Strategic Competition in Cyberspace + A Cyber Commons? Flashcards
(44 cards)
What is the “tragedy of the cyber commons” analogy?
The risk that unregulated shared digital resources (like open networks) will be exploited by individual actors for selfish gain, leading to collective harm (e.g., DDoS attacks, data breaches).
Name three UN cyber norms and a challenge to their implementation.
(1) No attacks on critical infrastructure (e.g., power grids), (2) State responsibility for non-state actors (e.g., Russia’s tolerance of REvil), (3) Assistance requests during cyber incidents. Challenge: Vague definitions (e.g., “critical infrastructure” varies by state). Evaluation: 2017 GGE deadlock shows geopolitical divides (US vs. Russia/China).
Why did the UN GGE process fail in 2017?
Due to disagreements over: 1) Rules for cyber conflict, 2) State control of information, 3) Applicability of Article 2(4) on use of force
What are the five categories of the EU Cyber Diplomacy Toolbox?
1) Preventive (confidence-building), 2) Cooperative (dialogues), 3) Stability (signaling), 4) Restrictive (sanctions), 5) Support to member states (Joint Cyber Unit).
How does the NIS Directive enhance EU cybersecurity?
Requires essential services (energy, transport) to report cyber incidents and appoint CSIRTs, but criticized for vague reporting thresholds.
What is the key difference between cyber diplomacy and digital diplomacy?
Cyber diplomacy negotiates international cyber norms/laws; digital diplomacy uses digital tools (e.g., Twitter) for traditional diplomacy.
What was the significance of NATO’s 2014 Article 5 cyber commitment?
Recognized cyber attacks could trigger collective defense, but left thresholds undefined (unlike kinetic attacks).
Name three examples of Russian state-linked cyber operations.
1) Moonlight Maze (1999), 2) Estonia DDoS (2007), 3) Internet Research Agency election interference (2016).
What percentage of U.S. persons did Russian IRA Facebook posts reach in 2016?
Estimated 126 million people (29 million directly).
What is China’s doctrine of “Active Defense” in cyberspace?
Justifies preemptive cyber strikes against perceived threats, often conflated with IP theft (e.g., Microsoft Exchange hack 2021).
What are “patriot hackers” in China’s cyber strategy?
Non-state actors tolerated/encouraged by the PLA to conduct “deniable” attacks (e.g., APT41).
What is the U.S. “defend forward” strategy?
Persistent Engagement doctrine allowing preemptive cyber ops to disrupt adversaries (e.g., 2018 takedown of Russian troll farms).
What was the Five Eyes network’s role in U.S. cyber strategy?
Enabled mass surveillance via PRISM (2007), sharing signals intelligence among US, UK, Canada, Australia, NZ.
What are three examples of U.S.-China cyber rivalry?
1) Huawei 5G bans, 2) APT10 Cloud Hopper attacks, 3) TikTok data privacy disputes.
What was the operational impact of the SolarWinds hack (2020)?
Compromised 18,000 networks via software updates, including U.S. Treasury and DOJ, exposing supply chain vulnerabilities.
How does the Budapest Convention address cybercrime?
First international treaty on cybercrime (2001), but rejected by Russia/China over sovereignty concerns.
What is the key criticism of multistakeholder models like IGF?
Lack enforcement power while allowing authoritarian states to legitimize participation without compliance.
What are three types of cyber norms proposed by the UN GGE?
1) No attacks on critical infrastructure, 2) No tampering with supply chains, 3) Assist states under attack.
How did Colonial Pipeline (2021) demonstrate ransomware risks?
Caused fuel shortages across U.S. Southeast, paid $4.4M ransom, revealed critical infrastructure vulnerabilities.
What is the “cyber sovereignty” model advocated by China/Russia?
State control over domestic internet (e.g., Great Firewall, Runet laws) vs. Western “open internet” ideals.
What are the three dimensions of national cyber power according to Klimberg?
1) Government coordination, 2) International alliances, 3) Non-state actor cooperation.
What was unique about the Viasat hack (2022)?
Kinetic-cyber hybrid attack disrupting Ukrainian military comms hours before Russia’s invasion.
What is the EU Cybersecurity Act’s certification framework?
Standardizes security requirements for ICT products (e.g., IoT devices), though adoption remains slow.
Why is attribution difficult in cyber conflicts?
1) Use of proxies (e.g., patriot hackers), 2) VPNs/Tor masking, 3) False flag operations.