Consequences of cyberspace for countries' maritime strategy and security

Document Type : Research Paper

Abstract

The role of cyber space in the maritime environment of the countries is very prominent and it contains important consequences for the security and maritime strategy of the countries. In this regard, the question of the present article is what is the role of naval forces in the field of cyber space and what are the consequences (opportunities and challenges) of this space for the security and maritime strategy of countries? In response to this question, by using the descriptive-analytical method and document research tools, we came to the proposition that cyberspace is the core of success in naval missions and forms the basis of control and command of naval forces. Intelligence-based systems enable battlespace awareness, intelligence gathering, targeting, and other capabilities. The goal of modern naval forces is to maintain the freedom of maneuver and deprive the enemy of freedom of action at sea, which is provided by cyber capabilities and equipment. Adversaries' cyber capabilities, such as precision targeting and long-range attacks on ships, mean that navies at sea are more tightly interconnected than ever before, yet more vulnerable. The traditional balance of power between navies and adversaries has been disrupted by the proliferation of cyber capabilities, which has created asymmetries. Cyber ​​capabilities also make smaller navies and non-state actors disproportionately powerful.

Keywords

Main Subjects


  • منابع و مأخذ

    فارسی:

    • احدی، محمد، شاهمحمدی، محمد (1397)؛ طرح راهبردی دفاع سایبری جمهوری اسلامی ایران در حوزه بازدارندگی، فصلنامه مطالعات بین‌رشته‌ای دانش راهبردی، سال هشتم، شماره 31، تابستان 1397، صص 252-225
    • بوژمهرانی، علی اصغر و مهدوی حاجی محمدرضا (1399)؛ واکاوی تهدیدات نوین سایبری در نیروهای مسلح، فصلنامه مطالعات جنگ، دوره 2، شماره 6 ، آذر، صص:100-126
    • خلیلی‌پور رکن‌آبادی، علی و  نورعلی‌وند یاسر (1391)؛ تهدیدات سایبری و تأثیر آن بر امنیت ملی، فصلنامه مطالعات راهبردی، سال پانزدهم، شماره دوم، تابستان، صص  196-167.
    • کاویانی حسن، میرسپاسی ناصر و دیگران (1399)؛ طراحی مدل شایستگی کارکنان در حوزه امنیت سایبری، فصلنامه مطالعات بین‌رشته‌ای دانش راهبردی، سال دهم، شماره 41، زمستان 1399، صص 298-273.
    • نجفی سیار، رحمان (1401)؛ ارزیابی راهبردهای جدید دریایی ایالات متحده در برابر چین؛ مزیت‌ها و چالش‌ها، فصلنامه روابط خارجی، دوره 15، شماره 54، صص 3-27.
    • یادگاری، وحید و دیگران (1396)؛ نقش امنیت فاوا در جنگ سایبری علیه سازمان‌های امنیتی با رویکرد پدافند غیرعامل، فصلنامه پژوهش‌های حفاظتی- امنیتی، دانشگاه جامع امام حسین (ع) سال 6، شماره 21، صص 1-24.

    منابع انگلیسی:

    • Brenner, Susan (2018); Cyberthreats: The Emerging Fault Lines of the Nation State, New York: Oxford University Press.
    • BBC News, (August 28, 2015); Egypt Arrests as Undersea Internet Cable Cut Off Alexandria,” Available at: bbc.com/news/world-middle-east-21963100.
    • Choucri Nazli and David D. Clark, (2021); “Integrating Cyberspace and International Relations: The Co-Evolution Dilemma, Harvard University and Massachusetts Institute for Technology, November 6–7.
    • Choucri and Clark, (2021); Integrating Cyberspace and International Relations, Cambridge Press.
    • Charles Cheney Hyde, (1956); International Law, Chiefly as Interpreted and Applied by the United States , 2nd rev., 3 vols. Boston, MA: Little, Brown.
    • Daniel T. Kuehl, (2019); “From Cyberspace to Cyberpower: Defi ning the Problem,” in Cyberpower and National Security , ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz, Washington, DC: National Defense University Press and Potomac Books, Inc., p. 28.
    • Cyberspace Operations, Joint Publication 3-12, S. Department of Defense, February 5, 2019.
    • Dombrowski Peter and Chris C. Demchak, (Spring 2017), “Cyber War, Cybered Confl ict, and the Maritime Domain,” Naval War College Review 67, 2, pp. 73–6.
    • Defence White Paper 2018: Defending Australia and its National Interests , Department of Defence, Government of Australia. Available at: defence.gov.au/whitepaper/docs/ WP_2013_web.pdf
    • Impson, Nick (2020); The Next Warm War: How History’s Anti-Access/Area Denial ,Campaigns Inform the Future of War, Address: https://smallwarsjournal.com/jrnl
    • Navy Cyber Power 2020 ; S. Navy Information Dominance Roadmap 2013–2028, Deputy Chief of Naval Operations for Information Dominance, Director of Warfare Integration for Information Dominance,p. ii. Available at: www.defenseinnovationmarketplace.mil/resources/Information_Dominance_Roadmap.
    • Navy Cyber Power 2020: Sustaining U.S. Global Leadership – Priorities for 21st Century Defens, Deputy Chief of Naval Operations for Information Dominance/Fleet Cyber Command/Tenth Fleet, Washington, DC, November 2020. Available at: defenseinnovationmarketplace.mil/resources/NavyCyberPlan2020.pdf
    • Russell, Alison Lawlor; (2018); Cyber Blockades, Washington, DC: Georgetown University Press.
    • The UK National Strategy for Maritime Security, HM Government, May 2019, p. 19. Available at: www. gov.uk/government/publication.
    • Rattray, Gregory J (2014); Strategic Warfare in Cyberspace, Cambridge, MA: MIT Press.
    • Sherry Sontag and Christopher Drew, (2012); Blind Man’s Bluff, New York: HarperCollins.
    • Sherry Sontag and Christopher Drew,(1998); Blind Man’s Bluff, New York: Harper
    • Stavridis, James “Time for a U.S. Cyber Force, Proceedings Magazine 140, 1/1331, January 2017.
    • Maritime Doctrine of the Russian Federation 2020, July 2001, Ocean Policy 2020, p. 16. Available at: www. org/downloads/arctic/Russian_Maritime_Policy_2020.pdf
    • S. Navy Information Dominance Roadmap 2013–2028 , pp. 7–8; Navy Cyber Power 2020.
    • VADM Jan E. Tighe, 3 (May 2021); “The Impact of Cyber on the Maritime Operational Level of War,” MOC Warfighter. Available at: usnwc.edu/mocwarfighter/Article.aspx?ArticleID=23
    • Zsolt, Haig. (2018); Electronic Warfare in Cyberspace, Faculty of Military Sciences and Officer Training National University of Public Service, Budapest, p6.