2012
DOI: 10.1177/0967010611431079
|View full text |Cite
|
Sign up to set email alerts
|

Cyclones in cyberspace: Information shaping and denial in the 2008 Russia–Georgia war

Abstract: While the rhetoric of cyber war is often exaggerated, there have been recent cases of international conflict in which cyberspace has played a prominent role. In this article, we analyze the impact of cyberspace in the conflict between Russia and Georgia over the disputed territory of South Ossetia in August 2008. We examine the role of strategic communications, information operations, operations in and through cyberspace, and conventional combat to account for the political and military outcomes of the conflic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 73 publications
(25 citation statements)
references
References 25 publications
0
23
0
Order By: Relevance
“…This ties well in with our interpretation that the interaction both within the NAFCD and the interaction that the NAFCD has with other cyber and security organization should be improved. Studies that we have discussed also show that there is a need for more thorough training schemes that emphasize more unforeseen events and challenge the entire organization (Samuelson and Zeckhauser, 1988; Ritov and Baron, 1992; Deibert et al, 2012; Lindsay, 2013; Björck et al, 2015; Sheffi, 2015; Torgersen, 2015; Buchanan, 2016). This is necessary if the NAFCD wants to improve how they cope with the different levels of DD-UN (levels 0–4) in relation to different levels of familiarity, notification, and escalation.…”
Section: Discussionmentioning
confidence: 96%
See 1 more Smart Citation
“…This ties well in with our interpretation that the interaction both within the NAFCD and the interaction that the NAFCD has with other cyber and security organization should be improved. Studies that we have discussed also show that there is a need for more thorough training schemes that emphasize more unforeseen events and challenge the entire organization (Samuelson and Zeckhauser, 1988; Ritov and Baron, 1992; Deibert et al, 2012; Lindsay, 2013; Björck et al, 2015; Sheffi, 2015; Torgersen, 2015; Buchanan, 2016). This is necessary if the NAFCD wants to improve how they cope with the different levels of DD-UN (levels 0–4) in relation to different levels of familiarity, notification, and escalation.…”
Section: Discussionmentioning
confidence: 96%
“…The problematic point regarding cyber-attacks is that it is possible to be exposed to an extensive attack without ever detecting it (Lindsay, 2013). Deibert et al (2012) have analyzed the impact of cyberspace on the conflict between Russia and Georgia in 2008. They refer to cyber warfare and discuss different issues that need to be dealt with regarding future comparative research.…”
Section: Introductionmentioning
confidence: 99%
“…In fact, such cases require the international co-operation in combating cyberspace security violations. So, the military tactics and strategies have started to combine the traditional combat with the electronic or virtual attacks (Deibert, Rohozinski, & Crete-Nishihata, 2012). Such cyber activities have made cyberspace acquire a very significant strategic position which could be regarded as equal as geographical spaces, such as land, sea, and air.…”
Section: Cyberspace and Sovereignty: Prior Researchmentioning
confidence: 99%
“…For some, it was geographically separate area-a real space, international, independent, and separated from the territory of the states (Deibert et al, 2012). Yet, the anonymity and autonomy of cyberspace facilitate aggression against state sovereignty and make it quite difficult to identify and locate trespassers (Placid & Wynekoop, 2011).…”
Section: Cyberspace: Time-space Theories and Legal Perspectivementioning
confidence: 99%
“…A genius of the strategy was that no one could link the Russian government and the cyber attackers, protecting the Russian state from political or legal culpability 11. Georgia and Estonia epitomise the emerging model.…”
mentioning
confidence: 99%