Abstract
Many nations around the world are establishing military cyber commands. Evidently, there is no one solution for a cyber command that fits all nations that are allies today. However, the likely challenge for all states will continue to be the so-called malicious cyber activities that take place in peacetime and remain below the threshold of an armed attack, where the sovereign right of self-defense and the use of countermeasures is perhaps not as evident compared to a conventional armed conflict. Against the background of increasing cyber threats it remains to be seen if the cyber commands are able to cover the entire matrix of cyber security challenges that a nation needs to be able to handle. Therefore, an equally prudent approach is also needed on the civilian side, both in the governmental as well as in the private sector, especially in the critical infrastructure providers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Different sources offer even bigger numbers. For instance, the website of the Infosec Institute claims that at least 140 countries were developing cyber weapons.
References
Alexander, K. B. (2011). Building a New Command in Cyberspace. Strategic Studies Quarterly, 5(2), 3–12. Retrieved June 30, 2018 from http://www.airuniversity.af.mil/Portals/10/SSQ/documents/Volume-05_Issue-2/Alexander.pdf.
Arquilla, J. (2013, April 17). Twenty Years of Cyberwar. Journal of Military Ethics, 12(1), 80–87. https://doi.org/10.1080/15027570.2013.782632.
Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is Coming!. Comparative Strategy, 12(2), 141–165. (Spring, Copyright 1993 Taylor & Francis, Inc.).
Arquilla, J., & Ronfeldt, D. (2017). In Athena’s camp. Preparing for conflict in the information age. RAND Corporation. Retrieved June 26, 2018 from https://www.rand.org/pubs/monograph_reports/MR880.html.
Bartholomees, J. (2006). A survey of the theory of strategy. In J. B. Bartholomees, U.S. army war college guide to national security policy and strategy. U.S. Army War College. Retrieved from https://ssi.armywarcollege.edu/pdffiles/PUB708.pdf.
Boutilier, A. (2018, June 12). Canada’s spy agency expands its cyber security role. Retrieved from The Star: https://www.thestar.com/news/canada/2018/06/12/canadas-spy-agency-expands-its-cyber-security-role.html.
Brantly, A. F. (2018). The cyber deterrence problem. In T. J. Minarik, (Ed.), 10th International Conference on Cyber Conflict CyCon X: Maximising Effects (pp. 31–53).
Buzan, B. (1991). New patterns of global security in the twenty-first century. International Affairs.
Clarke, R. (2009, Nov-Dec). War from cyberspace. The National Interest, 31–36. Retrieved June 30, 2018 from http://nationalinterest.org/article/war-from-cyberspace-3278.
Collier, J. (2016). Strategies of cyber crisis management: Lessons from the approaches of Estonia and the United Kingdom. Oxford: University of Oxford DPIR. Retrieved June 30, 2018 from https://www.politics.ox.ac.uk/publications/strategies-of-cyber-crisis-management-lessons-from-the-approaches-of-estonia-and-the-united-kingdom.html.
Deibert, R. J., & Rohozinski, R. (2010a). Risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4, 15–32.
Deibert, R., & Rohozinski, R. (2010b). Control and subversion in Russian cyberspace. In R. Deibert, J. Palfrey, R. Rohozinski, J. Zittrain, R. Deibert, J. Palfrey, R. Rohozinski, & J. Zittrain (Eds.), Access controlled: The shaping of power, rights and rule in cyberspace. Cambridge, MA: MIT Press. Retrieved June 30, 2018 from https://pdfs.semanticscholar.org/48b5/50fe0dc602ea7e0a9d4f8f395d9ede34ae66.pdf.
Department of the Army HQ. (2017, April 11). Field Manual (FM) 3–12. Cyberspace and Electronic Warfare Operations. Retrieved June 30, 2018 from https://fas.org/irp/doddir/army/fm3-12.pdf.
Emmott, R. (2017, September 7). Critical alert: EU ministers test responses in cyber war game. Reuters. https://www.reuters.com/article/eu-defence-cyber/critical-alert-eu-ministers-test-responses-in-cyber-war-game-idUSL8N1LN56A.
European Commission. (2018, May 4). Questions and answers: Directive on security of network and Information systems, the first EU-wide legislation on cybersecurity. Retrieved from European Commission: europa.eu/rapid/press-release_MEMO-18-3651_en.pdf.
Friedman, T. L. (2005, April 3). It’s a flat world, after all. The New York Times Magazine. Retrieved from https://www.nytimes.com/2005/04/03/magazine/its-a-flat-world-after-all.html.
Härmä, K., & Minarik, T. (2017, Sep 18). European union equipping itself against cyber attacks with the help of cyber diplomacy toolbox. Retrieved from NATO CCDCOE: https://ccdcoe.org/european-union-equipping-itself-against-cyber-attacks-help-cyber-diplomacy-toolbox.html.
Heidegger, M. (1977). The question concerning technology. Retrieved from http://www.psyp.org/question_concerning_technology.pdf.
Infosec Institute. (2012, October 5). The rise of cyber weapons and relative impact on cyberspace. Retrieved June 29, 2018 from Infosec Institute: https://resources.infosecinstitute.com/the-rise-of-cyber-weapons-and-relative-impact-on-cyberspace/.
International Telecommunications Union. (2017, July 6). Global cybersecurity index 2017. Retrieved from https://www.itu.int/en/ITU-D/Cybersecurity/Documents/Global%20Cybersecurity%20Index%202017%20Report%20version%202.pdf.
Klimburg, A. (2012). National cyber security framework manual. In A. Klimburg (Ed.), Tallinn: NATO CCDCOE.
Kodar, E. (2017). NATO information assurance symposium’17. Mons, Belgium. Retrieved June 30, 2018 from https://www.youtube.com/watch?v=PKC-nWRfez4.
Leong, J. (2017, June 30). Singapore on target list for cyberattacks, new SAF command set up to handle threats: Ng Eng Hen. Retrieved from Channel NewsAsia: https://www.channelnewsasia.com/news/singapore/singapore-on-target-list-for-cyberattacks-new-saf-command-set-up-8991770.
Liff, A. P. (2012, May). Cyberwar: A new ‘absolute weapon’? the proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies, 401–428. https://doi.org/10.1080/01402390.2012.663252.
Lord, N. (2017, March 27). What is the NIS directive? Definition, requirements, penalties, best practices for compliance and more. Retrieved from Digital Guardian: https://digitalguardian.com/blog/what-nis-directive-definition-requirements-penalties-best-practices-compliance-and-more.
Nakashima, E. (2016, December 23). Obama moves to split cyberwarfare command from the NSA. Retrieved June 30, 2018 from The Washington Post: https://www.washingtonpost.com/world/national-security/obama-moves-to-split-cyberwarfare-command-from-the-nsa/2016/12/23/a7707fc4-c95b-11e6-8bee-54e800ef2a63_story.html?noredirect=on&utm_term=.e85bb0ea7a3f.
NATO. (2016, July 8). Cyber defence pledge. Retrieved from NATO: https://www.nato.int/cps/su/natohq/official_texts_133177.htm.
NewsAsia, C. (2017, March 3). Singapore to set up new defence cyber organisation. Retrieved from https://www.channelnewsasia.com/news/singapore/singapore-to-set-up-new-defence-cyber-organisation-8775266.
Paganini, P. (2012, October 5). The rise of cyber weapons and relative impact on cyberspace. Retrieved from Infosec Institute: https://resources.infosecinstitute.com/the-rise-of-cyber-weapons-and-relative-impact-on-cyberspace/.
Pernik, P. (2018, November 26). Estonian cyber command: What is it for? Retrieved from International Centre for Defence and Security: https://icds.ee/estonian-cyber-command-what-is-it-for/.
Pugliese, D. (2018, February 28). Canada adds new cybersecurity center, hikes funding for electronic spy agency. Retrieved from Defense News: https://www.defensenews.com/international/2018/02/28/canada-adds-new-cybersecurity-center-hikes-funding-for-electronic-spy-agency/.
Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. The Journal of Strategic Studies, 38(1–2), 4–37. https://doi.org/10.1080/01402390.2014.977382.
Schmitt, M. N. (2017). Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press.
Scotti, M. (2017, June 20). Canadian security agency will soon be able to launch cyber attacks against terrorists. Retrieved from Global News: https://globalnews.ca/news/3542168/canada-launch-cyber-attack-terrorism/.
Shea, J. (2010, February 2). Lecture 6—Cyber attacks: hype or an increasing headache for open societies? Brussels: NATO. Retrieved June 29, 2018, from https://www.nato.int/cps/en/natolive/opinions_84768.htm.
Smeets, M. (2017). Organisational integration of offensive cyber capabilities: A primer on the benefits and risks. In 2017 9th International Conference on Cyber Conflict. Defending the Core (pp. 25–42). NATO CCDCOE.
Tigner, B. (2017, December 1). Estonia to incorporate offensive capabilities into its future cyber command. Retrieved from Jane’s 360: http://www.janes.com/.
Wallace, I. (2013, December 16). The military role in national cybersecurity governance. Retrieved from Brookings: https://www.brookings.edu/opinions/the-military-role-in-national-cybersecurity-governance/.
Wilner, A. (2017). Cyber deterrence and critical-infrastructureprotection: Expectation, application, and limitation. Comparative Strategy, 36(4), 309–318. https://doi.org/10.1080/01495933.2017.1361202.
World Economic Forum. (2013, March 30). The global information technology report 2013. Retrieved June 30, 2018 from World Economic Forum: http://www3.weforum.org/docs/WEF_GITR_Report_2013.pdf.
World Economic Forum. (2018). The global risks report 2018. Retrieved from World Economic Forum: http://www3.weforum.org/docs/WEF_GRR18_Report.pdf.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alatalu, S. (2020). Cyber Commands—A Universal Solution to a Universal Cyber Security Challenge?. In: Feldner, D. (eds) Redesigning Organizations. Springer, Cham. https://doi.org/10.1007/978-3-030-27957-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-27957-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27956-1
Online ISBN: 978-3-030-27957-8
eBook Packages: Economics and FinanceEconomics and Finance (R0)