The Evolution of Cyber Warfare in Information Operations Targeting Estonia, the U.S., and Ukraine

Author(s):  
Kenneth James Boyte

This comparative international case study provides a context for considering the evolution of cyber technologies as elements of hybrid warfare, including information operations (IO), capable of killing people, as well as impacting political elections and physical infrastructure (such as power grids and satellite-based communications and weapons systems). Threatened by “autonomous battle networks,” the “Internet of Battle Things” has been considered a domain of modern warfare by the United States since 2011 and by NATO since 2016. Focusing on three historic cyberattacks against three modern democracies—Estonia in 2007, the United States in 2012, and Ukraine during the 2013-2015 conflict—the study shows how computer warfare, first reported in the 1990s, has become integral in warfare for both state and non-state actors—particularly for information warfare waged by proxies to create confusion and manipulate public opinion via satellites that can penetrate national boundaries and firewalls with armies of zombies and botnets.

2017 ◽  
Vol 7 (2) ◽  
pp. 54-69 ◽  
Author(s):  
Kenneth J. Boyte

This comparative international case study of cyber warfare provides a context for considering the evolution of cyber technologies as elements of hybrid warfare capable of creating confusion, disrupting communications, and impacting physical infrastructure (such as power grids and satellite-based communications and weapons systems). Expanding an unpublished paper recognized by the ASIS Foundation in its 2012 international student writing competition concerning global security, which compared the cyberattacks against Estonia in 2007 and the United States in 2012, this study re-examines and updates the original data in a broader analysis that primarily includes the cyberattacks against Ukraine during the 2013-2015 conflict, but also considers other incidents on the timeline of digitization. The study shows how cyber warfare, first reported in the 1990s, has become an integral component of war today for both state and non-state actors who use zombies and robot armies to penetrate national boundaries and firewalls via satellites.


2019 ◽  
pp. 108-125
Author(s):  
Kenneth J. Boyte

This comparative international case study of cyber warfare provides a context for considering the evolution of cyber technologies as elements of hybrid warfare capable of creating confusion, disrupting communications, and impacting physical infrastructure (such as power grids and satellite-based communications and weapons systems). Expanding an unpublished paper recognized by the ASIS Foundation in its 2012 international student writing competition concerning global security, which compared the cyberattacks against Estonia in 2007 and the United States in 2012, this study re-examines and updates the original data in a broader analysis that primarily includes the cyberattacks against Ukraine during the 2013-2015 conflict, but also considers other incidents on the timeline of digitization. The study shows how cyber warfare, first reported in the 1990s, has become an integral component of war today for both state and non-state actors who use zombies and robot armies to penetrate national boundaries and firewalls via satellites.


2020 ◽  
pp. 1214-1231
Author(s):  
Kenneth J. Boyte

This comparative international case study of cyber warfare provides a context for considering the evolution of cyber technologies as elements of hybrid warfare capable of creating confusion, disrupting communications, and impacting physical infrastructure (such as power grids and satellite-based communications and weapons systems). Expanding an unpublished paper recognized by the ASIS Foundation in its 2012 international student writing competition concerning global security, which compared the cyberattacks against Estonia in 2007 and the United States in 2012, this study re-examines and updates the original data in a broader analysis that primarily includes the cyberattacks against Ukraine during the 2013-2015 conflict, but also considers other incidents on the timeline of digitization. The study shows how cyber warfare, first reported in the 1990s, has become an integral component of war today for both state and non-state actors who use zombies and robot armies to penetrate national boundaries and firewalls via satellites.


2014 ◽  
Vol 7 (1) ◽  
pp. 33-41 ◽  
Author(s):  
Elisabeth Scheibelhofer

This paper focuses on gendered mobilities of highly skilled researchers working abroad. It is based on an empirical qualitative study that explored the mobility aspirations of Austrian scientists who were working in the United States at the time they were interviewed. Supported by a case study, the paper demonstrates how a qualitative research strategy including graphic drawings sketched by the interviewed persons can help us gain a better understanding of the gendered importance of social relations for the future mobility aspirations of scientists working abroad.


2015 ◽  
Vol 36-37 (1) ◽  
pp. 163-183
Author(s):  
Paul Taylor

John Rae, a Scottish antiquarian collector and spirit merchant, played a highly prominent role in the local natural history societies and exhibitions of nineteenth-century Aberdeen. While he modestly described his collection of archaeological lithics and other artefacts, principally drawn from Aberdeenshire but including some items from as far afield as the United States, as a mere ‘routh o’ auld nick-nackets' (abundance of old knick-knacks), a contemporary singled it out as ‘the best known in private hands' (Daily Free Press 4/5/91). After Rae's death, Glasgow Museums, National Museums Scotland, the University of Aberdeen Museum and the Pitt Rivers Museum in Oxford, as well as numerous individual private collectors, purchased items from the collection. Making use of historical and archive materials to explore the individual biography of Rae and his collection, this article examines how Rae's collecting and other antiquarian activities represent and mirror wider developments in both the ‘amateur’ antiquarianism carried out by Rae and his fellow collectors for reasons of self-improvement and moral education, and the ‘professional’ antiquarianism of the museums which purchased his artefacts. Considered in its wider nineteenth-century context, this is a representative case study of the early development of archaeology in the wider intellectual, scientific and social context of the era.


2018 ◽  
Vol 28 (6) ◽  
pp. 1855-1864
Author(s):  
Olga Zoric ◽  
Katarina Jonev ◽  
Ivan Rancic

The author starts from the informational dimension of the operational environment in a strategic reality and deal with the problem of defining informational power from the theoretical and practical aspect of information warfare.The deliberations in the work are aimed to initiate a procedure for auditing of the security documents in order to create a legal basis for the operationalization of the content of information security, as one of the aspects of integral security of the Republic of Serbia. The paper deals with the conceptual determinations and importance of information, information warfare and information operations, as well as the content of information warfare, pointing out the strategic and doctrinal definitions of the information warfare of the United States of America, the Russian Federation and the Republic of Serbia. It is necessary to accurately and objectively observe world achievements in the field of national security and the relation of the most powerful world powers to the problem of information warfare. Based on a comparative analysis of world trends and the state of the theoretical and practical aspects of information security of the Republic of Serbia, the focus is on work, where measures are proposed to improve the security function in the fourth unit of work.


Sign in / Sign up

Export Citation Format

Share Document