Cyber Power: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
 
(11 intermediate revisions by 2 users not shown)
Line 8: Line 8:


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Nye:2010&f=wikibiblio.bib ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Nye:2010&f=wikibiblio.bib ''BibTeX'']


==Categorization==
==Categorization==
Line 14: Line 13:
* Threats and Actors: [[States]]
* Threats and Actors: [[States]]
* Issues: [[Cyberwar]], [[Espionage]]
* Issues: [[Cyberwar]], [[Espionage]]
* Approaches: [[International Law (including Laws of War)
* Approaches: [[International Law (including Laws of War)]]
]]


==Key Words==  
==Key Words==  
 
[[Keyword_Index_and_Glossary_of_Core_Ideas#Botnet | Botnet]],
SCADA systems, laws of war, communications privacy Law, intelligence infrastructure/information infrastructure, botnets, malware
[[Keyword_Index_and_Glossary_of_Core_Ideas#Communications_Privacy_Law | Communications Privacy Law]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacktivist | Hacktivist]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Intelligence_Infrastructure/Information_Infrastructure | Intelligence Infrastructure/Information Infrastructure]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Malware | Malware]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#SCADA_Systems | SCADA Systems]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Script_Kiddie | Script Kiddie]]


==Synopsis==
==Synopsis==
Line 26: Line 29:


==Additional Notes and Highlights==
==Additional Notes and Highlights==
Expertise Required: Technology - Low; Policy - Low


This paper provides a historical perspective on the geopolitical consequences of the ICT revolution and discusses the differences and similarities of cyberspace with other spaces for state conflicts, such as seas, air.  
This paper provides a historical perspective on the geopolitical consequences of the ICT revolution and discusses the differences and similarities of cyberspace with other spaces for state conflicts, such as seas, air.  
Line 31: Line 35:
It then moves on to analyze the power relations between nation states in cyberspace, and the growing power of non-state actors (corporations, smaller-scale/criminal organizations) in the cyberspace, and reflects on the application of laws of wars to cyber conflicts.  
It then moves on to analyze the power relations between nation states in cyberspace, and the growing power of non-state actors (corporations, smaller-scale/criminal organizations) in the cyberspace, and reflects on the application of laws of wars to cyber conflicts.  


"Cyberspace will not replace geographical space and will not abolish state sovereignty, but the diffusion of power in cyberspace will coexist and greatly complicate what it means to exercise power along each of these dimensions." (p. 3)
"''Cyberspace will not replace geographical space and will not abolish state sovereignty, but the diffusion of power in cyberspace will coexist and greatly complicate what it means to exercise power along each of these dimensions.''" (p. 3)


'''Outline:'''
'''Outline:'''

Latest revision as of 15:43, 10 August 2010

Full Title of Reference

Cyber Power

Full Citation

Joseph S. Nye, Cyber Power, Belfer Center for Science and International Affairs, Harvard Kennedy School (2010). Web

BibTeX

Categorization

Key Words

Botnet, Communications Privacy Law, Hacktivist, Intelligence Infrastructure/Information Infrastructure, Malware, SCADA Systems, Script Kiddie

Synopsis

Power depends upon context, and the rapid growth of cyber space is an important new context in world politics. The low price of entry, anonymity, and asymmetries in vulnerability means that smaller actors have more capacity to exercise hard and soft power in cyberspace than in many more traditional domains of world politics. Changes in information has always had an important impact on power, but the cyber domain is both a new and a volatile manmade environment. The characteristics of cyberspace reduce some of the power differentials among actors, and thus provide a good example of the diffusion of power that typifies global politics in this century. The largest powers are unlikely to be able to dominate this domain as much as they have others like sea or air. But cyberspace also illustrates the point that diffusion of power does not mean equality of power or the replacement of governments as the most powerful actors in world politics.

Additional Notes and Highlights

Expertise Required: Technology - Low; Policy - Low

This paper provides a historical perspective on the geopolitical consequences of the ICT revolution and discusses the differences and similarities of cyberspace with other spaces for state conflicts, such as seas, air.

It then moves on to analyze the power relations between nation states in cyberspace, and the growing power of non-state actors (corporations, smaller-scale/criminal organizations) in the cyberspace, and reflects on the application of laws of wars to cyber conflicts.

"Cyberspace will not replace geographical space and will not abolish state sovereignty, but the diffusion of power in cyberspace will coexist and greatly complicate what it means to exercise power along each of these dimensions." (p. 3)

Outline:

 Abstract
 Information and Power Diffusion
 Power
 Cyber Power
 Actors and their Relative Power Resources
 Google and China
 Governments and Governance
 Conclusion