DETERRENCE AND CYBER-WEAPONS
Hemmer, Patrick T.
MetadataShow full item record
Rapid technological advancements and societal inclusion of these technologies have expanded civil and defense capabilities but have also created significant vulnerabilities. Cyber-weapons have the potential to affect interaction between states by exploiting this vulnerability. To better understand the mechanics of how cyber-weapons affect state relations this research applies a common framework to explore the attributes of traditional weaponsconventional, nuclear, and RMAand how they typically influence this behavior. After proposing selected factors that influence the effectiveness of a cyber-attack, the research examines the cyber-attacks in 2007 on Estonia and 2008 on Georgia in order to refine and provide nuanced analysis on the role of the proposed causal factors. The proposed factors are government involvement, level of attack sophistication, and the degree to which the state is dependent upon digitally connected technology. The research indicates that the role of the state is one of the most significant factors in influencing the effectiveness of a cyber-attack and highlights the role that plausible deniability plays in this relationship. Some initial policy recommendations are made based on the finding that the use of cyber-weapons as a deterrent is still ill-defined and that the focus should be on decreasing state vulnerability to these attacks.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, is not copyrighted in the U.S.
Showing items related by title, author, creator and subject.
Ertekin, Necati (Monterey, California. Naval Postgraduate School, 2008-09);The contemporary military rivalry is driven mostly by the ongoing military technical revolution. In particular, the weapons used on the future battlefield will play an important role in military affairs. Which weapons can ...
Vish, Jeffrey A. (Monterey, California. Naval Postgraduate School, 2006-09);The Air Base has long been a potential target of attack for enemy planners. An effective way to attack the United States Air Force (USAF) is to avoid its usual dominance in the air and use an asymmetrical approach, attacking ...
Garcia, J.B.; von Winterfeldt, Detlof (2016-04);We propose a methodology, called defender–attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game‐theoretic formulations of this problem, ...