Advertisement

Cyberwar and Cyberpeace

  • Stefan Hügel
  • Hans-Jörg Kreowski
  • Dietrich Meyer-Ebrecht
Living reference work entry

Abstract

For a decade at least, a worldwide cyber armament race takes place; cyber attacks against all kinds of information and communication systems are a daily reality, and cyberwar becomes a growing threat. In this chapter, the military, political, and technological aspects of cyberwar are surveyed and discussed on one hand. On the other hand, the vision of cyberpeace is sketched as a counter-concept.

Keywords

Cyber security Cyber weapons Cyberpeace Cyberwar International law Internet Military Surveillance 

Reference

  1. Bindé, J. (Coord.) (2005). Towards knowledge societies: UNESCO world report (UNESCO reference works series). Paris: UNESCO. http://unesdoc.unesco.org/images/0014/001418/141843e.pdf. Accessed 27 February 2017.
  2. Brenner, S. W. (2009). Cyber threats: The emerging fault lines of the nation state. Oxford, UK: Oxford University Press.CrossRefGoogle Scholar
  3. Carr, J. (2012). Inside cyber warfare (2nd ed.). Beijing etc: O’Reilly.Google Scholar
  4. Clarke, R. A., & Knake, R. (2012). Cyber war: the next threat to national security and what to do about it. New York: HarperCollins.Google Scholar
  5. Costigan, S. S., & Perry, J. (2012). Cyberspaces and global affairs. Farnham, Surrey: Ashgate.Google Scholar
  6. Department of Defense. (2011). Department of defense strategy for operating in cyberspace. http://csrc.nist.gov/groups/SMA/ispab/documents/DOD-Strategy-for-Operating-in-Cyberspace.pdf. Accessed 25 July 2016.
  7. Federal Ministry of Defense. (2016). Abschlussbericht Aufbaustab Cyber- und Informationsraum. http://www.bmvg.de/resource/resource/MzEzNTM4MmUzMzMyMmUzMTM1MzMyZTM2MzIzMDMwMzAzMDMwMzAzMDY5NmU2ODYyNzc2MzY5NzMyMDIwMjAyMDIw/Abschlussbericht%20Aufbaustab%20CIR.pdf. Accessed 21 July 2016.
  8. Federal Ministry of Justice and Consumer Protection. (2001). Gesetz zur Beschränkung des Brief-, Post- und Fernmeldegeheimnisses (“G10-Gesetz”) http://www.gesetze-im-internet.de/g10_2001/. Accessed 21 July 2016.
  9. Federal Ministry for Justice and Consumer Protection. (2012). Basic law for the federal republic of Germany. http://www.gesetze-im-internet.de/englisch_gg/. Accessed 21 July 2016.
  10. Federal Ministry of the Interior. (2011). Cyber-Sicherheitsstrategie für Deutschland, https://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/cyber.pdf?__blob=publicationFile. Accessed 21 July 2016.
  11. Forum Computer Professionals for Peace and Social Responsibility (FIfF). (2014). Forderungen zum Cyberpeace. FIfF-Kommunikation, 31(4), 62–65.Google Scholar
  12. Foschepoth, J. (2012). Überwachtes Deutschland. In Post- und Telefonüberwachung in der alten Bundesrepublik. Göttingen/Bristol: Vandenhoeck & Ruprecht.Google Scholar
  13. Gaycken, S. (2011). Cyberwar. Das Internet als Kriegsschauplatz. Munich: Open Source Press.Google Scholar
  14. Gaycken, S. (2012). Cyberwar – Das Wettrüsten hat längst begonnen. Munich: Goldmann/Randomhouse.Google Scholar
  15. German Bundestag. (2014). 18th electorial term: Establishment of a committee of inquiry; Printed paper 18/843. http://www.bundestag.de/blob/284528/a89d6006f28900c4f46e56f5e0807ddf/einsetzungsantrag_englisch-docx-data.pdf. Accessed 25 July 2016.
  16. Greenwald, G. (2014). No place to hide. Edward Snowden, the NSA, and the US surveillance state. New York: Metropolitan Books.Google Scholar
  17. Heintschel von Heinegg, W. (2015). Völkerrecht im Cyberraum – das Tallinn-Handbuch und der Tallinn-2-Prozess. Dossier 79, W&F Wissenschaft und Frieden 3/2015 & FIfF-Kommunikation 32(3).Google Scholar
  18. Hügel, S. (2016). Cyberpeace – Promoting human rights and peaceful use of the internet. In Hofkirchner, W. & Burgin, M. (Eds.). The future information society, Singapore: World scientific, to appear. (A short version can be found under: http://cyberpeace.fiff.de/Uploads/Uploads/ISIS_Cyberpeace_Extended_Abstract.pdf).
  19. IPPNW – International Physicians for the Prevention of Nuclear War (2015). Body count. Casuality Figures after 10 Years of the “War on Terror” 1st international edition. Washington DC., Berlin, Ottawa. http://www.ippnw.de/commonFiles/pdfs/Frieden/Body_Count_first_international_edition_2015_final.pdf. Accessed 24 July 2016.
  20. ISO 27001 (2013). ISO/IEC 27001:2013 – Information technology – Security techniques – Information security management systems – Requirements. International Organization for Standardization.Google Scholar
  21. Johnigk, S., Kreowski, H.-J., & Nothdurft, K. (2014). Cyberwar – Schimäre oder reale Bedrohung? FIfF-Kommunikation, 31(4), 74–76.Google Scholar
  22. Johnigk, S., Nothdurft, K. (2015): Das Problem der Attributierung von Cyberangriffen und seine Folgen. Dossier 79, W&F Wissenschaft und Frieden 3/2015 & FIfF-Kommunikation 32(3).Google Scholar
  23. Kaspersky (2015). Targeted Cyberattacks Logbook, https://apt.securelist.com, Accessed 17 July 2017
  24. Luhmann, N. (2000). Vertrauen (4th ed.). Stuttgart: Lucius & Lucius.Google Scholar
  25. Petermann, T. et al. (2010) Gefährdung und Verletzbarkeit moderner Gesellschaften – am Beispiel eines großräumigen Ausfalls der Stromversorgung. Technological Impact Assessment Office at the German Parliament, Report No. 141, November 2010, http://www.tab-beim-bundestag.de/de/pdf/publikationen/berichte/TAB-Arbeitsberichtab141.pdf. Accessed 26 Jan 2017.
  26. Powell, W. W., & Snellman, K. (2004). The knowledge economy. Annual Review of Sociology, 30(1), 199–220.CrossRefGoogle Scholar
  27. Reinhold, T. (2016). Die Bundeswehr zieht ins Cyberfeld. Blätter für deutsche und. Internationale Politik, 7(16), 17–20.Google Scholar
  28. Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5–32.CrossRefGoogle Scholar
  29. Rooney, D., Hearn, G., & Ninan, A. (Eds.). (2005). Handbook on the knowledge economy. Cheltenham: Edward Elgar Publishing.Google Scholar
  30. Scahill, J. (2015). Germany is the tell-tale heart of America’s drone war, The Intercept. https://theintercept.com/2015/04/17/ramstein/. Accessed 21 July 2016.
  31. Schmitt, M. N. (2013). Tallinn-manual on the international law applicable to cyber warfare. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  32. Schneier, B. (2012). Liars & Outliers. In Enabling the trust that society needs to thrive. Indianapolis: Wiley & Sons.Google Scholar
  33. Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford: Oxford University Press.Google Scholar
  34. Stiennon, R. (2010). Surviving cyberwar. Lanham: Government Institutes.Google Scholar
  35. Stiennon, R. (2015). There will be cyberwar: How the move to network-centric war fighting has set the stage for cyberwar. Birmingham: IT-Harvest Press.Google Scholar
  36. Tallinn Manual. Wikipedia entry, https://en.wikipedia.org/wiki/Tallinn_Manua/Tallinn_Manual. Accessed 24 July 2016.
  37. Ventre, D. (Ed.). (2011). Cyberwar and information warfare. London/Hoboken: Wiley-ISTE.Google Scholar
  38. Ventre, D. (2016). Information warfare (2nd ed.). London/Hoboken: Wiley-ISTE.CrossRefGoogle Scholar
  39. Zimmermann, A. (2013). Es gibt keinen rechtsfreien Raum (Interview). Internationale Politik, 68(3), 26–31.Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Stefan Hügel
    • 1
  • Hans-Jörg Kreowski
    • 2
  • Dietrich Meyer-Ebrecht
    • 3
  1. 1.Forum Computer Professionals for Peace and Social Responsibility (FIfF)BremenGermany
  2. 2.Computer Science DepartmentUniversity of BremenBremenGermany
  3. 3.RWTH Aachen, Institute of Imaging and Computer VisionAachenGermany

Personalised recommendations