Small Wars Journal

cyberwarfare

NATO Is in a Cyberwar with Russia and Must Expand Article 5 to Include Cyberwarfare or Risk Losing and Diminishment

Fri, 09/24/2021 - 1:59am
Article 5 of NATO’s foundational 1949 North Atlantic Treaty demands that if an “armed attack” is carried out against even just one member state, all other member states “shall” consider that attack (and any armed attack) on a member state “an attack against them all” and “will assist,” up to and “including the use of armed force.”  This bedrock is the centerpiece for over seven decades of the Pax Americana: the U.S.-led global system of military power, alliances, collective defense, and ability to project combined strength anywhere on the planet.  For it to continue in these roles, NATO must adapt to current and future threats by adding cyberwarfare—including information warfare—to Article 5.

About the Author(s)

To Operationalize Cyber, Humanize the Design SWJED Mon, 11/21/2016 - 4:58am

Operationalizing cyber is not about linear thinking and lines of operation.

The Cyber Espionage Predominant Purpose Test SWJED Thu, 10/20/2016 - 10:27am

Can international law meaningfully distinguish between cyberespionage for national security purposes and economic espionage?

Cyber Support to Corps and Below: Digital Panacea or Pandora’s Box? SWJED Wed, 10/19/2016 - 9:09am

The unrelenting tempo of combat operations at the Corps and below level in the Army creates unique challenges for the execution of Offensive Cyber Operations.

Combat Identification in Cyberspace SWJED Sun, 08/25/2013 - 5:59pm

"Along with the rest of the U.S. government, the Department of Defense depends on cyberspace to function. It is difficult to overstate this reliance."

Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion

Wed, 06/19/2013 - 3:30am

Conventional and cyber conflict diffusion diverge on two points:  third-party intervention (escalation) and collateral damage (pathogen).  The findings raise questions regarding state neutrality, non-state actors, and authenticating attackers.

About the Author(s)