Open Access. Powered by Scholars. Published by Universities.®

Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Political Science

An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh Apr 2018

An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh

Electronic Theses and Dissertations

Research into the international agreements that increase cooperation over cybersecurity challenges is severely lacking. This is a necessary next step for bridging diplomatic challenges over cybersecurity. This work aspires to be push the bounds of research into these agreements and offer a tool that future researchers can rely on. For this research I created, and made publicly available, the International Cybersecurity Cooperation Dataset (ICCD), which contains over 350 international cybersecurity agreements and pertinent metadata. Each agreement is marked per which subtopics within cybersecurity related agreements it covers. These typologies are:

  • Discussion and Dialogue

  • Research

  • Confidence Building Measures

  • Incident Response

  • Crime ...


Failed Cyberdefense - The Environmental Consequences Of Hostile Acts, Jan Kallberg, Rosemary A. Burk May 2014

Failed Cyberdefense - The Environmental Consequences Of Hostile Acts, Jan Kallberg, Rosemary A. Burk

Jan Kallberg

A failed cyberdefense can have wider effects than discussed in earlier debates of potential consequences of a cyberattack. The need for cyberdefense to protect the environment has not drawn the attention it deserves as a national security matter. Adversarial nations are covertly pursuing methods to damage and disrupt the United States in a cyberconflict in the future. The president of the United States noted this in Sustaining U.S. Global Leadership: Priorities for 21st Century Defense: Both state and non-state actors possess the capability and intent to conduct cyberespionage and, potentially, cyberattacks on the United States, with possible severe effects ...


Cyber Power Restrained: How Strategic Culture Inhibits The Integration Of Cyber Weapons By The United States Military, David Matthew Bisson Jan 2014

Cyber Power Restrained: How Strategic Culture Inhibits The Integration Of Cyber Weapons By The United States Military, David Matthew Bisson

Senior Projects Spring 2014

This article seeks to reconcile the support status of cyber power in the United States military with the seriousness of the cyber threat confronting the nation. It rejects the argument that cyber weapons are not useful and are not traditional “weapons” by drawing parallels between cyber power and military force in the physical domains, as well as revealing how some of the most prominent issues in cybersecurity are political and not technological in nature. The article proposes strategic culture as an alternative explanation for U.S. cyber power’s current status. By studying the case studies of American air and ...


Cyber Attack: A Dull Tool To Sharpen Foreign Policy, Emilio Iasiello Jun 2013

Cyber Attack: A Dull Tool To Sharpen Foreign Policy, Emilio Iasiello

Emilio Iasiello

This paper examines how cyber attacks, if indeed conducted by nation states, have been unsuccessful in supporting states' foreign policy objectives. By analyzing three prominent case studies, I show that as a result of geopolitical tensions, cyber attacks were implemented to further nation state objectives in support of foreign policy considerations and failed to achieve their respective outcomes despite successful deployment against their intended targets. The three case studies, hypothetical scenarios because attribution has not been confirmed, include: (1) the October 2012 distributed denial of service attacks targeting the U.S. banking sector; (2) the 2012 Stuxnet attack against Iran ...


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a ...


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future ...


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China ...


Designer Satellite Collisions From Covert Cyber War, Jan Kallberg Feb 2012

Designer Satellite Collisions From Covert Cyber War, Jan Kallberg

Jan Kallberg

Outer space has enjoyed two decades of fairly peaceful development since the Cold War, but once again it is becoming more competitive and contested, with increased militarization. Therefore, it is important the United States maintain its space superiority to ensure it has the capabilities required by modern warfare for successful operations. Today is different from earlier periods of space development,1 because there is not a blatantly overt arms race in space,2 but instead a covert challenge to US interests in maintaining superiority, resilience, and capability. A finite number of states consider themselves geopolitical actors; however, as long as ...