Advertisement

Small State Acquisition of Offensive Cyberwarfare Capabilities: Towards Building an Analytical Framework

  • Daniel Hughes
  • Andrew Colarik
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9650)

Abstract

This paper examines the factors that motivate small states to acquire Offensive Cyberwarfare Capabilities (OCWC) and identifies the circumstances under which acquiring such capabilities is advantageous to a small state. First, the paper will offer a comprehensive analysis of the characteristics and limitations of OCWC, arguing that military conflicts are unlikely to be won solely by cyber weapons. Second, it analyses potential and likely uses of OCWC by small states and how these may advance political objectives, as explained by conceptual security models. Finally, the paper presents the first iteration of an analytic framework designed to provide a customized estimate of the desirability of OCWC acquisition for individual small states. The model is demonstrated by a case study on a member of the Five Eyes intelligence network and quintessential small state: New Zealand.

Keywords

Cyber Warfare Small states Capabilities Weapons Acquisition Framework New Zealand 

References

  1. 1.
    Burton, J.: Small states and cyber security: the case of New Zealand. Polit. Sci. (00323187), 65(2), 216–238 (2013). doi: 10.1177/0032318713508491
  2. 2.
    Mayer, M., Carpes, M., Knoblich, R.: (Introduction) The Global Politics of Science and Technology. Springer, Berlin (2014)CrossRefGoogle Scholar
  3. 3.
    Vice Chairman of the Joint Chiefs of Staff: Joint Terminology for Cyberspace Operations (2011). http://www.nsci-va.org/CyberReferenceLib/2010-11-joint%20Terminology%20for%20Cyberspace%20Operations.pdf
  4. 4.
    Schrier, F.: On Cyberwarfare DCAF Working Paper No. 7 (2015). www.dcaf.ch/content/download/67316/…/OnCyberwarfare-Schreier.pdf
  5. 5.
  6. 6.
    Shakarian, P., Shakarian, J., Ruef, A.: Introduction to Cyberwarfare: A Multidisciplinary Approach. Syngress, Burlington (2013)Google Scholar
  7. 7.
    Theohary, C., Rollins, J.: Cyberwarfare and Cyberterrorism: In Brief. Congressional Research Service, Washington (2015). https://www.fas.org/sgp/crs/natsec/R43955.pdf Google Scholar
  8. 8.
    Colarik, A., Janczewski, L.: Developing a grand strategy for Cyber War. In: 2011 The International Conference on Information Assurance & Security (IAS), pp. 52–57 (2011). doi: 10.1109/ISIAS.2011.6122794
  9. 9.
    Parks, R.C., Duggan, D.P.: Principles of Cyberwarfare. IEEE Secur. Priv. Mag. 9(5), 30 (2011). doi: 10.1109/MSP.2011.138 CrossRefGoogle Scholar
  10. 10.
    Arquilla, J.: Twenty years of Cyberwar. J. Mil. Ethics 12(1), 80–87 (2013)CrossRefGoogle Scholar
  11. 11.
    Kiravuo, T., Tiilikanien, S., Sarela, M., Manner, J.: Peeking under the skirts of a nation: finding ics vulnerabilities in the critical digital infrastructure. In: Proceedings of the European Conference on e-Learning (2015)Google Scholar
  12. 12.
    Korns, S., Kastenburg, J.E.: Georgia’s Cyber left hook. Parameters 38(4), 60–76 (2009). Winter 08-09Google Scholar
  13. 13.
    Singer, P.W., Friedman, A.: Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press, Oxford (2014)Google Scholar
  14. 14.
    Gompert, D. C., Libicki, M.: Waging cyber war the american way. Survival (00396338), 57(4), 7–28 (2015). doi: 10.1080/00396338.2015.1068551
  15. 15.
  16. 16.
    Rid, T., McBurney, P.: Cyber-Weapons. RUSI J. R. U. Serv. Inst. Def. Stud. 157(1), 6 (2012). doi: 10.1080/03071847.2012.664354 Google Scholar
  17. 17.
    Carr, J.: The misunderstood acronym: why cyber weapons aren’t WMD. Bull. At. Sci. 69(5), 32 (2013). doi: 10.1177/0096340213501373 CrossRefGoogle Scholar
  18. 18.
    Lewis, J., Timlin, K.: Cybersecurity and Cyberwarfare 2011 preliminary assessment of national doctrine and organization (2011). http://unidir.org/files/publications/pdfs/cybersecurity-and-cyberwarfare-preliminary-assessment-of-national-doctrine-and-organization-380.pdf
  19. 19.
    Gartzke, E.: The myth of cyberwar: bringing war in cyberspace back down to earth. Int. Secur. 2, 41 (2013)CrossRefGoogle Scholar
  20. 20.
    Rid, T.: Cyberwar and Peace. Foreign Aff. 92(6), 77–87 (2013)Google Scholar
  21. 21.
    Clarke, R.D., Knake, R.K.: Cyber War. HarperCollins, New York (2010)Google Scholar
  22. 22.
  23. 23.
    Kuehl, D.T.: From Cyberspace to Cyberpower: Defining the Problem. Cyberpower and National Security, Washington (2009). http://ctnsp.dodlive.mil/files/2014/03/Cyberpower-I-Chap-02.pdf Google Scholar
  24. 24.
    Goetschel, L.: The foreign and security policy interests of small states in today’s Europe. In: Goetschel, L. (ed.) Small States Inside and Outside the European Union, pp. 13–31. Kluwer Academic Publishers, Dordrecht (1998)CrossRefGoogle Scholar
  25. 25.
    Rickli, J.: European small states’ military policies after the Cold War: from territorial to niche strategies. Camb. Rev. Int. Aff. 21(3), 307–325 (2008). doi: 10.1080/09557570802253435 CrossRefGoogle Scholar
  26. 26.
    Sutton, P.: The concept of small states in the international political economy. Round Table 100(413), 141–153 (2011)CrossRefGoogle Scholar
  27. 27.
    Baehr, P.: Small states: a tool for analysis? World Polit. 27, 456–466 (1975). doi: 10.2307/2010129 CrossRefGoogle Scholar
  28. 28.
    Wittgenstein, L., Anscombe, G.M.: Philosophical Investigations. The United Kingdom Basil Blackwell, Oxford (1958). c1953Google Scholar
  29. 29.
    Schutte, S.: Cooperation beats deterrence in Cyberwar. Peace Econ. Peace Sci. Public Policy 18(3), 1–11 (2012). doi: 10.1515/peps-2012-0006 MathSciNetCrossRefGoogle Scholar
  30. 30.
  31. 31.
    Tan, A.T.: Punching above its weight: singapore’s armed forces and its contribution to foreign policy. Def. Stud. 11(4), 672–697 (2011)CrossRefGoogle Scholar
  32. 32.
    McLay, J.: New Zealand and the United Nations: Small State, Big Challenge, August 2013. http://www.nzunsc.govt.nz/docs/Jim-McLay-speech-Small-State-Big%20Challenge-Aug-13.pdf
  33. 33.
    Statistics New Zealand, (n.d.): Index of key New Zealand Statistics. http://www.stats.govt.nz/browse_for_stats/snapshots-of-nz/index-key-statistics.aspx#
  34. 34.
    Ministry of foreign affairs and trade. Foreign Relations, March 2014. http://mfat.govt.nz/Foreign-Relations/index.php
  35. 35.
    New Zealand Defence Force. Defence Capability Plan (2014). http://www.nzdf.mil.nz/downloads/pdf/public-docs/2014/2014-defence-capability-plan.pdf
  36. 36.
    New Zealand Defence Force. Defence White Paper 2010 (2010). http://www.nzdf.mil.nz/downloads/pdf/public-docs/2010/defence_white_paper_2010.pdf
  37. 37.
    Reitzig, A.: In defiance of nuclear deterrence: anti-nuclear New Zealand after two decades. Med. Conflict Surv. 22(02), 132–144 (2006). doi: 10.1080/13623690600621112 CrossRefGoogle Scholar
  38. 38.
    New Zealand Defence Force. New Zealand Defence Force Doctrine (2012). http://www.nzdf.mil.nz/downloads/pdf/public-docs/2012/nzddp_d_3rd_ed.pdf

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Massey UniversityAlbanyNew Zealand

Personalised recommendations