Strategic Competition in Cyberspace + A Cyber Commons? Flashcards

(44 cards)

1
Q

What is the “tragedy of the cyber commons” analogy?

A

The risk that unregulated shared digital resources (like open networks) will be exploited by individual actors for selfish gain, leading to collective harm (e.g., DDoS attacks, data breaches).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three UN cyber norms and a challenge to their implementation.

A

(1) No attacks on critical infrastructure (e.g., power grids), (2) State responsibility for non-state actors (e.g., Russia’s tolerance of REvil), (3) Assistance requests during cyber incidents. Challenge: Vague definitions (e.g., “critical infrastructure” varies by state). Evaluation: 2017 GGE deadlock shows geopolitical divides (US vs. Russia/China).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why did the UN GGE process fail in 2017?

A

Due to disagreements over: 1) Rules for cyber conflict, 2) State control of information, 3) Applicability of Article 2(4) on use of force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the five categories of the EU Cyber Diplomacy Toolbox?

A

1) Preventive (confidence-building), 2) Cooperative (dialogues), 3) Stability (signaling), 4) Restrictive (sanctions), 5) Support to member states (Joint Cyber Unit).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the NIS Directive enhance EU cybersecurity?

A

Requires essential services (energy, transport) to report cyber incidents and appoint CSIRTs, but criticized for vague reporting thresholds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the key difference between cyber diplomacy and digital diplomacy?

A

Cyber diplomacy negotiates international cyber norms/laws; digital diplomacy uses digital tools (e.g., Twitter) for traditional diplomacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was the significance of NATO’s 2014 Article 5 cyber commitment?

A

Recognized cyber attacks could trigger collective defense, but left thresholds undefined (unlike kinetic attacks).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name three examples of Russian state-linked cyber operations.

A

1) Moonlight Maze (1999), 2) Estonia DDoS (2007), 3) Internet Research Agency election interference (2016).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What percentage of U.S. persons did Russian IRA Facebook posts reach in 2016?

A

Estimated 126 million people (29 million directly).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is China’s doctrine of “Active Defense” in cyberspace?

A

Justifies preemptive cyber strikes against perceived threats, often conflated with IP theft (e.g., Microsoft Exchange hack 2021).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are “patriot hackers” in China’s cyber strategy?

A

Non-state actors tolerated/encouraged by the PLA to conduct “deniable” attacks (e.g., APT41).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the U.S. “defend forward” strategy?

A

Persistent Engagement doctrine allowing preemptive cyber ops to disrupt adversaries (e.g., 2018 takedown of Russian troll farms).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What was the Five Eyes network’s role in U.S. cyber strategy?

A

Enabled mass surveillance via PRISM (2007), sharing signals intelligence among US, UK, Canada, Australia, NZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are three examples of U.S.-China cyber rivalry?

A

1) Huawei 5G bans, 2) APT10 Cloud Hopper attacks, 3) TikTok data privacy disputes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What was the operational impact of the SolarWinds hack (2020)?

A

Compromised 18,000 networks via software updates, including U.S. Treasury and DOJ, exposing supply chain vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does the Budapest Convention address cybercrime?

A

First international treaty on cybercrime (2001), but rejected by Russia/China over sovereignty concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the key criticism of multistakeholder models like IGF?

A

Lack enforcement power while allowing authoritarian states to legitimize participation without compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are three types of cyber norms proposed by the UN GGE?

A

1) No attacks on critical infrastructure, 2) No tampering with supply chains, 3) Assist states under attack.

19
Q

How did Colonial Pipeline (2021) demonstrate ransomware risks?

A

Caused fuel shortages across U.S. Southeast, paid $4.4M ransom, revealed critical infrastructure vulnerabilities.

20
Q

What is the “cyber sovereignty” model advocated by China/Russia?

A

State control over domestic internet (e.g., Great Firewall, Runet laws) vs. Western “open internet” ideals.

21
Q

What are the three dimensions of national cyber power according to Klimberg?

A

1) Government coordination, 2) International alliances, 3) Non-state actor cooperation.

22
Q

What was unique about the Viasat hack (2022)?

A

Kinetic-cyber hybrid attack disrupting Ukrainian military comms hours before Russia’s invasion.

23
Q

What is the EU Cybersecurity Act’s certification framework?

A

Standardizes security requirements for ICT products (e.g., IoT devices), though adoption remains slow.

24
Q

Why is attribution difficult in cyber conflicts?

A

1) Use of proxies (e.g., patriot hackers), 2) VPNs/Tor masking, 3) False flag operations.

25
What was the LockBit ransomware group's peak ransom demand?
$50M (2023 attack on Boeing), exemplifying criminal-state nexuses in Russia.
26
How does GDPR intersect with cyber regulation?
Mandates 72-hour breach notifications (Article 33), creating de facto global standards due to extraterritoriality.
27
What are three examples of cyber confidence-building measures?
1) Hotlines (US-China 2015), 2) Transparency reports, 3) Joint exercises (NATO Cyber Coalition).
28
What is the "zero-day market" and its regulatory challenges?
Trade in unpatched vulnerabilities; criticized for arming governments (e.g., NSO Group's Pegasus).
29
How did NotPetya (2017) blur crime-war distinctions?
Russian malware disguised as ransomware caused $10B+ damage globally, but avoided Article 5 response.
30
What is the OEWG's key difference from the UN GGE?
Open to all UN states (vs. GGE's 25 experts), but diluted outcomes with non-binding recommendations.
31
What are three limitations of international cyber law?
1) No universal treaty, 2) Jurisdictional conflicts, 3) Vague applicability of LOAC to cyberspace.
32
What was the 780th Military Intelligence Brigade's role?
First U.S. "Cyber Brigade" (2006), pioneering military cyber ops later institutionalized under Cyber Command.
33
How does APEC address cybersecurity?
Through non-binding initiatives like the Cybersecurity Strategy (2002), focusing on economic resilience.
34
What are three trends in AI-enabled cyber threats?
1) Deepfake disinformation, 2) Automated phishing, 3) AI-powered vulnerability scanning.
35
What is the "Cyber Defence Pledge" by NATO?
2016 agreement for members to allocate resources to cyber defense, but lacks specific spending targets.
36
How did the 2014 Sony hack escalate US-NK tensions?
Attributed to NK, led to first cyber sanctions under Obama's EO 13694, testing proportionality norms.
37
What is ENISA's role in EU cyber regulation?
Provides certification frameworks and threat analyses, but lacks enforcement powers.
38
What are three examples of Chinese cyber espionage targets?
1) Defense contractors, 2) University research, 3) Healthcare data (e.g., COVID vaccine IP).
39
What is the "Kill Chain" model in cyber defense?
Lockheed Martin's 7-stage framework (Recon to Actions) to disrupt attacks early.
40
What are three arguments for/against the Cyber Crime Treaty?
For: Harmonizes laws; Against: 1) Expands surveillance, 2) Weakens encryption, 3) Lacks human rights safeguards.
41
What was the significance of the 2010 Stuxnet attack?
First known cyber weapon (US/Israel vs. Iran) physically damaging nuclear centrifuges, setting a kinetic precedent.
42
How does the NIS 2 Directive (2023) improve upon NIS 1?
Expands sectors covered (e.g., social media), mandates stricter incident reporting, and harmonizes sanctions.
43
What are three challenges to cyber deterrence?
1) Attribution difficulties, 2) Asymmetric incentives, 3) Escalation risks (e.g., Stuxnet retaliation).
44
What is the "Cyber Ranges" initiative by NATO?
Simulated environments (e.g., Tallinn) for allied cyber defense training and strategy testing.