Deterring Cyber Warfare
eBook - ePub

Deterring Cyber Warfare

Bolstering Strategic Stability in Cyberspace

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Deterring Cyber Warfare

Bolstering Strategic Stability in Cyberspace

Book details
Book preview
Table of contents
Citations

About This Book

While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence of major cyber attacks.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Deterring Cyber Warfare by Brian M. Mazanec,B. Thayer in PDF and/or ePUB format, as well as other popular books in Politik & Internationale Beziehungen & Militärpolitik. We have over one million books available in our catalogue for you to explore.

Information

Part I
Cyberspace, Cyber Warfare, and Deterrence
1
Introduction
Abstract: This chapter explains the central question, central argument, limitations, and significance of the book. The major question addressed is: in light of the challenges of applying deterrence theory to cyber warfare, how can the United States and its allies successfully deter major cyber attacks? While deterrence theory faces major challenges when applied to cyber warfare due to the unique aspect of cyber technology, there are three specific efforts that can help mitigate this challenge, which we explore in this study. First, cultivating beneficial norms for strategic stability; second, continuing efforts in the area of improving cyber forensics and defenses, including regarding lower evidentiary standards for attributing cyber attacks and addressing harboring “independent” attackers; and finally, developing and communicating a clear declaratory policy and credible options for deterrence-in-kind so as to make escalation unavoidable and costly.
Keywords: Computer Network Attack; cyber security; cyber warfare; deterrence
Mazanec, Brian M., and Bradley A. Thayer. Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace. Basingstoke: Palgrave Macmillan, 2015. DOI: 10.1057/9781137476180.0004.
Introduction
As deterrence of attack has a long history in human affairs, dating to pre-history, so too does the interplay between the rise of new technologies and the resultant need to find a countervailing strategy or weapon for deterrence to obtain once again.1 The endless race between the development of a new weapon, its application, a defensive response to it, and the adjustment of deterrence theory to address or manage the threat has entered a new chapter with the rise of cyber warfare.2 Cyber warfare presents a new and challenging threat to international relations, and the situation is becoming worse as cyber capabilities and attacks are proliferating. This is acknowledged at the highest levels of the US government. At his confirmation hearing, Secretary of Defense Chuck Hagel expressed his confidence that ‘at this time, it appears that the United States has successfully deterred major cyber attacks’ but went on to explain that he expects deterring such major attacks to be a continued key challenge for the United States.3
As Secretary Hagel recognized, deterrence in this area is challenging because deterrence theory was developed for deterrence of kinetic attacks: deterring the application of force by the armies, air forces, and navies of one’s enemies, and in the nuclear era, the enemy’s strategic forces. However, with respect to deterrence, cyber warfare is in many respects unlike what has come before – it is not inherently kinetic. Accordingly, deterrence theorists and practitioners must adapt existing concepts and pursue tailored strategies to help achieve deterrence of cyber warfare with the goal that the result will be an increase in strategic stability in cyberspace. Indeed, there is a reasoned assumption among scholars such as Martin Libicki, who have highlighted the concern that cyber deterrence may not work as well as nuclear deterrence, that if this is the case, it illustrates the need for additional focus on this pressing challenge.4
The major question we address in this study is: in light of the challenges of applying deterrence theory to cyber warfare, how can the United States and its allies successfully deter major cyber attacks? Our central argument is that while deterrence theory faces major challenges when applied to cyber warfare due to the unique aspect of cyber technology, investments and efforts in three specific areas can help mitigate this challenge. Specifically, we recommend cultivating beneficial norms for strategic stability; continuing efforts in the area of improving cyber forensics and defenses, including regarding lower evidentiary standards for attributing cyber attacks and addressing harboring ‘independent’ attackers; and developing and communicating a clear declaratory policy and credible options for deterrence-in-kind so as to make escalation unavoidable and costly. The challenges to applying deterrence theory to cyber warfare relate to pronounced uncertainty with respect to, first, awareness and attribution of an attack and, second, the uncertain effects of any attack.
The difficulties surrounding attribution and control of its effects make deterrence of cyber warfare uniquely difficult. In some cases, lack of control makes the application of the weapon both enticing for the attacker but also risky due to blowback onto his own interests, his own society and economy, and those of his allies, and the risk of escalation by the defender, if, indeed, he is able to determine the attacker. Peter Singer of the Brookings Institution and others have identified this lack of attribution as the key factor that prohibits the direct and immediate application of deterrence theory to the cyber realm.5 If an attack is attributable, then traditional deterrence applies, including the possibility of a kinetic response. If an attack is not attributable, or the attacker believes it will be falsely attributed, it may be so enticing a weapon as to be irresistible.
This is an old problem – if you could do something bad and get away with it, would you? This issue has been considered in various guises by philosophers and political leaders throughout history. In Republic, Plato provides the example of Gyges’ Ring, which made its wearer invisible.6 Would a man wearing Gyges’ Ring be righteous; alas, no, he concluded. The temptation of being able to get away with something malicious without attribution would be too great, and even a moral man would be corrupted by such power. Cyber weapons give a state a Gyges’ Ring, and increasingly, we witness the consequences. The implications of this uncertainty illustrate the need to develop a tailored approach to improve the ability to apply deterrence to cyber warfare. The three efforts we identify in this book will help manage these challenges.
Importance of deterring cyber warfare
The arguments of our study are significant for three reasons. First, the United States needs to deter cyber warfare and, given the empirical evidence publicly available, the United States has not done this well enough. This study calls attention to this danger and serves as a contribution to help US decision-makers better understand and apply the logic and the difficulties of deterrence of cyber attack. It provides a foundation for such discussions by introducing cyber warfare and then explaining the challenges associated with applying deterrence theory to this emerging form of warfare.
Second, the study offers a unique contribution by identifying a specific series of efforts that can be initiated or strengthened in order to improve the deterrence of cyber attacks. These solutions are drawn from lessons from fields such as biology as well as prior experiences dealing with threats such as terrorism and nuclear weapons. For example, microbial forensics provides important and useful examples for answering the critical ‘who did it?’ question. We argue that policymakers can learn from experiences in other areas, such as biological weapons and forensics, and in doing so develop an effective package of responses to improve deterrence of cyber warfare.
Third, cyber warfare is a major avenue of attack against the United States and has done significant damage to its national security interests, to the interests of allies, as well as to other states in international politics. Our study will help the United States address this growing and significant threat by improving its ability to deter cyber warfare. Cyber warfare is here to stay. It presents a growing challenge to the security of states and other international actors and is increasingly an element of conflict. Indeed, it should be considered as a component of conflict as any other arrow in the quiver of states. Its appeal is heightened because of the difficulty of attribution and the fact that it is widely usable as the norms for cyber warfare have not yet been firmly established. For example, in 2014, during the political crisis in Ukraine, a sophisticated cyber weapon known as ‘Snake’ or ‘Ouroboros’ was discovered.7 Snake is suspected to be of Russian origin and gives attackers full remote access to compromised Ukrainian systems. Threats such as this have led the Director of Intelligence James Clapper to identify cyber weapons as a major avenue of attack against the United States.8
An unfortunate fact of modern life is that there is a significant daily drumbeat of espionage-style cyber attacks against major military, intelligence, and civilian targets. The Norton Cybercrime Report puts the direct costs of cybercrime at $113 billion annually, with the United States’ costs coming in at $38 billion. Further, the Ponemon Institute estimates that the average annualized total cost – direct and indirect – of cyber attacks in the United States among 60 ...

Table of contents

  1. Cover
  2. Title
  3. Part I  Cyberspace, Cyber Warfare, and Deterrence
  4. Part II  Improving Deterrence of Cyber Attacks
  5. Works Cited
  6. Index