Concepts of Cyberdeterrence and Digital Security Dilemma in the US Academic Literature
https://doi.org/10.17994/IT.2019.17.3.58.4
Abstract
The global information space is conceptualized as a new battlefield, both in the research literature and in the strategic planning documents of states. In such analytical environment, there is a growing tendency to analyze international processes in the global information space from the standpoint of the theory of political realism, based on the ideas emerged in the “nuclear era”. One of the most developed theoretical concepts of realism is deterrence theory, which is aimed to overcome the limitations of the security dilemma. American political scientist R. Jervis was one of the founders of the both theoretical concepts, which were later revised by contemporary authors in relation to cyberspace. Contemporary researchers, including D. Nye and M. Libicki, as well as a number of other authors, argue that the deterrence strategy, by analogy with nuclear deterrence, is applicable to cyber weapons. In particular, they propose new term “cyber deterrence” (cyber-deterrence). Such conceptual constructions influence practical politics. According to the National Security Strategy of 2017, the United States is seeking implement a deterrence in cyberspace. The purpose of the article is to analyze the applicability of the cyber-deterrence concept to cyberspace in the US academic discourse based on the characteristics of the digital “security dilemma”. The article shows that cyber deterrence, by analogy with the nuclear one, can only exacerbate the security dilemma in digital space. Digital security dilemma is different from the security dilemma that exists in relation to other types of weapons, due to the specifics of information technologies whose offensive use is more effective rather than defensive, as well as the significant role of non-state actors, especially business. Thus, methodologically, this article proceeds from the fact that modern information and communication technologies are not inherently neutral, but have a certain set of characteristics that determine their military use and, as a result, affect modern international security. Under these conditions, the development of norms of responsible behavior of states in the global information space is considered as one of the tools to deter conflict in cyber space.
Keywords
About the Author
Elena ZinovievaRussian Federation
Dr Elena Zinovieva - Associate Professor, Department of World Politics, Deputy Director, Center of International Information Security and Science and Technology Policy, MGIMO University
Moscow, 119454
References
1. Bolgov R.V. (2010). Informatsionnye tehnologii v sovremennyh vooruzhennyh konfliktah i voennyh strat e gijah (politicheskie aspekty). [Information Technologies in the Contemporary International Armed Conf licts (Political Aspects)]. PhD Dissertation. Saint-Petersburg: Saint-Petersburg State University. 38 p.
2. Borghard E.D., Lonergan S.W. (2016). Can States Calculate the Risks of Using Cyber Proxies? Orbis. No. 3. P. 395–416.
3. Brantly A. (2018). Conceptualizing Cyber Deterrence by Entanglement. URL: http://dx.doi.org/10.2139/ ssrn.2624926
4. Brantly A. F. (2018). The Cyber Deterrence Problem. 10th International Conference on Cyber Conflict (CyCon). IEEE. P. 31–54.
5. Brenner J. (2014). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. NY: Penguin Press. 320 p.
6. Buchanan B. (2016). The Cybersecurity Dilemma: Hacking, Trust, and Fear between Nations. Oxford University Press, 2016. 304 p.
7. Cavelty M.D. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics. No. 3. P. 701–715.
8. Clarke R.A., Knake R.K. (2014). Cyber War. Tantor Media, Incorporated. 136 p.
9. Cooper J. R. (2012). A New Framework for Cyber Deterrence. In Reveron D.S. (ed.) Cyberspace and National Security Threats, Opportunities, and Power in a Virtual World. Washington: Georgetown University Press. P. 105–120.
10. Craig A., Valeriano B. (2016). Conceptualising Cyber Arms Races. 8th International Conference on Cyber Conflict (CyCon). IEEE. P. 141-158. URL: https://ccdcoe.org/uploads/2018/10/Art-10-ConceptualisingCyber-Arms-Races.pdf
11. Deibert R. (2015). Trajectories for Future Cybersecurity Research. In Gheciu A., Wohlforth W.C. (eds) The Oxford Handbook of International Security. Oxford: Oxford University Perss, 2015. P. 531–556.
12. Demidov O., Simonenko M. (2013). Pozhar v kiberprostranstve [Cyberspace on Fire]. Indeks bezopasnosti. No. 1. P. 229–232.
13. Finnemore M. (2019). Talking Past Each Other: Government, Business and Civil Society Discussing Cyber Security. Vestnik MGIMO-Universiteta. Vol. 12. No. 5. P. 7–11.
14. Finnemore M., Hollis D.B. (2016). Constructing Norms for Global Cybersecurity. American Journal of International Law. Vol. 110. No. 3. P. 425–479.
15. Gaver W.W. (1991). Technology Affordances. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM. P. 79–84.
16. Glaser C.L. (2011). Deterrence of Cyber Attacks and US National Security. Developing Cyber Security Synergy. Vol. 47. URL: http://www.offnews.info/downloads/2011-5CyberDeterrenceGlaser.pdf
17. Healey J. (ed.) (2013). A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Cyber Conflict Studies Association. 356 p.
18. Herz J. H. (1950). Idealist internationalism and the security dilemma. World politics. Vol. 2. No. 2. P. 157–180.
19. Istomin I. (2012). Nauchnoe obespechenie vneshnej politiki SShA. [Scientific support of the US foreign policy]. PhD Dissertation. Political Sciences.
20. Jervis R. (1978). Cooperation under the Security Dilemma. World Politics. Vol. 30. No. 2. P. 167–214.
21. Jervis R. (1989a). Rational Deterrence: Theory and Evidence. World Politics. Vol. 41. No. 2. P. 183–207. Jervis R. (2016). Some Thoughts on Deterrence in the Cyber Era. Journal of Information Warfare. Vol. 15. No. 2. P. 66–73.
22. Jervis, R. (1989b). The meaning of the nuclear revolution: Statecraft and the prospect of Armageddon. Cornell University Press. 266 p.
23. Kello L. (2017). The Virtual Weapon and International Order. New Heaven and London: Yale University Press. 319 p.
24. Korotkov A.V., Zinovieva E.S. (2011). Bezopasnost' kriticheskih informacionnyh infrastruktur v mezhdunarodnom gumanitarnom prave [Critical Information Infrastructures Security in the International Humanitarian Law]. Vestnik MGIMO–Universiteta. No. 4. P. 154–162.
25. Kugler R.L. (2009). Deterrence of Cyber Attacks and US National Security. In Kramer F., Starr S., Wentz L. (eds) Cyberpower and National Security. Washington DC: Potomac Books. P. 309–342.
26. Lewis J., Timlin K. (2011). Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization, UNIDIR. URL: http://unidir.org/files/publications/pdfs/cybersecurity-and-cyberwarfarepreliminary-assessment-of-national-doctrine-and-organization-380.pdf Libicki M. (2009). Cyberdeterrence and Cyberwar. Rand Corporation. 214 p.
27. Libicki M. (2016). Cyberspace in Peace and War. Naval Institute Press. 478 p.
28. Libicki M. (2018). Expectations of Cyber Deterrence. Strategic Studies Quarterly. No. 4. P.44–57.
29. Lieber K.A. (2005). War and the engineers: The primacy of politics over technology. Cornell University Press. 226 p.
30. Lindsay J. 2013. Stuxnet and the Limits of Cyber Warfare. Security Studies. No. 3. P. 36–404.
31. Lukasik S.J. (2010). A Framework for Thinking About Cyber Conflict and Cyber Deterrence with Possible Declaratory Policies for These Domains. Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for US Policy. Vol. 2. P. 99–122.
32. Majchrzak A., Markus M.L. (2012). Technology Affordances and Constraints in Management Information Systems (MIS). In Kessler E. (ed.) Encyclopedia of Management Theory. London: Sage. URL: https:// ssrn.com/abstract=2192196
33. Maness R., Valeriano B. (2016). The Impact of Cyber Conflict on International Interactions. Armed Forces & Society. Vol. 42. No. 2. P. 301–323.
34. Manjikian M. (2010). From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik. International Studies Quarterly. No. 2. Р. 381–401.
35. Mazarr M., Bauer R., Casey A., Heintz S., Matthews L. (2019). The Emerging Risk of Virtual Societal Warfare. Santa Monica, CA: RAND Corporation. URL: https://www.rand.org/pubs/research_reports/ RR2714.html
36. Mearsheimer J.J. (1985). Conventional Deterrence. Ithaca: Cornell University Press. 296 p.
37. Morozov E. (2012). The Net Delusion: The Dark Side of Internet Freedom. Public Affairs. 429 p.
38. Nye J.S. (2011). The Future of Power. Public Affairs. 300 p.
39. Nye J.S. (2017). Deterrence and Dissuasion in Cyberspace. International Security. Vol. 41. No. 3. P. 44–71.
40. Panarin I.N. (2006). Informatsionnaya vojna i geopolitika [Information Warfare and Geopolititcs]. Мoscow: Pokolenie. 560 p.
41. Rauscher K. F., Yaschenko V. (2011). Russia-US bilateral on cybersecurity: Critical terminology foundations. New York, USA: EastWest Institute. 48 p.
42. Reich P.C. et al. (2010). Cyber Warfare: a Review of Theories, Law, Policies, Actual Incidents – and the Dilemma of Anonymity. European Journal of Law and Technology. Vol. 1. No. 2. P. 1–58.
43. Rid T., Buchanan B. (2015). Attributing Cyber Attacks. Journal of Strategic Studies. Vol. 38. No. 1–2. P. 4–37.
44. Rogovskij E.A. (2014). Kiber-Vashington: global'nye ambitsii [Cyber–Washington: Global Ambitions]. Moscow: Mezhdunarodnye otnoshenija. 848 p.
45. Schelling, T. C. (1966). Arms and influence. New Haven, CT: Yale University Press.
46. Schmitt M.N. (ed.) (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. (2013). Cambridge University Press. 281 p.
47. Schmitt M.N. (ed.) (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. (2017). Cambridge University Press. 597 p.
48. Shakleina T.A. (2015). Liderstvo i sovremennyj mirovoj porjadok [Leadership in the Contemporary International Order]. Mezhdunarodnye protsessy. No. 4. P. 6–19.
49. Stevens T. (2012). A Cyberwar of Ideas? Deterrence and Norms in Cyberspace. Contemporary Security Policy. Vol. 33. No. 1. P. 148–170.
50. Tor U. (2017). “Cumulative Deterrence” as a New Paradigm for Cyber Deterrence. Journal of Strategic Studies. Vol. 40. No. 1-2. P. 92–117.
51. Valeriano B., Maness R. (2018). International Relations Theory and Cyber Security: Threats, Conflicts and Ethics in an Emergent Domain. In Brown C., Eckersley R. (eds) The Oxford Handbook of Political Theory. Oxford: Oxford University Press. P. 259–275.
52. Wilner A. (2019). US Cyber Deterrence: Practice Guiding Theory. Journal of Strategic Studies. P. 1–36.
53. Zetter K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. NY: Crown Publishers. 449 p.
Review
For citations:
Zinovieva E. Concepts of Cyberdeterrence and Digital Security Dilemma in the US Academic Literature. International Trends / Mezhdunarodnye protsessy. 2019;17(3):51-65. (In Russ.) https://doi.org/10.17994/IT.2019.17.3.58.4