Skip to main content

Cyberspace as a State’s Element of Power

  • Chapter
  • First Online:
Cyber-Development, Cyber-Democracy and Cyber-Defense

Abstract

Cyberspace is becoming increasingly central to states’ economies and their societies. This growing role of cyberspace has opened up new opportunities but at the same time created new threats, which states have to live with, finding ways to identify and mitigate them. Cyberthreats are created by the exploitation of vulnerabilities inherent in every manmade system to include cyberspace, by various actors which are usually grouped in four categories, namely, organized criminals, hactivists, foreign governments and terrorist groups. The last two actors are closely related to national security, in its narrow sense; they use cyber power against (other).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Caton, What do senior leaders need to know about cyberspace?

  2. 2.

    Hathaway and Klimburg, Preliminary considerations: on national cyber security, p.1.

  3. 3.

    Luiijf and Healey, Organizational structures and considerations, p.120.

  4. 4.

    Hathaway and Klimburg, op. cit., p.3.

  5. 5.

    Lindstrom and Luiijf, Political aims & policy methods, p.56.

  6. 6.

    Krepinevich, Cyber warfare: anuclear option”? p.8.

  7. 7.

    In 1982, an explosion tore apart a natural gas pipeline in Siberia. The planning and execution of the operation has been attributed to the CIA. Clark and Levin, Securing the information highway: how to enhance the United States’ Electronic Defenses and Libicki, 2009, Cyberdeterrence and cyberwar, p.21.

  8. 8.

    Hathaway and Klimburg, op. cit., p.8.

  9. 9.

    Betz, Cyber war is not coming, p.21.

  10. 10.

    Hathaway and Klimburg, op. cit., p.17.

  11. 11.

    This typology is adhered to by a considerable number of countries in their national cyber security strategies. For a typical example see relevant documents by the UK and New Zealand.

  12. 12.

    For an updated list of cyber incidents, including cyber espionage ones, visit www.csis.org (significant cyber events).

  13. 13.

    Humanity has not seen mercenaries since the dark ages; today, their use should not be ruled out, albeit in different form.

  14. 14.

    Liff, Cyberwar: A newabsolute weapon’? The proliferation of cyberwarfare capabilities and interstate war, p.423.

  15. 15.

    Marinos and Sfakianakis, ENISA threat landscape: responding to the evolving threat environment.

  16. 16.

    Liff, op. cit.

  17. 17.

    Booth, Critical security studies and world politics.

  18. 18.

    The characterization of security as “trinitarian” stems from the Clausewitz’s view of war as a “paradoxical trinity” (Clausewitz, On war, p.89), which today is used to characterize wars amongst nation-states or wars of the industrial age.

  19. 19.

    Booth, op. cit.

  20. 20.

    Nadig, Human smuggling, national security, and refugee protection; Castels and Miller, The age of migration.

  21. 21.

    Though we are generally in agreement, we would extend this state-centric approach to include the period from the Peace of Westphalia, when the modern nation-state started emerged firstly in Europe and then elsewhere.

  22. 22.

    Nadig, op. cit.

  23. 23.

    Castels and Miller, op. cit.

  24. 24.

    Clausewitz, On war.

  25. 25.

    Summers, On strategy: a critical analysis of the Vietnam War.

  26. 26.

    Douhet, The command of the air.

  27. 27.

    Ibid., p.22.

  28. 28.

    Ibid., p.20.

  29. 29.

    Steed, Cyber power and strategy: so what?

  30. 30.

    Ibid., p.23.

  31. 31.

    Libicki, op.cit., p.124.

  32. 32.

    Goodman, Cyber deterrence: tougher in theory than in practice? p.103.

  33. 33.

    Milevski, A special operation in cyberspace, p.64.

  34. 34.

    Gray, Making strategic sense of cyber power: why the sky is not falling? Nye, Cyber power.

  35. 35.

    Nye, op. cit., p.2.

  36. 36.

    Gray, op. cit., p.4.

  37. 37.

    Ibid., p.7.

  38. 38.

    Martin Libicki argues that “The establishment of the 24th Air Force and US Cyber Command marks the ascent of cyberspace as a military domain. As such, it joins the historic domains of land, sea, air, and space.” Libicki, 2009, op. cit.

  39. 39.

    Steed, op. cit.; Libicki, 2009, op. cit.

  40. 40.

    Clausewitz, op, cit.

  41. 41.

    Miller and Kuehl consider “social cohesion and political will” as one of the multiple objectives that cyberattacks will likely have (Miller and Kuehl, op. cit., p.2).

  42. 42.

    Hathaway and Klimburg, op. cit., p.7.

  43. 43.

    McAfee, Critical infrastructure protection report, March 2011.

  44. 44.

    UK Cabinet Office, The UK cyber security strategy: protecting and promoting the UK in a digital world.

  45. 45.

    www.csis.org, Significant cyber events.

  46. 46.

    Betz, op. cit., p.22.

  47. 47.

    Ibid., p.23.

  48. 48.

    Libicki, 2009, op. cit., p.176.

  49. 49.

    Nye, op. cit., p.5.

  50. 50.

    Gray, op. cit., p.41.

  51. 51.

    Ludendorff, Total war.

  52. 52.

    Nye, op. cit., p.19.

  53. 53.

    Betz, op. cit., p.23.

  54. 54.

    Gray, op. cit., p.34–35.

  55. 55.

    Betz, op. cit., p.24.

  56. 56.

    Libicki, 2009, op. cit.

  57. 57.

    Ibid., p.140.

  58. 58.

    Miller and Kuehl, Cyberspace and theFirst Battlein 21st-century war.

  59. 59.

    Milevski, op. cit.

  60. 60.

    Ibid.

  61. 61.

    Gray, op. cit., p. 30.

  62. 62.

    Milevski, op. cit.

  63. 63.

    Ibid., p.65.

  64. 64.

    New Zealand’s cyber security strategy, June 2011.

  65. 65.

    Betz, op. cit.

Bibliography

  • Betz D (2011) Cyber war is not coming. Infinity Journal 3:21–24

    Google Scholar 

  • Booth K (ed) (2005) Critical security studies and world politics. Lynne Rienner Publishers, London

    Google Scholar 

  • Canada’s cyber security strategy: for a stronger and more prosperous Canada, 2010

    Google Scholar 

  • Castles S, Miller M (2009) The age of migration. The Guilford Press, New York

    Google Scholar 

  • Caton J (2011) What do senior leaders need to know about cyberspace? In: Neal D et al (eds) Crosscutting issues in international transformation: interactions and innovations among people, organizations, processes, and technology, vol 11, Essay., pp 207–228

    Google Scholar 

  • Clark W, Levin P (2009) Securing the information highway: how to enhance the United States' electronic defenses. Foreign Affairs, Nov/Dec 2009

    Google Scholar 

  • Douhet G (1921) The command of the air. Office of Air Force History, Washington, DC, 1991

    Google Scholar 

  • Farwell JP, Rohozinski R (2010) Stuxnet and the future of cyber war. Survival: Global Politics and Strategy 53(1):23–40

    Article  Google Scholar 

  • Goodman W (2010) Cyber deterrence: tougher in theory than in practice? Strategic Studies Quarterly Fall 2010:102–135

    Google Scholar 

  • Gray CS (2013) Making strategic sense of cyber power: why the sky is not falling? Strategic Studies Institute, Carlisle, PA

    Google Scholar 

  • Hathaway M, Klimburg A (2012) Preliminary considerations: on national cyber security. In: Klimburg A (ed) National cyber security: framework manual. NATO Cooperative Cyber Defense Center of Excellence, Tallinn, pp 1–43

    Google Scholar 

  • Keymer E (2010) The cyber-war, Jane’s Defence Weekly, No. 39, 29 Sept. 2010

    Google Scholar 

  • Krepinevich AF (2012) Cyber warfare: a “nuclear option”? Center for Strategic and Budgetary Assessments, Washington, DC

    Google Scholar 

  • Libicki MC (2009) Cyberdeterrence and cyberwar. RAND Corporation, Santa Monica, CA

    Google Scholar 

  • Libicki MC (2011) Cyberwar as a confidence game. Strategic Studies Quarterly Spring 2011:132–146

    Google Scholar 

  • Liff AP (2012) Cyberwar: a new ‘absolute weapon’? The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies 35(3):401–428

    Article  Google Scholar 

  • Lin HS (2010) Offensive cyber operations and the use of force. Journal of National Security Law and Policy 4:63–86

    Google Scholar 

  • Lindstrom G, Luiijf E (2012) Political aims & policy methods. In: Klimburg A (ed) National cyber security: framework manual. NATO Cooperative Cyber Defense Center of Excellence, Tallinn, pp 54–65

    Google Scholar 

  • Ludendorff E (1938) Total war

    Google Scholar 

  • Luiijf E, Healey J (2012) Organizational structures and considerations. In: Klimburg A (ed) National cyber security: framework manual. NATO Cooperative Cyber Defense Center of Excellence, Tallinn, pp 108–145

    Google Scholar 

  • Marinos L, Sfakianakis A (2012) ENISA threat landscape: responding to the evolving threat environment. European Network and Information Security Agency, Heraklion, Greece

    Google Scholar 

  • Milevski L (2011) A special operation in cyberspace. Joint Forces Quarterly 63:64–69

    Google Scholar 

  • Miller RA, Kuehl DT (2009) Cyberspace and the “First Battle” in 21st-century war. Center for Technology and National Security Policy, National Defense University, Defense Horizons, Washington, DC

    Google Scholar 

  • Nadig A (2002) Human smuggling, national security, and refugee protection. Journal of Refugee Studies 15(1):1–25

    Article  Google Scholar 

  • Nye JS (2010) Cyber power. Harvard Kennedy School, Belfer Center for Science and Inter-national Affairs, Cambridge, MA

    Google Scholar 

  • Steed D (2011) Cyber power and strategy: so what? Infinity Journal 2:21–24

    Google Scholar 

  • Summers H (1982) On strategy: a critical analysis of the Vietnam War. The Random House Publishing Group, New York

    Google Scholar 

  • UK Cabinet Office (2012) The UK cyber security strategy: protecting and promoting the UK in a digital world: 13-4

    Google Scholar 

  • von Clausewitz C (1976) On war. Princeton University Press, Princeton, Edited and translated from German by Howard M and Paret P

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Panos Mavropoulos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Nikitakos, N., Mavropoulos, P. (2014). Cyberspace as a State’s Element of Power. In: Carayannis, E., Campbell, D., Efthymiopoulos, M. (eds) Cyber-Development, Cyber-Democracy and Cyber-Defense. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-1028-1_10

Download citation

Publish with us

Policies and ethics