Skip to main content

Dr. Strangeweb: Or How They Stopped Worrying and Learned to Love Cyber War

  • Chapter
  • First Online:
Cyberterrorism

Chapter Overview

This chapter argues that there are many parallels between discussions of cyber terrorism and cyber war on the one hand, and discussions of terrorism and state terrorism on the other. The chapter begins by tracing these parallels. Next, the chapter explores the development of cyber war capabilities by the major powers and others and focuses on the changes in United States cyber war doctrine. It concludes by considering the consequences of these increasing capabilities and doctrinal decisions, arguing that it is only by convention that these state behaviors are labeled as cyber war rather than cyber terror.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Stohl, M. (1985) presented at the Defense Intelligence College Symposium on Terrorism, Washington, DC, December 3, 1985. Later published as Stohl, M. 1988. “States, Terrorism and State Terrorism: The Role of the Superpowers” in Slater, R. and Stohl, M. (eds.) Current Perspectives on International Terrorism, Macmillan, London, and St. Martin’s Press, New York, pp. 155–205.

  2. 2.

    For an illustration see the debate between Wight (2012) and Stohl (2012).

  3. 3.

    See also Debrix (2001).

  4. 4.

    See also Stohl 2007.

  5. 5.

    Sic, as written in the original.

  6. 6.

    Capitals in original.

  7. 7.

    The Spectrum of State Responsibility

    1. State-prohibited. The national government will help stop the third-party attack

    2. State-prohibited-but-inadequate. The national government is cooperative but unable to stop the third-party attack

    3. State-ignored. The national government knows about the third-party attacks but is unwilling to take any official action

    4. State-encouraged. Third parties control and conduct the attack, but the national government encourages them as a matter of policy

    5. State-shaped. Third parties control and conduct the attack, but the state provides some support

    6. State-coordinated. The national government coordinates third-party attackers such as by “suggesting” operational details

    7. State-ordered. The national government directs third-party proxies to conduct the attack on its behalf

    8. State-rogue-conducted. Out-of-control elements of cyber forces of the national government conduct the attack

    9. State-executed. The national government conducts the attack using cyber forces under their direct control

    10. State-integrated. The national government attacks using integrated third-party proxies and government non-state actors. These behaviors thus serve to undermine the norms which underlie the international law regime

Further Reading

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Stohl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Stohl, M. (2014). Dr. Strangeweb: Or How They Stopped Worrying and Learned to Love Cyber War. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-0962-9_5

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-0961-2

  • Online ISBN: 978-1-4939-0962-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics