Abstract
Contemporary life depends on a cyber-world, but it lacks basic security. This chapter focuses on two sources of systemic vulnerability: cyber-warfare and the dangers of the Dark Web. First, cyber-war makes a state vulnerable to attack. Carrying out a cyber-attack is inexpensive and thus a seductive option for combative states. A massive cyber-attack may disrupt a state prior to invasion. The other source of concern is the Dark Web. Hidden from commonly used browsers and search engines, criminal and terrorist actors can freely operate with little government control. It can be argued this could be a tool for those struggling against tyranny, but it can also be made to work for those seeking to undermine legitimate governance and pursue a destructive lifestyle.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Works Cited
Allagui, I., and J. Kuebler. 2011. The Arab Spring and the Role of ICTs. International Journal of Communications 5: 1435–1442.
Aouragh, M., and A. Alexander. 2011. The Egyptian Experience: Sense and Nonsense of the Internet Revolution. International Journal of Communication 5: 1344–1358.
BBC News. US Pentagon to Treat Cyber-Attacks as ‘Acts of War’. Last modified June 1, 2011. http://www.bbc.co.uk/news/world-us-canada-13614125. Accessed Sep 2012.
Biddle, S. 2012 The Secret Online Weapons Store That’ll Sell Anyone Anything. Gizmodo. http://gizmodo.com/5927379/the-secret-online-weapons-store-thatll-sell-anyone-anything
Chakrabarti, S., K. Punera, and M. Subramanyam. 2002. Accelerated Focused Crawling Through Online Relevance Feedback. Proceedings of the 11th International World Wide Web Conference, ACM Press, New York.
Cheong, F.C. 1996. Internet Agents: Spiders, Wanderers, Brokers, and Bots. Indianapolis: New Riders.
Cheswik, W., S. Bellowin, and A. Rubin. 2003. Firewalls and Internet Security: Repelling the Wily Hacker. Boston: Pearson Education.
Clark, W.K., and P.L. Levin. 2009. Securing the Information Highway. Foreign Affairs, November 1. http://www.foreignaffairs.com/articles/65499/wesley-k-clark-and-peter-l-levin/securing-the-information-highway. Accessed 12 Sep 2012.
Crawford, A. 2014. Dark Net ‘Used by Tens of Thousands of Paedophiles’. BBC News. http://www.bbc.com/news/technology-27885502
CSIS. 2015. Significant Cyber Incidents Since 2006. CSIS. http://csis.org/files/publication/151211_Significant_Cyber_Events_List.pdf
Department of Defense. 2015. Cyber Strategy. Washington, DC. http://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf
DoD. 2013. Department of Defense 2013 Task Force Report: Resilient Military Systems and the Advanced Cyber Threat. Washington, DC.
The Economist. 2015. The Plague of Global Terrorism. http://www.economist.com/blogs/graphicdetail/2015/11/daily-chart-12
Egan, M. 2015. What is the Dark Web? PC Advisor. http://www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/
Erbschloe, M. 2005. Trojans, Worms and Spyware: A Computer Security Professional’s Guide to Malicious Code. Boston: Elsevier.
van Evera, S. 1998. Offense, Defense and the Causes of War. International Security 22(4): 5–43.
Farivar, C. 2013. Just a Month After Shutdown, Silk Road 2.0 Emerges. Ars Technica.http://arstechnica.com/business/2013/11/just-a-month-after-shut-down-silk-road-2-0-emerges/
Flitter, E. 2015. CORRECTED-U.S. Sharply Reduces Silk Road’s Estimated Sales Volume. Reuters. http://www.reuters.com/article/usa-bitcoin-trial-silkroad-idUSL1N0UT1PJ20150120
Fu, T., A. Abassi, and H. Chen. 2010. A Focused Crawler for Dark Web Forums. Journal of the American Society for Information Science and Technology 61(6): 1213–1231.
Gitlin, M., and M. Golstein. 2015. Cyberattack. Minneapolis: Twenty-First Century Books.
GloomyHouse. 2015. 6 Terrifying 4Chan Posts. YouTube, May 28, 2015. https://www.youtube.com/watch?v=FrznpmzZbPg
Hintz, A. 2011. Challenges to Freedom of Expression in the Digital World: Lessons from Wikileaks and the Arab Spring. Journal for Communication Studies 5: 83–105.
ICC. 2002. Rome Statute. https://www.icc-cpi.int/nr/rdonlyres/ea9aeff7-5752-4f84-be94-0a655eb30e16/0/rome_statute_english.pdf. Accessed 24 Feb 2016.
Kassab, H.S. 2014. In Search of Cyber Stability: International Relations, Mutually Assured Destruction and the Age of Cyber Warfare. In Cyberspace and International Relations: Theory, Prospects and Challenges, ed. Jan-Frederik Kremer, and Benedikt Müller. Bonn: Springer.
Lipton, J. 2015. ‘Dark Web’ Market for Illegal Guns and Drugs Grows. CNBC. http://www.cnbc.com/2014/12/17/dark-web-market-for-illegal-guns-and-drugs-grows.html
Metz, C. 2016. The Plan to Unite Bitcoin with All Other Online Currencies. Wired. http://www.wired.com/2016/01/project-aims-to-unite-bitcoin-with-other-online-currencies/
Morgenthau, H. 2005. Politics Among Nations: The Struggle for Power and Peace. New York: McGraw-Hill.
O’Neill, Patrick Howell. 2015. Hackers Build a New Tor Client Designed to Beat the NSA. The Daily Dot. http://www.dailydot.com/politics/tor-astoria-timing-attack-client/
Oltermann, P. 2014. Germany ‘May Revert to Typewriters’ to Counter Hi-Tech Espionage. The Guardian. http://www.theguardian.com/world/2014/jul/15/germany-typewriters-espionage-nsa-spying-surveillance
Penn State University. 2013. Types of Attack. Cyber Security: Its Importance and Relevance to the Modern World. http://www.personal.psu.edu/users/j/m/jms6423/Engproj/Types%20of%20Attacks.xhtml
Top 10 Internet-Censored Countries. USA Today, February 4, 2014. http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385/
Tucker, P. 2015. How the Military Will Fight ISIS on the Dark Web. Defense One. http://www.defenseone.com/technology/2015/02/how-military-will-fight-isis-dark-web/105948/
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Kassab, H.S. (2017). Cyber-Vulnerability. In: Prioritization Theory and Defensive Foreign Policy . Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-48018-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-48018-3_7
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-48017-6
Online ISBN: 978-3-319-48018-3
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)