Matches in SemOpenAlex for { <https://semopenalex.org/work/W2766367031> ?p ?o ?g. }
Showing items 1 to 68 of
68
with 100 items per page.
- W2766367031 endingPage "199" @default.
- W2766367031 startingPage "196" @default.
- W2766367031 abstract "In “Deterrence and Dissuasion in Cyberspace,” Joseph Nye reveals the difficulties in applying deterrence to cyberspace by extending the concept from its hard core of retaliatory dynamics and threat of denial to include entanglement (interdependence by another name) and norms.1 This extension of concept still leaves Nye apparently dissatisfied: he concludes that deterrence in the Cold War was not as good as scholars and policymakers think it was, so perhaps they are holding cyber deterrence to an illusionary standard. Essentially, Nye suggests that both scholars and policymakers should cut cyber deterrence a break.The management of cyber aggression does indeed need a break: a sharp break away from deterrence-centric thinking. Nye's piece illustrates how we are facing a degenerative program moment or the friction one expects on the edge of a paradigm's need to shift.2 The evidence from real-world security dynamics suggests that deterrence is the wrong framework for explaining cyber aggression and for formulating policy. Rather than contorting deterrence, we need a line of research outside the deterrence paradigm. In 1998, Nye and Sean Lynn-Jones urged security studies scholars to be open continuously to deep reflection if they are to make a difference.3 The dominance of deterrence thinking is blocking such reflection and policy application.Nye's article walks through the very real limitations of both retaliatory and denial-based deterrent threats against cyber aggression. Punishment is made more difficult by the attribution problem, and denial is challenging because “cyber defenses are notoriously porous” and “offense dominates defense” (p. 56).In short, if aggression sits below the threshold where serious military sanctions are credible but above the level where it can be deterred through “good cyber hygiene” (p. 57), the deterrence paradigm fails to address where recognizing security action is taking place.4 But rather than recognizing these limitations as indicators that new concepts may be needed, Nye's response is to massage the retaliatory and denial problems and then suggest that interdependence and norms be reconceived as “means of deterrence and dissuasion.” In doing so, he reduces their considerable potential as standalone approaches. For example, he notes that breaking norms can lead to “reputational costs,” when denial fails (p. 60). But this is just the threat of punishment repackaged, which can succeed only if others impose costs through some behavioral change because of the aggressor's poor reputation. The actions of President Bashar al-Assad in Syria's brutal civil war may have damaged Assad's reputation, but unless states change their behavior toward Assad because of his reputation for violating norms (essentially exacting a cost from him), the norm against mass murder counts for little. The causal factor here for Nye that might lead to deterred behavior remains not norms but retaliation, which Nye has already said should not be the basis for deterrence in cyberspace.What Nye actually wants is “to reduce and prevent adverse actions in cyberspace” (p. 54). This worthy goal does not, and need not, equate with deterrence. Retaliation and denial are tools different from defense, entanglement, and norms. They are also distinct from counter capability and operations offense, compellence, and other non-deterrence security approaches that can challenge, reduce, and manage but not necessarily deter adverse actions. Once one maps national security goals to the reality of cyber operations, deterrence theory becomes more of an impediment than a stimulus to thinking about strategy.Nye quotes Jon Lindsay's finding that “deterrence works where it is needed most, yet it usually fails everywhere else” (p. 18), which implies that acts that might cross a clear traditional threshold are strategically relevant and “everywhere else” is not. In fact, “everywhere else” is fast becoming strategically relevant space. Cyberspace provides a new seam for traditional great power competition, the intensity of which will only increase as cyber actors leverage machine learning and artificial intelligence technology developments. If one examines the writings of Russian Gen. Valery Gerasimov and the Chinese People's Liberation Army's notions of informationized war,5 it becomes clear that certain actors see cyberspace as a strategically salient vector for achieving their goals below the traditional deterrence/war threshold.We must examine the dynamics of the cyber domain if we are to provide policies to secure it. Cyber deterrence thinking seems to block this effort. Every policy document on cyberspace begins with the notion that it is interconnected—and yet we declare it a military domain, rather than a domain in which the military must operate simultaneously with allies, adversaries, the business sector, and individuals. Interconnectedness means that national security actors are in constant contact with other players and, unlike in strategic environments in which deterrence might succeed, it suggests that strategy must assume that contact and action are never absent.At the tactical level, the “terrain” of cyber engagement is constantly changing. This is human-created space, and every new software version, platform, user interface, and process shifts that terrain. It is perpetually under construction.So what if the systemic structure of interconnectedness, the condition of constant contact, and the shifting nature of terrain combine to produce a distinct dynamic: offense persistence—a strategic environment characterized by actors with continuous willingness and capacity to produce security challenges? Security could then not be achieved in the absence of action. It would rest in challenging others' pursuit of cyber initiatives through a comprehensive operational approach encompassing resiliency, active defense, and offense. Security would be advanced when one anticipates the exploitation of one's own vulnerability, while anticipating the vulnerabilities of others. Deterrence does not explain how one organizes strategically relevant action in such a continuously active space.The persistence of offense does not mean that security studies scholars and policymakers should despair; however, using a legacy construct of deterrence, whose measure of effectiveness is the absence of action, to explain an environment of constant action will not prevent adverse actions in cyberspace for many of the reasons that Nye himself outlines. Let us take the critique Nye offers us, not to resuscitate and stretch deterrence thinking, but to logically and creatively move beyond it.—Richard J. HarknettCincinnati, OhioI am grateful to Richard Harknett for his thoughtful response to my article about deterrence and dissuasion in cyberspace.1 We agree that classical Cold War deterrence theory is not a good approach to thinking about how to reduce and prevent adverse actions in cyberspace. As I say in the article, the aim in nuclear deterrence is total prevention, whereas many aspects of cyber behavior are more like other behaviors, such as crime, that we try imperfectly to deter. Moreover, attribution is generally less complex in nuclear events. Preventing harm in cyberspace involves four complex political mechanisms: threats of punishment, denial, entanglement, and norms.I disagree, however, that there should be a “sharp break away from deterrence-centric thinking.” Harknett praises my criticisms of “retaliatory and denial-based deterrent threats against cyber aggression.” My view is that we should reformulate these aspects of deterrence, but not discard them. Instead we should realize that the complex political processes of dissuasion require us to add the dimensions of entanglement and norms because of the interconnectedness of cyberspace that he cites. He makes the good point that norms have independent causal effects besides threatened reputational costs, and I tried to indicate this with my example of how the nuclear taboo inhibited President Dwight Eisenhower from accepting the recommendations of the chairman of the Joint Chiefs of Staff in 1954 and 1955.Our positions would be remarkably similar if Harknett would accept my amendment of his last sentence so that it would say “let us take the critique Nye offers us to resuscitate and stretch [classic] deterrence thinking, [and] to logically and creatively move beyond it.” That is what I thought I was trying to do.—Joseph S. Nye Jr.Cambridge, Massachusetts" @default.
- W2766367031 created "2017-11-10" @default.
- W2766367031 creator A5024447341 @default.
- W2766367031 creator A5067589326 @default.
- W2766367031 date "2017-11-01" @default.
- W2766367031 modified "2023-09-28" @default.
- W2766367031 title "Is Deterrence Possible in Cyberspace?" @default.
- W2766367031 cites W2076146491 @default.
- W2766367031 doi "https://doi.org/10.1162/isec_c_00290" @default.
- W2766367031 hasPublicationYear "2017" @default.
- W2766367031 type Work @default.
- W2766367031 sameAs 2766367031 @default.
- W2766367031 citedByCount "10" @default.
- W2766367031 countsByYear W27663670312018 @default.
- W2766367031 countsByYear W27663670312019 @default.
- W2766367031 countsByYear W27663670312020 @default.
- W2766367031 countsByYear W27663670312021 @default.
- W2766367031 countsByYear W27663670312022 @default.
- W2766367031 countsByYear W27663670312023 @default.
- W2766367031 crossrefType "journal-article" @default.
- W2766367031 hasAuthorship W2766367031A5024447341 @default.
- W2766367031 hasAuthorship W2766367031A5067589326 @default.
- W2766367031 hasBestOaLocation W27663670311 @default.
- W2766367031 hasConcept C110875604 @default.
- W2766367031 hasConcept C136764020 @default.
- W2766367031 hasConcept C138921699 @default.
- W2766367031 hasConcept C162324750 @default.
- W2766367031 hasConcept C17744445 @default.
- W2766367031 hasConcept C190253527 @default.
- W2766367031 hasConcept C199539241 @default.
- W2766367031 hasConcept C2780982575 @default.
- W2766367031 hasConcept C2781241145 @default.
- W2766367031 hasConcept C38652104 @default.
- W2766367031 hasConcept C41008148 @default.
- W2766367031 hasConcept C60643870 @default.
- W2766367031 hasConceptScore W2766367031C110875604 @default.
- W2766367031 hasConceptScore W2766367031C136764020 @default.
- W2766367031 hasConceptScore W2766367031C138921699 @default.
- W2766367031 hasConceptScore W2766367031C162324750 @default.
- W2766367031 hasConceptScore W2766367031C17744445 @default.
- W2766367031 hasConceptScore W2766367031C190253527 @default.
- W2766367031 hasConceptScore W2766367031C199539241 @default.
- W2766367031 hasConceptScore W2766367031C2780982575 @default.
- W2766367031 hasConceptScore W2766367031C2781241145 @default.
- W2766367031 hasConceptScore W2766367031C38652104 @default.
- W2766367031 hasConceptScore W2766367031C41008148 @default.
- W2766367031 hasConceptScore W2766367031C60643870 @default.
- W2766367031 hasIssue "2" @default.
- W2766367031 hasLocation W27663670311 @default.
- W2766367031 hasOpenAccess W2766367031 @default.
- W2766367031 hasPrimaryLocation W27663670311 @default.
- W2766367031 hasRelatedWork W2482890604 @default.
- W2766367031 hasRelatedWork W2610626531 @default.
- W2766367031 hasRelatedWork W266107767 @default.
- W2766367031 hasRelatedWork W271504020 @default.
- W2766367031 hasRelatedWork W2958917847 @default.
- W2766367031 hasRelatedWork W2998014111 @default.
- W2766367031 hasRelatedWork W3187241870 @default.
- W2766367031 hasRelatedWork W4322618539 @default.
- W2766367031 hasRelatedWork W753845210 @default.
- W2766367031 hasRelatedWork W2519475542 @default.
- W2766367031 hasVolume "42" @default.
- W2766367031 isParatext "false" @default.
- W2766367031 isRetracted "false" @default.
- W2766367031 magId "2766367031" @default.
- W2766367031 workType "article" @default.