Abstract
For a decade at least, a worldwide cyber armament race takes place; cyber attacks against all kinds of information and communication systems are a daily reality, and cyberwar becomes a growing threat. In this chapter, the military, political, and technological aspects of cyberwar are surveyed and discussed on one hand. On the other hand, the vision of cyberpeace is sketched as a counter-concept.
Reference
Bindé, J. (Coord.) (2005). Towards knowledge societies: UNESCO world report (UNESCO reference works series). Paris: UNESCO. http://unesdoc.unesco.org/images/0014/001418/141843e.pdf. Accessed 27 February 2017.
Brenner, S. W. (2009). Cyber threats: The emerging fault lines of the nation state. Oxford, UK: Oxford University Press.
Carr, J. (2012). Inside cyber warfare (2nd ed.). Beijing etc: O’Reilly.
Clarke, R. A., & Knake, R. (2012). Cyber war: the next threat to national security and what to do about it. New York: HarperCollins.
Costigan, S. S., & Perry, J. (2012). Cyberspaces and global affairs. Farnham, Surrey: Ashgate.
Department of Defense. (2011). Department of defense strategy for operating in cyberspace. http://csrc.nist.gov/groups/SMA/ispab/documents/DOD-Strategy-for-Operating-in-Cyberspace.pdf. Accessed 25 July 2016.
Federal Ministry of Defense. (2016). Abschlussbericht Aufbaustab Cyber- und Informationsraum. http://www.bmvg.de/resource/resource/MzEzNTM4MmUzMzMyMmUzMTM1MzMyZTM2MzIzMDMwMzAzMDMwMzAzMDY5NmU2ODYyNzc2MzY5NzMyMDIwMjAyMDIw/Abschlussbericht%20Aufbaustab%20CIR.pdf. Accessed 21 July 2016.
Federal Ministry of Justice and Consumer Protection. (2001). Gesetz zur Beschränkung des Brief-, Post- und Fernmeldegeheimnisses (“G10-Gesetz”) http://www.gesetze-im-internet.de/g10_2001/. Accessed 21 July 2016.
Federal Ministry for Justice and Consumer Protection. (2012). Basic law for the federal republic of Germany. http://www.gesetze-im-internet.de/englisch_gg/. Accessed 21 July 2016.
Federal Ministry of the Interior. (2011). Cyber-Sicherheitsstrategie für Deutschland, https://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/cyber.pdf?__blob=publicationFile. Accessed 21 July 2016.
Forum Computer Professionals for Peace and Social Responsibility (FIfF). (2014). Forderungen zum Cyberpeace. FIfF-Kommunikation, 31(4), 62–65.
Foschepoth, J. (2012). Überwachtes Deutschland. In Post- und Telefonüberwachung in der alten Bundesrepublik. Göttingen/Bristol: Vandenhoeck & Ruprecht.
Gaycken, S. (2011). Cyberwar. Das Internet als Kriegsschauplatz. Munich: Open Source Press.
Gaycken, S. (2012). Cyberwar – Das Wettrüsten hat längst begonnen. Munich: Goldmann/Randomhouse.
German Bundestag. (2014). 18th electorial term: Establishment of a committee of inquiry; Printed paper 18/843. http://www.bundestag.de/blob/284528/a89d6006f28900c4f46e56f5e0807ddf/einsetzungsantrag_englisch-docx-data.pdf. Accessed 25 July 2016.
Greenwald, G. (2014). No place to hide. Edward Snowden, the NSA, and the US surveillance state. New York: Metropolitan Books.
Heintschel von Heinegg, W. (2015). Völkerrecht im Cyberraum – das Tallinn-Handbuch und der Tallinn-2-Prozess. Dossier 79, W&F Wissenschaft und Frieden 3/2015 & FIfF-Kommunikation 32(3).
Hügel, S. (2016). Cyberpeace – Promoting human rights and peaceful use of the internet. In Hofkirchner, W. & Burgin, M. (Eds.). The future information society, Singapore: World scientific, to appear. (A short version can be found under: http://cyberpeace.fiff.de/Uploads/Uploads/ISIS_Cyberpeace_Extended_Abstract.pdf).
IPPNW – International Physicians for the Prevention of Nuclear War (2015). Body count. Casuality Figures after 10 Years of the “War on Terror” 1st international edition. Washington DC., Berlin, Ottawa. http://www.ippnw.de/commonFiles/pdfs/Frieden/Body_Count_first_international_edition_2015_final.pdf. Accessed 24 July 2016.
ISO 27001 (2013). ISO/IEC 27001:2013 – Information technology – Security techniques – Information security management systems – Requirements. International Organization for Standardization.
Johnigk, S., Kreowski, H.-J., & Nothdurft, K. (2014). Cyberwar – Schimäre oder reale Bedrohung? FIfF-Kommunikation, 31(4), 74–76.
Johnigk, S., Nothdurft, K. (2015): Das Problem der Attributierung von Cyberangriffen und seine Folgen. Dossier 79, W&F Wissenschaft und Frieden 3/2015 & FIfF-Kommunikation 32(3).
Kaspersky (2015). Targeted Cyberattacks Logbook, https://apt.securelist.com, Accessed 17 July 2017
Luhmann, N. (2000). Vertrauen (4th ed.). Stuttgart: Lucius & Lucius.
Netzpolitik.org. (2015). Strategische Leitlinie Cyber-Verteidigung im Geschäftsbereich BMVg. https://netzpolitik.org/2015/geheime-cyber-leitlinie-verteidigungsministerium-erlaubt-bundeswehr-cyberwar-und-offensive-digitale-angriffe/#Strategische-Leitlinie-Cyber-Verteidigung. Accessed 21 July 2016.
Petermann, T. et al. (2010) Gefährdung und Verletzbarkeit moderner Gesellschaften – am Beispiel eines großräumigen Ausfalls der Stromversorgung. Technological Impact Assessment Office at the German Parliament, Report No. 141, November 2010, http://www.tab-beim-bundestag.de/de/pdf/publikationen/berichte/TAB-Arbeitsberichtab141.pdf. Accessed 26 Jan 2017.
Powell, W. W., & Snellman, K. (2004). The knowledge economy. Annual Review of Sociology, 30(1), 199–220.
Reinhold, T. (2016). Die Bundeswehr zieht ins Cyberfeld. Blätter für deutsche und. Internationale Politik, 7(16), 17–20.
Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5–32.
Rooney, D., Hearn, G., & Ninan, A. (Eds.). (2005). Handbook on the knowledge economy. Cheltenham: Edward Elgar Publishing.
Scahill, J. (2015). Germany is the tell-tale heart of America’s drone war, The Intercept. https://theintercept.com/2015/04/17/ramstein/. Accessed 21 July 2016.
Schmitt, M. N. (2013). Tallinn-manual on the international law applicable to cyber warfare. Cambridge: Cambridge University Press.
Schneier, B. (2012). Liars & Outliers. In Enabling the trust that society needs to thrive. Indianapolis: Wiley & Sons.
Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford: Oxford University Press.
Stiennon, R. (2010). Surviving cyberwar. Lanham: Government Institutes.
Stiennon, R. (2015). There will be cyberwar: How the move to network-centric war fighting has set the stage for cyberwar. Birmingham: IT-Harvest Press.
Tallinn Manual. Wikipedia entry, https://en.wikipedia.org/wiki/Tallinn_Manua/Tallinn_Manual. Accessed 24 July 2016.
Ventre, D. (Ed.). (2011). Cyberwar and information warfare. London/Hoboken: Wiley-ISTE.
Ventre, D. (2016). Information warfare (2nd ed.). London/Hoboken: Wiley-ISTE.
Zimmermann, A. (2013). Es gibt keinen rechtsfreien Raum (Interview). Internationale Politik, 68(3), 26–31.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this entry
Cite this entry
Hügel, S., Kreowski, HJ., Meyer-Ebrecht, D. (2017). Cyberwar and Cyberpeace. In: Carayannis, E., Campbell, D., Efthymiopoulos, M. (eds) Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, Cham. https://doi.org/10.1007/978-3-319-06091-0_41-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-06091-0_41-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06091-0
Online ISBN: 978-3-319-06091-0
eBook Packages: Springer Reference Economics and FinanceReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences