Abstract
The foundation of this chapter is based in the fact that information, as argued by Clausewitz, can by a weapon whether too little or too much. This chapter is presents a revised typology of cyber war within the international system. It addresses the limitations of a previous typology given the revelations that have occurred in the international system over the past several years. The typology addresses important issues including the type of attack, the actor involved, and the level of disruption that is generated by the attack. The resulting outcomes allow for better understanding and plotting of the impact of cyber war within the international system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Auchard E, Bate F (2017) French candidate Macron claims massive hack as emails leaked. Reuters. http://www.reuters.com/article/us-france-election-macron-leaks-idUSKBN1812AZ
Betts RK (1978) Analysis, war, and decision: why intelligence failures are inevitable. World Polit 31(1):61–89
Cetron MJ, Davies O (2009) Ten critical trends for cyber security. Futurist 43(5):40–49
Clarke RA, Knake RK (2010) Cyber war: the next threat to national security and what to do about it. Ecco, New York
Clausewitz C (1984) On war. Howard M, Paret P (eds). Princeton University Press, Princeton
Colarisk A, Janczewski L (2012) Establishing cyber warfare doctrine. J Strat Sec 5(1):31–48
Danadio R (2017) Why the Macron Hacking Attack Landed with a Thud in France. The New York Times. https://www.nytimes.com/2017/05/08/world/europe/macron-hacking-attack-france.html?smid=fb-nytimes&smtyp=cur&_r=1
Greathouse CB (2014) Cyber war and strategic thought: do the classic theorists still matter? In: Cyberspace and international relations. Springer, Berlin/Heidelberg, pp 21–40
Haggard S, Lindsay JR (2015) North Korea and the Sony Hack: exporting instability through cyberspace, Asia Pacific Issues no. 117. East-West Center, Honolulu. http://hdl.handle.net/10125/36444
Handel M (1989) War, strategy and intelligence. Routledge, London
House of Commons Public Administration and Constitutional Affairs Committee (2017) Lessons learned from the EU Referendum. House of Commons, London
Jervis R (1968) Hypotheses on misperception. World Polit 20(3):454–479
Kallber J, Cook TS (2017) The unfitness of traditional military thinking in cyber: four cyber tenets of undermines conventional strategies. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2693260
Kaplan F (2017) Dark territory: the secret history of cyber war. Simon and Schuster Reprint Edition, New York
Kerr PK, Rollins J, Theohary CA (2010) The Stuxnet computer worm: harbinger of an emerging warfare capability. Congressional Research Service. https://fas.org/sgp/crs/natsec/R41524.pdf
Kiesling EC (2001) On war: without the fog. Mil Rev 81:85–87
Knake R, Segal A (2016) How the next U.S. president can contain china in cyberspace. J Int Aff 70(1):21–28
Lindsay JR (2013) Stuxnet and the limits of cyber warfare. Secur Stud 22(3):365–404
McMullen DA, Sanchez HM, O’Reilly-Allen M (2016) Target security: a case study of how hackers hit the jackpot at the expense of customers. Rev Bus Financ Stud 7(2):41–50
Miladi N (2016) Social media and social change. Domes 25(1):36–51. Academic Search Complete, EBSCOhost
Nakashima E (2015) Hacks of OPM databases compromised 22.1 million people, federal authorities say. The Washington Post. https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/?utm_term=.be8cc4d64af6
New York Times Archive (2016–17) Russian hacking in the U.S. election. https://www.nytimes.com/news-event/russian-election-hacking
Owens B (2001) Lifting the fog of war. Johns Hopkins University Press, Baltimore
Schaap AJ (2009) Cyber warfare operations: development and use under international law. Air Force Law Rev 64:121–174
Shane S, Rosenberg M, Lehren AW (2017) Documents said to reveal hacking secrets of C.I.A. New York Times, 8 March 2017
Syal R (2017) Brexit: foreign states may have interfered in vote, report says. The Guardian. https://www.theguardian.com/politics/2017/apr/12/foreign-states-may-have-interfered-in-brexit-vote-report-says
Tikk E, Kaska K, Vihul L (2010) International cyber incidents: legal considerations. Cooperative Cyber Defence Center of Excellence, Tallinn. NATO. https://ccdcoe.org/publications/books/legalconsiderations.pdf
Uitermark J (2016) Complex contention: analyzing power dynamics within anonymous. Soc Mov Stud. https://doi.org/10.1080/14742837.2016.1184136
Valeriono B, Maness RC (2014) The dynamics of cyber conflict between rival antagonists, 2001–11. J Peace Res 51(3):347–360
Waldman T (2010) Shadows of uncertainty: Clausewitz’s timeless analysis of chance in war. Def Stud 10(3):336–368
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Greathouse, C. (2018). Drinking from a Fire Hydrant: Information Overload As a Cyber Weapon. In: Prunckun, H. (eds) Cyber Weaponry. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-74107-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-74107-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74106-2
Online ISBN: 978-3-319-74107-9
eBook Packages: Law and CriminologyLaw and Criminology (R0)