Covert or not Covert: National Strategies During Cyber Conflict

被引:2
|
作者
Baram, Gil [1 ]
Sommer, Udi [1 ]
机构
[1] Tel Aviv Univ, Sch Polit Sci, Tel Aviv, Israel
来源
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE | 2019年
关键词
covert actions; cyber operations; national cyber strategies; ATTRIBUTION; ESCALATION; POLITICS; COSTS;
D O I
10.23919/cycon.2019.8756682
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Anonymity is considered to be a key characteristic of cyber conflict. Indeed, existing accounts in the literature focus on the advantages of the non-disclosure of cyber attacks. Such focus inspires the expectation that countries would opt to maintain covertness. This hypothesis is rejected in an empirical investigation we conducted on victims' strategies during cyber conflict: in numerous cases, victim states choose to publicly reveal the fact that they had been attacked. These counterintuitive findings are important empirically, but even more so theoretically. They motivate an investigation into the decision to forsake covertness. What does actually motivate states to move into the international arena and publicly expose a cyber attack? The goal of this paper is to understand why and under which geopolitical circumstances countries choose to give up the advantages of anonymity. Whether they wish to Name and Shame opponents for ignoring international norms or whether they try to avoid public humiliation, victims of cyber attacks occasionally reveal the fact that they had been attacked. There is tension between such motivations and the will to protect intelligence sources and the incentives to prevent escalation if an attack is revealed, even more so if the attacker is exposed. Indeed, we find that sunk costs, counterescalation risks and the need to signal resolve-while critical in motivating victims to keep cyber attacks secret-may not suffice under such specific circumstances. By focusing on the victim's side, we draw inspiration from data on real-world cyber attacks in order to place cyber operations in the larger context of secrecy and covert actions in the international arena. In so doing, the aim is to advance the use of empirical data for understanding the dynamics of cyber conflict and the decision-making process of states operating in this increasingly complex domain.
引用
收藏
页码:197 / 212
页数:16
相关论文
共 50 条
  • [1] Subversion: from covert operations to cyber conflict
    Cline, Lawrence E.
    SMALL WARS AND INSURGENCIES, 2024, 35 (07): : 1289 - 1293
  • [2] Subversion: from covert operations to cyber conflict
    Cormac, Rory
    INTERNATIONAL AFFAIRS, 2024, 100 (06) : 2682 - 2683
  • [3] Robust Covert Attack Strategies and Their Detection for Switched Cyber-Physical Systems
    Kazemi, MohamadGhasem
    Khorasani, Khashayar
    2023 31ST MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, MED, 2023, : 389 - 394
  • [4] Jamming Strategies in Covert Communication
    Shmuel, Ori
    Cohen, Asaf
    Gurewitz, Omer
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2019, 2019, 11527 : 1 - 15
  • [5] Jamming strategies in covert communication
    Shmuel, Ori
    Cohen, Asaf
    Gurewitz, Omer
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11527 LNCS : 1 - 15
  • [6] Strategies for Covert Web Search
    Weir, George R. S.
    Igbako, David
    2013 FOURTH CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2013), 2014, : 50 - 57
  • [7] Covert Channels in Cyber-Physical Systems
    Abdelwahab, Ahmed
    Lucia, Walter
    Youssef, Amr
    IEEE CONTROL SYSTEMS LETTERS, 2021, 5 (04): : 1273 - 1278
  • [8] African nations as proxies in covert cyber operations
    Kallberg, Jan
    Rowlen, Steven
    AFRICAN SECURITY REVIEW, 2014, 23 (03) : 307 - 311
  • [9] Topology of covert conflict (transcript of discussion)
    Nagaraja, Shishir
    Laurie, Ben
    Zugenmaier, Alf
    Danezis, George
    SECURITY PROTOCOLS, 2007, 4631 : 329 - 332
  • [10] Covert Channels in Cyber-Physical Systems
    Abdelwahab, Ahmed
    Lucia, Walter
    Youssef, Amr
    2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 4649 - 4654