Abstract
In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations, and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This chapter discusses various asymmetries associated with institutions, nations, and organizations that influence the ICT-security nexus. Regulative, normative, and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries.
Criminals, for their part, are motivated by greed. Few leaders of the cyber-organized crime world would hesitate to sell their capabilities to a terrorist loaded with hard currency. That, combined with the ever-growing terrorist awareness of cyber vulnerabilities, makes this set of scenarios not just highly likely, but close to inevitable (Bucci & Steven, 2009).
“If you’re able to take down part of the electrical grid, pretty much everything else fails …. You’re not back in the 1970s; you’re back in the 1870s.” James Woolsey, former director of the US Central Intelligence Agency (cf. Maltz, 2009).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adams, J. (2001, May/June). Virtual defense. Foreign Affairs, 98–112.
Aggarwal, V. (2009, August 3). Lead: Cyber crime’s rampant. Express Computer. http://www.expresscomputeronline.com/20090803/market01.shtml. (Accessed 22 October 2009).
Baron, W. R. (1997, Spring). Volpe engineers use biometrics to help ease border crush. Volpe Journal, available at: http://www.volpe.dot.gov/infosrc/journal/spring97/biomet.html (Accessed 22 October 2009).
Bickers, C. (2001, August 16). Combat on the Web. Far Eastern Economic Review, 30–33.
Blank, S. (2004). Rethinking the concept of asymmetric threats in US strategy. Comparative Strategy, 23(4/5), 343–367.
Blau, J. (2004, May 26). Russia – A happy haven for hackers. http://www.computerweekly.com/Article130839.htm
Bridis, T. (2001, June 27). E-Espionage rekindles cold-war tensions – US tries to identify hackers; millions of documents are stolen. Wall Street Journal, A.18.
Bronk, C. (2009). Time to move toward a more secure cyberspace. World Politics Review. http://www.worldpoliticsreview.com/article.aspx?id=4194
Bucci, C., & Steven, P. (2009). A most dangerous link. US Naval Institute Proceedings, 135(10), 38–42.
Busetta, A., & Milito, A. M. (2009). Socio-demographic vulnerability: The condition of Italian young people. Social Indicators Research. DOI 10.1007/s11205-009-9507-9.
Coll, S. (2008). The Bin Ladens: An Arabian family in the American century. New York: The Penguin Press.
crime-research.org. (2005, May 3). Red Hackers come back! http://www.crime-research.org/news/03.05.2005/1199. (Accessed 22 October 2007).
Denning, D. E. (2003). Chapter eight: Activism, hacktivism, and cyberterrorism: The internet as a tool for influencing foreign policy. In J. Arquilla & D. Ronfeldt (Eds.), Networks and netwars: The future of terror, crime, and militancy. Rand Corporation Monograph/Report MR-1382. http://www.rand.org/pubs/monograph_reports/MR1382/index.html. (Accessed 22 October 2008).
The Economist. (2008a, December 8). Marching off to cyberwar. 389(8609), 20.
The Economist. (2008b). Between Allah and America. 387(8575), 92–93.
English, L. P. (2005). Information quality: Critical ingredient for national security. Journal of Database Management, 16(1), 18–32.
Fisher, I. (2002, August 1). Cybercafe crackdown may trip up leering boys. New York Times.
Gabrys, E. (2002). The international dimensions of cyber-crime, Part 1. Information Systems Security, 11(4), 21–32.
GAO Reports. (2007, June 22). Public and private entities face challenges in addressing cyber threats. RPT-number: GAO-07-705.
Garner, J. M. (1997, March). Asymmetric niche warfare. Phalanx, 1.
Gillis, C., & McHugh, M. (2002, February). Bonner proposes ‘smart box’. American Shipper, 33.
Gotz, G. (1999). Monopolistic competition and the diffusion of new technology. The Rand Journal of Economics, 30(4), 679–693.
Grow, B., & Bush, J. (2005, May 30). Hacker hunters. Business Week.
Harris, C. (2009, October 6). Making cyber-security a national priority. Government Technology Magazine. http://www.govtech.com/dc/articles/714308. (Accessed 22 October 2009).
Harvard Law Review. (2006, June). Note: Immunizing the Internet, Or: How I learned to stop worrying and love the worm, 119, 2442.
Hernandez, J. C., Sierra, J. M., & Ribagorda, A. (2004). Beware of the security software. Information Systems Security, 12(6), 39–45.
Hirsh, M. (2002). Bush and the world. Foreign Affairs, 81(5), 18–44.
Hoo, K. S., Goodman, S., & Greenberg, L. (1997). Information technology and the terrorist threat. Survival, 39(3), 135–155.
Jesdanun, A. (2008, April 6). US cyberwarfare prep includes offense. http://news.yahoo.com/s/ap/20080406/ap_on_hi_te/cyberwarfare. (Accessed 22 October 2009).
Johnson, M. L. (2004, April). Biometrics and the threat to civil liberties. Computer, 90–93.
Kelley, J. (2001, February 5). Terror Groups Hide Behind Web Encryption, USA Today, http://www.usatoday.com/tech/news/2001-02-05-binladen.htm. Accessed 20 March 2010.
Kshetri, N. (2005, May/June). Hacking the odds. Foreign Policy, 93.
Lane, M. (2005, February 2005). Customs reform and trade facilitation: An entrée to the global marketplace. USAID. http://tcb-fastrade.com/downloads/IP_Customs_Reform_S.pdf. (Accessed 22 October 2006).
Lenzner, R., & Vardi, N. (2004, September 20). The next threat. Forbes, 70.
Liang, Q., & Xiangsui, W. (1999, February). Unrestricted warfare. Beijing: PLA Literature and Arts Publishing House. http://www.terrorism.com/documents/TRC-Analysis/unrestricted.pdf. (Accessed 22 October 2004).
Libicki, M. C. (2009). Cyberdeterrence and cyberWar, a report prepared for the United States Air Force. The RAND Corporation. http://www.rand.org/pubs/monographs/2009/RAND_MG877.pdf. Accessed 27 October 2009.
Maltz, M. (2009,October 21). Turning power lines into battle lines. The National Post. http://network.nationalpost.com/np/blogs/fullcomment/archive/2009/10/21/milton-maltz-turning-power-lines-into-battle-lines.aspx (Accessed 22 October 2009).
Maney, K. (2001). Osama’s messages could be hiding in plain sight. USA Today, B6.
McGeer, B. (2002). Security: Bankers fight a new battle it adjustments, purchases Part of Patriot Act. Bank Technology News, 15(11), 1.
McHugh, M., & Damas, P. (2002, November). Mega-port groups back security pilot. American Shipper, 14–18.
Meigs, M. C. (2003). Unorthodox thoughts about asymmetric warfare. Parameters, 33(2), 4–18.
Metz, S. (2001, July–August). Strategic asymmetry. Military Review, 81(4), 23–31.
Metz, S., & Johnson, D. V., II. (2001, January). Asymmetry and US military strategy: Definition, background, and strategic concepts. Carlisle Barracks, PA: US Army War College, Strategic Studies Institute.
Michael, G. (2009). Adam Gadahn and Al-Qaeda’s internet strategy. Middle East Policy, 16(3), 135–152.
Nance, M. (2008, May/June). How (not) to spot a terrorist. Foreign Policy, 166, 74–76.
Nemets, A., & Torda, T. (2001, November 9). Interesting cards up Putin’s sleeve: Russian sponsorship of international terrorism. newsmax.com. http://www.newsmax.com/archives/articles/2001/11/9/143709.shtml. (Accessed 22 October 2009).
Onlinecasinonews.com. (2004, February 3). Mob’s extortion attempt on Internet bookies. http://www.onlinecasinonews.com/ocnv2_1/article/article.asp?id=4748. (Accessed 22 October 2005).
Price, S. A. (1999). Understanding contemporary cryptography and its wider impact upon the general law. International Review of Law, Computers & Technology, 13(2), 95–126.
Reid, T. (2007). China’s cyber army is preparing to march on America, says Pentagon. http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article2409865.ece. (Accessed 22 October 2008).
Robertson, J. (2007, November 30). China disputes report calling it a key cyber warfare instigator. The Age, http://news.theage.com.au/technology/china-disputes-report-calling-it-a-key-cyber-warfare-instigator-20071130-1dwx.html. Accessed 20 March 2010.
Rogers, E. M. (1983). The diffusion of innovations (3rd ed.). New York: Free Press.
Rogers, E. M. (1995). The diffusion of innovations (4th ed.). New York: Free Press.
Rosenberger, J. D. (2005). The inherent vulnerabilities of technology. The Wargames Directory. http://www.wargamesdirectory.com/html/articles/Various/technology.asp. (Accessed 22 October 2006).
Sabel, C., & Zeitlin, J. (eds.) (1997). World of possibilities: Flexibility and mass production in western industrialization. New York: Cambridge University Press.
Scott, W. R. (1995). Institutions and organizations. Thousand Oaks, CA: Sage.
Scott, W. R. (2001). Institutions and organizations. Thousand Oaks, CA: Sage.
Snidal, D. (1994). The politics of scope: Endogenous actors, heterogeneity and institutions. Journal of Theoretical Politics, 6(4), 449–472.
Snidal, D. (1996). Political economy and international institutions. International Review of Law and Economics, 16(1), 121–137.
Spartacus (UD) Spartacus educational, http://www.spartacus.schoolnet.co.uk/FWWmaximgun.htm. Accessed 22 October 2009.
Stone, B. (2001, July 16). Busting the web bandits. Newsweek, 55.
Storper, M., & Walker, R. (1989). The capitalist imperative: Territory, technology and industrial growth. London: Basil Blackwell.
Swartz, J. (2007, March 12). Chinese hackers seek US access; Attacks highlight weaknesses in Internet security. USA Today, 3B.
Sudworth, J. (2009). New ‘cyber attacks’ hit S Korea. BBC News. http://news.bbc.co.uk/2/hi/asia-pacific/8142282.stm. (Accessed 22 October 2009).
Thomas, T. L. (1999, September–October). Infosphere threats. Military Review. Posted on: Foreign Military Studies Office. http://fmso.leavenworth.army.mil/fmsopubs/issues/infosphere/infosphere.htm. (Accessed 22 October 2005).
United States Government Accountability Office. (2007). Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats: GAO-07-705, June. http://www.gao.gov/htext/d07705.html. (Accessed 22 October 2008).
Vardi, N. (2005, July 25). Chinese take out. Forbes, 54.
Varese, F. (2002). The Russian Mafia: Private protection in a new market economy. New York: Oxford University Press.
Verton, D. (2003). Black ice: The invisible threat of cyberterrorism. New York: McGraw-Hill/Osborne.
Walker, C. (2004, June). Russian Mafia Extorts Gambling Websites. http://www.americanmafia.com/cgi/clickcount.pl?url=www.americanmafia.com/Feature_Articles_270.html. (Accessed 22 October 2005).
Waller, J. M. (2000, February 28). PLA revises the art of war. Insight on the News, 21–23.
World IT Report. (2003, February 3). Pakistan faces difficulties to block porn sites.
World Tribune. (2008). Pentagon official: China may already be at cyberwar with US March 13. http://www.worldtribune.com/worldtribune/WTARC/2008/ea_china_03_13.asp. (Accessed 22 October 2009).
Young, J. (2004). BC attempts to regulate international outsourcing of personal information. Deeth Williams Wall LLP. http://www.dww.com/articles/bcpatriot_amendments.htm. (Accessed 22 October 2005).
Yousafzai, S., & Hirsh, M. (2004). The harder hunt for Bin Laden. Newsweek, December 29, 2003/January 5, 2004, 58.
Zhou, L. (2005). Special Issue: Database technology for enhancing national security. Journal of Database Management, 16(1), I–III.
Zombori, G. (2001, January 5). e + Finance + Crime: A report on cyber-crime and money laundering. Study of Organized Crime and Corruption, Osgoode Hall Law School, York University, Toronto, Ontario, Canada. http://www.yorku.ca/nathanson/Publications/e.htm. (Accessed 22 October 2009).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kshetri, N. (2010). Information and Communications Technologies, Cyberattacks, and Strategic Asymmetry. In: The Global Cybercrime Industry. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11522-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-11522-6_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11521-9
Online ISBN: 978-3-642-11522-6
eBook Packages: Business and EconomicsBusiness and Management (R0)