Lesson 4 Flashcards

Grey Zone (16 cards)

1
Q

Hoffman and definition of Gray Zone

Hoffman

A
  • illegal activities of
  • non-traditional statecraft
  • that are below the threshold of armed organized violence.
  • Cyber security is involved.

Hoffman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intent of grey zone tactics

A
  • secure strategic leverage through gradual
  • reamaining below the threshold that would trigger a significant response.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Thuesen & Jakobsen perception of western, China and Russia’s perception of war

A

Western: Clear separation of war and peace, based on history and law, but challenged by gray zone conflicts

Russia: Mixes war and peace, uses non-military tactics to gain advantage.

China: Uses all possible methods to force opponents to submit, including society-wide tactics.

Theussen & Jakobsen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hybrid warfare

A

Traditional military capabilities with irregular tactics (such as cyber).

Can also be without military capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hybrid threats

-Hybrid Center of Excellence

A

Action conducted by state or non-state actors, whose goal is to undermine or harm a target by combining overt and covert military and non-military means.

-Hybrid Center of Excellence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dunn Cavelty view on politics and ayber-attacks

A

NotPetya is just one of many politically motivated cyber-attacks. Ukraine, Russia, Sandworms.
Tknology and politics are interwined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ottis Conflict in Cyberspace

A

Offensive cyber capabilities are appealing to weaker countries that prefer to engage technologically advanced and dependent adversaries.

Non-state actors are ideal for causing confusion and performing deniable acts against adversaries, potentially masking more dangerous campaigns by professional operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Nye Jospehs, detterence of cyberspace

A

UAS detterence by punishment: Threatening of punishment

Deterrence by Denial: cyber defenses can build resilience of a state.

Deterrence by Entanglement:
The economic interdependence between countries, such as the U.S. and China, can act as a deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Weber, Valentin on cyberspace

A

Great powers initiate destructive cyber operations for territorial gains, to preempt threats, and in retaliation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Thuesen & Jakobsen Western Grey Zone aspect consequences

A

China and Russia can take of advantage of the grey zone, since the west only differ within traditional warfare and peace.

Therefore they use the salami-effect, taking small steps, to stay within the greyzone and within the targeted state’s threshold without starting a traditional war.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hoffman’s Heuristic Construction of Conflcits

A
  1. Measures Short of Armed Conflict
  2. Irregular Warfare/Terrorism
  3. Hybrid Warfare
  4. Conventional Warfare (limited to theater-wide objectives)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stensrud and example of Svalbard

A

Svalbard Context: In the maritime zones around Svalbard, Russia’s actions constitute an active threat and possibly limited hybrid operations, but not outright hybrid warfare, reflecting a strategy of maintaining strategic uncertainty while avoiding escalation.

**Need for Nuance: **It is important to avoid interpreting every Russian act of aggression as warfare, and labeling incidents as “hybrid operations” may risk undermining conflict and resource management and Arctic diplomacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Beazner and Cordey perception of the Western percepton of peace and war

A

the same as Thuesen and Jakobsen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ottis and cyber conflicts

A

Offensive cyber capabilities are appealing to weaker countries that prefer to engage technologically advanced and dependent adversaries.

Non-state actors are ideal for causing confusion and performing deniable acts against adversaries, potentially masking more dangerous campaigns by professional operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dunn Cavelty Politics Cyber Security

A

Politics and tecknology is interwined

NotPetya is just one of many politically motivated cyber-attacks. Ukraine, Russia, Sandworms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Joseph Nye and detterence and punishment

A

**Deterrence ** in cyberspace depends on how, who, and what one is trying to deter, with ambiguities of attribution and diverse adversaries complicating the strategy.

**Punishment ** is less prominent in cyber strategies compared to nuclear weapons, while denial plays a larger role in dealing with non-state actors