SSOAR Logo
    • Deutsch
    • English
  • Deutsch 
    • Deutsch
    • English
  • Einloggen
SSOAR ▼
  • Home
  • Über SSOAR
  • Leitlinien
  • Veröffentlichen auf SSOAR
  • Kooperieren mit SSOAR
    • Kooperationsmodelle
    • Ablieferungswege und Formate
    • Projekte
  • Kooperationspartner
    • Informationen zu Kooperationspartnern
  • Informationen
    • Möglichkeiten für den Grünen Weg
    • Vergabe von Nutzungslizenzen
    • Informationsmaterial zum Download
  • Betriebskonzept
Browsen und suchen Dokument hinzufügen OAI-PMH-Schnittstelle
JavaScript is disabled for your browser. Some features of this site may not work without it.

Download PDF
Volltext herunterladen

(1.013 MB)

Zitationshinweis

Bitte beziehen Sie sich beim Zitieren dieses Dokumentes immer auf folgenden Persistent Identifier (PID):
https://nbn-resolving.org/urn:nbn:de:0168-ssoar-91327-3

Export für Ihre Literaturverwaltung

Bibtex-Export
Endnote-Export

Statistiken anzeigen
Weiterempfehlen
  • Share via E-Mail E-Mail
  • Share via Facebook Facebook
  • Share via Bluesky Bluesky
  • Share via Reddit reddit
  • Share via Linkedin LinkedIn
  • Share via XING XING

Why Great Powers Launch Destructive Cyber Operations and What to Do About It

[Stellungnahme]

Weber, Valentin

Körperschaftlicher Herausgeber
Forschungsinstitut der Deutschen Gesellschaft für Auswärtige Politik e.V.

Abstract

2010 was a seminal year. Stuxnet, an American-Israeli cyber operation sabotaged Iranian uranium enrichment centrifuges. It became publicly known as the first cyber operation in history that destroyed physical objects. This operation had the clear goal of degrading Iran’s uranium enrichment capabilit... mehr

2010 was a seminal year. Stuxnet, an American-Israeli cyber operation sabotaged Iranian uranium enrichment centrifuges. It became publicly known as the first cyber operation in history that destroyed physical objects. This operation had the clear goal of degrading Iran’s uranium enrichment capability, but in general there has been little research as to why hegemons launch destructive cyber operations. This brief argues that the main motivations are threefold: territorial conquest, threat prevention, and retaliatory actions. Key Findings: Iran, North Korea, South Korea, Ukraine and Taiwan have been the main targets of destructive great power cyber operations. For the US, future targets will possibly be limited to countries that aim to acquire nuclear weapons - Iran and North Korea. Given ongoing border disputes, China and Russia will likely target neighboring countries with such destructive campaigns - for China those are Vietnam, the Philippines, and Japan, and for Russia they are Georgia, Moldova, and Japan. To prevent destructive cyber operations, Germany and other EU states have been engaged in cyber capacity building and threat-intelligence sharing across continents. But Berlin needs to set priorities. When it comes to combatting state-sponsored cyber campaigns, Germany should deepen ties with non-EU countries that have been or likely will be targets of damaging rather than merely disruptive operations, i.e., in Southeast Asia, East Asia, the Caucasus, and Southeast Europe.... weniger

Thesaurusschlagwörter
Großmacht; Informationstechnologie; Bedrohung; Gebietsgewinn; Vergeltung; USA; Israel; Iran; Nordkorea; Südkorea; Ukraine; Taiwan; China; Vietnam; Philippinen; Japan; Russland; Georgien; Republik Moldau; Bundesrepublik Deutschland; EU; Verteidigungspolitik; Sicherheitspolitik; internationale Beziehungen; Internet

Klassifikation
Friedens- und Konfliktforschung, Sicherheitspolitik
interaktive, elektronische Medien

Sprache Dokument
Englisch

Publikationsjahr
2023

Erscheinungsort
Berlin

Seitenangabe
7 S.

Schriftenreihe
DGAP Policy Brief, 33

ISSN
2198-5936

Status
Veröffentlichungsversion; begutachtet

Lizenz
Creative Commons - Namensnennung, Nicht kommerz., Keine Bearbeitung 4.0


GESIS LogoDFG LogoOpen Access Logo
Home  |  Impressum  |  Betriebskonzept  |  Datenschutzerklärung
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.
 

 


GESIS LogoDFG LogoOpen Access Logo
Home  |  Impressum  |  Betriebskonzept  |  Datenschutzerklärung
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.