The Deterrence and Prevention of Cyber Conflict

2021 ◽  
pp. 272-294
Author(s):  
Paul Cornish

For all its apparent complexity, deterrence is built upon a relatively straightforward premise: that fear of adverse consequences can serve to prevent unacceptable behaviour. In traditional deterrence theory, particularly that which matured during the Cold War, prevention could be achieved both by fear of punishment and by fear of failure: by punitive measures that would be undertaken in response to a transgression and intended to inflict some pain, damage, or loss upon the transgressor; or by a denial posture intended to impress upon an adversary that the complexities of the defences will be technologically insurmountable and/or the costs of doing so unbearably high. Fresh thinking is required to make deterrence relevant to the cyber era. The challenges of cyber warfare are described here as the ‘four zeros’: ‘zero day’ vulnerability to novel malware; ‘zero source’ or non-attribution of an attack; ‘zero effect’ or covert, non-detectable attack; and ‘zero intent’ or lack of clarity as to an adversary’s intentions. These challenges can be met by allowing deterrence to function in different ways as circumstances allow or require: punitive, constructive, and protective deterrence.

2020 ◽  
Vol 3 (2) ◽  
Author(s):  
Zoran Jovanovski ◽  
Andrej Iliev ◽  
Anita Ilieva Nikolovska

Historical development of cyber warfare follows three major historical periods: first period follows the technological advances of information technology during the 1980s until the end of the Cold War in 1990, second period is from the end of the Cold War to the terrorist attacks in United States during 11-th september 2001 year and the third period  is from the terrorist attacks in United States during 11-th september 2001 year onwards. Each of the mentioned historical periods follows a specific doctrine and strategy of dealing with the national security threats from cyberspace. The world super powers and the world states, introduce appropriate strategies and national policies to deal with the consequences of this kind of warfare. Expression of cyberspace is linked to a short story titled "Burning Chrome" in the 1982 year written by American author William Gibson. In the following years, this word turned out to be conspicuously related to online PC systems. According to NATO, people are part of cyberspace.  According to this, NATO defines that cyberspace is more than just internet, including not only hardware, software and information systems, but also peoples and social interaction with these networks. The first cyber warfare weapon ever known in history was Stuxnet. Stuxnet's objective was to physically annihilate a military target. Stuxnet has contaminated more than 60,000 PCs around the world, mostly in Iran. While international cooperation is essential, each nation should in near future develop a National foundation, its own national cyber security strategy, authorities and capabilities. Every nation state, should  require effective coordination and cooperation among governmental entities at the national and sub-national levels as well as the private sector and civil society. The main hypothesis of this paper is to present the historical development and perspectives of cyber warfare and accordingly propose the best legal concepts, national doctrines and strategies for dealing with this modern type of warfare.


2019 ◽  
pp. 304-330
Author(s):  
Metodi Hadji-Janev

Many incidents in cyberspace and the response to those incidents by victim states prove that the cyber conflict is a reality. This new conflict is complex and poses serious challenges to national and international security. One way to protect the civilian populace is by deterring potential malicious actors (state and non-state) from exploiting cyberspace in a negative way. Given the changed reality and complexity that gravitates over the cyber conflict classical deterrence that have worked during the Cold War is not promising. The article argues that if the states are about to protect their civilians from the future cyber conflict by deterring potential attacker they need to change the approach to deterrence.


Author(s):  
Metodi Hadji-Janev

Many incidents in cyberspace and the response to those incidents by victim states prove that the cyber conflict is a reality. This new conflict is complex and poses serious challenges to national and international security. One way to protect the civilian populace is by deterring potential malicious actors (state and non-state) from exploiting cyberspace in a negative way. Given the changed reality and complexity that gravitates over the cyber conflict classical deterrence that have worked during the Cold War is not promising. The article argues that if the states are about to protect their civilians from the future cyber conflict by deterring potential attacker they need to change the approach to deterrence.


Author(s):  
Shannon Carcelli ◽  
Erik A. Gartzke

Deterrence theory is slowly beginning to emerge from a long sleep after the Cold War, and from its theoretical origins over half a century ago. New realities have led to a diversification of deterrence in practice, as well as to new avenues for its study and empirical analysis. Three major categories of changes in the international system—new actors, new means of warfare, and new contexts—have led to corresponding changes in the way that deterrence is theorized and studied. First, the field of deterrence has broadened to include nonstate and nonnuclear actors, which has challenged scholars with new types of theories and tests. Second, cyberthreats, terrorism, and diverse nuclear force structures have led scholars to consider means in new ways. Third, the likelihood of an international crisis has shifted as a result of physical, economic, and normative changes in the costs of crisis, which had led scholars to more closely address the crisis context itself. The assumptions of classical deterrence are breaking down, in research as well as in reality. However, more work needs to be done in understanding these international changes and building successful deterrence policy. A better understanding of new modes of deterrence will aid policymakers in managing today’s threats and in preventing future deterrence failures, even as it prompts the so-called virtuous cycle of new theory and additional empirical testing.


Author(s):  
Nicolas Papanastasopoulos ◽  
◽  

Deterrence is the key concept for understanding the strategy and diplomacy of the age (Kenny, 1985). Its various versions — or better yet — its main manifestations appear during the Cold War period (Brodie, Wolfers, Viner, at A. Lupovici, 2010), initially through competition, especially in the field of scientific discoveries and then in the balance between the two superpowers, the US and the Soviet Union. This article, using a historical and conceptual perspective, analyses the philosophy and dynamic of the deterrence theory, both in the conventional and especially in its Cold War and the multipolar era dimension. This article revisits the concept of deterrence and defends a more plausible deterrence theory — the ‘extended deterrence’ conception. Drawing on insights from the IR theory and security studies, we are going to use Greek-Turkish relations as a case study of this approach. This approach supports an implementation of the extended deterrence by the enrichment of the NATO’s article 5. The findings of this study can help members of the academic community familiarize themselves with this new concept of deterrence. Keywords: deterrence, strategic theory, doctrine, IR theory, nuclear weapons.


Author(s):  
Metodi Hadji-Janev

Many incidents in cyberspace and the response to those incidents by victim states prove that the cyber conflict is a reality. This new conflict is complex and poses serious challenges to national and international security. One way to protect the civilian populace is by deterring potential malicious actors (state and non-state) from exploiting cyberspace in a negative way. Given the changed reality and complexity that gravitates over the cyber conflict classical deterrence that have worked during the Cold War is not promising. The article argues that if the states are about to protect their civilians from the future cyber conflict by deterring potential attacker they need to change the approach to deterrence.


2002 ◽  
Vol 96 (3) ◽  
pp. 695-696
Author(s):  
Michael D. McGinnis

For too long, nuclear deterrence theory has been treated as a casualty of the end of the Cold War. During the preceding period of superpower rivalry, debates over the credibility of nuclear deterrence attracted the attention of sophisticated game theorists in diverse disciplines. But with the end of the Cold War, this research tradition virtually ground to a halt. In this important new book, two long-term contributors to this body of research revisit these issues and effectively recast these models as representations of policy dilemmas of long-standing and continuing relevance. For instance, their models of U.S. strategic doctrines of massive retaliation and flexible response prove relevant to any situation in which the parties perceive two levels of conflict to be significantly different, even if neither level involves the use of nuclear weapons.


Sign in / Sign up

Export Citation Format

Share Document