Skip to main content

Abstract

This chapter deals with developing and communicating a clear declaratory policy and credible options for deterrence-in-kind so as to make escalation unavoidable and costly. Specifically, we discuss developing and communicating a clear declaratory policy and credible options for deterrence-in-kind so as to make escalation unavoidable and costly, which will further help enhance the deterrence of major cyber attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. Peter Lavoy, ‘Managing South Asia’s Nuclear Rivalry: New Policy Challenges for the United States’, The Nonproliferation Review 10/3 (Fall/Winter 2003), 84–94.

    Article  Google Scholar 

  2. James I. Matray, ‘Dean Acheson’s Press Club Speech Reexamined’, The Journal of Conflict Studies 22/1 (Spring 2002), http://journals.hil.unb.ca/index.php/jcs/article/view/366/578.

  3. Malcolm Chalmers, ‘Words That Matter? NATO Declaratory Policy and the DDPR’, Nuclear Threats Initiative Report (17 November 2011), http://www.nti.org/media/pdfs/NTI_Framework_Chpt2.pdf?_=1322701473, 52–65.

    Google Scholar 

  4. Tim Cohen, ‘Obama: It’s the world’s “red line” on Syria; Senate Panel Backs Military Strike Plan’, CNN (4 September 2013), http://www.cnn.com/2013/09/04/politics/us-syria/index.html.

    Google Scholar 

  5. David E. Sanger, ‘NATO Set to Ratify Pledge on Joint Defense in Case of Major Cyberattack’. The New York Times, 31 August 2014, http://www.nytimes.com/2014/09/01/world/europe/nato-set-to-ratify-pledge-on-joint-defense-in-case-of-major-cyberattack.html?_r=1.

    Google Scholar 

  6. Jim Finkle, ‘Hacker Group in China Linked to Big Cyber Attacks: Symantec’, Reuters (17 September 2013), http://www.reuters.com/article/2013/09/17/us-cyberattacks-china-idUSBRE98G0M720130917.

    Google Scholar 

  7. United States Department of State, ‘State Sponsors of Terrorism List’, accessed 17 September 2013, http://www.state.gov/j/ct/list/c14151.htm.

    Google Scholar 

  8. Boaz Ganor, ‘Countering State-Sponsored Terrorism’, International Institute for Counter-Terrorism 25/4 (25 April 1998), http://www.ict.org.il/Articles/tabid/66/Articlsid/701/currentpage/34/Default.aspx.

    Google Scholar 

  9. Kirit Radia, ‘Libya Is Off U.S. Terrorist List’, ABC News (15 May 2006), http://abcnews.go.com/International/story?id=1965753&page=1.

    Google Scholar 

  10. Peter W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford: Oxford UP, 2013), 144–148.

    Google Scholar 

  11. Aliya Sternstein, ‘Pentagon Plans to Deploy More Than 100 Cyber Teams by Late 2015’, NextGov (19 March 2013), http://www.nextgov.com/defense/2013/03/pentagon-plans-deploy-more-100-cyber-teams-late-2015/61948/.

    Google Scholar 

  12. Barton Gellman and Ellen Nakashima, ‘U.S. Spy Agencies Mounted 231 Offensive Cyber-Operations in 2011, Documents Show’, The Washington Post (30 August 2013), http://articles.washingtonpost.com/2013-08-30/world/41620705_1_computer-worm-former-u-s-officials-obama-administration.

    Google Scholar 

  13. Franz-Stefan Gady, ‘It’s Time We Talk about Cyber Deterrence’, The Huffington Post (12 September 2013), http://www.huffingtonpost.com/franzstefan-gady/cyber-war-in-syria-it-is-_b_3897981.html.

    Google Scholar 

  14. Vincent Manzo, ‘Stuxnet and the Dangers of Cyberwar’, The National Interest (29 January 2013), http://nationalinterest.org/commentary/stuxnet-the-dangers-cyberwar-8030.

    Google Scholar 

  15. United States Department of Defense, Defense Science Board, ‘Task Force Report: Resilient Military Systems and the Advanced Cyber Threat’ (January 2013), http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf.

    Google Scholar 

  16. Jeremy A. Rabkin and Ariel Rabkin, ‘To Confront Cyber Threats, We Must Rethink the Law of Armed Conflict’, Koret-Taube Task Force on National Security and Law, Hoover Institution, Stanford University (2012), 10.

    Google Scholar 

  17. B. Nathaniel Garrett, ‘Taming the Wild Wild Web: Twenty-First Century Prize Law and Privateers as a Solution to Combating Cyber-Attacks’, University of Cincinnati Law Review 81/2 (2013), 694.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 2015 Brian M. Mazanec and Bradley A. Thayer

About this chapter

Cite this chapter

Mazanec, B.M., Thayer, B.A. (2015). Developing a Declaratory Policy and Offensive Cyber Weapons. In: Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace. Palgrave Pivot, London. https://doi.org/10.1057/9781137476180_6

Download citation

Publish with us

Policies and ethics