Abstract
Since the advent of the internet, governments endeavored to shape its use for their strategic advantage. This ambition extends to military applications where control of the cyber domain has become a primary element of modern conflicts. Increasingly, military doctrine features cyber weapons not only as a tool to strategically prepare the battlefield, but also as a critical component of battlefield tactics. The significance of cyber weapons on both national defense strategy and battlefield tactics is so significant that many military theorists have characterized it as a Revolution in Military Affairs (RMA), a tectonic shift in capabilities akin to the advent of manned flight or nuclear fission. This paper analyzes the modern uses of cyber weapons through the lens of recent RMAs, suggesting potential implications for policy and areas for further study by the academy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bartosiak, J. (2019). Revolution in military affairs. Geopolitical Futures. https://geopoliticalfutures.com/pdfs/the-revolution-in-military-affairs-geopoliticalfutures-com.pdf
Cimbala, S. J., & McDermott, R. N. (2014). A new cold war? Missile defence, nuclear arms reductions, and cyber war. Comparative Strategy, 34(1), 95–111.
Clark, R. (2019). The fifth domain: Defending our country, our companies, and ourselves in the age of cyber threats. Penguin Publishers.
Collins, R., et al. (1999). Macrohistory: Essays in sociology of the long run. Stanford University Press.
Floridi, L. (2017). The fourth revolution, how the infosphere is reshaping human reality. Oxford University Press.
Gaddis, J. L. (1982). Strategies of containment. Oxford University Press.
Gaddis, J. L. (1999). Cold war statesmen confront the bomb: Nuclear diplomacy since 1945. Oxford University Press.
Goldstone, J. (2012). Political demography: How population changes are reshaping international security and national politics. Oxford University Press.
Kelly, C. (2014). Atomic heritage. In US National Museum of Nuclear Science & History. 8 August 2014.
Kramer, A.. (2021). Companies linked to Russian ransomware hide in plain sight. New York Times. https://www.nytimes.com/2021/12/06/world/europe/ransomware-russia-bitcoin.html
McAfee, A. (2019), More from Less: The Surprising Story of How We Learned to Prosper Using Fewer Resources. Scribner
McMillan, P. J.. (1997). Cold warmonger. The New York Times. https://www.nytimes.com/1997/05/25/books/cold-warmonger.html
Robinson, J.. (2020). Cyberwarfare statistics: A decade of geopolitical attacks. Privacy Affairs. https://www.privacyaffairs.com/geopolitical-attacks
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jaffe, J. (2023). Cyber Weapons and the Fifth Domain: Implications of Cyber Conflict on International Relations. In: Mazzi, F. (eds) The 2022 Yearbook of the Digital Governance Research Group. Digital Ethics Lab Yearbook. Springer, Cham. https://doi.org/10.1007/978-3-031-28678-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-28678-0_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28677-3
Online ISBN: 978-3-031-28678-0
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)