Information technology and military power
In: Cornell studies in security affairs
35 Ergebnisse
Sortierung:
In: Cornell studies in security affairs
In: Journal of peace research, Band 61, Heft 1, S. 87-102
ISSN: 1460-3578
Most cyber intrusions are a form of intelligence rather than warfare, but intelligence remains undertheorized in international relations (IR). This article develops a theory of intelligence performance at the operational level, which is where technology is most likely to affect broader political and military outcomes. It uses the pragmatic method of abduction to bootstrap general theory from the historical case of Bletchley Park in World War II. This critical case of computationally enabled signals intelligence anticipates important later developments in cybersecurity. Bletchley Park was uncommonly successful due to four conditions drawn from contemporary practice of cryptography: radio networks provided connectivity; German targets created vulnerability; Britain invested in bureaucratic organization; and British personnel exercised discretion. The method of abduction is used to ground these particular conditions in IR theory, revisit the evaluation of the case, and consider historical disanalogies. The result is a more generalizable theory that can be applied to modern cybersecurity as well as traditional espionage. The overarching theme is that intelligence performance in any era depends on institutional context more than technological sophistication. The political distinctiveness of intelligence practice, in contrast to war or coercive diplomacy, is deceptive competition between rival institutions in a cooperatively constituted institutional environment. Because cyberspace is highly institutionalized, furthermore, intelligence contests become pervasive in cyberspace.
In: Intelligence and national security, Band 36, Heft 2, S. 260-278
ISSN: 1743-9019
In: Perspectives on politics, Band 18, Heft 1, S. 336-337
ISSN: 1541-0986
In: Security studies, Band 29, Heft 2, S. 335-361
ISSN: 1556-1852
In: Perspectives on politics, Band 16, Heft 4, S. 1139-1141
ISSN: 1541-0986
In: Science, technology, & human values: ST&HV, Band 42, Heft 6, S. 1061-1099
ISSN: 1552-8251
In: Perspectives on politics, Band 14, Heft 4, S. 1275-1277
ISSN: 1541-0986
In: New perspectives quarterly: NPQ, Band 32, Heft 3, S. 17-21
ISSN: 1540-5842
In: International security, Band 39, Heft 3, S. 7-47
ISSN: 1531-4804
Exaggerated fears about the paralysis of digital infrastructure and the loss of competitive advantage contribute to a spiral of mistrust in U.S.-China relations. In every category of putative Chinese cyber threat, there are also considerable Chinese vulnerabilities and Western advantages. China has inadvertently degraded the economic efficiency of its networks and exposed them to foreign infiltration by prioritizing political information control over technical cyber defense. Although China also actively infiltrates foreign targets, its ability to absorb stolen data is questionable, especially at the most competitive end of the value chain, where the United States dominates. Similarly, China's military cyber capacity cannot live up to its aggressive doctrinal aspirations, even as its efforts to guide national information technology development create vulnerabilities that more experienced U.S. cyber operators can attack. Outmatched by the West, China is resorting to a strategy of international institutional reform, but it benefits too much from multistakeholder governance to pose a credible alternative. A cyber version of the stability-instability paradox constrains the intensity of cyber interaction in the U.S.-China relationship—and in international relations more broadly—even as lesser irritants continue to proliferate.
In: New perspectives quarterly: NPQ, Band 32, Heft 3, S. 17-21
ISSN: 0893-7850
In: International security, Band 39, Heft 3, S. 7-47
ISSN: 0162-2889
World Affairs Online
In: Security studies, Band 22, Heft 3, S. 365-404
ISSN: 1556-1852
In: The journal of strategic studies, Band 36, Heft 3, S. 422-453
ISSN: 0140-2390
World Affairs Online
In: Security studies, Band 22, Heft 3, S. 365-404
ISSN: 0963-6412
World Affairs Online