Cyclones in cyberspace: Information shaping and denial in the 2008 Russia–Georgia war

While the rhetoric of cyber war is often exaggerated, there have been recent cases of international conflict in which cyberspace has played a prominent role. In this article, we analyze the impact of cyberspace in the conflict between Russia and Georgia over the disputed territory of South Ossetia in August 2008. We examine the role of strategic communications, information operations, operations in and through cyberspace, and conventional combat to account for the political and military outcomes of the conflict. The August 2008 conflict reveals some emergent issues in cyber warfare that can be generalized for further comparative research: the importance of control over the physical infrastructure of cyberspace, the strategic and tactical importance of information denial, the emergence of cyber-privateering, the unavoidable internationalization of cyber conflicts, and the tendency towards magnifying unanticipated outcomes in cyber conflicts – a phenomenon we call ‘cyclones in cyberspace’.

[1]  W. Bayles The Ethics of Computer Network Attack , 2001, The US Army War College Quarterly: Parameters.

[2]  Martin Dodge,et al.  The Role of Maps in Virtual Research Methods , 2005 .

[3]  Stuart Hannabuss,et al.  Terror on the Internet: The New Arena, the New Challenges , 2007 .

[4]  Daniel W. Drezner The Global Governance of the Internet: Bringing the State Back In , 2004 .

[5]  Paul Sturges,et al.  Access Denied: The Practice and Policy of Global Internet Filtering , 2008 .

[6]  Myriam Dunn Cavelty,et al.  Power and Security in the Information Age: Investigating the Role of the State in Cyberspace , 2007 .

[7]  J. Nichol Russia-Georgia Conflict in South Ossetia: Context and Implications for U.S. Interests , 2008 .

[8]  Richard Rogers Internet Research: The Question of Method—A Keynote Address from the YouTube and the 2008 Election Cycle in the United States Conference , 2010 .

[9]  Johan Eriksson,et al.  International Relations and Security in the Digital Age , 2007 .

[10]  Shanthi Kalathil,et al.  Open Networks, Closed Regimes: The Impact of the Internet on Authoritarian Rule , 2003, First Monday.

[11]  Rafal Rohozinski,et al.  Shifting Fire: Information Effects in Counterinsurgency and Stability Operations. A Workshop Report , 2006 .

[12]  Daniele Ehrlich,et al.  Analyzing Spatial Drivers in Quantitative Conflict Studies: The Potential and Challenges of Geographic Information Systems , 2009 .

[13]  Jeffrey T. G. Kelsey Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare , 2008 .

[14]  Ronald J. Deibert,et al.  Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.

[15]  Ronald J. Deibert,et al.  Beyond Denial: Introducing Next-Generation Information Access Controls , 2010, Access Controlled.

[16]  R. Hughes A treaty for cyberspace , 2010 .

[17]  Ronald J. Deibert,et al.  Measuring Global Internet Filtering , 2008 .

[18]  James N. Rosenau,et al.  Turbulence in World Politics: A Theory of Change and Continuity , 1990 .

[19]  T. Thomas The Bear Went Through the Mountain: Russia Appraises its Five-Day War in South Ossetia , 2009 .

[20]  John Arquilla,et al.  The Emergence of Noopolitik: Toward an American Information Strategy , 1999 .

[21]  Robert Latham,et al.  Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security , 2004 .

[22]  Kihong Park,et al.  The Internet as a Large-Scale Complex System , 2005, Santa Fe Institute Studies in the Sciences of Complexity.

[23]  Kristin A. Cook,et al.  Illuminating the Path: The Research and Development Agenda for Visual Analytics , 2005 .

[24]  JAVIERCORRALES FRANKWESTHOFF,et al.  Information Technology Adoption and Political Regimes , 2006 .

[25]  A. George,et al.  Case Studies and Theory Development in the Social Sciences , 2005 .

[26]  Shanthi Kalathil,et al.  Open Networks, Closed Regimes: The Impact of the Internet on Authoritarian Rule , 2003 .

[27]  Roger N. McDermott,et al.  Russia’s Conventional Armed Forces and the Georgian War , 2009, The US Army War College Quarterly: Parameters.

[28]  K. Himma The Handbook of Information and Computer Ethics , 2007 .

[29]  Mary Manjikian,et al.  From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik , 2010 .

[30]  M. Dodge,et al.  Mapping Cyberspace , 2000 .

[31]  H. Nissenbaum,et al.  Digital Disaster, Cyber Security, and the Copenhagen School , 2009 .

[32]  Anat Ben-David,et al.  The Palestinian—Israeli peace process and transnational issue networks: the complicated place of the Israeli NGO , 2008, New Media Soc..

[33]  Giampiero Giacomello,et al.  Bangs for the Buck: A Cost-Benefit Analysis of Cyberterrorism , 2004 .

[34]  John Arquilla,et al.  Chechnya: A Glimpse of Future Conflict? , 1999 .

[35]  Joshua E. Kastenberg,et al.  Georgia’s Cyber Left Hook , 2008, The US Army War College Quarterly: Parameters.

[36]  Milton L. Mueller,et al.  The Internet and Global Governance: Principles and Norms for a New Regime , 2007 .

[37]  David F. DiMeo,et al.  UNGOVERNED SPACES: Alternatives to State Authority in an Era of Softened Sovereignty , 2011 .

[38]  Johan Eriksson,et al.  The Information Revolution, Security, and International Relations: (IR)relevant Theory? , 2006 .