LECTURE PRESENTATION FOR Thomas Rid, Cyberwar will not take place Manjikian 2016 1.

Slides:



Advertisements
Similar presentations
Teen Dating Violence. What is dating violence? It is what happens in a teen dating relationship when one person uses physical, emotional, or sexual abuse.
Advertisements

Just War Theory.
Gallup Q12 Definitions Notes to Managers
Max Weber: “The Types of Legitimate Domination”
AMA National Alcohol Summit 2014 Domestic Violence and the intersection of alcohol from a front-line service perspective.
Application of Ethical Reasoning
WHAT IS AUDIENCE AWARENESS? Audience awareness means knowing your audience. It means knowing WHO you are trying to convince and HOW to convince them.
Introduction to Ethics Lecture 8 Moore’s Non-naturalism
Prof. Dr. T.D. Gill University of Amsterdam & Netherlands Defence Academy.
Natural Law Theological Ethics. Natural Law Two approaches to Theological Ethics Natural Law and Divine Command.
CyberEthics Essay Outline
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
How to Write an Argumentative Essay: Common Core Style! It all comes down to 5 letters: CERCA!
Wars Games By: Chris Hill. What is a Cyberwar? Cyberwar is a type of warfare that is all electronic attach instead of a physical attack which involves.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
Cyber-Warfare: The Future is Now!
Chapter Eleven Political Crime and Terrorism. Political Crime Since 9/11 political crime and terrorism have become important areas of criminological inquiry.
Hoggie Lee, I Sogang GSIS. ◈ Question *The most frequently cited dictum of Clausewitz is his assertion that war is an extension of politics by other.
Employee Engagement Survey
Chapter 5 Mental and Emotional Health Day 3 Lessons 5 & 6.
Looking after the Mentor
17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
AFTERNOON CONSTRUCTED RESPONSE PROMPT: Why do people stay in bullying, sexually-harassing, or abusive relationships? Why don’t they just leave or break.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Military Ethics in the New Millennium
Making a Great Planning Process Thinking about Outcomes in Four steps:-- new ways of relating to achieve a new relationship and a fully owned personal.
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Terrorism. Learning Topics Introduction Terrorism/Acts of war History of Terrorism Elements of Terrorism Types Media’s Role Objectives Tactics.
Crime & Punishment The Aims of Punishment Deterrence.
TYPES OF WAR. CLASSIFYING WARS The main traditional way of classification is to consider the weapons used in war Since 1945, war has either been nuclear.
God’s Oneness: The Kinds of Attributes God Does Not Have Argued by Plato: nothing corporeal can be truly one – i.e., truly a unity – because anything corporeal.
Some Examples of Fallacies
Corporal Punishment in Schools Leslie Boyer Angie Moore.
The Ethics of War 11.Forelesning. ”What if an international terrorist planted a nuclear bomb somewhere in Manhattan, set to go off in an hour and kill.
Experimental Research Methods in Language Learning Chapter 3 Experimental Research Paradigm and Processes.
Argumentative Essays Ms. Sanders rocks Ms. Sanders rocks.
JRN 490 Peace Journalism Lesson 6: Media in Conflict (Peace Journalism in the Philippines) By Metin Ersoy.
Wired for war P.W. Singer Published in 2009 SAM COLLINS.
Stomp Out Bullying! By Kelsey Gage Arkansas State University Integrating 2012.
Battles in Cyber Space Dr Richard E Overill Department of Informatics.
Identity Formation. Identity Development According to Erik Erikson, the task of establishing one’s identity is accomplished mainly by choosing and developing.
Security Mindset Lesson Introduction Why is cyber security important?
Writing Exercise Try to write a short humor piece. It can be fictional or non-fictional. Essay by David Sedaris.
Too Much of This Tied to Poor Teen Mental Health Close Reading - #1 1.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
In this lecture, we will learn about: Translation.
AS Ethics Utilitarianism Title: - Preference Utilitarianism To begin… What is meant by preference? L/O: To understand Preference Utilitarianism.
GRAB A MEDIA AND VIOLENCE WORKSHEET GET OUT YOUR AGGRESSION QUESTIONNAIRE.
Domestic abuse It is never OK. By the end of the lesson you will… Know …what domestic abuse is Understand …why it is unacceptable Be able to …avoid abusive.
GOVT Module 16 Defense Policy.
Myths.
What is Cyber Security Cyber War Cyber Power?
International Security and Peace
CSE 190 Neural Networks: Ethical Issues in Artificial Intelligence
Name of the idea Description and Military Application Maturity
Name of the idea Description and Military Application Maturity
Cybersecurity Case Study STUXNET worm
Lessons for the 21st Century
Object Oriented Programming and Software Engineering CIS016-2
Assessing Deterrence Options for Cyberweapons
Chapter 19 Transnational actors and international organizations in global politics Name: MA XINYUE Student No.:ID02403 Student No.:ID02403.
War and Violence Can war be just?.
Violence and Injury Prevention
The Persuasive Essay This is the first BIG unit of this course. You will be reading many essays and eventually writing your own. This is a big deal considering.
CYBERTERRORISM.
Responsible use of Technology
Presentation transcript:

LECTURE PRESENTATION FOR Thomas Rid, Cyberwar will not take place Manjikian

HIS CONTROVERSIAL THESIS  “In several ways, cyber attacks are not creating more vectors of violent interactions;  Rather they are making previously violent interactions less violent.” p. viii Manjikian

PLEASE WATCH THIS ONE HOUR DISCUSSION WITH THOMAS RID, DISCUSSING HIS BOOK Manjikian

PART ONE: WHY CYBERWAR IS PERHAPS NOT WAR Manjikian

MICHAEL HAYDEN, DIRECTOR OF CIA AND NSA  “Rarely has something been so important and so talked about with less clarity and less apparent understanding than this phenomenon.” p. 3 Manjikian

WHY DOES RID ARGUE THAT CYBERWAR IS NOT ‘REAL WAR’? WHAT CRITERIA DOES IT FAIL TO MEET?  An offensive act has to be:  1. instrumental  2. political  3. violent or potentially violent Manjikian

 Rid argues that cyber attacks are used to CONTROL, INVOKE conventional weapons (i.e. Putting a virus in a conventional weapon so it won’t work, sabotaging an autonomous vehicle)  Code is “parasitic on the target” (p. 13)  Cyberweapons (things like viruses) are not IN AND OF THEMSELVES capable of killing people Manjikian

WHEN IS WAR, NOT WAR?  Not a single human being has ever been killed or hurt as a result of a code-triggered cyber attack  Computer code can only directly affect computer-controlled machines, not humans Manjikian

ROLE OF THE BODY  War has traditionally injured bodies, produced bodies, corpses  Thus far, computer attacks have not DIRECTLY targetted humans, but rather machines. Manjikian

 BUT WHAT IF..... A virus shut off machines at a hospital? Shut of fire alarms or sprinkler systems during a fire?  Rid suggests we may not have the same EMOTIONAL reaction to cyberwarfare Manjikian

STOP AND THINK Manjikian

 Clausewitz: “War is an act of force to compel the enemy to do our will.”  INSTRUMENTAL: War is the MEANS of achieving a payoff.  Rid: this gets confused in cyber. Cyber war may be BOTH the payoff and the means. (i.e. Shutting down someone else’s network).  BUT, a cyberstrike is not lethal in the same way that conventional war is. Manjikian

 In order for a state to profit from carrying out a particular strike, people need to know who did it.  This enhances the credibility of the striker and forces the other side to surrender ATTRIBUTION PROBLEM Manjikian

WHAT DOES RID SAY IS A BETTER ANALOGY FOR CYBER ACTIVITY THAN CYBER WAR?  He describes a spectrum of cyber activity ranging from cyber crime to cyber war.  He suggests that most of the actions that we have seen to date are better understood as cyber crime.  3 examples: Estonia; Georgia; Stuxnet (Iran) Manjikian

PARADOXES REGARDING THE UTILITY OF CYBER WAR  “It is a massive challenge to use cyber weapons as instruments in the service of a wider political goal, not just in one- off and impossible-to-repeat sabotage stints.”  Cyberwar is not a strategy, though one might engage in tactical cyberwar as part of an overall military strategy Tactic: plan for achieving an immediate goal Manjikian

HOW DOES RID DESCRIBE THE RELATIONSHIP BETWEEN VIOLENCE AND POWER?  Force used by a sovereign isn’t simply violence; it is institutionalized, is equivalent to power  “violent cyber attacks are unlikely to ever be an implicit part of a legal order.”  Compares violetn cyber attacks to espionage, sabotage, subversion rather than LEGAL VIOLENCE as part of the political order Manjikian

SIGNIFICANCE OF THIS DISTINCTION  Rid: cyber attacks therefore cannot be used to maintain or establish trust in a regime (in the same way that conventional violence could) Manjikian

STOP AND REVIEW Manjikian

PART TWO: WHAT IS A WEAPON? Manjikian

WEAPON (DEFINED):  A tool that is used or designed to be used with the aim of threatening or causing physical, functional or mental harm to structures, systems or living things Manjikian

CYBER WEAPON (DEFINE)  Computer code that is used kor designed to be used, with the aim or threatening or causing physical, functional or mental harm to structures, systems or living beings Manjikian

THE PSYCHOLOGICAL DIMENSION  Weapons are used not just to hurt people but also to THREATEN them  People are aware of the weapon’s potential to harm them  (This is why deterrence works)  Weapons are used not just to hurt people but also to THREATEN them  People are aware of the weapon’s potential to harm them  (This is why deterrence works) Manjikian

WHAT IS NOT A WEAPON  Rid: sabotage  Weaponization of gadgets  Scada attacks – i.e. Attacks on an electrical grid, nuclear powerplant, etc.  Distinguishes between INTRUSIONS and INSTRUMENTS OF HARM Manjikian

IMPLICATIONS OF RID’S ARGUMENT  Affects how we think about deterrence in cyberwar (see my article)  Affects how we think about ethics of cyberwar Manjikian

AN OPPOSING VIEWPOINT Manjikian