Skip to main content

The Challenges of Cyber Deterrence

  • Chapter
  • First Online:
The 2018 Yearbook of the Digital Ethics Lab

Part of the book series: Digital Ethics Lab Yearbook ((DELY))

Abstract

In this chapter, I analyse deterrence theory and argue that its applicability to cyberspace is limited and that these limits are not trivial. They are the consequence of fundamental differences between deterrence theory and the nature of cyber conflicts and cyberspace. The goals of this analysis are to identify the limits of deterrence theory in cyberspace, clear the ground of inadequate approaches to cyber deterrence, and define the conceptual space for a domain-specific theory of cyber deterrence, still to be developed.

This chapter is based on a research article published in Philosophy & Technology: “The Limits of Deterrence Theory in Cyberspace” (Taddeo 2017c).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/

  2. 2.

    https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html?_r=0

  3. 3.

    https://www.symantec.com/connect/blogs/greenbug-cyberespionage-group-targeting-middle-east-possible-links-shamoon

  4. 4.

    For the purposes of this chapter, I will use the expression ‘traditional deterrence theory’ to refer to any theory of deterrence relying on kinetic military forces, whether they be conventional or nuclear.

  5. 5.

    Attribution may not be necessary in all instances of deterrence, for example for deterrence by defence. Some argue that when the exact source of an attack is unknown, attribution and, hence, responsibility for an attack, can be shifted to the particular state in which the attack originated (Morgan 2010; Goodman 2010). However, clear attribution remains necessary for deterrence by retaliation.

  6. 6.

    http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm

  7. 7.

    http://www.wired.co.uk/article/petya-malware-ransomware-attack-outbreak-june-2017

  8. 8.

    https://www.theregister.co.uk/2017/06/28/petya_notpetya_ransomware/

  9. 9.

    http://www.telegraph.co.uk/technology/2017/05/23/highly-likely-wannacry-cyber-attack-linked-north-korea/

  10. 10.

    https://www.symantec.com/security_response/writeup.jsp?docid=2010-071400-3123-99

  11. 11.

    https://www.theregister.co.uk/2016/05/09/sixyearold_patched_stuxnet_hole_still_the_webs_biggest_killer/

  12. 12.

    https://www.forbes.com/sites/thomasbrewster/2017/05/12/nsa-exploit-used-by-wannacry-ransomware-in-global-explosion/#3f04a279e599

  13. 13.

    https://fas.org/irp/agency/dod/dsb/autonomy-ss.pdf; https://www.darpa.mil/program/cyber-grand-challenge

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mariarosaria Taddeo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Taddeo, M. (2019). The Challenges of Cyber Deterrence. In: Öhman, C., Watson, D. (eds) The 2018 Yearbook of the Digital Ethics Lab. Digital Ethics Lab Yearbook. Springer, Cham. https://doi.org/10.1007/978-3-030-17152-0_7

Download citation

Publish with us

Policies and ethics