Cyber Operations In Wartime

Headlines about cyber warfare often focus on doomsday scenarios, with depictions of nation-states using “cyber bombs” to remotely dismantle electric grids and other critical infrastructure

Yet recent events, including Russia’s use of cyber operations for information warfare and propaganda, suggest that policymakers and military leaders need to broaden their assumptions about how state and non-state actors are likely to use such operations in future conflicts. 

To investigate the role of cyber operations in diverse crisis scenarios, the UC Berkeley Center for Long-Term Cybersecurity  (CLTC) has developed two distinct wargame formats the use  innovative methodology for investigating competition among diverse actors to determine their likely strategic preferences.

Island Impact & Netwar

In the Island Impact game, players represented either the US or China in a simulated crisis in the South China Sea. In Netwar the players took on the role of either a national government or one of three opposition groups (a violent non-state actor, major international firm, or cyber activist network) in the context of an escalating conflict.

  • CLTC first ran these games with university students and national security professionals to examine how the participants approached incorporating cyber capabilities with more conventional tools of statecraft.
  • CLTC then constructed a survey experiment involving more than 3,000 internet users to identify which of the strategies identified in the wargame they preferred.

The wargames and survey experiments both showed that cyber capabilities produce a moderating influence on coercive exchanges and crisis escalation.

Cyber-based instruments of power appear to offer states a means of managing escalation ‘in the shadows’.

Cyber conflict appears in these simulations to resemble covert action and looks more like the ‘political warfare’ of the Cold War than it does a military revolution. The research work suggests that leaders should think about cyber exchanges in crisis settings more as political warfare and subterfuge than as traditional warfighting. 

Among The  CLTC's Key Findings:

Cyber exchanges will not necessarily be escalatory:

Particularly in state-to-state crises, participants were restrained in their use of cyber tools, suggesting that cyber capabilities may not necessarily be a preferred choice for provocative escalations.

Cyber deterrence may be overhyped:

In the context of cyberspace, the logic of coer-cion—the use of threats and limited action to alter behavio is less about deterrence (i.e. the threat of force) than about signaling resolve and undermining adversaries from within.

Power disparities had limited influence on decision-making:

Even players who were more powerful than their opponents used restraint, suggesting that cyber operations may in fact help stabilize strategic interactions between rivals.

Regime type informs cyber strategy preferences: 

Actors took a more defensive posture when the polity they were contesting was a democracy, as opposed to an autocracy.

Cyber strategy is “issue-agnostic”:

The nature of the conflict has little impact on the use of cyber capabilities, as different issues driving conflict, ideology or ethnic minority rights, did not produce observable differences in cyber strategy preferences.

The report, sponsored by the UC Berkeley, gives an overview of the implications for policymakers and military leaders as they make decisions about cybersecurity and anticipate how rivals will use cyber space in future crises linked below. 

Academia. Edu:

You Might Also Read: 

Reshaping The Future Of War With Malware:

 

« Alarming Surge In Malicious Apps
Endpoint Security Is More Important Than Ever »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Commissum

Commissum

Commissum specialise in information assurance and security testing services.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Infopulse

Infopulse

Infopulse is a global provider of Software Engineering, Cloud & IT Infrastructure Management, and Cybersecurity services.

Intraprise Health

Intraprise Health

Intraprise Health is a Certified HITRUST Assessor and award-winning provider of health information security products and services.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

Prophaze Technologies

Prophaze Technologies

Prophaze enable organizations and SaaS providers to improve their web application cybersecurity and reduce costs through AI automation.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

CloudDefense.AI

CloudDefense.AI

CloudDefense.AI is an industry-leading multi-layered Cloud Native Application and Protection Platform (CNAPP) that safeguards your cloud infrastructure and cloud-native apps,

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

Foresights

Foresights

Foresights is a Nordic company utilizing advanced intelligence tradecraft and extensive cyber security capabilities to deliver services and advisory tailored to our client’s critical requirements.

Swise

Swise

Swise is a Cyber security and compliance platform for your small business. Simplify and automate your security and compliance with our AI-powered platform.