Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-8bljj Total loading time: 0 Render date: 2024-06-16T01:19:11.253Z Has data issue: false hasContentIssue false

1 - Introduction

Published online by Cambridge University Press:  24 March 2017

Alison Lawlor Russell
Affiliation:
Merrimack College, Massachusetts
Get access

Summary

The Information Age of the twenty-first century is distinguished by the proliferation of networks of power that transmit information in a variety of forms and have the effect of defining and decentralizing power relationships. The instantaneous transmission of information through vast geographic space has made possible our current global economic system, as well as the operations of modern governments, militaries, and social organizations. Their capabilities hinge on the accessibility of cyberspace to all participants. To be absent from these networks of information is to be absent from power.

Cyberspace is the modern communications network that underpins global information exchange and services. It is ubiquitous, complex, and much bigger than the Internet alone. It reinforces the global economic order and is essential to all elements of state power, from military operations to electricity to basic communications. Old networks, such as landline-based telephone systems, have been integrated into the newer and more efficient networks of cyberspace. Cyberspace is so ubiquitous that large-scale, strategic connectivity is rarely questioned.

Nevertheless, connectedness to cyberspace should not be taken for granted, especially by states. Cyberspace is a man-made network to which a state can be connected and disconnected, sometimes against its will. Cyber blockades can occur, and states can be denied access to cyberspace. The experience of North Korea in December 2014 illustrated just how quickly and completely a state can be denied access to cyberspace. For nine-and-a-half hours on December 22, North Korea suffered a total outage of Internet connectivity. The event was consistent with a cyber attack, and it came just days after the US Federal Bureau of Investigation said that North Korea was responsible for a major cyber attack on Sony Pictures. However, experts cautioned that North Korea's outage could also be attributed to other causes, such as power problems.

Deliberate actions to deny a state access to cyberspace and/or diminish its capacity to operate freely therein may be considered anti-access and area denial operations (or A2/AD operations). According to the modern understanding of A2/AD operations, they specifically mean to deny an adversary the ability to bring its operational capabilities into the contested region or prevent the attacker from operating freely within the region and maximizing its capabilities.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Introduction
  • Alison Lawlor Russell, Merrimack College, Massachusetts
  • Book: Strategic A2/AD in Cyberspace
  • Online publication: 24 March 2017
  • Chapter DOI: https://doi.org/10.1017/9781316817001.001
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Introduction
  • Alison Lawlor Russell, Merrimack College, Massachusetts
  • Book: Strategic A2/AD in Cyberspace
  • Online publication: 24 March 2017
  • Chapter DOI: https://doi.org/10.1017/9781316817001.001
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Introduction
  • Alison Lawlor Russell, Merrimack College, Massachusetts
  • Book: Strategic A2/AD in Cyberspace
  • Online publication: 24 March 2017
  • Chapter DOI: https://doi.org/10.1017/9781316817001.001
Available formats
×