Lecture 6 Flashcards

First 7 cards are part of lecture 5

1
Q

Definition alliance

A

-“A formal or informal relationship of security cooperation
between two or more sovereign states” (Walt 1987, 1).
- Alliances….produce additional security quickly
but with less reliability and at the political cost of
moderating conflicting interests with the prospective
ally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pros and cons of alliances

A

Useful as a part of many kinds of strategies, e.g. containment,
deterrence, also limited and total war
But come with inherent dangers
Chain-ganging: “[State(s)] dragged into war in order to save reckless
allies.”
Buck-passing: “[State(s)] allow others to bear the burden of halting the
rise of a state that threatens to gain hegemony” (Morrow 1993, 207).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Theory of alliance formation = Balance of power

A

states ally to aggregate power to confront a more powerful state (e.g.
Waltz 1979). If no possible alliance exists that can balance a very powerful
state, states “bandwagon” by allying with that powerful state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Theory of alliance formation = balance of threat

A

raw power per se does not endanger states’ security, but rather threats (due
to geographic proximity, ideology, etc.). Therefore, states ally to balance
against threat rather than against power (Walt 1987)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Theory of alliance formation = domestic affinity

A

“States will tend to ally with states whose political orientations are similar to
their own” (e.g., Walt 1987)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do some alliances last longer than others?

A
  1. Shifts in distribution of power
  2. Changes in threat posed by a state/states
  3. Regime type
    - How stable are public preferences ?
    - To what extent is there continuity of national leadership?
    - Alliances among liberal democracies, may be “especially strong and
    resilient” (WM, 273, quoting Gaubatz 1996)
  4. Institutionalization
    - Creation of organizations, bureaucracies, which on their own try to
    survive into the future, lobby, manage change, etc.
    - Institutional capacity allows alliance to shift to address new threats
    when the original reason for the alliance is no longer present
  5. Socialization
    - Contact between elites (regular summits, conferences, etc.)
    - Formal cooperation between personnel from member government
    (secondment, etc.)
    - Attempts at creating sense of community among elites and across the
    publics of the alliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Defining cyberspace

A

Items “based on or dependent on computing and communications
technology; the information that these artifacts use, store,
handle, or process; and the interconnections among these various
elements” (US National Academy of Sciences 2014, 8; quoted in
WM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cyber as a prefix

A

“cyber” as a prefix denotes anything associated with
cyberspace; bottom line, “technology infrastructures” that
deal with “electronic information (data) processing” (CCDCOE
2017; quoted in WM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Actors in cyberspace

A

States
Non-state actors
Proxy actors
Corporations
Private individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Actions * aka Computer Network Operations

A

Defense
Exploitation
Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Varieties of cyber attacks

A

Denial of service (DoS) and distributed denial of service (DDoS)
Malware (including ransomware, worms)
Phishing and spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Evolution in cyber attacks

A

From states as “primary,” even “exclusive” actors to non-state
actors playing key roles too; influence of technology in this shift
From emphasis on exploitation to disruption of public and private
resources
Capacity for “weaponized” attacks that damage or destroy
physical infrastructure and potentially result in loss of life
A new concern: AI and the role of chatbots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attribution as a problem (confronting cyber attacks)

A

Not fundamentally different from non-cyber attacks, but evidence tends to be
almost exclusively circumstantial
Given the nature of the evidence, tricky to convince audiences (attacker; public)
that the authority doing the attribution knows attacker’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Developing international legal norms: the Tallin manual (confronting cyber attacks)

A

Cyber attacks can be treated as acts of war “if [they cause] harm to individuals
or damage to property equivalent to the use of force” (WM).
States “are responsible for cyber attacks” carried out by non-state actors
based “within their borders if the state is aware of them or [they[ act under [the
state’s] direction” (WM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cyberwar

A

Information has always been an essential
part of warfare
Information includes communications for
command and control; reconnaissance and
intelligence collection on the enemy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Alternative approach cyber war

A

An alternative approach, developed
starting in the late 1990s, emphasizes using
cybertechnology and networked
organizational structures to achieve “an
information edge over adversary military
forces in battle” (Arquilla 2011)
The war in Ukraine has become a testing
ground, including uses of AI for these
purposes

17
Q

What is the strategic attack paradigm

A

During the Cold War, information viewed as
a strategic domain that could potentially be
weaponized for massive, strategic effect
The “strategic attack paradigm”
emphasized to this day, particularly given
concerns about critical infrastructure (cyber
attacks) and influence operations (gray
zone)