-
Essay / Cyberwar: the importance of the new digital...
For thousands of years, warfare has remained relatively unchanged. Even though tactics and weapons changed as new methods of combat evolved, men and women, or their weapons, still had to meet at the same time and place to attack, defend, surrender or conquer. However, the advent of the Internet has created a new warfighting domain in which militaries can remotely conduct surveillance, reconnaissance, espionage, and attacks from an ambiguous, spaceless digital environment. State and non-state actors have already embraced this new domain and used legal and illegal means to further serve their interests. Further complicating cybersecurity is that as states attempt to protect themselves against cyberwar, private and commercial technological methods largely follow state technological developments, largely removing military advantages. created by the great armies. Since the creation and implementation of international networks via the Internet, the United States has adopted this technology within military and government infrastructure. As a result, the United States has exposed itself to a new threat that must be actively responded to in order to protect U.S. national security. Successful cyberattacks originating from China, Russia and the Middle East have already penetrated US military network infrastructure and leaked sensitive and classified information. Although the scale and scope of information breaches have not yet posed a serious threat to the United States, the increase in cyberthreats and cyberattacks makes cyberwarfare one of the most serious national security issues important issues facing the United States and the intelligence community. A ca...... middle of paper ......rch Complete, EBSCOhost (accessed March 21, 2011).Lynn III, William J. 2010. “Defending a New Domain.” In Foreign Affairs, 97-108. Foreign Affairs, 2010. Academic Search Complete, EBSCOhost (accessed March 21, 2011). Schaap, Arie J. 2009. “Cyber Warfare Operations: Development and Use under International Law.” Air Force Law Review 64, 121-173. Academic research completed, EBSCOhost (accessed March 21, 2011). Thomas C. Wingfield, 2000 “The Law of Information Conflict: National Security” Law in Cyberspace 17 (Aegis Research Coqj). Thornburgh, Nathan. “The invasion of Chinese cyberspies – TIME.” http://www.time.com/time/magazine/article/0,9171,1098961,00.html.Trias, Eric D. and Bryan M. Bell. 2010. “Cyber This, Cyber That… So What?” Journal of Air and Space Power 24, no. 1:90-100. Academic Search Complete, EBSCOhost (accessed March 21, 2011).