Cyberwarfare and Cybersecurity

C. Weiss
{"title":"Cyberwarfare and Cybersecurity","authors":"C. Weiss","doi":"10.1093/oso/9780190946265.003.0011","DOIUrl":null,"url":null,"abstract":"Information warfare is part of the technology-based challenge by China and Russia to the post–World War II liberal order. Russia uses traditional and social media in a long-range, systematic, worldwide disinformation campaign to undermine Western democracies and alliances and the idea of objective truth. China seeks to dominate the technology, management, and policy of the future Internet through its competitive 5G technology, so as to surpass the United States politically and technologically. It exports the techno-authoritarian system of mass surveillance and artificial intelligence that it developed to control its Uyghur minority. Like a nuclear attack, a large-scale cyberattack could spiral out of control into a cyber-apocalypse in the absence of agreed guidelines. But to authoritarian governments, the free flow of information is also a form of cyberattack, complicating negotiations. It is critically important to develop internationally agreed norms for cyberwarfare, building on the Tallinn Manual and similar efforts. This will take time.","PeriodicalId":194094,"journal":{"name":"The Survival Nexus","volume":"136 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Survival Nexus","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oso/9780190946265.003.0011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Information warfare is part of the technology-based challenge by China and Russia to the post–World War II liberal order. Russia uses traditional and social media in a long-range, systematic, worldwide disinformation campaign to undermine Western democracies and alliances and the idea of objective truth. China seeks to dominate the technology, management, and policy of the future Internet through its competitive 5G technology, so as to surpass the United States politically and technologically. It exports the techno-authoritarian system of mass surveillance and artificial intelligence that it developed to control its Uyghur minority. Like a nuclear attack, a large-scale cyberattack could spiral out of control into a cyber-apocalypse in the absence of agreed guidelines. But to authoritarian governments, the free flow of information is also a form of cyberattack, complicating negotiations. It is critically important to develop internationally agreed norms for cyberwarfare, building on the Tallinn Manual and similar efforts. This will take time.
网络战与网络安全
信息战是中国和俄罗斯以技术为基础挑战二战后自由秩序的一部分。俄罗斯利用传统媒体和社交媒体,在全球范围内进行长期、系统的虚假信息宣传,破坏西方民主国家和联盟,以及客观真理的理念。中国试图通过其具有竞争力的5G技术,主导未来互联网的技术、管理和政策,从而在政治和技术上超越美国。它输出了大规模监控和人工智能的技术专制系统,这是它为控制维吾尔少数民族而开发的。就像核攻击一样,如果没有商定的指导方针,大规模网络攻击可能会失控,演变成一场网络灾难。但对威权政府来说,信息的自由流动也是一种网络攻击,使谈判复杂化。在《塔林手册》和类似努力的基础上,制定国际商定的网络战规范至关重要。这需要时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信