Open Access. Powered by Scholars. Published by Universities.®

International Relations

Cyber Operations

Publication Year

Articles 1 - 6 of 6

Full-Text Articles in Policy Design, Analysis, and Evaluation

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a ...


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future ...


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced ...


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los ...


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As ...


Designer Satellite Collisions From Covert Cyber War, Jan Kallberg Feb 2012

Designer Satellite Collisions From Covert Cyber War, Jan Kallberg

Jan Kallberg

Outer space has enjoyed two decades of fairly peaceful development since the Cold War, but once again it is becoming more competitive and contested, with increased militarization. Therefore, it is important the United States maintain its space superiority to ensure it has the capabilities required by modern warfare for successful operations. Today is different from earlier periods of space development,1 because there is not a blatantly overt arms race in space,2 but instead a covert challenge to US interests in maintaining superiority, resilience, and capability. A finite number of states consider themselves geopolitical actors; however, as long as ...