Covert or not Covert: National Strategies During Cyber Conflict

被引:2
|
作者
Baram, Gil [1 ]
Sommer, Udi [1 ]
机构
[1] Tel Aviv Univ, Sch Polit Sci, Tel Aviv, Israel
来源
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE | 2019年
关键词
covert actions; cyber operations; national cyber strategies; ATTRIBUTION; ESCALATION; POLITICS; COSTS;
D O I
10.23919/cycon.2019.8756682
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Anonymity is considered to be a key characteristic of cyber conflict. Indeed, existing accounts in the literature focus on the advantages of the non-disclosure of cyber attacks. Such focus inspires the expectation that countries would opt to maintain covertness. This hypothesis is rejected in an empirical investigation we conducted on victims' strategies during cyber conflict: in numerous cases, victim states choose to publicly reveal the fact that they had been attacked. These counterintuitive findings are important empirically, but even more so theoretically. They motivate an investigation into the decision to forsake covertness. What does actually motivate states to move into the international arena and publicly expose a cyber attack? The goal of this paper is to understand why and under which geopolitical circumstances countries choose to give up the advantages of anonymity. Whether they wish to Name and Shame opponents for ignoring international norms or whether they try to avoid public humiliation, victims of cyber attacks occasionally reveal the fact that they had been attacked. There is tension between such motivations and the will to protect intelligence sources and the incentives to prevent escalation if an attack is revealed, even more so if the attacker is exposed. Indeed, we find that sunk costs, counterescalation risks and the need to signal resolve-while critical in motivating victims to keep cyber attacks secret-may not suffice under such specific circumstances. By focusing on the victim's side, we draw inspiration from data on real-world cyber attacks in order to place cyber operations in the larger context of secrecy and covert actions in the international arena. In so doing, the aim is to advance the use of empirical data for understanding the dynamics of cyber conflict and the decision-making process of states operating in this increasingly complex domain.
引用
收藏
页码:197 / 212
页数:16
相关论文
共 50 条
  • [21] Data-Driven Covert-Attack Strategies and Countermeasures for Cyber-Physical Systems
    Taheri, Mahdi
    Khorasani, Khashayar
    Shames, Iman
    Meskin, Nader
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4170 - 4175
  • [22] COVERT ACTION - FROM COVERT TO OVERT
    TREVERTON, GF
    DAEDALUS, 1987, 116 (02) : 95 - 123
  • [23] Stealthy Local Covert Attacks on Cyber-Physical Systems
    Mikhaylenko, Dina
    Zhang, Ping
    2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 2568 - 2573
  • [24] Getting the desired candidate: An exploration of the covert strategies
    Dhar, Rajib Lochan
    WORK-A JOURNAL OF PREVENTION ASSESSMENT & REHABILITATION, 2014, 47 (04): : 441 - 451
  • [25] Detecting covert channel attacks on cyber-physical systems
    Li, Hongwei
    Chasaki, Danai
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2024, 9 (03) : 228 - 237
  • [26] Covert political conflict in organizations: Challenges from below
    Morrill, C
    Zald, MN
    Rao, H
    ANNUAL REVIEW OF SOCIOLOGY, 2003, 29 : 391 - 415
  • [27] Robust Stealthy Covert Attacks on Cyber-Physical Systems
    Li, Xuerong
    Zhang, Ping
    Dong, Hongli
    IFAC PAPERSONLINE, 2022, 55 (06): : 520 - 525
  • [28] Stealthy Local Covert Attacks on Cyber-Physical Systems
    Mikhaylenko, Dina
    Zhang, Ping
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (12) : 6778 - 6785
  • [29] Covert Attack Detection and Secure Control for Cyber Physical Systems
    Wang, Xianghua
    Zolghadri, Ali
    IFAC PAPERSONLINE, 2023, 56 (02): : 7184 - 7189
  • [30] 'Covert'
    Bibbins, M
    ANTIOCH REVIEW, 1998, 56 (01): : 49 - 49