14.11.2016 Views

3Faces%20of%20the%20Dragon

3Faces%20of%20the%20Dragon

3Faces%20of%20the%20Dragon

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Can retaliators hold assets of the attacker at risk? There is no guarantee that attackers in<br />

cyberspace will have assets that could be put at risk. 193 Is it reasonable to retaliate against<br />

a hacker who has done significant damage to a banking or industry infrastructure? What<br />

assets does a hacker possess?<br />

Can retaliators do so repeatedly? Can a retaliatory attack ensure that an attacker will not<br />

attack again? While this was probably the case during a nuclear attack it is far less likely<br />

after a cyber attack, when the attacker may close off vulnerabilities.<br />

Can retaliatory cyber attacks disarm cyber attackers? If the attacker is a hacker who could<br />

be anywhere, the answer is probably not.<br />

Will third parties stay out of the way? Nation-states may stay out of the way but it is<br />

uncertain if other elements (non-state actors such as terrorist or criminal groups who want<br />

to get in on the action) will do so.<br />

Might retaliation send the wrong message? An explicit deterrence policy defining cyber<br />

attacks as acts of war may encourage private enterprises to lose their incentive to invest in<br />

cyber security, knowing that someone above them (government policy) has a larger<br />

incentive to protect their business.<br />

Can states set thresholds for response? It is difficult to establish a threshold and to prove<br />

when it has been crossed and by whom.<br />

Can escalation be avoided? While retaliation may or may not be “in kind” (another cyber<br />

attack), it does not guarantee that a counter-retaliation will also be “in kind.” A fight that<br />

starts in cyberspace may carry over to other means. 194<br />

These are all tough, legitimate questions. Another question that might have been proposed is “what<br />

is the actual intent of electrons involved in an attack? Were they intended to conduct reconnaissance<br />

but were misinterpreted? How would an irrational actor respond to a reconnaissance effort?” If a<br />

nuclear weapon was involved, everyone would know about the incident.<br />

Some reviewers of Libicki’s work found that it had omissions. Retired Colonel Jeffrey Caton noted<br />

that the work had missed how state sovereignty is defined in cyberspace; had compartmentalized<br />

military aspects of cyberspace from other instruments of power (diplomatic, economic, information);<br />

had not discussed second- and third-order effects; and had oversimplified the assumption that<br />

deterrence and war in cyberspace are uniquely ambiguous. 195<br />

In addition to urging caution against the implementation of a cyber deterrence concept for the<br />

reasons mentioned here, Libicki also suggests that the US and the US Air Force “should not make<br />

strategic cyber war a priority investment area. Strategic cyber war, by itself, would annoy but not<br />

disarm an adversary.” 196 Further, if strategic cyber war is not a priority for the US, then why spend<br />

money on cyber defense and cyber security? Libicki appears to abandon even the concept of a<br />

defensive strategic cyber war policy.<br />

Conclusions: What Does This Mean for the Deterrence Concept?<br />

The discussion above indicates some significant differences exist in the nuclear and<br />

information/cyber deterrence concepts. And there are other differences not addressed above. Of

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!