The Challenges of Cyber Deterrence
In this chapter, I analyse deterrence theory and argue that its applicability to cyberspace is limited and that these limits are not trivial. They are the consequence of fundamental differences between deterrence theory and the nature of cyber conflicts and cyberspace. The goals of this analysis are to identify the limits of deterrence theory in cyberspace, clear the ground of inadequate approaches to cyber deterrence, and define the conceptual space for a domain-specific theory of cyber deterrence, still to be developed.
KeywordsCyberspace Cyber conflicts Defence Deterrence Retaliations State Stability
- Bendiek, A., and T. Metzger. 2015. Deterrence theory in the cyber-century: Lessons from a state-of-the-art literature review, Lecture notes in informatics (LNI), 553–570. Bonn: Gesellschaft Fur Informatik.Google Scholar
- Bunn, M.E. 2007. Can deterrence be tailored? Strategic Forum, Number 225, January 2007. Washington, DC: Institute for National Strategic Studies, National Defense University.Google Scholar
- Cath, C., S. Wachter., M. Taddeo., and L. Floridi. 2017. Artificial intelligence and the “good society”: The US, EU, and UK approach. Science and Engineering Ethics, March. https://doi.org/10.1007/s11948-017-9901-7.
- Clark, D., and S. Landau. 2011. Untangling attribution. Harvard National Security Journal 2011 (2): 25–40.Google Scholar
- Crosston, M. 2011. World gone cyber MAD: How “mutually assured debilitation” is the best hope for cyber deterrence. Strategic Studies Quarterly 50 (1): 100–116.Google Scholar
- Dipert, R. 2013. The essential features of an ontology for cyberwarfare. In Conflict and cooperation in cyberspace, ed. Panayotis Yannakogeorgos and Adam Lowther, 35–48. Taylor & Francis. http://www.crcnetbase.com/doi/abs/10.1201/b15253-7.
- European Union. 2014. Cyber defence in the EU: Preparing for cyber warfare? – think tank. Brussels. http://www.europarl.europa.eu/thinktank/en/document.html?reference=EPRS_BRI(2014)542143.
- ———. 2015. Cyber diplomacy: EU dialogue with third countries – think tank. Brussels. http://www.europarl.europa.eu/thinktank/en/document.html?reference=EPRS_BRI(2015)564374.
- Floridi, L., and M. Taddeo, eds. 2014. The ethics of information warfare, Law, governance and technology series. Vol. 14. Heidelberg: Springer.Google Scholar
- Freedman, L. 2004. Deterrence. Cambridge, UK/Malden: Polity Press.Google Scholar
- G7 Declaration. 2017. G7 declaration on responsible state behavior in cyberspace. Lucca. http://www.mofa.go.jp/files/000246367.pdf.
- Goodman, W. 2010. Will Goodman, Cyber deterrence: Tougher in theory than in practice?, Strategic Studies Quarterly Fall: 102–35.Google Scholar
- Haley, C. 2013. A theory of cyber deterrence. Georgetown Journal of International Affairs, February. http://journal.georgetown.edu/a-theory-of-cyber-deterrence-christopher-haley/.
- Harknett, R.J., and E.O. Goldman. 2016. The search for cyber fundamental. Journal of Information Warfare 15 (2): 81–88.Google Scholar
- Hathaway, O., and R. Crootof. 2012. The law of cyber-attack. California Law Review 100 (1–2012): 817–886.Google Scholar
- Hollis, D.B. 2011. An E-SOS for cyberspace. Harvard International Law Journal. 52 (373): 374–375.Google Scholar
- International Security Advisory Board. 2014. A framework for international cyber stability. United States Department of State. http://goo.gl/azdM0B.
- Jensen, E.T. 2009. Cyber warfare and precautions against the effects of attacks. Texas Law Review 88 (1533): 1534–1569.Google Scholar
- ———. 2012. Cyber deterrence. SSRN scholarly paper ID 2070438. Rochester: Social Science Research Network. https://papers.ssrn.com/abstract=2070438.
- Kastenberg, J.E. 2009. Changing the paradigm of internet access from government information systems: A solution to the need for the DoD to take time-sensitive action on the Niprnet. Air Force Law Review 64: 175.Google Scholar
- Kugler, R. 2009. Deterrence of cyber attacks. In Cyberpower and national security, ed. Franklin Kramer, Stuart Starr, and Larry Wentz, 309–342. Washington, DC: National Defense University.Google Scholar
- Lan, Tang, Zhang Xin, Dmitry Grigoriev Harry Raduege Jr., Pavan Duggal, and Stein Schjølberg. 2010. Global cyber deterrence views from China, the U.S., Russia, India, and Norway. EastWest Institute.Google Scholar
- Libicki, M.C. 1997. Defending cyberspace and other metaphors. Washington, DC: National Defense Univ/National Strategic Studies.Google Scholar
- Libicki, Martin. 2011. The strategic uses of ambiguity in cyberspace. Military and Strategic Affairs 3 (3): 3–10.Google Scholar
- ———. 2009. Cyberdeterrence and cyberwar. Product Page. http://www.rand.org/pubs/monographs/MG877.html.
- McConnell, M. 2010. Mike McConnell on how to win the cyber-war we’re losing, 28 February 2010. http://www.washingtonpost.com/wp-dyn/content/article/2010/02/25/AR2010022502493.html.
- ———. 2010. Applicability of traditional deterrence concepts and theory to the cyber realm. In Proceedings of a workshop on deterring cyberattacks: Informing strategies and developing options for U.S. policy, 55–76. Washington, DC: National Academic Press.Google Scholar
- NSA. 2013. A strategy for surveillance powers. The New York Times. http://www.nytimes.com/interactive/2013/11/23/us/politics/23nsa-sigint-strategy-document.html.
- Nye, J.S. 2011. Nuclear lessons for cyber security? Strategic Studies Quarterly 5 (4): 11–38.Google Scholar
- Owens, W.A., Kenneth W. Dam., H. Lin., National Research Council (U.S.), National Research Council (U.S.), National Research Council (U.S.), eds. 2009. Technology, policy, law, and ethics regarding U.S. Acquisition and use of cyberattack capabilities. Washington, DC: National Academies Press.Google Scholar
- Powell, R. 2008. Nuclear deterrence theory: The search for credibility, Digitally printed version. Paperback Re-Issue. Cambridge: Cambridge University Press.Google Scholar
- Rattray, G.J. 2009. An environmental approach to understanding cyberpower, in Kramer, Cited, 253–274, Esp. 256. In Cyberpower and National Security, ed. Stuart S. Kramer and Lerry K. Wentz, 253–74. Washington, DC: National Defense UP.Google Scholar
- Schelling, T.C. 1980. The strategy of conflict: [With a new preface]. Cambridge, MA: Harvard University Press.Google Scholar
- Schelling, T.C., and Harvard University Center for International Affairs. 1966. Arms and influence. New Haven: Yale University Press.Google Scholar
- Schneier, B. 2017. Why the NSA makes us more vulnerable to cyberattacks. Foreign Affairs, 30 May 2017. https://www.foreignaffairs.com/articles/2017-05-30/why-nsa-makes-us-more-vulnerable-cyberattacks.
- Sterner, E. 2011. Retaliatory deterrence in cyberspace. Strategic Studies Quaterly 5 (1): 65–80.Google Scholar
- ———. 2012b. ‘An analysis for a just cyber warfare’. In 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1–10.Google Scholar
- ———. 2014. Information warfare: The ontological and regulatory gap. Newsletter on Philosophy and Computers 14 (1 (fall 2014)): 13–20.Google Scholar
- Taddeo, M., and L. Glorioso. 2016. Regulating cyber conflicts and shaping information societies. In Ethics and policies for cyber operations, philosophical studies series. Berlin/Heidelberg: Springer.Google Scholar
- Tanji, M. n.d. Deterring a cyber attack? Dream on… WIRED. Accessed 15 July 2017. https://www.wired.com/2009/02/deterring-a-cyb/.
- UK Government. 2014. Deterrence in the twenty-first century: Government response to the committee’s eleventh report. http://www.publications.parliament.uk/pa/cm201415/cmselect/cmdfence/525/52504.htm.Google Scholar
- ———. 2015. National Security Strategy 2016–2021. London: HM Government. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/national_cyber_security_strategy_2016.pdf.Google Scholar
- UN Institute for Disarmament Research. 2014. Cyber stability seminar 2014: Preventing cyber conflict. Geneva: UN Institute for Disarmament Research.Google Scholar
- US Government. 2015. The Department of Defense cyber strategy. Washington, DC, USA.Google Scholar
- Wittgenstein, L. 2009. Philosophical investigations, eds. P.M.S. Hacker and Joachim Schulte, Rev. 4th ed. Chichester/Malden: Wiley-Blackwell.Google Scholar