{"title":"Cyberwarfare and Cybersecurity","authors":"C. Weiss","doi":"10.1093/oso/9780190946265.003.0011","DOIUrl":null,"url":null,"abstract":"Information warfare is part of the technology-based challenge by China and Russia to the post–World War II liberal order. Russia uses traditional and social media in a long-range, systematic, worldwide disinformation campaign to undermine Western democracies and alliances and the idea of objective truth. China seeks to dominate the technology, management, and policy of the future Internet through its competitive 5G technology, so as to surpass the United States politically and technologically. It exports the techno-authoritarian system of mass surveillance and artificial intelligence that it developed to control its Uyghur minority. Like a nuclear attack, a large-scale cyberattack could spiral out of control into a cyber-apocalypse in the absence of agreed guidelines. But to authoritarian governments, the free flow of information is also a form of cyberattack, complicating negotiations. It is critically important to develop internationally agreed norms for cyberwarfare, building on the Tallinn Manual and similar efforts. This will take time.","PeriodicalId":194094,"journal":{"name":"The Survival Nexus","volume":"136 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Survival Nexus","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oso/9780190946265.003.0011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Information warfare is part of the technology-based challenge by China and Russia to the post–World War II liberal order. Russia uses traditional and social media in a long-range, systematic, worldwide disinformation campaign to undermine Western democracies and alliances and the idea of objective truth. China seeks to dominate the technology, management, and policy of the future Internet through its competitive 5G technology, so as to surpass the United States politically and technologically. It exports the techno-authoritarian system of mass surveillance and artificial intelligence that it developed to control its Uyghur minority. Like a nuclear attack, a large-scale cyberattack could spiral out of control into a cyber-apocalypse in the absence of agreed guidelines. But to authoritarian governments, the free flow of information is also a form of cyberattack, complicating negotiations. It is critically important to develop internationally agreed norms for cyberwarfare, building on the Tallinn Manual and similar efforts. This will take time.