美国作业代写范文:Is Cyber War Between the U.S. and Russia Possible?

发布时间:2022-08-09 11:03:43 论文编辑:cinq888

美国作业代写范文-美国和俄罗斯之间可能发生网络战争吗?本文是一篇美国留学生作业写作范例,主要内容是讲述从20世纪的大部分时间到21世纪,美国和俄罗斯之间一直存在一定程度的紧张关系。第二次世界大战后,冷战在两国之间创造了一种动态,滋生了持续的竞争。这种动态在苏联解体后一直存在,并在随后的几十年中呈现出多种形式。从冷战时期的核军备竞赛和20世纪后半叶的太空竞赛开始,技术一直是竞争的主要支持者。如今,这种紧张关系已经在网络领域显现出来,每个国家都在努力通过使用网络情报和攻击来取得优势。在过去十年中,美国发现了几起俄罗斯不仅干涉美国国内网络活动,而且干涉其他几个国家的事件。俄罗斯对爱沙尼亚和立陶宛等西方联盟的前卫星国、如今的独立民主国家的网络干扰,使国际体系处于戒备状态。下面就一起来参考这篇美国作业代写范文。

美国作业代写范文

How Technology is Changing the Dynamic 技术如何改变动态

Introduction 引言

Throughout most of the 20th century and into the 21st, there has been a level of tension between the U.S. and Russia. Following the Second World War, the Cold War created a dynamic between the two countries that breeds constant competition. This dynamic has persisted past the fall of the Soviet Union and has taken many shapes and forms in the following decades. Technology has been the main proponent of competition, beginning with the nuclear arms race of the Cold War and the race to space of the latter half of the 20th century. Today, the tension has manifested itself into the cyber sphere, with each country working to gain the upper hand over the other through the use of cyber intelligence and attacks. In the past decade, the U.S. has identified several instances of Russia interfering not only with American domestic cyber activity, but also interfering in several other countries. Russia’s cyber interference with former satellite states, now independent, democratic nations with Western alliances, such as Estonia and Lithuania, puts the international system on alert.

In April of 2007, cyber attacks were documented in Estonia that resulted in the disarming of several Estonian government, private sector, and news portal websites over three weeks. It is largely speculated that the Kremlin orchestrated the attack in light of political tension between Estonia and Russia regarding World War 2 memorial services. In 2008, the Radio Free Europe/Radio Liberty website operating within Belarus was targeted by a Distributed Denial of Service. The attack effectively disabled the website, which is one of the only free, pro-Western news sources operating in Belarus. Belarus has been led by its president, Alexander Lukashenka, since 1994, and is considered to have the strongest remaining political ties with Russia while also having one of the most repressive media environments in the world. The attack is largely suspected to have been perpetrated by Russia. These attacks set a precedent of high profile Russian intervention in the operations of free, democratic, pro-Western institutions, which creates a level of discomfort in Western countries, specifically the United States, given the tenuous relation between the two countries over the past several decades.

2007年4月,爱沙尼亚发生了网络攻击,导致数个爱沙尼亚政府、私营部门和新闻门户网站在三周内被解除武装。据推测,这次袭击是克里姆林宫策划的,因为爱沙尼亚和俄罗斯在第二次世界大战纪念仪式方面存在政治紧张关系。2008年,白俄罗斯境内运营的自由欧洲电台/自由电台网站遭到分布式拒绝服务攻击。该网站是白俄罗斯境内唯一一个免费的亲西方新闻来源。自1994年以来,白俄罗斯一直由其总统亚历山大·卢卡申科领导,被认为与俄罗斯保持着最牢固的政治关系,同时也是世界上最压抑的媒体环境之一。这次袭击基本上被怀疑是俄罗斯所为。这些袭击开创了俄罗斯高调干预自由、民主、亲西方机构运作的先例,这给西方国家,特别是美国,造成了一定程度的不适,因为两国在过去几十年中关系脆弱。

The U.S. also has a history of breaching the cyber securities of other nations. As early as the 1960’s and 1970’s, American submarines operated alongside the early National Security Agency and in the Sea of Okhotsk. They were able to evade Soviet detection and intercept information from an underwater communications cable, effectively stealing undeterminable amounts of classified Soviet intelligence. In 1982, an alleged cyber attack on a Russian gas pipeline was orchestrated by American operatives, and resulted in the explosion of the pipeline in an attempt to disrupt the Soviet economy. Sabotage and espionage between the two countries is not unprecedented, and likely not final, given the current political climate. In 2010, Iranian nuclear facilities were attacked by the Stuxnet worm, a computer worm that infiltrates a device, spreads, takes over, and disables the network system. Centrifuges within the Iranian facilities were breaking, rendering the facilities inoperable. It is largely speculated that the attacks were a joint operation between the United States and Israel.

美国也有破坏其他国家网络安全的历史。早在20世纪60年代和70年代,美国潜艇就在早期国家安全局(National Security Agency)附近和鄂霍次克海作业。他们能够避开苏联的探测并从水下通信电缆截获信息,有效地窃取了数量不确定的苏联机密情报。1982年,美国特工策划了一次据称对俄罗斯天然气管道的网络攻击,导致管道爆炸,企图破坏苏联经济。鉴于当前的政治气候,两国之间的破坏和间谍活动并非史无前例,也不可能是最终的。2010年,伊朗核设施遭到了Stuxnet蠕虫的攻击。Stuxnet蠕虫是一种渗透设备、传播、接管并禁用网络系统的计算机蠕虫。伊朗设施内的离心机发生故障,导致设施无法运行。据推测,这些袭击是美国和以色列之间的联合行动。

This study will look at several cases of cyber attacks, specifically curtailed around the U.S. and Russia. The two countries are no stranger to armed conflict, and have already come dangerously close to war, as evident by the Cold War. Technology has become integral to the definition of power, and the concept of a powerful country shifts as technology does. As technology changes, so does the international system, and Russia has used this to their advantage. Understanding the criteria of war set by Carl von Clausewitz, the question sought to be answered by this research is whether a new theory of war, cyber war, between the United States and Russia is possible.

这项研究将着眼于美国和俄罗斯周围具体减少的几起网络攻击案件。这两个国家对武装冲突并不陌生,并且已经危险地接近战争,冷战就是明证。技术已成为权力定义的组成部分,强国的概念也随着技术的发展而变化。随着技术的变化,国际体系也在变化,俄罗斯利用了这一优势。理解卡尔·冯·克劳塞维茨设定的战争标准,本研究试图回答的问题是,美俄之间是否可能出现一种新的战争理论,即网络战争。

Literature Review 文献综述

In order to answer the question explored in this study, it is important to define cyber war and what it entails. The Oxford Dictionary defines cyber war as being, “The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes” (Oxford Dictionary, 2018).

为了回答本研究中探讨的问题,重要的是定义网络战争及其所包含的内容。《牛津词典》将网络战定义为“利用计算机技术破坏国家或组织的活动,特别是出于战略或军事目的蓄意攻击信息系统”。

Carl von Clausewitz offers three elements that define the concept of war, which can then be applied to the concept of cyber war and used to decide if it applies to the United States and Russia. First, Clausewitz writes that war is inherently violent, that both sides of the conflict work to overwhelm the other and inflict enough pain to render surrender. Second, he asserts that war is used as a means to an end, the end being the coercion of the enemy into accepting the terms of defeat. The third element is the concept of war’s political nature, that war is an extenuation of politics. It is politically motivated, and not defined by one decision; the ultimate “end” is subject to the will of the party in power and not necessarily constrained by isolated acts (Rid, 2012). The body of research into this question is divided along the lines of these elements. One such study concludes that cyber war is inevitable, although not necessarily between the U.S. and Russia. John Arquilla and David Ronfeldt surmise that technology inherently initiates cultural change, that it forces a shift in the international system. They draw upon historical precedent of technological advancements that changed the nature of war and had profound impacts on the course of history, such as the invention of the gun. Arquilla and Ronfeldt argue that the concept of modern “war” has shifted, so as to minimize violent conflict and has come to focus on the collection of information that would allow you to outmaneuver your opponent (Arquilla, 1993). They note that conflict in the modern age has manifested itself into an ideological disagreement and highly intertwined with economics, rather than territorial disputes as it has been in the past. Information has become a highly prioritized currency in inter-state conflict, and because of this, the nature of war has been changed.

卡尔·冯·克劳塞维茨(Carl von Clausewitz)提出了三个定义战争概念的要素,然后可以将这些要素应用于网络战争概念,并用来决定它是否适用于美国和俄罗斯。首先,克劳塞维茨写道,战争本质上是暴力的,冲突双方都努力压倒对方,并造成足够的痛苦以投降。第二,他声称战争是达到目的的手段,目的是迫使敌人接受失败的条件。第三个要素是战争政治性质的概念,即战争是政治的一种减轻。它是出于政治动机,不是由一项决定决定的;最终的“终结”取决于执政党的意愿,而不一定受到孤立行为的约束。对这个问题的研究主体是按照这些要素划分的。其中一项研究得出结论,网络战争是不可避免的,尽管不一定是美国和俄罗斯之间的战争。约翰·阿奎拉和大卫·朗费尔特(David Ronfeldt)推测,技术从本质上引发了文化变革,迫使国际体系发生变化。他们借鉴了改变战争性质并对历史进程产生深远影响的技术进步的历史先例,例如枪的发明。Arquilla和Ronfeldt认为,现代“战争”的概念已经转变,以尽量减少暴力冲突,并将重点放在收集信息上,使你能够战胜对手。他们指出,现代的冲突表现为意识形态分歧,与经济高度交织,而不是过去的领土争端。在国家间冲突中,信息已成为一种高度优先的货币,因此,战争的性质发生了变化。

 Research into cyber war also suggests that technology changes the nature of the international system (Weigly, 1989). It allows a state access to another in ways previously not possible. Technology has redrawn boundaries between states and opens systems that had not been accessible before (Arquilla, 1993). This challenges the international system and opens it up to reconfiguration. States have begun to alter their approach to national security and priorities, with a focus on protecting their economy. To challenge a powerful country by modern standards, such as the United States or Russia, it is necessary to challenge their economy, to compromise their economic capabilities.

对网络战争的研究还表明,技术改变了国际体系的性质。它允许一个状态以以前不可能的方式访问另一个状态。技术重新划定了州与州之间的界限,并开放了以前无法访问的系统。这对国际体系构成了挑战,并为其重新配置打开了大门。各国已开始改变对国家安全和优先事项的态度,重点是保护本国经济。要以现代标准挑战一个强大的国家,如美国或俄罗斯,就必须挑战它们的经济,损害它们的经济能力。

 Alternatively, there is research surmising that cyber war is not inevitable, that it will not take place, based on the three elements set for by Clausewitz. Thomas Rid argues that no cyber attack to date has met all three elements of being violent, instrumental, and politically attributed, despite numerous isolated attacks meeting one or two of the criteria (Rid, 2012). He looks into the Estonia cyber attack in April of 2007 that threatened their national sovereignty, as well as the explosion of a Russian gas pipeline in 1982 that is suspected to be the result of an American cyber attack, and found neither to meet the definition of cyber war. He concludes that because cyber war is not geared towards the type of violence that directly threatens human life and safety, cyber war is not likely.

或者,有研究推测,基于克劳塞维茨设定的三个要素,网络战争并非不可避免,也不会发生。托马斯·里德(Thomas Rid)认为,迄今为止,没有任何网络攻击符合暴力、工具性和政治性三个要素,尽管有许多孤立的攻击符合其中一个或两个标准。他调查了2007年4月爱沙尼亚网络攻击事件,该事件威胁到了爱沙尼亚的国家主权,以及1982年俄罗斯天然气管道爆炸事件,该爆炸事件被怀疑是美国网络攻击的结果,并发现两者都不符合网络战的定义。他总结说,由于网络战争并非针对直接威胁人类生命和安全的暴力类型,因此网络战争不太可能发生。

 Regardless of whether these case studies conclude an act of cyber war or not, it is evident that the number of cyber attacks are increasing, and are likely to continue. The Pew Research Center conducted a survey in 2014 that canvased 1,642 experts on the Internet and cyber attacks and found that 61% agreed that a major attack causing widespread harm would occur by 2025. The study highlighted four key themes agreeing with the likelihood of attacks. First, that systems connected to the Internet are open targets. An overwhelming amount of society’s basic functions, essential to daily activities, are facilitated by the Internet. This attracts attention from those who wish to take advantage of this fact. Second, that security is not the primary concern when Internet applications are designed. Designers instead work to make the most economically beneficial product they can, to make the most money they can. System security does not often fall in that category. Third, that major cyber attacks have already happened, such as Stuxnet. Finally, that cyber attacks often target the private sector rather than government institutions. These institutions are more vulnerable to attacks because they are not equipped with the same level of defense as government institutions, but arguably carry equal weight importance in the daily lives of the public (Pew Research, 2014). The dissenting opinion argues three counter concepts. First, that there is already significant progress in security fixes. Designers are upgrading system security capabilities. Second, that cyber deterrence is an effective method of defense. The threat of retaliation is sufficient to deter malicious actors. Cyber deterrence is defined as the capability to do to attackers what they may intend to inflict (Libicki, 2009), and that the potential attacker is aware of it. Third, that cyber attacks are exaggerated, created by organizations that would profit from an atmosphere of fear.

无论这些案例研究是否得出网络战争行为的结论,很明显,网络攻击的数量正在增加,并可能继续。皮尤研究中心(Pew Research Center)在2014年进行了一项调查,调查了1642名互联网和网络攻击方面的专家,发现61%的人同意到2025年将发生一次造成广泛伤害的重大攻击。该研究强调了四个关键主题,同意攻击的可能性。首先,连接到互联网的系统是开放的目标。互联网为社会的大量基本功能提供了便利,这些功能对日常活动至关重要。这吸引了那些希望利用这一事实的人的注意。其次,在设计互联网应用程序时,安全不是首要考虑的问题。相反,设计师们致力于尽可能地制造最经济实惠的产品,尽可能地赚大钱。系统安全性通常不属于这一类。第三,重大网络攻击已经发生,例如Stuxnet。最后,网络攻击的目标往往是私营部门,而不是政府机构。这些机构更容易受到攻击,因为它们没有政府机构那样的防御能力,但可以说在公众的日常生活中具有同等的重要性。持不同意见的人提出了三个相反的概念。首先,在安全修复方面已经取得了重大进展。设计者正在升级系统安全功能。第二,网络威慑是一种有效的防御方法。报复威胁足以威慑恶意行为者。网络威慑被定义为对攻击者实施他们可能打算实施的攻击的能力,并且潜在的攻击者知道这一点。第三,网络攻击被夸大了,是由从恐惧气氛中获利的组织发起的。

 The United States has identified the cyber sphere as a top national security sphere, and has initiated efforts to increase deterrence capabilities under the new administration, including the commission of several research and development agencies. Agencies such as the Cyberspace Solarium Commission have been tasked with finding and have published strategic approaches to cyber deterrence (Sasse, 2018).

美国已将网络领域确定为最高国家安全领域,并在新政府(包括几个研发机构)的领导下,开始努力提高威慑能力。网络空间日光浴室委员会等机构已被授权寻找并公布了网络威慑的战略方法。

Theory 理论

 Realism is the international relations theory that best explains the United States and Russia’s response to one another and the shifting world system. Under realism, international relations is individual states interacting with each other, in the pursuit of power. States act in accordance with human nature, which is largely selfish. The definition of power is ambiguous, and is not constrained by any one component, but has been agreed to include technological capabilities. There exists a balance of power in the international system, and states battle to gain the upper hand over the others while preventing others from doing the same to them. There is a lack of hegemony in the international system, so higher power to assume the ultimate authority in delegating the balance of power. To do so, states operate in their own self interest, with national security being a top priority. They rely on their own military resources to achieve desired ends, and a “self-help” system of sorts emerges. Jean-Jacques Rousseau wrote about realism in his work, The State of War (Roosevelt, 1987),and surmised that the world is governed by predatory rulers, and that there is an inherent anarchy in international politics. Applying the theory to the modern world, neorealism borrows models from economics and behavioral science. It makes the modification to the theory that recognizes economic resources as the basis of influence and power. A powerful country by today’s standards is a country with a powerful, secure economy.

现实主义是一种国际关系理论,它最能解释美国和俄罗斯之间的反应以及不断变化的世界体系。在现实主义下,国际关系是单个国家为了追求权力而相互作用。国家按照人性行事,这在很大程度上是自私的。权力的定义模棱两可,不受任何一个组成部分的限制,但已经同意包括技术能力。国际体系中存在着力量平衡,各国争先恐后地取得优势,同时阻止其他国家对它们采取同样的行动。在国际体系中缺乏霸权,因此更高的权力机构可以在权力平衡中承担最终权力。要做到这一点,各国必须以自身利益为出发点,国家安全是首要任务。他们依靠自己的军事资源来达到预期目的,于是出现了一种“自助”系统。让·雅克·卢梭在他的著作《战争状态》中写道现实主义,并推测世界由掠夺性统治者统治,国际政治中存在固有的无政府状态。新现实主义将这一理论应用于现代世界,借鉴了经济学和行为科学的模型。它修正了将经济资源视为影响力和权力基础的理论。按照今天的标准,一个强大的国家是一个经济强大、安全的国家。

 Between the United States and Russia, there lies a deeply rooted struggle for power. Both states have built themselves up as two of the most powerful states in the international system. As prescribed by the realism theory, each state is in constant struggle to gain power over the other; this concept is directly applicable to the situation today.  Constant changes in technology create constant opportunity for the balance of power to shift, and both countries work to gain power over the other.

美国和俄罗斯之间存在着根深蒂固的权力斗争。这两个国家都已成为国际体系中最强大的两个国家。正如现实主义理论所规定的,每个国家都在不断地争夺对另一个国家的权力;这一概念直接适用于今天的情况。技术的不断变化为力量平衡的转移创造了不断的机会,两国都在努力超越对方。

Cases/Analysis 案例/分析

 The following cases look at instances of possible cyber attacks that the U.S. and Russia/Soviet Union were involved in. By comparing them the Clausewitz’s criteria of war, it will possible to evaluate the possibility of cyberwar given the precedent set by the United States and Russia, specifically their capabilities and the extent to which they are willing to go in the name of national security and protecting the balance of power.

以下案例分析了美国和俄罗斯/苏联可能参与的网络攻击。通过将其与克劳塞维茨的战争标准进行比较,可以评估美国和俄罗斯开创的先例下网络战争的可能性,特别是他们的能力以及他们愿意以国家安全和保护力量平衡的名义进行网络战争的程度。

1.)   Estonia, 2007: 1)爱沙尼亚,2007年:

In April of 2007, street riots broke out in the capital, Tallinn, between young Russian ethnic groups and the native Estonians. The riots were in response a government decision to relocate a Soviet-era, World War Two memorial that celebrated Soviet army victories. The site had become a rallying point for extremist Russian nationalists, and the relocation was an attempt on the government’s behalf to ease tensions. Instead, the tensions only increased when the peaceful protests turned violent, with police making 1300 arrests, hundreds injured, and one death. The Estonian ambassador in Moscow was physically assaulted. Estonian government web pages, news agencies, and private sector websites were attacked over a span of three weeks, disrupting the day to day operations of the country.

2007年4月,在首都塔林,年轻的俄罗斯族裔群体和当地的爱沙尼亚人之间爆发了街头暴乱。暴乱是对政府决定搬迁一座苏联时代的二战纪念馆的回应,该纪念馆庆祝苏联军队的胜利。该地点已成为俄罗斯极端民族主义者的聚集点,搬迁是为了政府缓解紧张局势。相反,当和平抗议演变为暴力时,紧张局势才有所加剧,警方逮捕了1300人,数百人受伤,一人死亡。爱沙尼亚驻莫斯科大使遭到人身攻击。爱沙尼亚政府网页、新闻机构和私营部门网站在三周内遭到攻击,扰乱了该国的日常运作。

Analysis: Estonia is a highly interconnected state, with high internet capabilities. It was a wide range of government and private sector services available online and the majority of the Estonian population has access to and used the Internet; much of daily life is dependent on internet functionality. The attack is suspected to have been instigated by the Kremlin and Russian nationalists in response to removal of the memorial. This particular attack is highly politically motivated but lacks any inherent violent motivation. It demonstrates Russia’s ability and willingness to interfere in an independent state’s sovereignty.

分析:爱沙尼亚是一个高度互联的国家,具有很高的互联网能力。这是一种广泛的政府和私营部门在线服务,大多数爱沙尼亚人都能访问和使用互联网;许多日常生活都依赖于互联网功能。这次袭击被怀疑是克里姆林宫和俄罗斯民族主义者为回应纪念馆的拆除而煽动的。这次袭击具有高度的政治动机,但缺乏任何内在的暴力动机。它表明了俄罗斯干涉独立国家主权的能力和意愿。

 Source: “International Cyber Incidents: Legal Considerations” by Eneken Tikk, Kadri Kaska, and Liis Vihul, 2010.

2.)   Radio Free Europe/Radio Liberty, 2008:自由欧洲电台/自由电台,2008年:

In April of 2008, on the anniversary of the Chernobyl disaster, the Radio Free Europe/Radio Liberty website operating within Belarus was targeted by a Distributed Denial of Service attack. The attack rendered the website inoperable. The attack lasted for two days, during which other RFL/RL websites were affected. Belarus is notoriously maintains one the closest relationships with Russia following the fall of the Soviet Union, having been lead by the same president, Alexander Lukashenka, since 1994. Only 29% of the population uses the Internet, and access is controlled by a state-owned company that controls and restricts some critical websites, according to Freedom House.

2008年4月,在切尔诺贝利灾难周年之际,在白俄罗斯境内运营的自由欧洲电台/自由电台网站遭到分布式拒绝服务攻击。这次攻击使该网站无法运行。攻击持续了两天,期间其他RFL/RL网站受到影响。众所周知,白俄罗斯是苏联解体后与俄罗斯关系最密切的国家之一,自1994年以来一直由同一位总统亚历山大·卢卡申科领导。据自由之家称,只有29%的人口使用互联网,访问权由一家控制和限制一些关键网站的国有公司控制。

Analysis: On the anniversary of the Chernobyl disaster, native Belarusians were protesting the government for lack of compensation following the disaster. It is speculated that the government attacked the RFL/RL to limit press coverage of the protesting, facilitated by Russian technology and Lukashenka’s close relationship with the Kremlin. The RFL/RL is one of the few sources pro-Western, uncensored, international news in Belarus. The Belarusian/Russian disruption of information flow again exemplifies Russia’s willingness to overpower a sovereign state. The fact that the website was pro-Western is not to be ignored by western states, specifically the United States. Analyzed by Clausewitz’s three criteria, the attack was not intended to be directly harmful to human safety, but was politically motivated, as it was an effort to assert one system of culture and government over another by silencing it.

分析:在切尔诺贝利灾难周年纪念日,当地白俄罗斯人抗议政府在灾难发生后缺乏赔偿。据推测,由于俄罗斯的技术和卢卡申科与克里姆林宫的密切关系,政府攻击RFL/RL是为了限制媒体对抗议的报道。RFL/RL是白俄罗斯为数不多的亲西方、未经审查的国际新闻来源之一。白俄罗斯/俄罗斯对信息流的破坏再次证明了俄罗斯愿意征服一个主权国家。该网站亲西方的事实不容西方国家忽视,尤其是美国。根据克劳塞维茨的三个标准进行分析,这次袭击的目的不是直接危害人类安全,而是出于政治动机,因为它是通过压制一种文化和政府体系来维护另一种制度。

Source: “International Cyber Incidents: Legal Considerations” by Eneken Tikk, Kadri Kaska, and Liis Vihul, 2010.

3.)   Operation Ivy Bells, 1960s/70s:常春藤钟的运作,1960/70年代:

In the 1960s and 70s, the American Navy and the National Security Agency created a covert operation that submarines would locate and tap into underwater Russian communication cables in the Sea of Okhotsk. The submarines were disguised as deep-water rescue and research vessels, and were able to avoid Russian detection. They used highly advanced technological equipment, some of which is still classified to this day, and the divers involved were some of the first to use the new underwater water breathing devices that are used today. The mission was reportedly highly successful, as it continued until the 1980s.

在20世纪60年代和70年代,美国海军和国家安全局(National Security Agency)发起了一项秘密行动,潜艇将在鄂霍次克海定位并接入俄罗斯的水下通信电缆。这些潜艇伪装成深水救援和研究船,能够避开俄罗斯的探测。他们使用了高度先进的技术设备,其中一些至今仍被列为机密,参与其中的潜水员是第一批使用今天使用的新型水下呼吸设备的人。据报道,该特派团非常成功,一直持续到1980年代。

Analysis: With this case, the United States has demonstrated a precedent and ability for cyber espionage and a desire for information to gain an advantage over Russia. Hacking Russian underwater communication cable and stealing highly classified state secrets sets the United States squarely in conflict with Russia and raises tensions between the two. When compared to Clausewitz’s three criteria, the mission was politically motivated, as it was an effort to steal information, but was not directly violent or cause any type of destruction. 

分析:在这起案件中,美国展示了网络间谍的先例和能力,以及获取信息以获得对俄罗斯的优势的愿望。黑客入侵俄罗斯水下通信电缆和窃取高度机密的国家机密,使美国与俄罗斯发生了直接冲突,并加剧了两国之间的紧张关系。与克劳塞维茨的三个标准相比,这次任务具有政治动机,因为它是为了窃取信息,但不是直接暴力或造成任何类型的破坏。

Source: Submarine Spying- Operation Ivy Bells in the Cold War by Matthew Gaskill, 2018.

4.)   Stuxnet, 2010.震网病毒,2010年

In 2010, several Iranian nuclear facilities were attacked by a malicious software computer worm, known as Stuxnet, that had the ability to repeat itself and spread to any device operating on the same network as the initially infected device. The worm gave attackers the capability to override the system, and it was used to destroy centrifuges inside the nuclear facilities, forcing the facilities to shut down. It is largely speculated that the worm was developed by a joint effort between the U.S. and Israel, in an effort to deter Iranian nuclear capabilities.

2010年,伊朗的几个核设施遭到了一种名为Stuxnet的恶意软件计算机蠕虫的攻击,该蠕虫能够自我复制,并传播到与最初受感染设备在同一网络上运行的任何设备。蠕虫使攻击者能够控制系统,并被用来摧毁核设施内的离心机,迫使设施关闭。据推测,这种蠕虫病毒是美国和以色列共同开发的,目的是威慑伊朗的核能力。

Analysis: By developing a malicious computer worm, capable of inflicting substantial systemic damage, the United States has demonstrated a willingness to initiate potentially violent and dangerous actions that operate in the self interest of the state. In this particular situation, the U.S. felt threatened by Iranian nuclear capabilities and attempted to protected itself by disabling Iran’s nuclear facilities. Attention on the United States was diffused by the cooperation with Israel, who had also had a state interest in disabling Iran’s nuclear operations. When compared against Clausewitz’s criteria, it is a politically motivated attack, but it was not directly violent and did not result in the physical harm of human life.

2010年,伊朗的几个核设施遭到了一种名为Stuxnet的恶意软件计算机蠕虫的攻击,该蠕虫能够自我复制,并传播到与最初受感染设备在同一网络上运行的任何设备。蠕虫使攻击者能够控制系统,并被用来摧毁核设施内的离心机,迫使设施关闭。据推测,这种蠕虫病毒是美国和以色列共同开发的,目的是威慑伊朗的核能力。

Source: “Cyber Attacks Likely to Increase” by the Pew Research Center, 2014.

Implications/Conclusion 影响/结论

 Applying realism to the Russian-American dynamic currently playing itself out through international relations, there is clear and definite struggle in the balance of power. They have developed two distinctly different systems and cultures and have perpetuated them internationally so that each has come in direct competition with the other for global dominance. Eastern and Western cultures have become so conflicted that each is a threat to the sovereignty of the other. The changing nature of technology changes the nature of this conflict and has continued to do since the Cold War. As exemplified by the case studies and recent international events, Russia has demonstrated the ability to integrate cyber capabilities and attacks in military offenses. The United States recognizes this as a threat to its allies along the Russian border, and subsequently a threat to Western culture. Conversely, the United States has demonstrated a willingness to act against states and institutions it deems threating to national security. The American government has prioritized the cyber theater as a top security priority, and the current presidential system has authorized new programs and operations that loosen restrictions on cyber retaliatory attacks. National Security Memorandum 13 enables agents to engage in retaliatory actions quickly and without approval from governing bodies, as well as allowing them to take preemptory steps towards potential attackers before any attack has even happened (Fryer-Briggs, 2018).

将现实主义应用于当前通过国际关系表现出来的俄美动态,在力量平衡中存在着明确而明确的斗争。它们发展了两种截然不同的制度和文化,并在国际上使其永久化,从而彼此直接竞争全球主导地位。东西方文化已经变得如此冲突,彼此都是对对方主权的威胁。技术性质的变化改变了这场冲突的性质,自冷战以来一直如此。案例研究和最近的国际事件表明,俄罗斯有能力将网络能力和攻击整合到军事犯罪中。美国认识到这是对其俄罗斯边境盟友的威胁,进而是对西方文化的威胁。相反,美国已表现出对其认为威胁国家安全的国家和机构采取行动的意愿。美国政府已将网络战区列为最高安全优先事项,目前的总统体制已授权新的计划和行动,以放松对网络报复性攻击的限制。《国家安全备忘录13》允许特工人员在未经管理机构批准的情况下迅速采取报复行动,并允许他们在任何攻击发生之前对潜在攻击者采取先发制人的措施。

 Understanding that the number of cyber attacks are increasing, so are the intensity of the attacks. Just this past year, thirteen Russian nationals and three Russian companies were indicted by the United States on charges of interfering with the 2016 presidential election. The Russians stand charged with the hacking of the Democratic National Committee and the Clinton presidential campaign (Mazzetti, 2018).

了解到网络攻击的数量正在增加,攻击的强度也在增加。就在去年,13名俄罗斯公民和3家俄罗斯公司被美国指控干扰2016年总统选举。俄罗斯人被控入侵民主党全国委员会和克林顿总统竞选。

As the intensity of the attacks increase, so does the likelihood of cyber war taking place between the United States and Russia. But following the criteria set forth by Clausewitz, there has been no cyber attack that meets those standards. If cyber war were to follow this definition of war, it is possible that it will never occur. It is also possible, however, that the nature of cyber attacks and changing cultural values combine to create a new definition of war, one that can define cyber attacks as acts of war. The goal of these attacks is not directly focused on violence, but rather on culture and state infrastructure. More and more, cyber attacks are becoming focused on and targeting the disruption of daily civilian life, hacking into the private sector businesses and corporation and disrupting state economies. If the goal of war remains the dominance of one state over the other, absent the violent criteria of past concepts of war, does cyber war not then meet the other criteria? The United States and Russia see each other as threats, and have responded as such, and along the lines of the realist theory: by building up military capabilities in the form of cyber attack and deterrence capabilities. As they continue to do so, the reality of cyber war becomes increasingly evident.

美国作业代写范文在文末总结到随着攻击强度的增加,美国和俄罗斯之间发生网络战争的可能性也在增加。但根据克劳塞维茨提出的标准,没有任何网络攻击符合这些标准。如果网络战争遵循这一战争定义,它可能永远不会发生。然而,网络攻击的性质和不断变化的文化价值观也有可能结合起来,形成一个新的战争定义,可以将网络攻击定义为战争行为。这些袭击的目标不是直接针对暴力,而是针对文化和国家基础设施。网络攻击越来越集中于并以破坏日常平民生活为目标,侵入私营企业和公司,扰乱国家经济。如果战争的目标仍然是一个国家对另一个国家的统治,而没有过去战争概念中的暴力标准,那么网络战争不符合其他标准吗?美国和俄罗斯将彼此视为威胁,并按照现实主义理论做出了回应:以网络攻击和威慑能力的形式建立军事能力。随着他们继续这样做,网络战争的现实变得越来越明显。

本站提供各国各专业留学生作业代写和指导服务,如有需要可咨询本平台。