01499nas a2200229 4500000000100000000000100001008004100002260000900043653000800052653004300060653005300103653004400156653003200200653003300232653001500265653003200280100002000312245004400332300001200376490000600388520087500394 2001 d c200110aCNO10amalicious computer-mediated activities10ainterdependencies created by network-based power10aprivate sector - government cooperation10aIT-related security regimes10aDual use information systems10aregulation10acomputer network operations1 aAndrew Rathmell00aControlling Computer Network Operations a121-1440 v73 a
The development of Information Operations and, more particularly, Computer Network Operations (CNO), has been paralleled by calls to control both the military and the criminal/terrorist use of these capabilities. The need for multilateral action to control criminal and terrorist activity is acknowledged and being pursued through mechanisms such as the Council of Europe. Efforts to control military use of CNO through arms control or multilateral behavioral norms are however being undermined by an unresolved dilemma faced by the leading powers; whether to exploit their CNO advantage for strategic purposes or to protect the global information environment on which they depend. In resolving this dilemma, Western strategists need to take into account two important new features of the security environment—interdependency and the role of the private sector.