Skip to main content

Developing Political Response Framework to Cyber Hostilities

  • Chapter
  • First Online:
Cyber Security: Power and Technology

Part of the book series: Intelligent Systems, Control and Automation: Science and Engineering ((ISCA,volume 93))

  • 2038 Accesses

Abstract

The debate on both the impacts of cyber attacks and how to respond to them is active, but precedents are a few. At the same time, cybersecurity issues have been catapulted into the highest of high politics: cyberpolitics. The objective of this chapter is to encourage political decision-makers (and others) to create a framework of proportionate ways to respond to different kinds of cyber hostility. The proportionate response is a complicated, situational political question. This chapter creates a context for the contemporary politics of cyber affairs in the world and determines five variables that policymakers need to consider when evaluating appropriate responses to a cyber attack. As offensive cyber activity becomes more prevalent, policymakers will be challenged to develop proportionate responses to disruptive or destructive attacks. There has already been significant pressure to “do something” in the light of the alleged state-sponsored attacks. Past experience suggests that most policy responses are ad hoc. This chapter comprehensively analyzes how cyber attacks should be treated as a political question and represents a rough framework for policymakers to build on. The chapter presents five variables that policymakers need to consider when evaluating appropriate responses to cyber hostilities. Combining incident impact, policy options, and other variables, the framework outlines the different levers of cyberpolitics that can be applied in response to the escalating levels of cyber incidents. The response framework is also an integral part of the state’s cyber deterrence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In July 2016, the WikiLeaks website publicized embarrassing emails from the accounts of the Democratic National Committee (DNC). The hackers gained full access to the DNC network used by the election staff, including emails, memos, and research performed for Democrats running for Congress (read more in Siboni and Siman-Tov 2016).

  2. 2.

    For the role of the cyber component in the Russia-Ukraine war, (see Geers 2015).

  3. 3.

    This Clausewitzian approach is controversial, but describes how politics and war are intertwined. (see, e.g., Kaldor (2010)).

  4. 4.

    “A decision as to when a cyber attack would lead to the invocation of Article 5 would be taken by the North Atlantic Council on a case-by-case basis.” NATO (2014).

  5. 5.

    “Hybrid Warfare” is a controversial concept. (See, e.g., Renz and Smith 2016).

  6. 6.

    The reader will find a more comprehensive analysis in Limnéll (2015).

  7. 7.

    Cyber attacks take many forms, like gaining, or attempting to gain, unauthorized access to a computer system or its data; unwanted disruption or denial of service attacks, including the take down of websites; installation of viruses or malicious code (malware) on a computer system; unauthorized use of a computer system for processing or storing data; changes to the characteristics of a computer system’s hardware, firmware or software without the owner’s knowledge, instruction or consent; and inappropriate use of computer systems.

  8. 8.

    Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury, or death solely through the exploitation of vulnerable information systems and processes. (See Applegate 2013).

  9. 9.

    General definition of a cyber attack in level five: “Poses an imminent threat to the provision of wide-scale critical infrastructure services, national gov’t stability, or to the lives of U.S. persons.” (White House 2016).

  10. 10.

    Included representatives from China, US, Russia and other countries.

  11. 11.

    NATO has declared that “our policy also recognizes that international law, including international humanitarian law and the UN Charter, applies in cyberspace.” (NATO 2014)

  12. 12.

    “All members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the purposes of the United Nations.”

  13. 13.

    Such as death/injury or destruction/damage, which would normally be viewed as an armed attack.

  14. 14.

    For example, foreign policy instruments such as diplomatic communication, warnings, and sanctions.

  15. 15.

    Compare Feakin (2015).

  16. 16.

    For example, the United States has announced that it will “respond to cyber attacks against U.S. interests at a time, in a manner, and in a place of our choosing, using appropriate instruments of U.S. power and in accordance with applicable law” (Department of Defense 2015).

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jarno Limnéll .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Limnéll, J. (2018). Developing Political Response Framework to Cyber Hostilities. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Power and Technology. Intelligent Systems, Control and Automation: Science and Engineering, vol 93. Springer, Cham. https://doi.org/10.1007/978-3-319-75307-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75307-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75306-5

  • Online ISBN: 978-3-319-75307-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics