Article 4 IPRI Journal XXIV I Mubeen Ashraf 1 28
Article 4 IPRI Journal XXIV I Mubeen Ashraf 1 28
Article 4 IPRI Journal XXIV I Mubeen Ashraf 1 28
Mubeen Ashraf*
Abstract
In an era defined by the complexities of global connectivity, the strategic
interplay within cyberspace presents unprecedented challenges and
opportunities. The nuances of cyber deterrence, leveraging theoretical
frameworks such as Game Theory and the Stability/Instability Paradox to
illuminate strategic decision-making processes and dynamics become
intrinsically dense. Deterrence and its fundamentals, cyber deterrence and its
types, challenges in mapping key elements of cyber deterrence, and policy
options for cyber deterrence all are significant features in devising effective
strategies. By analysing the interactions between major cyber powers like the
United States, Russia, and China, this paper underscores the intricate balance
of deterrence and escalation risks in cyberspace. It highlights how the
anonymity and deniability of cyber operations contribute to instability, while
advanced cyber capabilities can serve as both deterrents and provocations.
The research concludes that cyber deterrence necessitates a tailored
approach that is adaptive to the evolving cyber landscape. By addressing the
challenges outlined and implementing the recommended measures, effective
cyber deterrence can be achieved among state and non-state actors.
* Ms. Mubeen Ashraf has an M.Phil. in Defence and Strategic Studies from Quaid-i-Azam
University, Islamabad, and has worked as a Researcher at Global Foundation for Cyber
Studies and Research, Washington D.C, USA. She can be reached at
[email protected]
__________________
Introduction
The concept of warfare has been a constant evolving entity, adapting with
each technological leap, throughout human history. From the earliest use
of rudimentary clubs to the advanced weaponry of the contemporary era,
the methods of waging war have undergone profound transformations. In
the present digital epoch, a new form of warfare has emerged,
characterised by the complex web of connectivity that defines the internet.
This evolution has given rise to a compelling notion of information as a
potent and influential weapon.
The FBI reports underscoring the severity of the cyber threat, noting that
in 2022 alone, cyberattacks caused damages exceeding $10 billion.4
Despite a decrease in complaints compared to the previous year, financial
losses have surged, underscoring the gravity of cyber warfare, which
refers to the techniques, tactics, and procedures involved in cyber conflicts
in the digital era. These cyberattacks have occurred alongside traditional
conflicts, as evident in the Russia-Ukraine conflict. Even non-state groups
like Anonymous have declared "cyber wars," fundamentally reshaping the
concept of warfare and its repercussions on the world's economies and
stability.
In the recent past, during the Cold War, nuclear deterrence played a
pivotal role in averting a catastrophic conflict between the United States
and the Soviet Union.5 However, in the contemporary, rapidly evolving
world, the principles of deterrence are now being applied to the cyber
2 Kali Robinson, “How Israel’s Pegasus Spyware Stoked the Surveillance Debate,”
Council on Foreign Relations, accessed October 1, 2023, https://www.cfr.org/in-
brief/how-israels-pegasus-spyware-stoked-surveillance-debate.
3 Stephanie Kirchgaessner, “Israeli Spyware Allegedly Used to Target Pakistani Officials’
Theoretical Framework
In the contemporary world, the landscape of modern warfare has
transformed. The use of cyberspace in pursuing objectives by both state
and non-state actors has become a commonplace. These actors employ
various tools and weapons in cyberspace, distinct from those used in
traditional ground wars. To understand the phenomenon of cyber
deterrence and the policy options pursued by states and non-state actors to
deter adversaries in cyberspace, a collection of concepts is examined.
Deterrence itself is a widely debated and applied concept. A specific
comprehension of the Stability/Instability Paradox, and Game Theory is
more pertinent.
Stability/Instability Paradox
The Cold War era was characterised by paradoxical stability. Though the
threat of Mutually Assured Destruction (MAD) averted an all-out war but
did not prevent skirmishes. The end of the Cold War indicated the end of
strategic equilibrium and increased instability and violence. The limited
confrontation between the two nuclear rivals paved the way for a new
theoretical base, known as the Stability-Instability Paradox. Glenn Snyder
first proposed this in 1965, stating, “Greater the stability of the greater
strategic balance, lower is the stability of overall balance at lower levels
of violence.”6
6Robert Jervis, “Why Nuclear Superiority Doesn’t Matter,” Political Science Quarterly,
Vol.94 No.4 (Winter 1979-80). P 617-633 https://www.jstor.org/stable/2149629
One of the best examples is the cyber relationship between the US and
Russia, and the US and China, which illustrates strategic cyber stability
while simultaneously highlighting conventional cyber instability.
Game Theory
Game theory proposed by theoreticians including John von Neumann,
Anatol Rapoport, Thomas Schelling and others, studies strategic
interactions among rational players and offers valuable insights when
applied to cyber deterrence. It elucidates that engaging in cyber warfare
can be a rational choice for actors due to factors such as the difficulty in
detecting sophisticated cyberattacks, their relatively lower cost, and the
potential for anonymity. While the risk of retaliation remains, as
demonstrated by the Stuxnet case, where the possibility of a counter-
attack existed, scholars argue that deterrence by punishment in cyberspace
can escalate tensions.
The potential attacker, on the other hand, evaluates these defensive plays
and adjusts their strategies, accordingly. It can be justified through various
examples added in the research such as the US-China 2015 Agreement or
the sanctions posed to North Korea after Sony Hack in 2014. Signaling a
strong deterrence stance, the well-defined end-state here was to prevent
future attacks by demonstrating that such actions would result in severe
political and economic consequences.
Deterrence
Deterrence, a fundamental concept of criminology and international
relations, serves as a crucial component of various disciplines, striving to
During the Cold War era, deterrence played a pivotal role in shaping
global geopolitics. The superpowers of the time, the US and the Soviet
Union remained engaged in a delicate balance of power through nuclear
deterrence. The doctrine of MAD is emblematic of this era. The
possession of nuclear arsenals by both sides served as a deterrent against
the initiation of a full-scale war since the fear of catastrophic
consequences, inherent in deterrence, prevented these nations from
engaging in any direct conflict. This period showcased the effectiveness
of deterrence in preventing large-scale wars between major powers.
7 Joseph S. Nye Jr., “Deterrence and Dissuasion in Cyberspace,” International Security 41,
no. 3 (January 1, 2017): 44–71, https://doi.org/10.1162/ISEC_a_00266.
8 David Carter, “Deterrence,” 2019, https://openoregon.pressbooks.pub/ccj230/chapter/8-
3-deterrence/.
9
Carter.
a) Deterrence by Denial
b) Deterrence by Punishment12
10 Stefan Soesanto and Max Smeets, “Cyber Deterrence: The Past, Present, and Future,” in
NL ARMS Netherlands Annual Review of Military Studies 2020: Deterrence in the 21st
Century—Insights from Theory and Practice, ed. Frans Osinga and Tim Sweijs (The
Hague: T.M.C. Asser Press, 2021), 385–400, https://doi.org/10.1007/978-94-6265-419-
8_20.
11 Steve Morgan, “Cybercrime to Cost the World $10.5 Trillion Annually By 2025,”
https://policycommons.net/artifacts/4828945/understanding-deterrence/5665691/.
https://www.airuniversity.af.edu/Portals/10/SSQ/documents/Volume-09_Issue-
1/jasper.pdf.
15
Nye, “Deterrence and Dissuasion in Cyberspace.”
Tallinn Manual 3.0, the latest iteration released in 2021, further refines
and expands upon its predecessors, addressing key contemporary
challenges, including cyber deterrence. It offers insights into how
International Law applies to state behaviour in cyberspace and sheds light
on the legal considerations of cyber operations that may be employed as
part of a deterrence strategy.
16 John Glaser, “Cyberwar on Iran Won’t Work. Here’s Why,” Cato Institute, August 21,
2017, https://www.cato.org/commentary/cyberwar-iran-wont-work-heres-why.
17 Michael N. Schmitt, Tallinn Manual 2.0 on the International Law Applicable to Cyber
manual/.
19 Michael Schmitt, “Germany’s Positions on International Law in Cyberspace Part I,” Just
Security, T14:15:30+00:00, https://www.justsecurity.org/75242/germanys-positions-on-
international-law-in-cyberspace/.
20 Jyri Raitasalo, “Cyber Deterrence: An Oxymoron for Years to Come,” Global Security
Escalation Risks
The digital realm is highly dynamic, and cyber operations can escalate
rapidly. A retaliatory cyber action, intended as a deterrence measure, can
quickly spiral into a broader conflict. Without well-defined rules of
engagement and de-escalation mechanisms, cyber deterrence efforts run
the risk of inadvertently causing more significant disruptions or conflicts
than they aim to prevent. The escalation risks in cyber deterrence are
Sanctions
One traditional and still practiced method to stop an adversary from doing
anything undesirable, bigger states tend to impose economic and trade
sanctions. Sometimes it also happens that states warn before they impose
sanctions and the adversary state restricts itself from carrying out the
activity.21 One reason may be the increased globalisation and the
importance of the economy in running state affairs. Once the economic
activity is halted, it becomes difficult for smaller states to survive. One
way of putting sanctions is through strong international agreements.22 It is
noted that most of the states that are attacking other states in cyberspace
are already under sanctions and imposing new ones will not help much.
Till now there is no such law developed at the international level that may
ease the task and deter the enemy from doing illicit activities. Therefore,
for the sanctions to have an impact on the adversary, a new set of laws
regarding the increased ratio of offensive cyber weapons is required.
However, that was one side of the coin, the other side believes in putting
sanctions to deter and punish the adversaries, just as the US did during the
Sony Pictures Hack in 2014, by imposing sanctions on North Korea.23
Considering the effectiveness and limitations of imposing sanctions, the
US in 2016, also signed legislation that allows it to employ sanctions on
21 “Soleimani: What Are Sanctions and Why Do Countries Use Them?,” BBC News,
August 9, 2018, sec. Newsbeat, https://www.bbc.com/news/newsbeat-45128837.
22 Misha Glenny, “Stuxnet Will Come Back to Haunt Us,” The New York Times, accessed
Setting up Protection/Defense
All the defensive tools and techniques that provide security in cyberspace
are the deterrents. The ones working on deterrence theory from a cyber
perspective also believe that passive deterrence involves all relevant
actions to minimise the threats prevailing in cyberspace and building
resilient networks is no exception in the process. Although these actions
help in better system security engineering and doctrine, however, their
effectiveness as a substantial deterrent against cyber-attacks is not much
effective.27
24 Rustam Goychayev et al., “Cyber Deterrence and Stability,” Assessing Cyber Weapon
Analogues through Existing WMD Deterrence and Arms Control Regimes, September
30, 2017, https://doi.org/10.2172/1405058.
25 “Letter from Senate Democrats to Treasury Secretary Steven Mnuchin on Sanctions,”
is the extreme insecurity of these devices that are not very costly and,
therefore, are given more preference over the secure and costly devices.
This has urged the communities to take frequent and reliable actions to
protect the companies from becoming victims. So, it is better to follow
robust security standards and hold the companies accountable and
responsible if any breach occurs.28 This way increased protection in the
vulnerable devices will act as a consistent deterrent. A good cyber defense
strategy is essential for states and bigger organisations to counter threats
effectively by focusing on the pillars of cyber defense strategy.
2018, https://informaconnect.com/3-pillars-of-cyber-defence-strategies/.
The active cyber defense has numerous benefits as it can take direct
(defensive) actions against the adversary by invalidating, terminating, and
dropping robust cyber threats. It can also help in identifying and later
punishing the actual culprit. The perks of having an improved cyber
defense will restrict the adversary from planning a cyber-attack against a
state's military (e.g. US, Russia, or China) which they already know will
have a hard time if they mess with it. It can be demonstrated without
31 “Cyber,” “Cyber Defense,” Techopedia, February 5, 2019,
https://www.techopedia.com/definition/6705/cyber-defense.
32 Adam Bateman, “What Is Cyber Defense?,” F-Secure, 2020, https://www.f-
secure.com/en/consulting/our-thinking/what-is-cyber-defence.
33 Col. Mark Taylor, “Defensive Cyber Operations,” Military, PEO EIS, n.d.,
https://www.eis.army.mil/programs/dco.
34 “Maryville,” “Understanding General, Defensive, and Offensive Cybersecurity
There are many examples where states have individually signed different
treaties to protect their infrastructure from malicious attacks by the
adversary. The usefulness of these contracts is another question but for a
limited period, it has worked as well. One example is taken from China
and the US agreement in 201537 after Chinese military hackers targeted
five American companies related to nuclear power, metals, and solar
products.38 This brought both parties to agree on neither stealing nor
exploiting each other's secrets. These norms and laws can work as
effective deterrents, if taken seriously and respectfully. Other examples of
the issue of cyber security include the Budapest Convention and the
35 Martin C. Libicki, Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND, 2009).
36 Tim Stevens, “(PDF) Cyberweapons: Power and the Governance of the Invisible,”
ResearchGate, 2017, https://doi.org/10.1057/s41311-017-0088-y.
37 John W Rollins et al., “U.S.–China Cyber Agreement,” 2015,
https://sgp.fas.org/crs/row/IN10376.pdf.
38 Ashley Fantz, “Chinese Hackers Infiltrated U.S. Companies, Attorney General Says,”
This drafting of such norms with Russia, USA, Australia, and Switzerland
being a part of it holds some peace in cyberspace and if it works, norms
can work as effective cyber-deterrents.
Counterattack
This technique fits into the deterrence by punishment category, where to
shut the enemy down, a state retaliates, and it is not always sure that the
damage will be less or more than perceived. In other words, the counter-
attack can be both automated and non-automated. In an automated attack,
there is a surety that the opponent will suffer, and damage will be caused,
while in a non-automated attack, the effect will be widely visible. Another
notable point regarding the retaliatory attack is that it is not necessary to
answer a cyber-attack with another cyber-attack; however, it is up to the
states to look for a suitable response. This is the liberty that states enjoy as
part of their defense, as stipulated by International Law.
Amid Russia's recent move to elevate its nuclear readiness, the potential
for severe cyber retaliation looms. Conversely, NATO has affirmed that
any cyber assault on its members will invoke Article 5 of the NATO
Charter, enabling a comprehensive response. Historically, the US and its
allies have predominantly relied on publicly attributing attacks to Russia
Recently, there have been several incidents concerning the US, Iran,
Russia, India, Pakistan, the UK, and many others where either a threat of
nuclear war against a severe cyber-attack or a threat, of a cyber-attack in
response to other illicit activities is noted. However, in the case of an
offensive sophisticated cyber weapon that is used against any state for a
certain period, it limits the retaliation factor for some reasons. Firstly,
super cyber-weapons like Stuxnet make it difficult for the victims to
detect, if there is any abnormal activity present in the system that is
compromised, and even if they do, the utmost task is to mitigate the threat.
Secondly, attribution is a grave concern in cyberspace operations, and so
is the case for cyber weapons. They take some time to develop and are
carefully designed to deceive the opponent. Both cases require enough
time and, therefore, the probability of retaliation is decreased and highly
depends on its timely detection.
Recommendations
The following recommendations are proposed to enhance cyber deterrence
strategies and address the evolving challenges in cyberspace.
Public-Private Partnerships
Foster public-private partnerships to bolster cyber defenses.
Collaboration between governments and the private sector can lead
to more comprehensive and resilient cyber security measures,
acting as a deterrent to cyber threats.
Enhance Cyber Defense Strategies
Develop and share robust cyber defense strategies that focus on
active cyber defense measures, including automated responses,
honeypots, and deceptive tactics. A strong defense can serve as a
significant deterrent against cyber threats.
Utilise Sanctions and Economic Measures
Implement sanctions and economic measures against malicious
cyber actors. International cooperation and agreements are crucial
to ensure the effectiveness of these measures in punishing cyber
aggressors.
Strategically Stockpile Cyber Weapons
Strategically stockpile cyber weapons while maintaining a high
level of secrecy. The convincing demonstration of cyber
capabilities can deter potential adversaries, aligning with your
original point.
Regular Cyber security Drills
Conduct regular cyber security drills and exercises to test the
readiness of organisations and states in responding to cyberattacks.
These drills can help identify weaknesses and improve cyber
deterrence capabilities.
Adapt to the Evolving Cyber Landscape
Continuously adapt to the evolving cyber landscape by staying
informed about emerging cyber threats and technologies. Flexibility
and adaptability are essential in crafting effective cyber deterrence
strategies.
Engagement with Non-State Actors
Recognise the role of non-state actors in cyberspace and engage
with them through legal means. Developing mechanisms for
Conclusion
The research provides a thorough examination of deterrence in the context
of both traditional and cyber environments. The realm of cyberspace has,
indeed, introduced unique challenges and complexities when it comes to
the concept of cyber deterrence. The staggering financial damages caused
by cyber-attacks underscore the urgent need to address this issue. While
traditional deterrence theories have been effective in conventional
domains, applying them to cyberspace is a highly debatable and complex
endeavour. One of the fundamental challenges in achieving effective
cyber deterrence lies in the absence of a strong foundation of incidents
and communication in the cyber warfare landscape. The increasing
offensive cyber capabilities and the lack of transparency among states
regarding their cyber arsenals further complicate the matter. Additionally,
the asymmetry of power in cyberspace, the presence of non-state actors,
and the rapid escalation of cyber operations add to the complexity. Hence;