Thomas Rid's Militarization Of Cyber War

Improved Essays
The different worldviews, ideologies, or beliefs that exist in the real world, translate in cyberspace. For instance, Richard Clarke asserts that cyber war has already started, which sounds like a realist view. Conversely, Thomas Rid defends that cyber war will never occur, which appears very idealist. Others, like Martin Libicki argue that the current focus and fantasy about this topic is merely a temporary craze and that cyberspace is not even a war-fighting domain. Lastly, some pragmatics say that the cyber realm is a tool of which human should take advantage. The latter even anticipate an emergence of intelligence from the Internet that humans could and should then leverage.
This broad variety of opinions explains the perplexity that
…show more content…
This self-regulatory character materializes in the denial of weapons efficiency. Indeed, much more than in the real world, the effectiveness of the use of weapons, be they offensive or defensive, is far from certain in cyberspace. First, defensive weapons are not sure. Researching an ever-stronger protection, let alone an absolute one, is futile. Protections such as firewalls or antivirus require extensive programming and computing resources and, remain fallible. Probably the most striking example is that of the cyber-security company bankrupt by the activist group Anonymous. On a smaller scale, there is always somewhere an individual smart and stubborn enough to humble the most secure protective …show more content…
Indeed, cyberspace challenges the international order. Its global, borderless nature shakes the international regime dating from the Peace of Westphalia to such an extent that scholars, such as Nazli Choucri, claim that even the analytical tools of international politics are outdated and useless in the cyber era. From the communication of populations across the globe, civil society emerges as a new actor, which can lead to new political rules and systems. These self-regulatory actions show, to those who doubted, that humans are reactive, inventive, and can show solidarity, which, from a democratic perspective, is rather good news. The public authority that the military partly represents should, therefore, foster and not hinder these

Related Documents

  • Superior Essays

    The controversy of technology either having a positive or negative effect depends on the type of person. This controversy has existed from the early 1990’s, possibly earlier. (Pinker 1). The creation of various types of technology has brought on the fear of technology taking over and controlling people’s minds. No one really paid too much attention to the effect of technology until Carr wrote his article “Is Google Making Us Stupid?”.…

    • 1126 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The Cold War: How the Icy Rivalry Gave Us Fiery Technology Throughout history, we have experienced many technological influences, inventions, and innovations, many of which have changed the world and how we live in it. Our modern era depends on new, cutting-edge technology, but few look back to the origin. Some people believe that war brings new technology, since war motivates. Whether in the form of a theory, weapon, tool, or all three, the Cold War stands true to this and but this and played a major part in the advancement of our modern technological society by developing instruments for space exploration, bringing the advent of the internet, and upgrading operational capabilities of the computer.…

    • 881 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Thompson reports that with the increase of technology there has been an increase of ways to share ideas and opinions (352). One way this has benefited human society is, “Our social awareness is shifting, too, as we develop ESP-like ‘ambient awareness,’ a persistent sense of what others are doing and thinking” (Thompson 352). Simply put, the technology humanity has presently is making the population more aware of those around them. Because of the increased awareness that people have, they also have an expanded knowledge on foreign affairs, thus making conventional political problems, such as “pluralistic ignorance”, invalid (352). In other words, technology has a positive influence on humanity by making individuals more connected, thus allowing for political and social change to happen more quickly.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Hauser, Gerard “Vernacular Voices: The Rhetoric Publics and Public Spheres,” (Columbia: University of South Carolina Press, 1999). In an alternative view of the public sphere, the author discusses the idea of a rhetoric public sphere, which relies on discourse rather than economic class and face-to-face interaction. Similarly, one of the major differences between traditional physical public spheres and the Deep Web public sphere is that of discourse, which users rely on, and which follow many of the of the rhetoric properties of the author’s rhetoric public sphere. For example, the author discusses the permeable boundaries of rhetoric public spheres, and how people outside territorial groups can contribute to the discourse.…

    • 944 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Technology has the ability to diminish borders, lessen the time it takes to relay information, and bridge the gap between opposite sides of the world. The expansion of technology has called attention to the different experiences of citizens across the globe. It is possible the use of social technologies, like Facebook, Twitter, and Instagram, can open a window into the contrasting social and political systems within different countries. In “Democracy in Cyberspace: What Technology Can and Cannot Do for Us,” Ian Bremmer discusses the “Freedom Virus.” The “Freedom Virus” is the concept that the use of modern communication will encourage the democratization of the world.…

    • 1156 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Carl Von Clausewitz

    • 541 Words
    • 3 Pages

    Carl Von Clausewitz’s definition of an act of war substantiates particular state sponsored cyber-attacks as acts of war. Clausewitz’s definition requires cyber-attacks to meet three elements to elevate to the level of an act of war. Categorization of the perpetrator to determine the intent and nature of their attack is imperative in determining whether a cyber-attack meets Clausewitz’s definition. John Stone correctly advocated in “Cyber War Will Take Place!” that an act of force isn’t necessarily an act of violence when determining whether a cyber-attack is an act of war.…

    • 541 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Cyberwarfare In America

    • 242 Words
    • 1 Pages

    Looking at above, they are the some of important and critical target which comes under cyberwarfare in America. As the term cyberwarfare is not just only applicable to the inside activities of country itself thought it’s not limited to that; cyberwarfare also includes the attacks which are made by other nation. One of the most targeted nation among the countries is United States of America and the most of them comes from the China, including satellite in the space are also attacked by them, with supporting example “In January 2007, China used a grounded-based missile to destroy a defunct weather satellite in orbit some 500 miles above the earth’s surface” (Douglas, and Melik 138). In America, most of their services are depended on the satellites…

    • 242 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In today’s world the internet makes up a large portion of the way we get our news and keep in touch with family and friends. Some people believe that the new technology is a new tool used for conducting incivility. I have to disagree with these people on the thought that it does more good for this world than harm. I believe the use of internet and social media encourage civility in today’s society. Cyberbullying is a new form of bullying that has just recently come about from the use of internet and social media.…

    • 1126 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Past War Theory

    • 130 Words
    • 1 Pages

    I agree with your statement, “The United States needs to develop and employ policies, doctrine, tools, deterrent models, and rules of engagement against actors in cyberspace.” The AF is faced with writing the theory and doctrine for handling cyber-warfare, and defining which acts quantify as acts of war. Past war theory will help our AF make decisions, but cyberspace is not well covered in current warfare theory. The White House stated in 2011that the “United States will respond to hostile acts in cyberspace as we would to any other threat to our country.…

    • 130 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Ever since the world jumped into the realm of the the digital age with the creation of the internet in the early 90’s, many have pondered topics of free speech, expression, privacy, and censorship, and to what extent they apply to the internet. It is clear that the creators wanted an open, unrestricted access to their invention, but with the rise of extremist ideologies and harassment, many are questioning if organizations, companies, and governments should intervene to protect its users. From authoritarian regimes to libertarian republics, people across the globe currently have significantly different access to media and information through the internet. While some argue that censoring protects, helps others, and creates a better world for all, what ultimately happens is the gradual restriction of…

    • 641 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Unified Field Theory

    • 3066 Words
    • 12 Pages

    Strategic information security field has increased in the last from century from World War I, World War II and the current and post the Cold War. Obviously, the status quo changed with the end of the Cold War and the onset of the September 11th?s attacks on America, the strategic security field is now abuzz with what will come next. Among the strategic security analysts, we have seen that Huntington believes in future conflict, which is based on ?civilization? lines drawn on a variety of geographic, religious beliefs and ethnicities among others. Each of these modern social scientists has created concepts from the past and present, as well as future paradigm shifts of how international security will evolve.…

    • 3066 Words
    • 12 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    The Dell Theory

    • 1283 Words
    • 6 Pages

    While the internet can be used as ways to outsource products or get connected with other nations, it can also be a harmful way to get connected. For global supply chains it can be a helpful resource and a way for countries to communicate and interact. For mutant supply chains it is a dangerous tool. This is also a limit to the way the flat world is used. Mutant supply chains like al Qaeda can use the internet to show off their harmful ways and to get other people to be apart of what they stand for.…

    • 1283 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays