems on the other. These systems, combined with expanded cyber-security cooperation across borders, will be integral in detecting suspicious digital activities and countering attempted acts of cyber warfare and cyber terrorism.

A Definition

Cyberspace is a new domain of operations, vital to national security. States are into an increasingly interconnected world with a diverse threat spectrum, with little understanding of how decisions are made within this amorphous domain

In order to analyze the strategic aspect of cyber warfare, Wirtz (2003) criteria of integration of strategic warfare cross all spectrum of affairs right from the tactical to the grand strategic level provide an important criterion for postulating the strategic framework for cyber warfare.

Cyberwarfare is strategic warfare that can be used as a principal means to achieve strategic ends and as required by Luttwak’s criterion for strategic warfare, the framework for strategic cyber warfare is to be defined across all spectrum of affairs right from the grand strategic to the tactical level.

Cyberwar and Cyber-Espionage

Cyberwar is not simply stealing information, neither the global great game of nations spying on each other’s governments nor the more controversial sort of private-sector economic espionage that the US has long accused China of carrying out. Cybersecurity is the activity of protecting information and information systems (networks, computers, databases, data centers, and applications) with appropriate procedural and technological security measures (Tonge et al, 2013).

Cyber threat intelligence (CTI) is an area of cybersecurity that focuses on the collection and analysis of information about current and potential attacks that threaten the safety of an organization or its assets. The first case of cyber espionage occurred more than a half-century ago, with the arrest of an East German spy in IBM’s German by West Germany’s police in 1968.

Cyberwar and Cyber-Crime

Cyberwar is not profit-focused hacking like bank fraud or the ransomware attacks that seek to extort millions from victims, that’s cybercrime, no matter how cruel and costly its effects may sometimes be. It is possible to distinguish the crimes perpetrated using IT and telematic systems from the crimes committed against the same systems, no longer intended as tools for carrying out illegal acts but as material objects of the latter; and still, a distinction can be made between crimes committed on the Internet from crimes committed via the Internet with the clarification that this latter category includes a heterogeneous set of crimes municipalities provided by the penal code and by some special laws.

In the spring of 2007, an unprecedented series of so-called distributed denial of service, or DDoS, attacks slammed more than a hundred Estonian websites, taking down the country’s online banking, digital news media, government sites, and practically anything else that had a web presence. The attacks were a response to the Estonian government’s decision to move a Soviet-era statue out of a central location in the capital city of Tallinn, angering the country’s Russian-speaking minority and triggering protests on the city’s streets and the web.

Key Terms in this Chapter

Information Warfare: It is a concept involving the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is an emerging asymmetric threat that forces us to innovate our security approach.

Cyber Warfare: They are all those activities aimed at causing damage to computer systems of any kind. Unlike “normal” cyber attacks, these are actions carried out with specific political-military purposes by special military apparatus or by cyber criminal organizations financed, in any case, by government entities.

Cyber Terrorism: Janczewski and Colarik (2008) AU12: The in-text citation "Janczewski and Colarik (2008)" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. defines cyber terrorism as: “Cyber terrorism means pre-mediated, politically motivated attacks by sub national groups or clandestine agents or individuals against information and computer systems, computer programs, and data that results in violence against non-combatant targets.”

Complete Chapter List

Search this Book:
Reset