The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May-June (2013 vol.15)
pp: 32-35
Jan Kallberg , The University of Texas at Dallas
Bhavani Thuraisingham , The University of Texas at Dallas
ABSTRACT
During the last few years, several nation states have entered cyberspace in an attempt to use the Internet for policy, geopolitical, and state gains. Using development of the battle tank as an analogy, the authors explore the militarization of the Internet and how the ability to think beyond the existing cybersecurity paradigm has led to new cyberweapons and the need for new defensive strategies. The existing paradigm says that cyberspace is becoming more secure; the entrance of state actors reverses this trajectory, making cyberspace less secure and heavily contested.
INDEX TERMS
Internet, Cyberspace, Military communication, Computer crime, Information technology, Information assurance, information technology, cyberoperations, cyberdefense, information assurance, defense, cyberwar, cybereducation, information operations
CITATION
Jan Kallberg, Bhavani Thuraisingham, "State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks", IT Professional, vol.15, no. 3, pp. 32-35, May-June 2013, doi:10.1109/MITP.2013.20
REFERENCES
1. J. Kallberg and B. Thuraisingham, "From Cyber Terrorism to State Actors" Covert Cyber Operations," Strategic Intelligence Management—National Security Imperatives and Information and Communications Technologies, Butterworth-Heinemann, 2013, pp. 229–233.
2. H. Guderian, Achtung—Panzer! The Development of Armored Forces, Their Tactics, and Operational Potential, translation by C. Duffy, Arms and Armour, 1992.
3. J.J. Mearsheimer, Liddell Hart and the Weight of History, Comstock Pub Assoc, 1988.
4. J. Kallberg, "Designer Satellite Collisions from Covert Cyber War," Strategic Studies Q., Spring 2012, pp. 129–146.
5. W.J. Lynn III, "A Military Strategy for the New Space Environment," Washington Q., vol. 34, no. 3. 2011, pp. 7–16.
6. F. Nelson, "China's Spy Network," The Spectator,4 Dec. 2010; www.spectator.co.uk/features/6507703chinas-spy-network.
7. D. Geer, "A New Cybersecurity Research Agenda (In Three Minutes or Less)," Threat Post,7 Nov. 2011; https://threatpost.com/en_us/blogsnew-cybersecurity-research-agenda-three-minutes-or-less-110711.
8. K.N. Waltz, "Nuclear Myths and Political Realities," American Political Science Rev., vol. 84, no. 3, 1990, pp. 731–745.
9. J. Kallberg and B. Thuraisingham, "Cyber Operations: Bridging from Concept to Cyber Superiority," Joint Forces Q., vol. 68, no. 1, 2013, p. 53; www.ndu.edu/presscyber-operations.html.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool