Skip to main content
Search for articles, authors, keywords
Abstract:

The Gray Zone represents a space between peaceful state rivalries and war. Within this space actors have developed hybrid strategies to extend their influence. This concept of conflict is best illustrated by Russia’s actions in Eastern Ukraine in 2014. Gray Zone doctrine leverages ambiguity to create an environment in which adversaries are unable to make strategic decisions in a timely and confident manner. Cyber Operations, because of the attribution problem, lend themselves to this kind of conflict. This article explores the interactions between the Gray Zone and cyber operations and considers questions which NATO must address in order to adapt.

Creative Commons BY-SA

Article statistics

Fitton, Oliver. 2016. “Cyber Operations and Gray Zones: Challenges for NATO”. Connections: The Quarterly Journal 15 (2): 109-19. doi:http://dx.doi.org/10.11610/Connections.15.2.08.
31379 Views
8968 Downloads

Bibliography

on Clausewitz, CarlOn War In Anatol Rapoport. Harmondsworth: Penguin Books, 1982.

Rhodes, RichardThe Making of the Atomic Bomb . London: Simon & Schuster, 2012.

Rid, ThomasCyber War Will Not Take Place . London: Hurst, 2013.

Jordan, Larry R.Hybrid War: Is the US Army Ready for the Face of 21st Cen¬tury Warfare In US Army Command and General Staff College., 2008.

Owens, Mackubin Thomas. "Reflection on Future War." Naval War College Review 61, no. 3 (2008).

Glenn, Russell W.All Glory Is Fleeting: Insights from the Se¬cond Lebanon War . Santa Monica, CA: RAND, 2012.

Hoffn, Frankma G.. "Hybrid Warfare and Challenges." Joint Force Quarterly 52 (2009): 34-48.

Bachmann, Sascha-Dominik, and Hakan Gunneriussan. "Hybrid Wars: The 21st Century’s New Threats To Global Peace And Security." Scientia Militaria, South Afri¬can Journal of Military Studies 43, no. 1 (2015).

Arquilla, John, and David Ronfeldt. "Cyberwar is Coming!Comparative Strategy 12, no. 2 (1993).

Clark, Richard, and Robert KnakeCyber War: The Next Threat to National Security And What To Do About It. New York: HarperCollins, 2010.

Rid, ThomasCyber War Will Not Take Place . London: Hurst, 2013.

Vandiver, JohnBreedlove: NATO Must Redefine Responses to Unconventional Threats, Stars and Stripes., 2014.

Apps, PeterAmbiguous Warfare’ Providing NATO with New Challenges, Reuters., 2014.

Command, United States Spe. "The Gray Zone." In White paper. Vol. 1., 2015.

Committee, House of CommonsTowards the next Defence and Security Review: Part Two – NATO . London: House of Commons Defence Committee, 2014.

Murray, Williamson, and Peter R. MansoorHybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.

Government, HMThe Future of the United Kingdom’s Nuclear Deterrent, December In Cm 6994. Vol. at 18., 2006.

Gehlbach, Scott. "Reflections on Putin and the Media." Post-Soviet Affairs 26, no. 1 (2010): 77-87.

Rid, ThomasCyber War Will Not Take Place . London: Hurst, 2013.

"Tracking GhostNet: Investigating a Cyber Espionage Network." Information Warfare Monitor (2009).

Government, HM. "National Security Strategy and Strategic Defence and Security Re-view 2015: A Secure and Prosperous United Kingdom." (2015): 40.

Geers, Kenneth. "Cyberspace and the Changing Nature of Warfare." In White paper pre¬sented at the 2008 Black Hat Conference, 7.0.

Rid, Thomas, and Ben Buchanan. "Attributing Cyber Attacks." Journal of Strategic Studies 38 , no. 32 (2015).

Fitton, Oliver, and Mark Lacy. "The Syrian Electronic Army Is Rewriting the Rules of War." The Conversation (2013).

Jones, Adam. "Syrian Electronic Army Turns on Assad Regime." Seczine: Security Magazine (2013).

Menn, JosephFatal System Error: The Hunt for the New Crime Lords Who Are Bring¬ing Down the Internet . New York: Public Affairs, 2010.

Securing SCADA Infrastructure In White paper . Vol. 6. Sunnyvale, CA: Fortinet, 2010.

The Atlantic Charter., 2009.

McLeary, Paul. "NATO Chief: Cyber Can Trigger Article 5." Defense News (2015).

Thomas, Timothy L.. "Nation-State Cyber Strategies: Examples from China and Russia ." In Cyberpower and National Security, 477, 486. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz ed. Dulles: Potomac Books, 2009.

Gehlbach, Scott. "Reflections on Putin and the Media." Post-Soviet Affairs 26, no. 1 (2010): 77-87.

Themes