Skip to main content

Cyber Peacekeeping

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 157)

Abstract

Until now, many works have focused on attempting to define cyber warfare, as well as appropriate response leading to conflict escalation. Instead, this paper proposes a comprehensive definition of Cyber Peacekeeping motivated by prior research on peacekeeping, cyber conflict and warfare, and international relations in cyberspace. Cyber Peacekeeping works to promote online safety and security, which assists in both physical and cyber conflict cessation, and helps protect cyber civilians from becoming either victims or participants in cyber conflicts. This work defines key terms of cyber peacekeeping, as well as its scope and goals in relation to conflict prevention, mitigation, aftermath containment and cleanup. We then propose a potential organizational structure of Cyber Peacekeeping to support its defined roles and functions. Through a case study of a notable past cyber conflict, examples of practical cyber peacekeeping are shown, as well as the roles that peacekeeping could have played in such conflicts.

Keywords

  • Cyber peacekeeping
  • Cyber conflicts
  • Cyber war
  • Cyberspace safe layer
  • International relations in cyberspace
  • Stability and security
  • Information clearinghouse

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-25512-5_10
  • Chapter length: 14 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   54.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-25512-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   72.00
Price excludes VAT (USA)
Fig. 1.
Fig. 2.

References

  1. Bellamy, A.J., Williams, P.D., Griffin, S.: Understanding Peacekeeping. Polity, Cambridge (2010)

    Google Scholar 

  2. Lynn III, W.J.: Defending a new domain: the pentagon’s cyberstrategy. Foreign Aff. 89, 97–108 (2010)

    Google Scholar 

  3. Melzer, N.: Cyberwarfare and International Law. UNDIR Resources, Helgafell (2011)

    Google Scholar 

  4. Schmitt, M.N. (ed.): Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)

    Google Scholar 

  5. Hathaway, O.A.: The Law of Cyber-Attack. Faculty Scholarship Series. Paper 3852 (2012)

    Google Scholar 

  6. Allen, P.D., Demchak, C.: The Palestinian-Israeli Cyberwar. Mil. Rev. 83, 52 (2003)

    Google Scholar 

  7. Rehman, S.: Estonia’s Lessons in Cyberwarfare. USNews (2013)

    Google Scholar 

  8. Boo, H.-W., Lee, K.-K.: Cyber war and policy suggestions for South Korean planners. Int. J. Korean Unification Stud. 21(2), 85–106 (2012)

    Google Scholar 

  9. Cahill, T.P., Rozinov, K., Mule, C.: Cyber warfare peacekeeping, pp. 100. In: Proceedings of the 2003 IEEE Workshop on Information Assurance (2003)

    Google Scholar 

  10. Kleffner, J.K.: Keeping the cyber peace: international legal aspects of cyber activities in peace operations. Int. Law Stud. 89, 1 (2013)

    Google Scholar 

  11. Bayo, O.A.: The factors behind success and failures of United Nations peacekeeping missions: a case of the Democratic Republic of Congo. J. Altern. Perspect. Soc. Sci. 3(4), 19 (2012)

    Google Scholar 

  12. ITU International Multilateral Partnership Against Cyber Threats. http://www.impact-alliance.org/

  13. NATO Cooperative Cyber Defense Center of Excellence. https://ccdcoe.org/

  14. Bronk, C.: Hacks on Gas: Energy, Cybersecurity, and U.S. Defense. Rice University, Houston (2014)

    Google Scholar 

  15. Chang, Y.: Cyber conflict between Taiwan and China. Strateg. Insights 10(1), 25–35 (2011)

    Google Scholar 

  16. Farwell, J.P., Arakelian, D.: A Better Syria Option: Cyber War. The National Interest (2013)

    Google Scholar 

  17. Al-Marashi, I.: The Angel of Death is coming for you, ISIL. AlJazeera (2015)

    Google Scholar 

  18. Mobile Continues to Steal Share of US Adults’ Daily Time Spent with Media. eMarketer (2014)

    Google Scholar 

  19. Eugene Kaspersky Press Club 2013. Canberra, Australia (2013). http://outsidelens.scmagazine.com/video/Eugene-Kaspersky-Press-Club-201

  20. Kulikova, A.: Is a cyber arms race between the US and Russia possible? Russia Direct (2015)

    Google Scholar 

  21. Cole, J.M.: China’s Shifting Cyber Focus on Taiwan. The Diplomat (2013)

    Google Scholar 

  22. Sartre, P.: Making UN Peacekeeping More Robust: Protecting the Mission, Persuading the Actors. International Peace Institute, New York (2011)

    Google Scholar 

  23. Das, S.K., Kant, K., Zhang, N.: Handbook on Securing Cyber-Physical Critical Infrastructure. Elsevier, Amsterdam (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nikolay Akatyev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Institute for Computer Sciences, Social informatics and Telecommunication Engineering

About this paper

Cite this paper

Akatyev, N., James, J.I. (2015). Cyber Peacekeeping. In: James, J., Breitinger, F. (eds) Digital Forensics and Cyber Crime. ICDF2C 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 157. Springer, Cham. https://doi.org/10.1007/978-3-319-25512-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25512-5_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25511-8

  • Online ISBN: 978-3-319-25512-5

  • eBook Packages: Computer ScienceComputer Science (R0)