The Damoclean sword of offensive cyber: Policy uncertainty and collective insecurity

  title={The Damoclean sword of offensive cyber: Policy uncertainty and collective insecurity},
  author={Christian Leuprecht and J{\'o}zsef Szem{\'a}n and David B. Skillicorn},
  journal={Contemporary Security Policy},
  pages={382 - 407}
ABSTRACT Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and… 
Contemplating a Cyber Weapons Convention: An Exploration of Good Practice and Necessary Preconditions
Abstract Despite being a crucially important domain for states, businesses, and individuals, cyberspace still suffers from a regulation deficit. This article takes up one such dangerously
Approaches to international information security and the discourse of cyberspace
The results showed that due to the compelling non-kinetic application of infosec, the debate at international forums had become a victim of geopolitical considerations and needs to be disassociated from social freedom as it has been adopted for military application and requires a national security perspective to confine the course of security implications.
Collective security and strategic instability in the digital domain
ABSTRACT Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead
The Hybridisation of Conflict: A Prospect Theoretic Analysis
Revisionist actors are increasingly operationalising a broad number of non-violent threats in their quest to change the status quo, popularly described as hybrid conflict. From a defensive point of
A fragile public preference for cyber strikes: Evidence from survey experiments in the United States, United Kingdom, and Israel
ABSTRACT To what extent does the public support the use of cyber weapons? We propose that public exposure to the destructive potential of cyber-attacks will dispel the clear cross-national preference
The EU’s Common Security and Defence Policy in Facing New Security Challenges and Its Impact on Cyber Defence
How EU’s Common Security and Defence Policy is prepared in standing against new security challenges, especially cyber threats, which influence to the future CSDP developments will be discussed as well.


The Meaning of the Cyber Revolution: Perils to Theory and Statecraft
Abstract While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Some scholars presume that
Integrating offensive cyber capabilities: meaning, dilemmas, and assessment
It is argued that organizational integration may lead to three benefits: enhanced interaction efficiency of intelligence and military activities, better knowledge transfer and reduced mission overlap, and there are also several negative effects attached to OIOCC.
Retaliatory Deterrence in Cyberspace
The view that deterrence is of little value in securing the nation’s infor mation infrastructure is based on a Cold War model of strategic nuclear deterrence. If one examines other approaches to
Russia's Approach to Cyber Warfare
The paper examines the Russian approach to cyber warfare, addressing both its theoretical and its practical underpinnings, and suggests that the Kremlin will have a relatively low bar for employing cyber in ways that U.S. decision makers are likely to view as offensive and escalatory in nature.
Cyberpower and National Security
Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyberspace challenges.
Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack
A formal model is used to explain why there are many low-value anonymous attacks but few high-value ones, showing how different assumptions about the scaling of exploitation and retaliation costs lead to different degrees of coverage and effectiveness for deterrence by denial and punishment.
Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War
The size of the effect of the proliferation of cyberwarfare capabilities on the frequency of war will probably be relatively small and the use of computer network attack as a brute force weapon will probably become increasingly frequent.
The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs: Is Strategic Cyber Deterrence the Key to Solving the Problem?
An overview of the trend of cyberattacks in the last decade reveals that cyberattacks frequently follow incidents of international discord or conflict, and cyber security has become a top priority in national and international security.
While most normative evaluations of military cyber-operations have emerged from the legal community, this article assesses the legitimacy of such operations from a philosophical-ethical perspective.