Deterrence and Norms to Foster Stability in Cyberspace
https://doi.org/10.1007/S13347-018-0328-0Abstract
Deterrence in cyberspace is possible. But it requires an effort to develop a new domain-specific, conceptual, normative, and strategic framework. To be successful, cyber deterrence needs to shift from threatening to prevailing. I argue that by itself, deterrence is insufficient to ensure stability of cyberspace. An international regime of norms regulating state behaviour in cyberspace is necessary to complement cyber deterrence strategies and foster stability. Enforcing this regime requires an authority able to ensure States compliance with the norms at an international level, run investigations into suspected State-run (or Statesponsored) cyber operations to define attribution, expose breaches of the norms, and impose adequate sanctions and punishments. These requirements define a political mandate for an authority that will have a deep impact on international relations and geo-political equilibriums. The UN Security Council has the necessary resources and the political and coercive power to meet these requirements. The time has come to embrace this power to consolidate and enforce an international regime of norms to regulate state behaviour in cyberspace. Problems, mistakes, and even failures are to be expected, but they must not hinder the process.
References (28)
- Brodie, B. (1978). The development of nuclear strategy. International Security, 2(4), 65-68.
- Chadwick, A., & Howard, P. N. (Eds.). (2009). Routledge Handbook of Internet Politics. Routledge hand- books. London: Routledge.
- Crosston, M. (2011). World gone cyber MAD: How 'mutually assured debilitation' is the best hope for cyber deterrence. Strategic Studies Quarterly, 50(1), 100-116.
- Eilstrup-Sangiovanni, M. (2017). Why the world needs an international cyberwar convention. Philosophy & Technology. https://doi.org/10.1007/s13347-017-0271-5.
- Finlay, C. J. (2018). Just war, cyber war, and the concept of violence. Philosophy & Technology. https://doi. org/10.1007/s13347-017-0299-6.
- Floridi, L. (2016). Mature information societies-a matter of expectations. Philosophy & Technology, 29(1), 1-4. https://doi.org/10.1007/s13347-016-0214-6.
- Floridi, L., & Taddeo, M. (Eds.). (2014). The ethics of information warfare, Law, governance and technology series, volume (Vol. 14). Heidelberg: Springer.
- Freedberg, S. (2014). NATO Hews To Strategic Ambiguity On Cyber Deterrence. 2014.
- Harknett, R. J., & Goldman, E. O. (2016). The search for cyber fundamental. Journal of Information Warfare, 15(2), 81-88.
- Kugler, R. (2009). Deterrence of cyber attacks. In F. Kramer, S. Starr, & L. Wentz (Eds.), Cyberpower and national security (pp. 309-342). Washington, D.C.: National Defense University.
- Lan, T., Xin, Z., Raduege Jr., H., Grigoriev, D., Duggal, P., & Schjølberg, S. (2010). Global Cyber Deterrence Views from China, the U.S., Russia, India, and Norway. EastWest Institute.
- Lawson, E. (2017). Deterrence in cyberspace: a silver bullet or a sacred cow? Philosophy & Technology. https://doi.org/10.1007/s13347-017-0267-1.
- Libicki, M. (2009). Cyberdeterrence and cyberwar. The RAND Corporation.
- Lonsdale, D. J. (2017). Warfighting for cyber deterrence: a strategic and moral imperative. Philosophy & Technology. https://doi.org/10.1007/s13347-017-0252-8.
- Nye, J. S. (2011). Nuclear lessons for cyber security? Strategic Studies Quarterly, 5(4), 11-38.
- Owens, W. A., Dam, K. W., Lin, H., & National Research Council (U.S.), National Research Council (U.S.), and National Research Council (U.S.) (Eds.). (2009). Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. Washington, DC: National Academies Press.
- M. Taddeo
- Powell, R. (2008). Nuclear deterrence theory: the search for credibility. Digitally version. Paperback Re-Issue. Cambridge: Cambridge University Press.
- Ryan, N. J. (2017). Five kinds of deterrence. Philosophy & Technology. https://doi.org/10.1007/s13347- 016-0251-1.
- Taddeo, M. (2012). Information warfare: a philosophical perspective. Philosophy and Technology, 25(1), 105-120.
- Taddeo, M. (2014). Just information warfare (pp. 1-12). April: Topoi. https://doi.org/10.1007/s11245-014-9245-8.
- Taddeo, M. (2016). On the risks of relying on analogies to understand cyber conflicts. Minds and Machines, 26(4), 317-321. https://doi.org/10.1007/s11023-016-9408-z.
- Taddeo, M. (2017a). Deterrence by norms to stop interstate cyber attacks. Minds and Machines. https://doi. org/10.1007/s11023-017-9446-1.
- Taddeo, M. (2017b). The limits of deterrence theory in cyberspace. Philosophy & Technology. https://doi. org/10.1007/s13347-017-0290-2.
- Taddeo, M. (2018). How to deter in cyberspace. The European Centre of Excellence for Countering Hybrid Threats, 2018(6), 1-10.
- Taddeo, M., & Floridi, L. (2018). Regulate artificial intelligence to avert cyber arms race. Nature, 556(7701), 296-298. https://doi.org/10.1038/d41586-018-04602-6.
- UN Institute for Disarmament Research. (2014). Cyber stability seminar 2014: preventing cyber conflict.
- Yang, G.-Z., Bellingham, J., Dupont, P. E., Fischer, P., Floridi, L., Full, R., Jacobstein, N., et al. (2018). The Grand Challenges of Science Robotics. Science Robotics, 3(14), eaar7650. https://doi.org/10.1126 /scirobotics.aar7650.