Revisiting Strategic Cyberwar Theory Reaching Decisive Strategic Outcome

07/16/2020
by   Jan Kallberg, et al.
0

Each strategy has a foundation, an overarching way of explaining why things are the way we see them and how to successfully reach our goals. Therefore, strategy is theory based because theory provides an intellectual framework for predicting outcomes leading to the end goal the strategy pursues. This article will present a theory, strategic cyberwar theory, that states that the utility of strategic cyberwar is tied to the likelihood of institutional instability in the targeted nation. In an ideal scenario, the cyber attacks are systematically attacking the targeted adversary institutions triggering the dormant entropy embedded in a nation with weak institutions. This will lead to submission to foreign policy and intent. The current alternative to strategic cyberwar theory is to unsystematically attack the adversary with cyber attacks where exploitation opportunities occur, which is likely to degrade parts of the information infrastructure, but it will not reach any strategic goals. If an adversarial society is unaffected by a cyber conflict, the conflict itself has not reached a decisive outcome, and results only in tit for tat game or stalemate. In strategic cyberwar theory1, the concept is to cyber attack the core of the institutional framework of the adversarial nation in pursuit of destabilization.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/06/2021

Staring Down the Digital Fulda Gap Path Dependency as a Cyber Defense Vulnerability

Academia, homeland security, defense, and media have accepted the percep...
research
02/14/2022

How to De-Escalate a Cyber Conflict

De-escalation of a cyber conflict can be substantially more difficult th...
research
06/17/2019

A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network

Infrastructure networks are vulnerable to both cyber and physical attack...
research
05/06/2022

Using cyber threat intelligence to support adversary understanding applied to the Russia-Ukraine conflict

In military organizations, Cyber Threat Intelligence (CTI) supports cybe...
research
10/13/2022

A Game Theoretical vulnerability analysis of Adversarial Attack

In recent times deep learning has been widely used for automating variou...
research
06/22/2019

Protecting shared information in networks: a network security game with strategic attacks

A digital security breach, by which confidential information is leaked, ...
research
08/18/2018

Supremacy by Accelerated Warfare through the Comprehension Barrier and Beyond: Reaching the Zero Domain and Cyberspace Singularity

It is questionable and even unlikely that cyber supremacy could be reach...

Please sign up or login with your details

Forgot password? Click here to reset