After world -War II, the influence of the computer went beyond military realm by extending to other sectors. Introducing cyber as a strategic concept, currently cyber security is an international strategic security notion. And given the multi- dimensional nature of political and military conflicts, cyberspace can act as a new-founded battlefield in which not only malicious actions in economic sectors can take place but more likely chemical, biological, radiological and nuclear infrastructures can be under attack by cyber-attacks. Cyber-attacks on energy sectors for instance, can have irreparable impacts on internal safety as seen in a malicious computer worm known as Stuxnet that was used to raid and destroy Iran’s Uranium-enriching centrifuge. The Stuxnet attack was among the few yet crucial cyber-attacks with strategic political objectives to avoid expansion of nuclear enrichment capacity of Iran. Also technically, it may be considered as a successful attack, but it did not accomplish its political objectives to end the conflict. As a survey published by Wall Street Journal shows relatively 48% of IT executives in England. Germany, United States and France are concerned about cyber-attack on vital infrastructure including energy infrastructure within the few years that may end up with loss of many lives, all highlight the leading role cyber-attacks will play in upcoming conflicts. Although the purpose of cyber-attack may vary from espionage to vital infrastructure devastation, but it mainly endangers national security in a far more sever, wider and stronger attack targeting larger-scale structures. Stressing the impacts of cyber-threats on key national sectors, this research stresses the crucial role, diplomacy can play in cyberspace conflicts, ensuring international security. Cyber diplomacy by employing cyber diplomats help reinforcing strategic doctrine that highlights education, science and research. Consequently, this process leads to negotiations between involved parties in cyber conflict and bridge the current gap between political agreement and military solution which will result in reconciliation and peace. In other words, the more cyber diplomacy is involved in cyber conflicts, the better threats will be mitigated. Given the complicated and evolving nature of CBRN threats and the crucial conflicts it may bring, cybersecurity has turned to a priority for most of countries. Following Italy’s technological advances, it is also suggested that Italy should attempt to approach cyber-diplomacy through facilitating Political Diplomacy Negotiation between counterparts in cyber conflicts around the world. To implement cyber diplomacy following steps are required to be taken; creating an overarching international cyber strategy, restructuring perspectives toward internal and external public diplomacy in cyberspace, encouraging a deeper perception of cyber power and proposing further perception and thinking in cyber’s subcategories and doctrines.
Cyber Diplomacy; a Peaceful Solution to Bring an End to International Cyber Conflicts / Khosravi, Alireza; Alireza, Heidari; Heidari, Soheila. - (2016).
Cyber Diplomacy; a Peaceful Solution to Bring an End to International Cyber Conflicts
Khosravi;Soheila
2016
Abstract
After world -War II, the influence of the computer went beyond military realm by extending to other sectors. Introducing cyber as a strategic concept, currently cyber security is an international strategic security notion. And given the multi- dimensional nature of political and military conflicts, cyberspace can act as a new-founded battlefield in which not only malicious actions in economic sectors can take place but more likely chemical, biological, radiological and nuclear infrastructures can be under attack by cyber-attacks. Cyber-attacks on energy sectors for instance, can have irreparable impacts on internal safety as seen in a malicious computer worm known as Stuxnet that was used to raid and destroy Iran’s Uranium-enriching centrifuge. The Stuxnet attack was among the few yet crucial cyber-attacks with strategic political objectives to avoid expansion of nuclear enrichment capacity of Iran. Also technically, it may be considered as a successful attack, but it did not accomplish its political objectives to end the conflict. As a survey published by Wall Street Journal shows relatively 48% of IT executives in England. Germany, United States and France are concerned about cyber-attack on vital infrastructure including energy infrastructure within the few years that may end up with loss of many lives, all highlight the leading role cyber-attacks will play in upcoming conflicts. Although the purpose of cyber-attack may vary from espionage to vital infrastructure devastation, but it mainly endangers national security in a far more sever, wider and stronger attack targeting larger-scale structures. Stressing the impacts of cyber-threats on key national sectors, this research stresses the crucial role, diplomacy can play in cyberspace conflicts, ensuring international security. Cyber diplomacy by employing cyber diplomats help reinforcing strategic doctrine that highlights education, science and research. Consequently, this process leads to negotiations between involved parties in cyber conflict and bridge the current gap between political agreement and military solution which will result in reconciliation and peace. In other words, the more cyber diplomacy is involved in cyber conflicts, the better threats will be mitigated. Given the complicated and evolving nature of CBRN threats and the crucial conflicts it may bring, cybersecurity has turned to a priority for most of countries. Following Italy’s technological advances, it is also suggested that Italy should attempt to approach cyber-diplomacy through facilitating Political Diplomacy Negotiation between counterparts in cyber conflicts around the world. To implement cyber diplomacy following steps are required to be taken; creating an overarching international cyber strategy, restructuring perspectives toward internal and external public diplomacy in cyberspace, encouraging a deeper perception of cyber power and proposing further perception and thinking in cyber’s subcategories and doctrines.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.