Lecture 6 Flashcards
First 7 cards are part of lecture 5
Definition alliance
-“A formal or informal relationship of security cooperation
between two or more sovereign states” (Walt 1987, 1).
- Alliances….produce additional security quickly
but with less reliability and at the political cost of
moderating conflicting interests with the prospective
ally.
Pros and cons of alliances
Useful as a part of many kinds of strategies, e.g. containment,
deterrence, also limited and total war
But come with inherent dangers
Chain-ganging: “[State(s)] dragged into war in order to save reckless
allies.”
Buck-passing: “[State(s)] allow others to bear the burden of halting the
rise of a state that threatens to gain hegemony” (Morrow 1993, 207).
Theory of alliance formation = Balance of power
states ally to aggregate power to confront a more powerful state (e.g.
Waltz 1979). If no possible alliance exists that can balance a very powerful
state, states “bandwagon” by allying with that powerful state
Theory of alliance formation = balance of threat
raw power per se does not endanger states’ security, but rather threats (due
to geographic proximity, ideology, etc.). Therefore, states ally to balance
against threat rather than against power (Walt 1987)
Theory of alliance formation = domestic affinity
“States will tend to ally with states whose political orientations are similar to
their own” (e.g., Walt 1987)
Why do some alliances last longer than others?
- Shifts in distribution of power
- Changes in threat posed by a state/states
- Regime type
- How stable are public preferences ?
- To what extent is there continuity of national leadership?
- Alliances among liberal democracies, may be “especially strong and
resilient” (WM, 273, quoting Gaubatz 1996) - Institutionalization
- Creation of organizations, bureaucracies, which on their own try to
survive into the future, lobby, manage change, etc.
- Institutional capacity allows alliance to shift to address new threats
when the original reason for the alliance is no longer present - Socialization
- Contact between elites (regular summits, conferences, etc.)
- Formal cooperation between personnel from member government
(secondment, etc.)
- Attempts at creating sense of community among elites and across the
publics of the alliance
Defining cyberspace
Items “based on or dependent on computing and communications
technology; the information that these artifacts use, store,
handle, or process; and the interconnections among these various
elements” (US National Academy of Sciences 2014, 8; quoted in
WM)
Cyber as a prefix
“cyber” as a prefix denotes anything associated with
cyberspace; bottom line, “technology infrastructures” that
deal with “electronic information (data) processing” (CCDCOE
2017; quoted in WM).
Actors in cyberspace
States
Non-state actors
Proxy actors
Corporations
Private individuals
Actions * aka Computer Network Operations
Defense
Exploitation
Attack
Varieties of cyber attacks
Denial of service (DoS) and distributed denial of service (DDoS)
Malware (including ransomware, worms)
Phishing and spear phishing
Evolution in cyber attacks
From states as “primary,” even “exclusive” actors to non-state
actors playing key roles too; influence of technology in this shift
From emphasis on exploitation to disruption of public and private
resources
Capacity for “weaponized” attacks that damage or destroy
physical infrastructure and potentially result in loss of life
A new concern: AI and the role of chatbots
Attribution as a problem (confronting cyber attacks)
Not fundamentally different from non-cyber attacks, but evidence tends to be
almost exclusively circumstantial
Given the nature of the evidence, tricky to convince audiences (attacker; public)
that the authority doing the attribution knows attacker’s identity
Developing international legal norms: the Tallin manual (confronting cyber attacks)
Cyber attacks can be treated as acts of war “if [they cause] harm to individuals
or damage to property equivalent to the use of force” (WM).
States “are responsible for cyber attacks” carried out by non-state actors
based “within their borders if the state is aware of them or [they[ act under [the
state’s] direction” (WM).
Cyberwar
Information has always been an essential
part of warfare
Information includes communications for
command and control; reconnaissance and
intelligence collection on the enemy