Visible to the public Towards establishment of cyberspace deterrence strategy

TitleTowards establishment of cyberspace deterrence strategy
Publication TypeConference Paper
Year of Publication2011
AuthorsAlperovitch, Dmitri
Conference Name2011 3rd International Conference on Cyber Conflict
KeywordsAvailability, civilian defense strategists, Computer crime, confidentiality, counter-strike, credible declaratory retaliation capability, cyberattacks, cyberdeterrence, Cyberspace, cyberspace deterrence strategy, deterrence, Economics, first-strike, Human Behavior, Information systems, integrity, military computing, military security, National security, pubcrawl, resilience, Scalability, security of data, social aspects of automation, strategy, Weapons
AbstractThe question of whether strategic deterrence in cyberspace is achievable given the challenges of detection, attribution and credible retaliation is a topic of contention among military and civilian defense strategists. This paper examines the traditional strategic deterrence theory and its application to deterrence in cyberspace (the newly defined 5th battlespace domain, following land, air, sea and space domains), which is being used increasingly by nation-states and their proxies to achieve information dominance and to gain tactical and strategic economic and military advantage. It presents a taxonomy of cyberattacks that identifies which types of threats in the confidentiality, integrity, availability cybersecurity model triad present the greatest risk to nation-state economic and military security, including their political and social facets. The argument is presented that attacks on confidentiality cannot be subject to deterrence in the current international legal framework and that the focus of strategy needs to be applied to integrity and availability attacks. A potential cyberdeterrence strategy is put forth that can enhance national security against devastating cyberattacks through a credible declaratory retaliation capability that establishes red lines which may trigger a counter-strike against all identifiable responsible parties. The author believes such strategy can credibly influence nation-state threat actors who themselves exhibit serious vulnerabilities to cyber attacks from launching a devastating cyber first strike.
Citation Keyalperovitch_towards_2011