PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Militarization of cyber space and multidimensionality of security

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The development of theoretical foundations for computer networks and their practical implementation has given rise to the progressive computerization of armed activities. The idea of a communication medium resistant to a nuclear attack, which was developed in the late sixties of the twentieth century in the form of the ARPANET, affects strategic, operational and tactical dimensions of the modern battlefield. It is also an important element shaping the processes related to ensuring the security of the state, both in the internal dimension as well as in dealings with other actors of international relations. Multi-layeredness and the growing complexity of cyber space cause that cyber security policy has been placed not only in the context of critical infrastructure, but also all the aspects of ethical and legal issues are taken into account. The armed forces have become an integral part of the information society, and as such, have been increasingly influenced by the civil sphere. The militarization of cyber space results directly from increasing saturation of the state structure with ICT technologies and the growing importance of these components in the process of ensuring security. The wide access to ICT generates a new threat to the defense system, including the armed forces. The ability of the digital impact on the military sphere, evidenced by many non-state actors, is today the main reason for implementing regulations restricting the activity of citizens in the global network.
Twórcy
autor
  • Center for Eastern Studies, Institute of International Studies, University of Wrocław
Bibliografia
  • 1. Alberts D. S., Information Age Transformation: Getting to a 21st Century Military, CCRP: Washington 1996.
  • 2. Aleksa K. (red.), Ką turime žinoti apie pasirengimą ekstremaliosioms situacijoms ir karo metui, Krašto apsaugos ministerija, Vilnius 2014.
  • 3. Barlow J. P., A Declaration of the Independence of Cyberspace, [online]. Available on the Internet: https://projects.eff.org/~barlow/Declaration-Final.html, [available: 13.01.2015].
  • 4. Barlow J. P., Selling Wine Wirhout Bottles: The Economy of Mind on the Global Net, [online]. Available on the Internet: https://w2.eff.org/Misc/Publi cations/John_Perry_ Barlow/HTML/idea_economy_article.html. [available: 16.01.2015].
  • 5. Boyle J., Foucault in cyberspace: surveillance, sovereignty, and hardwired censors, [in:] University of Cincinnati Law Review, vol. 66 (1997), p. 177-205.
  • 6. Brönnimann G. i in., CRN REPORT Focal Report 6. Assessing Threats in Cyberspace: Interrogating methodological approaches & the challenges of today’s complex risk environment, Center for Security Studies (CSS), ETH Zurich, Zurich 2011, [online]. Available on the Internet: http://www.css.ethz.ch/ publications/pdfs/Focal-Report-6-Cyber-Security.pdf. [available: 13.01.2015].
  • 7. Buzan B., Wæver O., De Wilde J., Security: A New Framework for Analysis, Rienner, Boulder 1998.
  • 8. Cavelty M. D., Cyber war: concept, status quo, and limitations, [in:] CSS Analysis in Security Policy, no. 71(4), 2010, p. 1-3, [online]. Available on the Internet: http://www.css.ethz.ch/publications/pdfs/CSS-Analyses-71.pdf, [available: 31.01.2015]
  • 9. Cavelty M. D., The militarisation of cyber security as a source of global tension, [in:] Möckli D. (ed.), Strategic trends 2012. Key Developments in Global Affairs, Center for Security Studies ETH Zurich, Zurich 2012, p. 103-124.
  • 10. Cavelty M. D., The Militarisation of Cyberspace: Why Less May Be Better, [in:] Czosseck C., Ottis R., Ziolkowski K. (ed.), 2012 4th International Conference on Cyber Conflict, CCDCOE, Tallin 2012, p. 141-153.
  • 11. Cavelty M. D., Rolofs O., Cyber war hype, [online]. Available on the Internet: http://www.the-atlantic-times.com/index.php?option=com_content&view=article &id=485:cyber-war-hype-&catid=25:politics&Itemid=2, [available: 13.01.2015]
  • 12. Cimbala S. J., Nuclear Weapons in the Information Age, Continuum International Pub. Group, London & New York 2012.
  • 13. Clarke R. A., Knake R., Cyber war: The Next Threat to National Security and What to Do About It, Ecco, New York 2010.
  • 14. Colby E., Cyber war and the Nuclear Option, [in:] The National Interest, June 24, 2013 [online]. Available on the Internet: http://nationalinterest.org/commentary/ cyber war-the-nuclear-option-8638, [available: 17.01.2015].
  • 15. Cybersecurity lobbying doubled in 2012, [online]. Available on the Internet: http://money.cnn.com/2013/04/08/technology/security/cybersecurity-lobbying/, [available: 12.01.2015].
  • 16. Denett S., Feinler E. J., Perillo F. (ed.), Arpanet information brochure, DDN Network Information Center, SRI International, Menlo Park 1985.
  • 17. Elgot J., Islamic State Beheading Video Watchers Get Arrest Warning From Met Police, [in:] The Huffington Post, 21 August 2014, [online]. Available on the Inter-net:http://www.huffingtonpost.co.uk/2014/08/20/watch-james-foleys-beheading -online-and-you-could-get-arrested_n_5694871.html, [available: 17.01.2015]
  • 18. Farrell N., US defence industry calls for more spending on cyber-warfare, [in:] The Inquirer, 17 February 2010, [online]. Available on the Internet: http://www.theinquirer.net/inquirer/news/1592237/us-defence-industry-calls-spending-cyber-warfare, [available: 12.01.2015].
  • 19. Fijałkowski Ł, Teoria sekurytyzacji i konstruowanie bezpieczeństwa, [in:] "Przegląd Strategiczny", no. 1 (2012), p. 149-161.
  • 20. Goodman W., Cyber Deterrence Tougher in Theory than in Practice?, [in:] Strategic Studies Quarterly, vol. 4(3) 2010, p. 102-135.
  • 21. Heller K. J., Does the Tallinn Manual Allow States to Kill Hackers? Not Really, [online]. Available on the Internet: http://opiniojuris.org/2013/03/25/does-the-tallin-manual-allow-states-to-kill-hackers-not-really/, [available: 21.01.2015].
  • 22. Hongsheng S., The Evolution of Law of War, [in:] Chinese Journal of International Politics” vol. 1(2), 2006, p. 267-301.
  • 23. Krupsky S., Israel's military censor to monitor Facebook, Twitter, blogs, [in:] Haaretz, 2 May 2012, [online]. Available on the Internet: http://www.haaretz.com/ news/diplomacy-defense/israel-s-military-censor-to-monitor-facebook-twitter-blogs- 1.427769, [available: 23.01.2015].
  • 24. Lessig L., The constitution of code: limitations on choicebased critiques of cyber-space regulation, Commlaw Conspectus: Journal of Communications Law and Technology Policy, vol.5, 1997, p. 181-191.
  • 25. Prigg M., Google glass for war: The US military funded smart helmet that can beam information to soldiers on the battlefield, [in:] Daily Mail, 27 May 2014, [online]. Avail-able on the Internet: http://www.dailymail.co.uk/ sciencetech/article-2640869/ Google-glass-war-US-military-reveals-augmented-reality-soldiers.html, [available: 31.01.2015].
  • 26. Rid T., Cyber war and Peace. Hacking Can Reduce Real-World Violence, [in:] Foreign Affairs, November/December 2013, [online]. Available on the Internet: http://www.foreignaffairs.com/articles/140160/thomas-rid/cyberwar-and-peace, [available: 31.01.2015].
  • 27. Schmitt M. N. (ed.), Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge University Press, New York 2013.
  • 28. Skrzypek E., Wiedza i praktyka, [in:] A. Szewczyk, Dylematy cywilizacji informatycznej, PWE, Warszawa 2004, p. 97-135.
  • 29. Wellen R., Cyber war and Nuclear War: the Most Dangerous of All Conflations, [online]. Available on the Internet: http://fpif.org/cyber war-and-nuclear-war-the-most-dangerous-of-all-conflations/, [available: 15.01.2015].
  • 30. Platform for Internet Content Selection, [online]. Available on the Internet: http://www.w3.org/PICS/, [available: 13.01.2015].
  • 31. Protocol for Web Description Resources (POWDER) Working Group, [online]. Available on the Internet: http://www.w3.org/2007/powder/, [available: 13.01.2015].
  • 32. Thai military seeks Facebook, Google cooperation with censorship, [online]. Available on the Internet: http://www.reuters.com/article/2014/05/29/thailand-politics-censorship-idUSL3N0OF26B20140529, [available: 23.01.2015].
  • 33. Bradley Manning given 35-year prison term for passing files to WikiLeaks, [online]. Available on the Internet: http://www.theguardian.com/world/2013/aug/21/ bradley-manning-35-years-prison-wikileaks-sentence, [available: 23.01.2015].
  • 34. Cybersecurity: Tech firms urged to share data with US, [online]. Available on the Internet: http://www.bbc.com/news/technology-31440978, [available: 15.02.2015].
  • 35. DARPA Goal for Cybersecurity: Change the Game, [online]. Available on the Internet: https://www.dvidshub.net/news/62356/darpa-goal-cybersecurity-change-ga me#.VONd3dpK_Wk, [available: 15.01.2015].
  • 36. Medieval Sourcebook: Tenth Ecumenical Council: Lateran II 1139, kanon 29., [online]. Available on the Internet: http://legacy.fordham.edu/halsall/basis /later an2.asp, [available: 23.01.2015].
  • 37. Mikko Hypponen - The Cyber Arms Race, [online]. Available on the Internet: https://www.youtube.com/watch?v=UUoi5-otFBE, [available: 31.01.2011].
  • 38. U.S. Officials Warn of Global Cyber Arms Race, [online]. Available on the Internet: http://www.ciozone.com/index.php/Security/U.S.-Officials-Warn-of-Global-Cyber-Arms-Race.html, [available: 23.01.2015].
  • 39. What caused Sony hack: What we know now, [online]. Available on the Internet: http://money.cnn.com/2014/12/24/technology/security/sony-hack-facts/, [avail-able: 31.01.2015].
  • 40. What is ICRA®?, [online]. Available on the Internet: https://www.fosi.org/icra/, [available: 13.01.2015].
Uwagi
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-76a853bc-2e6d-4690-af81-ac78718d27f3
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.