Abstract
This chapter evaluates the feasibility of cyber deterrence strategies. In the past few years, cyberspace has been the centre of attention for military policymakers, with states racing to assert their dominance and superiority. As with the advent of aerial warfare and air power in the first half of the twentieth century, the cyber domain has seen a rapid influx of technology. This praxis has outpaced theoretical formulation and conceptual development, with the result being that old strategies are being transposed to the new domain. Deterrence is chief among these but suffers from significant problems, as it has been fundamentally shaped by the nuclear era. The nature of cyberspace as characterised by immateriality and supranationality, with a preponderance of non-state actors, makes the rule sets that defined nuclear deterrence inapplicable. Exacerbating these issues are the real difficulties of achieving credibility and the attribution problem. The cyber deterrence strategies that have hereunto been expounded do not seem to heed these issues, but instead inflame a dangerous rhetoric that fuels a particularly volatile arms race. As an initial step towards ameliorating this situation, this chapter concludes by offering two rudimentary policy suggestions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ablon L, Libicki MC, Golay AA (2014) Markets for cybercrime tools and stolen data: hackers’ bazaar. RAND Corporation
Ackerman S, Thielman S (2016) US officially accuses Russia of hacking DNC and interfering with election. The Guardian, 8 Oct 2016
Allison G (2016) British parliament votes to renew trident. UK Defence Journal, 18 July 2016
Arquilla J, Ronfeld D (1993) Cyberwar is coming! RAND Corporation
BBC (2013) Syria crisis: cameron loses commons vote on Syria action, 30 Aug 2013 (http://www.bbc.co.uk/news/uk-politics-23892783)
Beaufre A (1994) A strategy of deterrence. In: Freedman L (ed) War. Oxford University Press, Oxford, pp 238–240
Betz D (2013) Cyberwar is not coming. Infinit J 1(3):21–24
Callahan M (2014) Hackonomics: a first-of-its-kind economic analysis of the cyber black market. Juniper Netw, 24 Mar 2014
Central Intelligence Agency (2016) The world factbook—Tuvalu. https://www.cia.gov/library/publications/the-world-factbook/geos/tv.html
Clarke RA, Knake RK (2010) Cyber war—the next threat to national security and what to do about it. Harper Collins, New York
Clausewitz Cv (1997) On war. Wordsworth, Ware (trans Graham JJ)
Department of Justice (2016) U.S. authorities charge owner of most-visited illegal file-sharing website with copyright infringement. Office of Public Affairs, 20 July 2016
Douhet G (1943) The command of the air. Faber and Faber, London (trans. Ferrari D)
e-Estonia. Estonian e-Residency. https://e-estonia.com/e-residents/about/
Facebook (2016) Information. https://www.facebook.com/whitehat/bounty/
Falliere N et al (2011) W32.Stuxnet Dossier. Version 1.4
Freedman A (2004) Zeppelin fictions and the british home front. J Mod Lit 27(3):47–62
Google. Google vulnerability reward program rules. https://www.google.com/about/appsecurity/reward-program/
Greenberg A (2012) Shopping for zero-days: a price list for hackers’ secret software exploits. Forbes, 23 Mar 2012
Hauben M, Hauben R (1997) Netizens: on the history and impact of usenet and the internet
HM Government (2016a) National cyber security strategy 2016–2021
HM Government (2016b) Chancellor’s speech to GCHQ on cyber security. https://www.gov.uk/government/speeches/chancellors-speech-to-gchq-on-cyber-security
Hope C (2015) Spies should be able to monitor all online messaging, says David Cameron. The Telegraph, 12 Jan 2015
ICS-CERT (2016) Cyber-attack against ukrainian critical infrastructure, 25 Feb 2016. https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01
Johnson DR, Post DG (1996) Law and borders: the rise of law in cyberspace. Stanford Law Rev 48:1367–1402
Mandiant (2013) APT1—exposing one of china’s cyber espionage units
McGoogan C (2016) US government declares cyber war on Islamic State. The Telegraph, 7 Apr 2016
McSmith A (2016) Theresa May says she would kill ‘100,00 men, women and children’ with a nuclear bomb. The Independent, 18 July 2016
Mele S (2013) Cyber weapons—legal and strategic aspects—version 2.0. Italian Institute of Strategic Studies
Microsoft. Microsoft bounty programs. https://technet.microsoft.com/en-US/security/dn425036
National Science and Technology Council (2016) Federal cybersecurity research and development strategic plan—ensuring prosperity and national security. Washington DC
Norton-Taylor R (2013) Britain plans cyber strike-force—with help from GCHQ. The Guardian, 30 Sept 2013
Park M, Ford D (2015) North Korea to U.S.: show evidence we hacked sony. CNN, 14 Jan 2015
Pearlman W, Cunningham KG (2012) Nonstate actors, fragmentation, and conflict processes. J Confl Resolut 56(1):3–15
Poolman K (1960) Zeppelins over England. Evans Brothers, London
Raymond N (2015) Accused silk road operator convicted on U.S. drug charges. Reuters. 4 Feb 2015
Rid T (2013) Cyber war will not take place. Oxford University Press, Oxford
Sanger DE (2012) Obama order sped up wave of cyberattacks against Iran. The New York Times, 1 June 2012
Schelling T (1994) The threat that leaves something to chance. In: Freedman L (ed) War. Oxford University Press, Oxford, pp 241–244
Schipka M (2007) The online shadow economy: a billion dollar market for malware authors. MessageLabs
Schneier B (2013) Rhetoric of cyber war breeds fear—and more cyber war. Schneier Security, 14 Mar 2013
Steiner P (1993) The New Yorker, 5 July 1993
The Economist. The Digital Arms Trade, 30 Mar 2013
The Times, 11 Nov 1932
United. United airlines bug bounty program. https://www.united.com/web/en-US/content/contact/bugbounty.aspx
W3Techs (2016) Usage of top level domains for websites. https://w3techs.com/technologies/overview/top_level_domain/all
Wagstyl S (2016) Germany points finger at kremlin for cyber attack on Bundestag. Financial Times, 13 May 2016
Acknowledgements
This chapter was partly based on an unpublished essay written for the International Institute of Strategic Studies 2015 Student Essay Competition on International Cyber Security. The author was supported by the EPSRC and the UK government as part of the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London (EP/K035584/1).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix A: Historical UK Military Spending
Appendix A: Historical UK Military Spending
See Table 1.
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Haggman, A. (2018). Cyber Deterrence Theory and Practise. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Power and Technology. Intelligent Systems, Control and Automation: Science and Engineering, vol 93. Springer, Cham. https://doi.org/10.1007/978-3-319-75307-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-75307-2_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75306-5
Online ISBN: 978-3-319-75307-2
eBook Packages: EngineeringEngineering (R0)