Recently Edward Lucas tweeted a series on the changes in Russian military doctrine, which signified a change away from physical combat and towards information domination in the form not seen since mid-90’s. That Russians always preferred, and are extremely skilled on, the battlefield in the cognitive domain is not new. But this new view of the recently requested new Russian military doctrine (Putin requested a new draft in 2013, having been dissatisfied with the 2010, strictly defensive doctrine that Medvedev signed off) shows just how forcefully information warfare is making a comeback.
We reviewed the Chinese intelligence community structure, the way they collect data and, as a result of the first two, also tackled the monolith myth of China in order to explain why most things you hear about Chinese cyber activities do not make sense nor survive any closer analysis. Now it is time we have a look at Chinese cyber capabilities and their use. This is Part 4 of the four part series: Chinese intelligence structures The Chinese way of collecting data [China: the monolith myth]((http://playgod.
It doesn’t take much to imagine the consequences of a successful cyber attack. In a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our computer vulnerabilities here at home. Taking down vital banking systems could trigger a financial crisis. The lack of clean water or functioning hospitals could spark a public health emergency. And as we’ve seen in past blackouts, the loss of electricity can bring businesses, cities and entire regions to a standstill.
A particularly important question is what sort of cyberattack is the equivalent of a traditional armed attack. Efforts to answer that question have culminated in the Manual on International Law Applicable to Cyber Warfare (also known as the Tallinn Manual), which will be published later this year. The Tallinn Manual is a nonbinding yet authoritative restatement of the law of armed conflict as it relates to cyberwar. Declarations of Cyberwar - IEEE Spectrum