541
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      If you have found this article useful and you think it is important that researchers across the world have access, please consider donating, to ensure that this valuable collection remains Open Access.

      Policy Perspectives is published by Pluto Journals, an Open Access publisher. This means that everyone has free and unlimited access to the full-text of all articles from our international collection of social science journals, and the authors don’t pay an author processing charge (APC’s).

      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Cyber Threat in Interstate Relations: Case of US-Russia Cyber Tensions

      research-article
      Bookmark

            Abstract

            The 20 th century was overshadowed by conventional military threats, whereas the 21 st century has witnessed the preeminence of non-conventional security threats, including terrorism, transnational crime, civil wars, environmental degeneration and information/cyber insecurity.

            Among these, cyber threat is the most advanced, complicated and ungoverned in the realm of interstate relations in view of technological advancement, lawlessness of cyberspace and widening scope of the arena. Thanks to globalization, advances in information and communication technologies (ICTs) are diffusing across societies and internet is becoming a universal and prominent phenomenon. This necessitates increased dependence of today's society on ICTs as micro to macro level governance tends to rapidly shift into digital form. Consequently, the domain of this digital world—cyber space—constitutes an essential element of states' operational activities in social, economic, political and military arenas. Given the positive-negative use of technology, cyberspace provides opportunities to improve and facilitate human life, but simultaneously poses serious threats to both individual and national security. Cyber threats range from non-kinetic such as cybercrime, espionage, hacking and information propaganda to kinetic, viz. cyber warfare. The focus of this article is two-fold. First, it explains the degree of seriousness of cyber threat in interstate relations. Second, it illustrates the impact of alleged Russian cyber intrusion into the US electoral system on US-Russia relations, and zeroes in on the underlying cyber issues between them.

            Content

            Author and article information

            Journal
            10.13169
            polipers
            Policy Perspectives: The Journal of the Institute of Policy Studies
            Pluto Journals
            18121829
            18127347
            2018
            : 15
            : 2
            : 41-55
            Affiliations
            Dr. Muhammad Riaz Shad, Assistant Professor, Department of International Relations, National University of Modern Languages (NUML), Islamabad.
            Article
            polipers.15.2.0041
            10.13169/polipers.15.2.0041
            4a62c16c-c6e5-4dd3-bf83-bdb7cbd4517e
            © 2018, Institute of Policy Studies

            All content is freely available without charge to users or their institutions. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles in this journal without asking prior permission of the publisher or the author. Articles published in the journal are distributed under a http://creativecommons.org/licenses/by/4.0/.

            History

            Education,Religious studies & Theology,Social & Behavioral Sciences,Law,Economics
            US-Russia Tensions,Information Warfare,Cyber Threat,Deterrence,US Presidential Elections,Interstate Relations,Cyber Warfare

            References

            1. , and , “Understanding the Facebook-Cambridge Analytica Story: Quick Take,” The Washington Post , April 11, 2018.

            2. , “Deterrence and Dissuasion in Cyberspace,” International Security 41, (2016/2017): 44.

            3. , Cyber politics in International Relations (Massachusetts: The MIT Press, 2012), 8.

            4. Ibid., 4.

            5. and , “Cyberwar and Rivalry: The Dynamics of Cyber Conflict between Antagonists, 2001–2011,” Journal of Peace Research 51 (2014): 4.

            6. Ibid., 1.

            7. , “Deterrence and Dissuasion in Cyberspace,” 53.

            8. Ibid., 54.

            9. Ibid., 55.

            10. , “UK becomes first state to admit to offensive cyber-attack capability,” Financial Times , September 29, 2013.

            11. , “Israel, China and Cyber Security,” The Diplomat , February 2, 2012.

            12. For details, see , “Timeline: Ten Years of Russian Cyber Attacks on Other Nations,” NBC News , December 18, 2016, accessed August 8, 2017, http://www.nbcnews.com/storyline/hacking-in-america/timeline-ten-years-russian-cyber-attacks-other-nations-n697111

            13. Ibid.

            14. , “Edward Snowden, Chelsea Manning and Julian Assange: our new heroes,” The Guardian , September 3, 2013, accessed July 7, 2018, https://www.theguardian.com/commentisfree/2013/sep/03/snowden-manning-assange-new-heroes

            15. , “Russia-US cyber tensions show the true threat of cyberwar,” Global Risk Insights , September 19, 2016, accessed August 7, 2017, http://globalriskinsights.com/2016/09/russia-us-cyber-true-threat-cyberwar/

            16. Ibid.

            17. , “Cyber War Will Not Take Place,” Journal of Strategic Studies 35, (2011):5.

            18. , “The Role of Cyberspace in Interstate Tensions and Conflicts” (MA diss., Leiden University, 2016).

            19. and , “Russia and Cyber Operations: Challenges and Opportunities for the next US Administration,” Carnegie Endowment for International Peace , Task Force White Paper, December 13, 2016, 2.

            20. , “‘Black Friday’ in US-Russia relations could unleash ‘cyber-skirmishes’ and more,” CNBC , October 10, 2016, accessed July 7, 2018, https://www.cnbc.com/2016/10/10/black-friday-in-us-russia-relations-could-unleash-cyber-skirmishes-and-more.html

            21. “18 Revelations from WikiLeaks’ Hacked Clinton Emails,” BBC News , October 27, 2016, accessed August 12, 2017, http://www.bbc.com/news/world-us-canada-37639370

            22. and , “US Officially Accuses Russia of Hacking DNC and Interfering with Election,” The Guardian , October 8, 2016, accessed August 13, 2017, https://www.theguardian.com/technology/2016/oct/07/us-russia-dnc-hack-interfering-presidential-election

            23. , and , “US intelligence report: Vladimir Putin ‘ordered’ operation to get Trump elected,” The Guardian , January 6, 2017, accessed August 16, 2017, https://www.theguardian.com/world/2017/jan/06/vladimir-putin-us-election-interference-report-donald-trump

            24. , “Putin Ordered ‘Influence Campaign’ Aimed at U.S. Election, Report Says,” The New York Times , January 6, 2017, accessed July 8, 2018, https://www.nytimes.com/2017/01/06/us/politics/russia-hack-report.html

            25. Ibid.

            26. , and , “Debbie Wasserman Schultz to resign as DNC chair as email scandal rocks Democrats,” The Guardian , July 25, 2016, accessed July 8, 2018, https://www.theguardian.com/us-news/2016/jul/24/debbie-wasserman-schultz-resigns-dnc-chair-emails-sanders

            27. , “Truth Has Stopped Mattering in the Russia Investigation,” The New York Times , April 30, 2018, accessed July 9, 2018, https://www.nytimes.com/2018/04/30/opinion/truth-russia-investigation.html

            28. , “The Emerging Timeline of Obama and Russia that is Giving Democrats Heartburn,” The Washington Post , June 23, 2017, accessed September 7, 2017, https://www.washingtonpost.com/news/the-fix/wp/2017/06/23/even-democrats-wanted-obama-to-speak-out-much-sooner-about-russia/?utm_term=.074eeb092e84

            29. , and , “Obama's Secret Struggle to Punish Russia for Putin's Election Assault,” The Washington Post , June 23, 2017, accessed September 8, 2017, https://www.washingtonpost.com/graphics/2017/world/national-security/obama-putin-election-hacking/?utm_term=.25e13fcd074a

            30. Ibid.

            31. Ibid.

            32. “Cybercom to Elevate to Combatant Command,” U.S. Department of Defense , https://www.defense.gov/News/Article/Article/1511959/cybercom-to-elevate-to-combatant-command/

            33. and , “US and Russia Differ Over a Treaty for Cyberspace,” The New York Times , June 27, 2009, accessed July 8, 2018, https://www.nytimes.com/2009/06/28/world/28cyber.html

            34. “WCIT: what happened and what it means for the Internet,” EDRI , December 19, 2012, accessed July 9, 2018, https://edri.org/edrigramnumber10-24wcit-what-happend/

            35. , “Cybersecurity and International Relations: The US Engagement with China and Russia” (Paper presented at FLACSO-ISA 2014, University of Buenos Aires, School of Economics, Buenos Aires, Argentina, July 23–25, 2014), accessed October 11, 2017, http://web.isanet.org/Web/Conferences/FLACSO-ISA%20BuenosAires%202014/Archive/6f9b6b91-0f33-4956-89fc-f9a9cde89caf.pdf

            36. and , Cyber War: The Next Threat to National Security and What to Do About It (New York: Harper-Collins Publishers, 2010), 242.

            37. and , eds., A Roadmap for US-Russia Relations (Washington: Center for Strategic & International Studies, 2017), Executive Summary, 8.

            38. Ibid.

            39. , “Understanding Russian “Hybrid Warfare”: And What Can be done about it,” Rand Corporation CT : 468 (Testimony presented before the House Armed Services Committee on March 22, 2017): 5.

            40. and , “Russia and Cyber Operations: Challenges and Opportunities for the Next U.S. Administration,” Carnegie Endowment for International Peace (2016): 3, accessed November 10, 2017, http://carnegieendowment.org/files/12-16-16_Russia_and_Cyber_Operations.pdf

            Comments

            Comment on this article