Abstract
In this chapter, I analyse deterrence theory and argue that its applicability to cyberspace is limited and that these limits are not trivial. They are the consequence of fundamental differences between deterrence theory and the nature of cyber conflicts and cyberspace. The goals of this analysis are to identify the limits of deterrence theory in cyberspace, clear the ground of inadequate approaches to cyber deterrence, and define the conceptual space for a domain-specific theory of cyber deterrence, still to be developed.
This chapter is based on a research article published in Philosophy & Technology: “The Limits of Deterrence Theory in Cyberspace” (Taddeo 2017c).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
For the purposes of this chapter, I will use the expression ‘traditional deterrence theory’ to refer to any theory of deterrence relying on kinetic military forces, whether they be conventional or nuclear.
- 5.
Attribution may not be necessary in all instances of deterrence, for example for deterrence by defence. Some argue that when the exact source of an attack is unknown, attribution and, hence, responsibility for an attack, can be shifted to the particular state in which the attack originated (Morgan 2010; Goodman 2010). However, clear attribution remains necessary for deterrence by retaliation.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
References
Bendiek, A., and T. Metzger. 2015. Deterrence theory in the cyber-century: Lessons from a state-of-the-art literature review, Lecture notes in informatics (LNI), 553–570. Bonn: Gesellschaft Fur Informatik.
Betz, D.J., and T. Stevens. 2013. Analogical reasoning and cyber security. Security Dialogue 44 (2): 147–164. https://doi.org/10.1177/0967010613478323.
Bologna, S., A. Fasani, and M. Martellini. 2013. From fortress to resilience. In Cyber security: Deterrence and IT protection for critical infrastructures, ed. M. Martellini, 53–56. Heidelberg: Springer.
Brodie, B. 1978. The development of nuclear strategy. International Security 2 (4): 65–68.
Bunn, M.E. 2007. Can deterrence be tailored? Strategic Forum, Number 225, January 2007. Washington, DC: Institute for National Strategic Studies, National Defense University.
Cath, C., S. Wachter., M. Taddeo., and L. Floridi. 2017. Artificial intelligence and the “good society”: The US, EU, and UK approach. Science and Engineering Ethics, March. https://doi.org/10.1007/s11948-017-9901-7.
Clark, D., and S. Landau. 2011. Untangling attribution. Harvard National Security Journal 2011 (2): 25–40.
Crosston, M. 2011. World gone cyber MAD: How “mutually assured debilitation” is the best hope for cyber deterrence. Strategic Studies Quarterly 50 (1): 100–116.
Dipert, R. 2013. The essential features of an ontology for cyberwarfare. In Conflict and cooperation in cyberspace, ed. Panayotis Yannakogeorgos and Adam Lowther, 35–48. Taylor & Francis. http://www.crcnetbase.com/doi/abs/10.1201/b15253-7.
European Union. 2014. Cyber defence in the EU: Preparing for cyber warfare? – think tank. Brussels. http://www.europarl.europa.eu/thinktank/en/document.html?reference=EPRS_BRI(2014)542143.
———. 2015. Cyber diplomacy: EU dialogue with third countries – think tank. Brussels. http://www.europarl.europa.eu/thinktank/en/document.html?reference=EPRS_BRI(2015)564374.
Floridi, L. 2008. The method of levels of abstraction. Minds and Machines 18 (3): 303–329. https://doi.org/10.1007/s11023-008-9113-7.
———. 2013. The ethics of information. Oxford: Oxford University Press.
Floridi, L., and M. Taddeo, eds. 2014. The ethics of information warfare, Law, governance and technology series. Vol. 14. Heidelberg: Springer.
Freedman, L. 2004. Deterrence. Cambridge, UK/Malden: Polity Press.
G7 Declaration. 2017. G7 declaration on responsible state behavior in cyberspace. Lucca. http://www.mofa.go.jp/files/000246367.pdf.
Goodman, W. 2010. Will Goodman, Cyber deterrence: Tougher in theory than in practice?, Strategic Studies Quarterly Fall: 102–35.
Haggard, S., and B.A. Simmons. 1987. Theories of international regimes. International Organization 41 (03): 491.
Haley, C. 2013. A theory of cyber deterrence. Georgetown Journal of International Affairs, February. http://journal.georgetown.edu/a-theory-of-cyber-deterrence-christopher-haley/.
Harknett, R.J., and E.O. Goldman. 2016. The search for cyber fundamental. Journal of Information Warfare 15 (2): 81–88.
Hathaway, O., and R. Crootof. 2012. The law of cyber-attack. California Law Review 100 (1–2012): 817–886.
Hollis, D.B. 2011. An E-SOS for cyberspace. Harvard International Law Journal. 52 (373): 374–375.
Iasiello, E. 2014. Is cyber deterrence an illusory course of action? Journal of Strategic Security 7 (1): 54–67.
International Security Advisory Board. 2014. A framework for international cyber stability. United States Department of State. http://goo.gl/azdM0B.
Jensen, E.T. 2009. Cyber warfare and precautions against the effects of attacks. Texas Law Review 88 (1533): 1534–1569.
———. 2012. Cyber deterrence. SSRN scholarly paper ID 2070438. Rochester: Social Science Research Network. https://papers.ssrn.com/abstract=2070438.
Jervis, R. 1979. Deterrence theory revisited. World Politics 31 (2): 289–324. https://doi.org/10.2307/2009945.
———. 1988. Realism, game theory, and cooperation. World Politics 40 (3): 317–349. https://doi.org/10.2307/2010216.
Kastenberg, J.E. 2009. Changing the paradigm of internet access from government information systems: A solution to the need for the DoD to take time-sensitive action on the Niprnet. Air Force Law Review 64: 175.
Kugler, R. 2009. Deterrence of cyber attacks. In Cyberpower and national security, ed. Franklin Kramer, Stuart Starr, and Larry Wentz, 309–342. Washington, DC: National Defense University.
Lan, Tang, Zhang Xin, Dmitry Grigoriev Harry Raduege Jr., Pavan Duggal, and Stein Schjølberg. 2010. Global cyber deterrence views from China, the U.S., Russia, India, and Norway. EastWest Institute.
Libicki, M.C. 1997. Defending cyberspace and other metaphors. Washington, DC: National Defense Univ/National Strategic Studies.
Libicki, Martin. 2011. The strategic uses of ambiguity in cyberspace. Military and Strategic Affairs 3 (3): 3–10.
———. 2009. Cyberdeterrence and cyberwar. Product Page. http://www.rand.org/pubs/monographs/MG877.html.
McConnell, M. 2010. Mike McConnell on how to win the cyber-war we’re losing, 28 February 2010. http://www.washingtonpost.com/wp-dyn/content/article/2010/02/25/AR2010022502493.html.
Morgan, P.M. 2003. Deterrence now, Cambridge studies in international relations 89. Cambridge, UK/New York: Cambridge University Press.
———. 2010. Applicability of traditional deterrence concepts and theory to the cyber realm. In Proceedings of a workshop on deterring cyberattacks: Informing strategies and developing options for U.S. policy, 55–76. Washington, DC: National Academic Press.
NSA. 2013. A strategy for surveillance powers. The New York Times. http://www.nytimes.com/interactive/2013/11/23/us/politics/23nsa-sigint-strategy-document.html.
Nye, J.S. 2011. Nuclear lessons for cyber security? Strategic Studies Quarterly 5 (4): 11–38.
Owens, W.A., Kenneth W. Dam., H. Lin., National Research Council (U.S.), National Research Council (U.S.), National Research Council (U.S.), eds. 2009. Technology, policy, law, and ethics regarding U.S. Acquisition and use of cyberattack capabilities. Washington, DC: National Academies Press.
Possony, S.T. 1946. Atomic power and world order. The Review of Politics 8 (4): 533–535.
Powell, R. 2008. Nuclear deterrence theory: The search for credibility, Digitally printed version. Paperback Re-Issue. Cambridge: Cambridge University Press.
Rattray, G.J. 2009. An environmental approach to understanding cyberpower, in Kramer, Cited, 253–274, Esp. 256. In Cyberpower and National Security, ed. Stuart S. Kramer and Lerry K. Wentz, 253–74. Washington, DC: National Defense UP.
Ryan, N.J. 2017. Five kinds of cyber deterrence. Philosophy & Technology, January. https://doi.org/10.1007/s13347-016-0251-1.
Schelling, T.C. 1980. The strategy of conflict: [With a new preface]. Cambridge, MA: Harvard University Press.
Schelling, T.C., and Harvard University Center for International Affairs. 1966. Arms and influence. New Haven: Yale University Press.
Schneier, B. 2017. Why the NSA makes us more vulnerable to cyberattacks. Foreign Affairs, 30 May 2017. https://www.foreignaffairs.com/articles/2017-05-30/why-nsa-makes-us-more-vulnerable-cyberattacks.
Sterner, E. 2011. Retaliatory deterrence in cyberspace. Strategic Studies Quaterly 5 (1): 65–80.
Taddeo, M. 2012a. Information warfare: A philosophical perspective. Philosophy & Technology 25 (1): 105–120. https://doi.org/10.1007/s13347-011-0040-9.
———. 2012b. ‘An analysis for a just cyber warfare’. In 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1–10.
———. 2013. Cyber security and individual rights, striking the right balance. Philosophy & Technology 26 (4): 353–356. https://doi.org/10.1007/s13347-013-0140-9.
———. 2014. Information warfare: The ontological and regulatory gap. Newsletter on Philosophy and Computers 14 (1 (fall 2014)): 13–20.
———. 2016. On the risks of relying on analogies to understand cyber conflicts. Minds and Machines 26 (4): 317–321. https://doi.org/10.1007/s11023-016-9408-z.
———. 2017a. Cyber conflicts and political power in information societies. Minds and Machines 27 (2): 265–268. https://doi.org/10.1007/s11023-017-9436-3.
———. 2017b. Deterrence by norms to stop interstate cyber attacks. Minds and Machines, September. https://doi.org/10.1007/s11023-017-9446-1.
———. 2017c. The limits of deterrence theory in cyberspace. Philosophy & Technology, October. https://doi.org/10.1007/s13347-017-0290-2.
Taddeo, M., and L. Glorioso. 2016. Regulating cyber conflicts and shaping information societies. In Ethics and policies for cyber operations, philosophical studies series. Berlin/Heidelberg: Springer.
Taddeo, Mariarosaria, and Luciano Floridi. 2018a. How AI can be a force for good. Science 361 (6404): 751–752.
———. 2018b. Regulate artificial intelligence to avert cyber arms race. Nature 556 (7701): 296–298.
Tanji, M. n.d. Deterring a cyber attack? Dream on… WIRED. Accessed 15 July 2017. https://www.wired.com/2009/02/deterring-a-cyb/.
UK Government. 2014. Deterrence in the twenty-first century: Government response to the committee’s eleventh report. http://www.publications.parliament.uk/pa/cm201415/cmselect/cmdfence/525/52504.htm.
———. 2015. National Security Strategy 2016–2021. London: HM Government. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/national_cyber_security_strategy_2016.pdf.
UN Institute for Disarmament Research. 2014. Cyber stability seminar 2014: Preventing cyber conflict. Geneva: UN Institute for Disarmament Research.
US Government. 2015. The Department of Defense cyber strategy. Washington, DC, USA.
Wittgenstein, L. 2009. Philosophical investigations, eds. P.M.S. Hacker and Joachim Schulte, Rev. 4th ed. Chichester/Malden: Wiley-Blackwell.
Yang, Guang-Zhong, Jim Bellingham, Pierre E. Dupont, Peer Fischer, Luciano Floridi, Robert Full, Neil Jacobstein, et al. 2018. The grand challenges of science robotics. Science robotics 3 (14): eaar7650. https://doi.org/10.1126/scirobotics.aar7650.
Zagare, F.C., and D.M. Kilgour. 2000. Perfect deterrence, Cambridge studies in international relations 72. Cambridge, UK/New York: Cambridge University Press.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Taddeo, M. (2019). The Challenges of Cyber Deterrence. In: Öhman, C., Watson, D. (eds) The 2018 Yearbook of the Digital Ethics Lab. Digital Ethics Lab Yearbook. Springer, Cham. https://doi.org/10.1007/978-3-030-17152-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-17152-0_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17151-3
Online ISBN: 978-3-030-17152-0
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)