排序方式: 共有15条查询结果,搜索用时 15 毫秒
11.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity. 相似文献
12.
James J. Wirtz 《Defense & Security Analysis》2017,33(2):106-114
The term “Gray Zone” is gaining in popularity as a way of describing contemporary security challenges. This article describes the “short-of-war” strategies – the fait accompli, proxy warfare, and the exploitation of ambiguous deterrence situations, i.e. “salami tactics” – that are captured by the term and offers several explanations for why state and non-state actors are drawn to these strategies. The analysis highlights why defense postures based on deterrence are especially vulnerable to the short-of-war strategies that populate the “Gray Zone.” The article concludes by suggesting how defense officials might adapt defense policies to life in the “Gray Zone.” 相似文献
13.
Rod Thornton 《Small Wars & Insurgencies》2013,24(6):865-885
AbstractThe siege of the northern Syrian town of Kobane was lifted in January 2015. The Kurdish defenders there had triumphed against Islamic State (IS). The conflict then moved on. It moved on, though, with the United States, the United Kingdom, and other Western powers having adopted, almost by default, the Kurds as proxy fighters in this conflict. The Kurds, however, are a divided and fractious nation spread across three states and historically famous for fighting among themselves. In employing the Kurds as proxies against IS, as this article shows, these Western powers must be aware of the unintended consequences that can result. 相似文献
14.
Geraint Alun Hughes 《Small Wars & Insurgencies》2014,25(3):522-538
The ongoing civil war in Syria is evolving into a ‘proxy war’, in which both the Baathist regime and its insurgent adversaries are becoming increasingly reliant upon support from external powers. Proxy warfare has a superficial appeal for sponsoring states, as it appears to offer a convenient and risk-free means of fulfilling foreign policy goals, which will not incur the financial and human costs of direct military intervention. Using Syria as a case study, this article shows that the conduct of proxy warfare has several potential political, strategic, and ethical consequences, which any democratic government in particular is obliged to consider before it resorts to this indirect means of foreign intervention. 相似文献
15.
Airpower, drones and cyber-weapons are employed by states in conjunction with local armed non-state actors in an effort to coercively intervene in the crises of the twenty-first century. While the externalization of the burden of warfare is a return to pre-modern war, it is the change in the underlying socio-political relations between the state and its military agent that is a novel phenomenon in surrogate warfare. This article demonstrates that in a post-Westphalian era characterized by non-state violence, globalized conflicts, a prioritization of risk management in a mediatized environment, the state has to explore new ways to remain relevant as the primary communal security provider. Thereby, the organization of violence has departed from the employment of the state’s soldier as the primary bearer of the burden of warfare to a mode of war where technological and human surrogates enable the state to manage the risks of post-modern conflict remotely. In this article, we conceptually explore surrogate warfare as a socio-political phenomenon within the context of globalized, privatized, securitized and mediatized war. 相似文献