the post is also avaible in: Hebrew :הכתבה זמינה גם ב
In recent years a growing number of researchers have expanded the discussion of deterrence strategy to a host of new threats. Unlike the Cold War era in which the study of deterrence focused primarily on deterrence among nations and superpowers and on nuclear deterrence, recent years – particularly since 9/11 – have seen much research on deterrence strategy in relation to other threats, such as terrorism, rogue states, and ethnic conﬂicts. These studies share several elements: they are based primarily on an effort to examine the relevance of conditions necessary for successful deterrence, formulated in the context of the Cold War, and to a large degree are policy oriented, particularly regarding the challenges confronting the United States. These same elements dominate the evolving debate on the connection between deterrence and cyber warfare. Much of the research on deterrence strategy and cyber warfare is based on an American perspective. It examines the possibility of successfully implementing the strategy of deterrence in order to prevent cyber attacks, or analyzes the way the US can use cyber warfare in order to deter other threats it faces.
These studies make it clear that the possibility of successful deterrence against cyber attacks is limited with regard to each of the dimensions required for its success: the existence of capability (weapons), the credibility of the threat, and the ability to convey the threatening message to the potential challenger. Nonetheless, there are several elements to consider that under certain circumstances are likely to serve as the basis for successful deterrence even in the realm of cyberspace. This essay surveys the literature and proposes directions for continued research on the topic.
The essay begins by presenting the necessary conditions for a successful strategy of deterrence. It then reviews the central claims regarding the difﬁculties in applying successful deterrence in cyber warfare vis-à-vis each of these conditions. The third part discusses some beneﬁts and shortcomings of certain factors that may strengthen deterrence against cyber warfare. Finally, it highlights the importance of continuing the discussion of deterrence and cyber warfare, indicating a number of directions for future research.
The Conditions for Successful Deterrence
There are different ways in which actors can try to prevent their enemies from taking undesirable action. The strategy of deterrence by punishment is one of the most studied. This type of deterrence has several deﬁnitions, with the deﬁnition by George and Smoke, whereby deterrence is the ability to persuade a potential enemy that the price it will pay as the result of carrying out the undesirable action will outweigh any possible proﬁt, is among the most commonly used.6 This type of deterrence differs from deterrence by denial, which is based on the attempt to persuade potential aggressors that they must avoid taking action because they will fail to attain their goals.8 The concept of deterrence also differs from the concept of compellence, which is based on the use of threats in order to make an enemy undertake an action, whereas the aim of deterrence is to make the enemy avoid taking undesirable action.
A central question regarding the strategy of deterrence by punishment concerns the conditions under which it is likely to be successful, i.e., cause a potential enemy to avoid challenging the defender. The research, developed mostly during the Cold War and dealing with deterrence between the superpowers, focuses on three central conditions: the defender’s capabilities, the credibility of the threat, and relaying the threat message to the challenger.
The ﬁrst essential condition for successful deterrence by punishment is that the defender be able to exact a price from the challenger. It is therefore not surprising that studies in deterrence arose in particular during the nuclear era, as this weapon allowed both sides to make the cost of a future war very clear. Nuclear weapons gave leaders a crystal ball of sorts, allowing them to see the effects of the next big war and thus encourage them to exert caution in their conduct. At the same time, capabilities are not limited to the non-conventional, as conventional means too may be used to take a toll on the challenger. Moreover, an important part of the capabilities dimension is the means of delivery available to the defender, such as aircraft, missiles, and even roads and vehicles that may play a role in the element of capabilities within the context of deterrence.
A second condition for successful deterrence is the credibility of the threat. In order for the deterrence threat to be effective, the defender must be ready to use the capabilities at its disposal. Various researchers have presented a range of factors that may limit this willingness, e.g., internal or international public opinion, or even the deterrence capabilities of the enemy (the challenger). Common to all these elements is that each in its own way raises the cost of taking action, thereby reducing the actor’s credibility in terms of carrying out the threat, if necessary.
The third condition is effective delivery of the messages to the challenger concerning the two previous conditions – capabilities and intentions. In other words, the challenger must be aware of the defender’s capabilities and its willingness to use them. Researchers who have developed psychological approaches to deterrence claim that this condition is the most important of all, whereby the perceptions and misperceptions of decision makers directly affect the success of deterrence. In this sense, what matters are neither the capabilities nor the intentions of the defender, rather how they are perceived by the potential challenger.
Finally, because the strategy of deterrence may prevent different types of threats, it is difﬁcult to discuss the conditions for successful deterrence uniformly, as they must be adapted not only to the challenger but also to the type of action the defender is trying to prevent. So, for example, while nuclear weapons may be effective in deterrence against an all-out attack (“general deterrence”), its effectiveness would be lower against more limited types of threats.
Difficulties of Deterrence in Cyber Warfare
Many of the studies analyzing the strategy of deterrence against cyber warfare are based on Cold War theories. Researchers analyzed the central conditions for successful deterrence discussed in the literature: defensive capabilities, the credibility of the threat, and communication, or the ability to transmit the message of capabilities and the credibility of the threat to the challenger. Most researchers believe that an analysis of these conditions shows that the strategy of deterrence may be expected to fail when applied to threats created by cyber warfare.
Cyber warfare allows weak players to move the confrontation into a sphere in which they can maximize proﬁts while risking little – which makes deterrence harder to establish. In effect, an actor that is more technologically developed is also more susceptible to cyber warfare. In fact, the possibility of retaliation against a weaker player is reduced, and thus the ability to establish a credible threat of deterrence is also lessened. For example, it is very difﬁcult to deter players, especially individuals, who do not own information systems that can be threatened with damage. This challenge also exists in the confrontation with nations with less developed information systems infrastructures, where the possibility of creating an effective threat by means of cyber warfare alone is limited.
A second challenge to deterrence against cyber threats relates to the defender’s credibility. The defender’s vulnerability may limit its willingness to tap its capabilities out of concern that retaliation could lead to escalation. The problem for the defender is that such escalation is liable to be much more dangerous to itself than to the challenger, which in turn is likely to strengthen the challenger’s belief that the defender’s willingness to act is low. This challenge is further ampliﬁed by the fact that cyber warfare entry costs are usually lower for the weaker side. In other words, the cost to the challenger of engaging in cyber warfare is often limited, which further increases the difﬁculties in presenting and executing the deterrent threat required in order to prevent such action.
Internal as well as international public opinion may limit the credibility of the threat of retaliation because of the nature of cyber warfare. In situations in which it is difﬁcult to establish the identity of the source of the attack, the ability to employ a retaliatory measure likely to cause damage is constrained. A potential challenger may view these constraints as undermining deterrence credibility. In this way a potential aggressor, assessing that the chances of the defender making good on its threats are low because of the damage it is likely to incur as a result, will be more willing to take risks and challenge the defender.
Conveying the Threat
A third problem stems from the defender’s difﬁculty in conveying the message about its capabilities and about the credibility of its response to the challenger. Beyond the fundamental problems regarding each of the dimensions described above, challengers may be not only anonymous but even individuals who often have no identiﬁable physical address.
Libicki, for example, claims that to this day the source of the 2007 attack on the Estonian servers is in question: it is not at all certain that the attack was directed from above by the Russian government, as claimed by many who have analyzed the case. The source of an attack can be another state entity, organizations or individuals operating from within the borders of another state, or organizations or individuals operating from within the targeted state. This situation reﬂects the frequent blurring between crime, terrorism, and warfare.
Moreover, when speaking of deterrence, it is necessary to identify the challenger in advance, before any challenge takes place, in order to target the deterrent threat. This is a key issue, because deterrence is based on the fact that the potential challenger is aware of the defender’s capabilities and its willingness to use them ahead of time. However, if the defender is hard pressed to identify the source of the damage even after the attack, it will certainly ﬁnd it difﬁcult to do so prior to it. While intelligence capabilities may provide a partial solution, the threat that the defender can envision in most situations is general only, and is meant to cover a relatively broad range of potential challengers that the defender thinks would be likely to attack. However, deterrence is more effective when the threat – even if not completely explicit – is aimed at speciﬁc actors rather than at anonymous and undifferentiated sets of actors or types of actors liable to issue a challenge.
Another difﬁculty directly related to the transmission of messages to the challenger involves the speciﬁc platform used. This difﬁculty is ampliﬁed in light of the multiplicity of actors capable of creating threats. Unlike the Cold War era, when enemies were a limited number of known state entities with relatively clear capabilities, the number of possible aggressors has multiplied in the information age, lowering the possibility of presenting stable and credible deterrence. The large number and variety of threats possible in cyber warfare creates an arena in which it is more complex to operate and in which it is not completely clear how or to whom to transmit the deterrent message.
Opportunities for Deterrence in Cyber Warfare
Despite these difﬁculties, the possibility of successful deterrence in cyber warfare exists, at least in part and under speciﬁc circumstances. For example, a number of researchers have stressed that retaliation need not be limited to cyberspace but may be effected by more traditional means. Thus, in the case of a state threatening to act by means of cyber warfare, the deterrent threat towards it may be based on the broadest range of capabilities the defending nation has at its disposal. Different threats, whether economic or military, may be effective in deterring a state enemy using cyber warfare against another state entity. Similarly, against threats posed by individuals or terrorist organizations seeking to use cyber warfare, states may, as proposed by a number of researchers (and also several decision makers), choose means of deterrence that do not require use of cyber capabilities. For example, they can employ threats through the judicial system (internal or international) and through internal security services, as well as use of traditional military threats. As such, if actors assess that they will proﬁt by diverting the confrontation into cyberspace, where they enjoy superiority, the actors under attack that might be attacked are under no obligation to limit the theater to cyberspace and may instead move the confrontation into theaters more convenient to them.
Another measure is deterrence by denial. The beneﬁt inherent in this sort of strategy is that it may be based on defensive measures and thus not only be a means of preventing the enemy from acting but also providing a solution in case the challenger decides to act. Moreover, according to Morgan, making extensive use of various defensive measures may help identify the aggressor and strengthen the ability to take retaliatory action, which in turn strengthens deterrence by punishment. Nonetheless, the challenges of using this strategy lie in overcoming problems similar to those linked to the successful use of deterrence by punishment. In both cases, the low entry cost required of challengers when they engage in cyber warfare remains a central difﬁculty.
Morgan also suggests that serial deterrence may be useful in confronting cyber warfare threats: “Cyber attacks are very likely to turn out to be manageable primarily through applications of serial deterrence, repeated harmful responses over an extended period, to induce either temporary or eventually permanent suspensions of the most bothersome attacks or of attacks by the most obnoxious opponents.” While this is an original way to confront threats in cyberspace and represents an interesting attempt to use existing concepts in an innovative way, it is not without difﬁculty. For example, it is unclear whether the enemy can be affected over time by repeated attempts, as these are liable to teach the challenger that the deterrence of the defender is not working (and that therefore the defender needs to engage in the same repetitive actions).
Another problem regarding a strategy based on serial deterrence is exposing the capabilities of the defender. Although this problem is inherent in every form of deterrence in cyberspace (deterrence by punishment or denial), it is particularly acute when what is at issue is deterrence over time, as with the strategy of serial deterrence. In such situations, exposing the offensive capabilities as the consequence of repeated attacks may serve as the basis for knowledge or inspiration for the challenger. Morgan himself has referred to this issue and argues that revealing capabilities is liable not only to provide inspiration to enemies and motivation to attain similar capabilities but is also likely to allow enemies to prepare for a future threat, thereby damaging its measure of effectiveness.
Directions for Further Research
While indeed some scholars have started to suggest new directions for research on deterrence in cyberspace, I would like to point to two main avenues through which cyber deterrence thinking can be further developed. First, research dealing with threats in cyberspace should be sharpened. It seems that there is a growing gap between practice and types of threats in the international arena, and the way in which research in this ﬁeld examines the strategy of deterrence. This gap exists in other research dealing with deterrence, but it is particularly prominent in the realm of cyberspace, which includes many types of interaction between many different sorts of actors representing various kinds of threats. Therefore it is necessary to expand the discussion about the types of actors, the threats they create, and the ways and challenges of deterring each one. In addition, similar to the broader research relating to the strategy of deterrence, there is a tendency to focus on the deterrence of states against various types of players (e.g., terrorist organizations, rogue states), while an important aspect not given sufﬁcient attention is the deterrence of these actors against the states they seek to challenge. This aspect exists also in cyber warfare and intensiﬁes the problems of states that must now deal with a much more complex setting than in the past.
Moreover, research on cyber warfare tends to deal with more classical aspects of security, whereas the arena of threats is complex and varied. For example, states are worried about the growing strength of economic players (such as Google) or ideological ones (e.g., individuals seeking to promote government reforms) using cyberspace. Irrespective of whether or not the existing deﬁnitions of cyber warfare include interactions with these actors, a considerable contribution could be made by analyzing these relations using theories of deterrence. The concept of the strategy of deterrence might be used, for instance, to study the interactions between Google and China with regard to the implied or direct threats presented by these players to one another in the context of search engine censorship. In this sense, dividing research on deterrence and cyber warfare according to different types of threats (e.g., internet war, cyber terror, cybercrime, cyberwar) and the actors operating them (states, individuals, economic institutions) may be not only more accurate and productive but may also identify the conditions for raising the chances of success of each actor’s strategy of deterrence against its enemy.
The second theme that should be expanded is analysis of the traditional literature on the strategy of deterrence in critical and original ways. This has already been done in some of the essays published on the topic. However, it remains to analyze further concepts regarding deterrence strategy already discussed in the literature, such as immediate deterrence, general deterrence, and extended deterrence, and to try to understand the signiﬁcance and relevance of applying these practices to cyberspace.
Similarly, the concept of ambiguity should be studied. This concept may serve as a framework for practical thinking in confronting the dilemma inherent in the need for revealing capabilities on the one hand, balanced against the concern that the enemy will be able to exploit this exposure to increase its own strength and immunity to attack. Using insights developed in different contexts may provide an interesting foundation for developing ideas on cyberspace ambiguity, not only with regard to intention and willingness to make good on threats but generally with regard to the existence of capabilities. In this respect, it is possible, for example, to analyze the different efforts made by several nations in recent years in the ﬁeld of cyber warfare. Not only are the means developed by nations likely to strengthen their strategy of deterrence against these threats, but the very prominence of these efforts may also serve as a deterrent tool. The same is true of the American establishment of a strategic command to manage cyber warfare: it has a range of objectives and functions, but its very reference and prominence allow not just improvements in capabilities but also demonstrate US willingness to invest resources in reducing threats and damage. It may be that stressing the desire to invest in measures of this sort and revealing the scope of the budgets, resources, and manpower dedicated to the subject – even absent a detailed breakdown of the measures acquired and their capabilities – can help increase the credibility of the deterrent message against threats in cyberspace, especially with regard to threats involving high levels of violence on the part of other nations. In other words, a partial revelation of capabilities while maintaining ambiguity about their essence allows for a reduction of the harmful effects described above but also transmits a forceful message. At the same time, one may expect that the low entry threshold for operating in cyberspace, especially in cases of asymmetrical confrontations, will continue to present a challenge to establishment of a strategy of deterrence seeking to prevent threats in this realm.
The research that deals with cyber warfare deterrence discusses primarily the difﬁculties inherent in deterring enemies from using this strategy. Although deterrence may work under certain circumstances, the problems associated with the defender’s capabilities, the defender’s willingness to use them, and the defender’s ability to convey a message of deterrence to its potential enemy greatly limit the possibility of successful deterrence. Nonetheless, in light of the beneﬁts inherent in the strategy of deterrence in reducing the scope of violence of conﬂicts, it is important to try to further the research dealing with the connections between deterrence and cyber warfare. This essay has indicated some directions for further thought and development of these ideas. However, as claimed by Morgan, these insights should be applied carefully, because additional empirical knowledge about the essence of cyber warfare is required, in terms of both the damage it can generate and the way in which it may be used.
This article was first published in Military & Strategic Affairs journal. Volume 3, issue 3.
To read the full article, press the following link: