{"id":27898,"date":"2016-07-27T14:30:27","date_gmt":"2016-07-27T04:30:27","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=27898"},"modified":"2016-07-26T13:51:05","modified_gmt":"2016-07-26T03:51:05","slug":"deterrence-cyberspace-different-domain-different-rules","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/deterrence-cyberspace-different-domain-different-rules\/","title":{"rendered":"Deterrence in cyberspace: different domain, different rules"},"content":{"rendered":"
<\/p>\n
Cyberspace pervades everyday life. Our growing reliance on networks has increased the vulnerability of Australia\u2019s national security, economy and society to malicious cyber actions. As a result, there\u2019s a need to build trust and confidence in cyberspace, and the infrastructure and institutions that it enables and supports.<\/span><\/p>\n Deterrence policies and capabilities are often invoked as a means to create this stability. Australia\u2019s recent<\/span> Cyber Security Strategy<\/span><\/a>, released in April 2016, stated that \u2018Australia\u2019s defensive and offensive cyber capabilities enable us to deter and respond to the threat of cyber attack\u2019. In launching the Strategy, Prime Minister Malcolm Turnbull further<\/span> emphasised<\/span><\/a> that \u2018acknowledging this offensive capability, adds a level of deterrence\u2019. This rhetorical trend is also evident in other international cyber strategies including those of our major allies and partners.<\/span><\/p>\n However, there are pit falls in that approach to cybersecurity. In our report, <\/span>Deterrence in Cyberspace, <\/span><\/i>released today<\/span>, <\/span><\/i>we explore those issues and provide recommendations for policymakers to address stability and security in cyberspace.<\/span><\/p>\n The use of deterrence to mitigate security threats is based on an assumption that states are rational, and make decisions based on cost-benefit assessments. On that assumption, one can deter a challenger by increasing the perceived costs of their action (deterrence by punishment) or decreasing the expected benefit (deterrence by denial).<\/span><\/p>\n However, threatening punishment is unlikely to deter malicious behaviour in cyberspace, for several reasons:<\/span><\/p>\n Instead, such threats have the potential to heighten international insecurity by inducing what we\u2019ve dubbed the \u2018credibility-stability paradox\u2019. The reliability of a state\u2019s commitment to enforcing its own deterrence policy statements is a significant symbol of its political and military power. If a state doesn\u2019t follow through on a threat when its threshold is crossed, it directly reduces its credibility in the eyes of the international community, undermining its ability to both intimidate and negotiate in the future.<\/span><\/p>\n Conversely, making good on a threat in cyberspace can have drastic impacts on international stability. Retaliation, either inside or outside of cyber space, may spiral beyond the intended punishment, inflicting damage over and above what would be considered a proportionate response to the breach of a threshold. That risks a minor incident triggering a tit-for-tat escalation that devolves into a larger and more destructive conflict, further damaging international stability. So, as soon as a cyber deterrence threat is extended, a state faces the strategic dilemma of being forced to choose between maintaining its credibility or risking collateral damage.<\/span><\/p>\n That isn\u2019t to say that offensive cyber capability shouldn\u2019t be developed, but rather that it shouldn\u2019t be developed for the purpose of making threats. The use of offensive cyber capabilities, in accordance with international law, to enable and support conventional military forces contributes positively to broader deterrence capability by reinforcing the lethality and effectiveness of armed forces as a tool of state power.<\/span><\/p>\n The report recommends methods to alter an adversary\u2019s decision-making by withholding the perceived rewards of certain behaviour and building an international conflict reduction framework. Implementing a denial strategy in cyberspace requires strong, adaptive defences, resilient networks, and the use of other advanced techniques and technologies to reduce the perceived value of malicious behaviour. Denying enemies an advantage commensurate with the effort required to breach security should dissuade them from further attempts on the network. That supports cybersecurity generally and, if effectively conducted, can further enhance conventional deterrence postures and improve a state\u2019s overall national security.<\/span><\/p>\n ICPC\u2019s new report explores the nature of cyberspace, reviews the challenges it poses to deterrence by punishment and offers alternative approaches for policymakers seeking to establish stability in cyberspace. In a context of increasing network dependence and growing cyber tensions, setting a precedent of restraint, trust and international cooperation is essential. This will ensure Australia can continue to reap the economic and social benefits of a stable cyberspace.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":" Cyberspace pervades everyday life. Our growing reliance on networks has increased the vulnerability of Australia\u2019s national security, economy and society to malicious cyber actions. As a result, there\u2019s a need to build trust and confidence …<\/p>\n","protected":false},"author":364,"featured_media":27899,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,95,1755],"class_list":["post-27898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyber-security","tag-deterrence"],"acf":[],"yoast_head":"\n\n