Abstract
This chapter deals with developing and communicating a clear declaratory policy and credible options for deterrence-in-kind so as to make escalation unavoidable and costly. Specifically, we discuss developing and communicating a clear declaratory policy and credible options for deterrence-in-kind so as to make escalation unavoidable and costly, which will further help enhance the deterrence of major cyber attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Notes
Peter Lavoy, ‘Managing South Asia’s Nuclear Rivalry: New Policy Challenges for the United States’, The Nonproliferation Review 10/3 (Fall/Winter 2003), 84–94.
James I. Matray, ‘Dean Acheson’s Press Club Speech Reexamined’, The Journal of Conflict Studies 22/1 (Spring 2002), http://journals.hil.unb.ca/index.php/jcs/article/view/366/578.
Malcolm Chalmers, ‘Words That Matter? NATO Declaratory Policy and the DDPR’, Nuclear Threats Initiative Report (17 November 2011), http://www.nti.org/media/pdfs/NTI_Framework_Chpt2.pdf?_=1322701473, 52–65.
Tim Cohen, ‘Obama: It’s the world’s “red line” on Syria; Senate Panel Backs Military Strike Plan’, CNN (4 September 2013), http://www.cnn.com/2013/09/04/politics/us-syria/index.html.
David E. Sanger, ‘NATO Set to Ratify Pledge on Joint Defense in Case of Major Cyberattack’. The New York Times, 31 August 2014, http://www.nytimes.com/2014/09/01/world/europe/nato-set-to-ratify-pledge-on-joint-defense-in-case-of-major-cyberattack.html?_r=1.
Jim Finkle, ‘Hacker Group in China Linked to Big Cyber Attacks: Symantec’, Reuters (17 September 2013), http://www.reuters.com/article/2013/09/17/us-cyberattacks-china-idUSBRE98G0M720130917.
United States Department of State, ‘State Sponsors of Terrorism List’, accessed 17 September 2013, http://www.state.gov/j/ct/list/c14151.htm.
Boaz Ganor, ‘Countering State-Sponsored Terrorism’, International Institute for Counter-Terrorism 25/4 (25 April 1998), http://www.ict.org.il/Articles/tabid/66/Articlsid/701/currentpage/34/Default.aspx.
Kirit Radia, ‘Libya Is Off U.S. Terrorist List’, ABC News (15 May 2006), http://abcnews.go.com/International/story?id=1965753&page=1.
Peter W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford: Oxford UP, 2013), 144–148.
Aliya Sternstein, ‘Pentagon Plans to Deploy More Than 100 Cyber Teams by Late 2015’, NextGov (19 March 2013), http://www.nextgov.com/defense/2013/03/pentagon-plans-deploy-more-100-cyber-teams-late-2015/61948/.
Barton Gellman and Ellen Nakashima, ‘U.S. Spy Agencies Mounted 231 Offensive Cyber-Operations in 2011, Documents Show’, The Washington Post (30 August 2013), http://articles.washingtonpost.com/2013-08-30/world/41620705_1_computer-worm-former-u-s-officials-obama-administration.
Franz-Stefan Gady, ‘It’s Time We Talk about Cyber Deterrence’, The Huffington Post (12 September 2013), http://www.huffingtonpost.com/franzstefan-gady/cyber-war-in-syria-it-is-_b_3897981.html.
Vincent Manzo, ‘Stuxnet and the Dangers of Cyberwar’, The National Interest (29 January 2013), http://nationalinterest.org/commentary/stuxnet-the-dangers-cyberwar-8030.
United States Department of Defense, Defense Science Board, ‘Task Force Report: Resilient Military Systems and the Advanced Cyber Threat’ (January 2013), http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf.
Jeremy A. Rabkin and Ariel Rabkin, ‘To Confront Cyber Threats, We Must Rethink the Law of Armed Conflict’, Koret-Taube Task Force on National Security and Law, Hoover Institution, Stanford University (2012), 10.
B. Nathaniel Garrett, ‘Taming the Wild Wild Web: Twenty-First Century Prize Law and Privateers as a Solution to Combating Cyber-Attacks’, University of Cincinnati Law Review 81/2 (2013), 694.
Author information
Authors and Affiliations
Copyright information
© 2015 Brian M. Mazanec and Bradley A. Thayer
About this chapter
Cite this chapter
Mazanec, B.M., Thayer, B.A. (2015). Developing a Declaratory Policy and Offensive Cyber Weapons. In: Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace. Palgrave Pivot, London. https://doi.org/10.1057/9781137476180_6
Download citation
DOI: https://doi.org/10.1057/9781137476180_6
Publisher Name: Palgrave Pivot, London
Print ISBN: 978-1-349-50193-9
Online ISBN: 978-1-137-47618-0
eBook Packages: Palgrave Intern. Relations & Development CollectionPolitical Science and International Studies (R0)