No Shortcuts by Smeets Max;
Author:Smeets, Max;
Language: eng
Format: epub
Publisher: Hurst Publishers
Published: 2022-05-18T00:00:00+00:00
CONCLUSION
Most scholarship on the dynamics of cyber conflict seeks to explain what states can and cannot do with cyber operations. Yet implicit in this debate is the assumption that states can participate in cyber conflict, that they have crossed the barriers to entry. This book challenged this assumption and explained that, for many states, the barriers of entry are much higher than often perceived to be. The argument developed in this book has multiple components.
First, I noted that cyberspace is not a level playing field. What I meant by this is that states do not follow the same playbook and rulebook. Or more formally, state actors face different strategic, organizational, and legal/normative constraints when it comes to conducting cyber operations. A constrained actor tends to embed cyber operations within a well-defined legal and ethical framework (that, for example, requires minimizing collateral damage) and is aware of the impact organizational trade-offs (such as the potential intelligence losses following an effect operation) and is behaving strategicallyâultimately connecting these cyber means to a political end.
Second, these constraints have a major influence on the operational requirements to conduct cyber effect operations. Constrained actors generally need to conduct targeted operations, with long intelligence collection lead-up times, much deliberation to ensure organizational alignment, deploying well-tested exploits and tools, with payloads triggered at a specific point in time. Meeting all these requirements is often challengingâespecially when there are time pressures to execute.
Third, I add the dimension of available resources to introduce a new typology distinguishing between four types of actors. A âType I actorâ refers to an actor that is loosely constrained in conducting cyber effect operations, with a high degree of financial and organizational resources. A âType II actorâ refers to a loosely constrained actor, with few financial and organizational resources. A âType III actorâ is highly constrained in terms of executing cyber effect operations, but also highly resourceful. A âType IV actorâ is highly constrained when it comes to conducting cyber effect operations and has limited financial and organizational resources. I argue that most of the states that have launched a cyber command are Type IV actors.
Fourth, offensive cyber capability development by constrained actorsâincluding Type IV actorsâis often misunderstood. Some reporting makes us believe that cyber commands are like factories âproducingâ or âbuilding upâ âcyber weaponsâ. I developed the PETIO framework to provide a better understanding of what it means to develop an offensive cyber capability under constraints. The frameworkâdistinguishing between five dimensions: People, Exploits, Tools, Infrastructure, and Organizationâshows that military cyber organizations are more like âservice providersâ tasked with a set of activities. When we seek to analyse how organizations are building up âoffensive cyber capabilitiesâ, what we are really talking about is how they have trained up developers, operators, or system administrators, and allowed lawyers to familiarize themselves with the field. Cyber capability development is also about how processes are put in place to effectively conduct cyber operations with the aim to degrade certain networks, without compromising intelligence sources or causing other negative consequences.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Arms Control | Diplomacy |
Security | Trades & Tariffs |
Treaties | African |
Asian | Australian & Oceanian |
Canadian | Caribbean & Latin American |
European | Middle Eastern |
Russian & Former Soviet Union |
The Secret History by Donna Tartt(18064)
The Social Justice Warrior Handbook by Lisa De Pasquale(11932)
Thirteen Reasons Why by Jay Asher(8402)
This Is How You Lose Her by Junot Diaz(6404)
Weapons of Math Destruction by Cathy O'Neil(5785)
Zero to One by Peter Thiel(5450)
Beartown by Fredrik Backman(5296)
The Myth of the Strong Leader by Archie Brown(5208)
The Fire Next Time by James Baldwin(4993)
How Democracies Die by Steven Levitsky & Daniel Ziblatt(4936)
Promise Me, Dad by Joe Biden(4893)
Stone's Rules by Roger Stone(4822)
100 Deadly Skills by Clint Emerson(4651)
Rise and Kill First by Ronen Bergman(4531)
A Higher Loyalty: Truth, Lies, and Leadership by James Comey(4524)
The David Icke Guide to the Global Conspiracy (and how to end it) by David Icke(4352)
Secrecy World by Jake Bernstein(4346)
The Farm by Tom Rob Smith(4296)
The Doomsday Machine by Daniel Ellsberg(4224)
