Can States Calculate the Risks of Using Cyber Proxies

@article{Borghard2016CanSC,
  title={Can States Calculate the Risks of Using Cyber Proxies},
  author={Erica D. Borghard and Shawn W. Lonergan},
  journal={Orbis},
  year={2016},
  volume={60},
  pages={395-416}
}

Cyber Operations, Accommodative Signaling, and the De-Escalation of International Crises

Abstract Signaling is a core element of international crisis bargaining and coercive diplomacy. To succeed in crises, a state must convey to its opponent that it possesses the capability to impose an

The illogic of plausible deniability: why proxy conflict in cyberspace may no longer pay

TLDR
The findings should decrease confidence in plausible deniability as a logic for why states outsource to proxies, and joins an emerging body of research that has questioned the role of plausible deniable in covert action, including cyber conflict.

The cyber deterrence problem

  • Aaron F. Brantly
  • Computer Science
    2018 10th International Conference on Cyber Conflict (CyCon)
  • 2018
TLDR
This work attempts to leverage relevant examples from both within and beyond cyberspace to examine applicability of deterrence in the digital age and for digital tools in an effort to shift the conversation from Atoms to Bits and Bytes.

Cyber Proxies and Their Implications for Liberal Democracies

Over 30 countries are pursuing offensive cyber capabilities, Director of U.S. Intelligence James Clapper testified in 2016. That’s a fivefold increase compared to only six years earlier when the U.S.

Forum: Conflict Delegation in Civil Wars

This forum provides an outlet for an assessment of research on the delegation of war to non-state armed groups in civil wars. Given the significant growth of studies concerned with this phenomenon

Deterrence by denial in cyberspace

Many scholars and practitioners are unconvinced that cyber deterrence is possible. This article aims to demonstrate why some of this skepticism is misplaced, as well as provide greater clarity and ...

Framers, founders, and reformers: Three generations of proxy war research

ABSTRACT The rapid expansion of the proxy war literature invites an examination of its advances and developments. This article’s aims are threefold. First, to assess proxy war literature with a view

Macht im Cyberspace: Eine Übersicht der bisherigen Forschung und künftiger Perspektiven anhand des Proxy-Konzepts

  • K. Zettl
  • Political Science
    Zeitschrift für Friedens- und Konfliktforschung
  • 2021
Entgegen seiner ursprünglichen Gründungshistorie erscheint das Internet zunehmend seitens staatlicher Akteure instrumentalisiert zu werden. Vor allem Autokratien nutzen dabei verstärkt den Cyberspace

No Shortcuts

Over the past decade, numerous states have declared cyberspace as a new domain of warfare, sought to develop a military cyber strategy and establish a cyber command. These developments have led to

Accountability and cyber conflict: examining institutional constraints on the use of cyber proxies

  • W. Akoto
  • Political Science
    Conflict Management and Peace Science
  • 2021
As state-sponsored cyber operations have proliferated, some states are outsourcing these operations to non-state cyber proxies. However, given the relative ease of outsourcing cyber operations, it is