TY - JOUR KW - CNO KW - malicious computer-mediated activities KW - interdependencies created by network-based power KW - private sector - government cooperation KW - IT-related security regimes KW - Dual use information systems KW - regulation KW - computer network operations AU - Andrew Rathmell AB -
The development of Information Operations and, more particularly, Computer Network Operations (CNO), has been paralleled by calls to control both the military and the criminal/terrorist use of these capabilities. The need for multilateral action to control criminal and terrorist activity is acknowledged and being pursued through mechanisms such as the Council of Europe. Efforts to control military use of CNO through arms control or multilateral behavioral norms are however being undermined by an unresolved dilemma faced by the leading powers; whether to exploit their CNO advantage for strategic purposes or to protect the global information environment on which they depend. In resolving this dilemma, Western strategists need to take into account two important new features of the security environment—interdependency and the role of the private sector.
BT - Information & Security: An International Journal DA - 2001 DO - http://dx.doi.org/10.11610/isij.0707 LA - eng N2 -The development of Information Operations and, more particularly, Computer Network Operations (CNO), has been paralleled by calls to control both the military and the criminal/terrorist use of these capabilities. The need for multilateral action to control criminal and terrorist activity is acknowledged and being pursued through mechanisms such as the Council of Europe. Efforts to control military use of CNO through arms control or multilateral behavioral norms are however being undermined by an unresolved dilemma faced by the leading powers; whether to exploit their CNO advantage for strategic purposes or to protect the global information environment on which they depend. In resolving this dilemma, Western strategists need to take into account two important new features of the security environment—interdependency and the role of the private sector.
PY - 2001 SP - 121 EP - 144 T2 - Information & Security: An International Journal TI - Controlling Computer Network Operations VL - 7 ER -