THE DYNAMICS OF CYBERSPACE AND NATIONAL POWER: CONTINUITY AND CHANGE

Authors

  • Khaled M. Khan Department of Computer Science and Engineering, College of Engineering, Qatar University, Doha, Qatar

Keywords:

Cyberspace, cybersecurity, cyberpower, cyber warfare, cyber strategy, national power

Abstract

This paper attempts to provide policymakers with an overview of cyberspace in support of their national power and national security preparedness. In this regard, it presents foundational issues and the dynamic nature of cyberspace that decision-makers often need to deal with in their policy-making process. It discusses the main building blocks of the topic and analyses how nation-states can effectively utilize cyberpower in cyberspace as an instrument of national power. The paper outlines the critical challenges posed as well as opportunities provided by cyberspace that developing countries can explore to consolidate national power. It finally proposes a set of recommendations with national cyber defensive and offensive protocols for nation-states such as Bangladesh.

Downloads

Download data is not yet available.

References

Andress, J., Winterfeld, S., & Ablon, L. (2014). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Second edition, Elsevier, The Netherlands.

Breene, K. (2016). Who are the cyberwar superpowers? World Economic Forum. [Online] Available at: https://www.weforum.org/agenda/2016/05/who-are-the-cyberwar-superpowers (Accessed: July 30, 2020).

Coughlan, S. (2003). Is there a common understanding of what constitutes cyber warfare? The University of Birmingham School of Politics and International Studies.

CSIS. (2020). Significant Cyber Incidents. Center for Strategic and International Studies. [Online] Available at: https://www.csis.org/programs/technology-policy-program/significant-cyber-incidents (Accessed: September 11, 2020).

Dzieza, J. (2014). A history of metaphors for the internet. The Verge. August 20. [Online] Available at: https://www.theverge.com/2014/8/20/6046003/a-history-of-metaphors-for-the-internet (Accessed: September 11, 2020).

Fish, D. (2018). Warner: U.S. Needs a New Doctrine in Cyberspace. Decipher. [Online] Available at: https://duo.com/decipher/warner-us-needs-a-new-doctrine-in-cyberspace (Accessed: July 20, 2020).

Gibson, W. (1984). Neuromancer. Publisher ACE.

Janes. (2020). US Air Force performs first Advanced Battle Management System demonstration. Janes. [Online] Available at: https://www.janes.com/defence-news/news-detail/us-air-force-performs-first-advanced-battle-management-system-demonstration (Accessed: July 24, 2020).

JCS. (2016). Dictionary of Military and Associated Terms (JP 3-0), Joint Chiefs of Staff, Joint Publication 1-02, Department of Defense, Washington D.C. Amended. on 15 February 2016. [Online] Available at: https://fas.org/irp/doddir/dod/jp1_02.pdf (Accessed: July 17, 2020).

Janczewski, L. & Colarik, A. (2007). Cyber Warfare and Cyber Terrorism, Hershey, Idea Group Inc.

Kaspersen, A. (2015). Cyberspace: the new frontier in warfare. World Economic Forum.

Kramer, F., Starr, S., Wentz, L. (2009). Cyberpower and National Security. National Defense University Press. USA.

Kuehl, D. (2009). From Cyberspace to Cyberpower: Defining the Problem. Kramer, D., Starr, S., & Wentz, L. Eds Cyberpower and National Security.

Laudrain, A. (2019). France’s New Offensive Cyber Doctrine. The Lawfare Institute, Brookings. [Online] Available at: https://www.lawfareblog.com/frances-new-offensive-cyber-doctrine (Accessed: July 23, 2020).

Liang, Q, Xiangsui, W. (1999). Unrestricted Aarfare. People’s Liberation Army (PLA). Literature and Arts Publishing House, Beijing.

Lewis, J. & Timlin, K. (2011). Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization. Center for Strategic and International Studies. Washington D.C., CSIS, UNIDIR.

Lykke, A. (1989). Defining Military Strategy. In Military Review. US Army Command and General Staff College.

McConnell, B. (2017). Tomorrow’s Challenge: Cooperation in the Cyber Realm. EastWest Institute. [Online] Available at: https://www.eastwest.ngo/idea/tomorrow’s-challenge-cooperation-cyber-realm (Accessed: July 13, 2020).

Pomerleau, M. (2018). DoD releases first new cyber strategy in three years. Fifthdomain. [Online] Available at: https://www.fifthdomain.com/dod/2018/09/19/department-of-defense-unveils-new-cyber-strategy (Accessed: July 17, 2020).

Rattray, G. (2009). An Environmental Approach to Understanding Cyberpower. In Cyberpower and National Security, Franklin D. Kramer. Stuart H. Starr & Larry K. Wentz, eds., Dullas, VA, Potomac Books.

Robinson, N., Gribbon, L., Horvath, V., Cox, K. Rand. (2013). Cyber-security threat characterization –A rapid comparative analysis. Rand Corporation.

Schreier, F. (2015). On Cyberwarfare. 2015 DCAF Horizon Working Paper No. 7.

Taillat, S. (2019). Signalling, Victory, and Strategy in France’s Military Cyber Doctrine. War on The Rocks. [Online] Available at: https://warontherocks.com/2019/05/signaling-victory-and-strategy-in-frances-military-cyber-doctrine (Accessed: July 14, 2020).

UNIDIR. (2011). Cyber security and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization. Center for Strategic and International Studies.

Weber, R. (2018). Revised DoD cyber doctrine highlights limits to U.S. powers. Inside Defense. [Online] Available at: https://insidedefense.com/insider/revised-dod-cyber-doctrine-highlights-limits-us-powers (Accessed: July 23, 2020).

White, H. (1994). The Role of Information Intermediaries and the Superhighway. In Information Superhighway: The Role of Librarians, Information Scientists, and Intermediaries. Helal, A., Weiss, J, Eds. Essen University Library.

Wingfield, T. (2000). The Law of Information Conflict: National Security Law in Cyberspace. Aegis Research Corporation.

Published

2020-10-28

How to Cite

Khan, K. M. . (2020). THE DYNAMICS OF CYBERSPACE AND NATIONAL POWER: CONTINUITY AND CHANGE. NDC E-JOURNAL, 1(1), 50-67. Retrieved from https://ndcjournal.ndc.gov.bd/ndcj/index.php/ndcj/article/view/283

Issue

Section

ARTICLES