Offensive cyber capabilities: To what ends?

作者: Max Smeets , Herbert S. Lin

DOI: 10.23919/CYCON.2018.8405010

关键词:

摘要: There is a growing interest in the use of offensive cyber capabilities (OCC) among states. Despite these capabilities, little still known about nature OCC as tool state. This research therefore aims to understand if (and how) have potential change role military power. Drawing on wide range cases, we argue that can alter manner which states their power strategically at least four ways. are not particularly effective deterring adversary action, except when threatened be used by with credible reputation. However, they do value compellence. Unlike conventional effects operations necessarily exposed publicly, means compelled party back down post-action without losing face thus deescalating conflict. The control reversibility effect an attacker may also encourage compliance. contribute force for defensive purposes, it could provide both preemptive well preventive strike option. Finally, its symbolic 'prestige weapon' enhance 'swaggering' remains unclear, due largely non-material ontology and transitory nature.

参考文章(23)
Neil C. Rowe, Towards Reversible Cyberattacks Monterey, California. Naval Postgraduate School. ,(2010)
Joseph Farrell, Robert Gibbons, Cheap Talk with Two Audiences The American Economic Review. ,vol. 79, pp. 1214- 1223 ,(1989)
Gregory F. Treverton, Framing Compellent Strategies ,(2001)
Jon R. Lindsay, Stuxnet and the Limits of Cyber Warfare Security Studies. ,vol. 22, pp. 365- 404 ,(2013) , 10.1080/09636412.2013.816122
Anne E. Sartori, The Might of the Pen: A Reputational Theory of Communication in International Disputes International Organization. ,vol. 56, pp. 121- 149 ,(2002) , 10.1162/002081802753485151
S. Mathew, R. Giomundo, S. Upadhyaya, M. Sudit, A. Stotz, Understanding multistage attacks by attack-track based visualization of heterogeneous event streams Proceedings of the 3rd international workshop on Visualization for computer security - VizSEC '06. pp. 1- 6 ,(2006) , 10.1145/1179576.1179578
Thomas Rid, Ben Buchanan, Attributing Cyber Attacks Journal of Strategic Studies. ,vol. 38, pp. 4- 37 ,(2015) , 10.1080/01402390.2014.977382
Chris McGuffin, Paul Mitchell, On Domains: Cyber and the Practice of Warfare International Journal. ,vol. 69, pp. 394- 412 ,(2014) , 10.1177/0020702014540618