HCSS
  • News
    • BNR | De Strateeg
    • Columns
    • Draghi Report Series
    • Events
    • Podcasts
  • Publications
    • Publications
      • All Publications
    • Defence & Security
      • Behavioural Influencing in the Military Domain
      • (Nuclear) Deterrence and Arms Control
      • Hybrid Threats
      • Rethinking Fire and Manoeuvre
      • Robotic and Autonomous Systems
      • Strategic Monitor Dutch Police
      • Transnational Organised Crime
    • Geopolitics & Geo-economics
      • China in a Changing World Order
      • Europe in a Changing World Order
      • Europe in the Indo-Pacific
      • Knowledge base on Russia (RuBase)
      • PROGRESS / Strategic Monitor
      • Transatlantic Relations
    • Climate, Energy, Materials & Food
      • Climate and Security
        • International Military Council on Climate and Security (IMCCS)
        • Water, Peace & Security (WPS)
      • Critical Minerals
      • Energy Security
        • Tank Storage in Transition
      • Food Security
    • Strategic Technologies
      • Cyber Policy & Resilience
        • Global Commission on the Stability of Cyberspace (GCSC)
      • Emerging Technologies
      • Global Commission on Responsible Artificial Intelligence in the Military Domain (GC REAIM)
      • Semiconductors
      • Space
  • Dashboards
    • Dashboards
      • All Dashboards
        • GINA
    • Defence & Security
      • DAMON | Disturbances and Aggression Monitor
      • GINA | Military
      • Nuclear Timeline
    • Geopolitics & Geo-economics
      • Dutch Foreign Relations Index
      • GINA | Diplomatic
      • GINA | Economic
      • GINA | Information
    • Climate, Energy, Materials & Food
      • Agrifood Monitor
      • CRM Dashboard
    • Strategic Technologies
      • Cyber Arms Watch
      • Cyber Comparator
      • Cyber Norms Observatory
      • Cyber Transparency
  • Services
    • HCSS Boardroom
    • HCSS Datalab
    • HCSS Socio-Political Instability Survey
    • Strategic Capability Gaming
    • Studio HCSS
    • Indo-Dutch Cyber Security School 2024
    • Southern Africa-Netherlands Cyber Security School 2025
  • NATO Summit
  • GC REAIM
    • GC REAIM | Members
    • GC REAIM | Conferences
    • GC REAIM | Partners, Sponsors, Supporters
  • About HCSS
    • Contact Us
    • Our People
    • Funding & Transparency
    • Partners & Clients
    • HCSS Newsletter
    • HCSS Internship Programme
    • Press & Media Inquiries
    • Working at HCSS
    • Global Futures Foundation
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

News

Mixed Signals: A Flawed Approach to Cyber Deterrence

February 10, 2020

New Publication: “Mixed Signals: A Flawed Approach to Cyber Deterrence” by Dr. Alexander Klimburg, Director of the HCSS Cyber Policy and Resilience Program, in Survival, vol. 62 no. 1, February–March 2020, pp. 107–130.

The conduct and deployment of the United States Cyber Command’s (CYBERCOM) vision of ‘persistent engagement’ represents a radical departure from previous notions of conflict in cyberspace. It builds on a number of questionable assumptions about the international history and perception of cyber conflict, the role and strategic direction of information warfare, and the general dynamics of deterrence.

This article, commissioned in part as a White Paper for the US Cyberspace Solarium Commission, critiques the high-risk approach of persistent engagement to developing cyber deterrence. The destabilising effect of persistent engagement is likely not only to trigger new forms of retaliation but also accelerate the already rapid international proliferation of offensive cyber capabilities. In the worst-case scenario, it may even pose a risk to the internet as we know it.

The controversial U.S.’ doctrine of ‘active defence in cyberspace’ and strategy outlook to ‘defend forward’ represents a questionable turn in the development of cyber deterrence. Overall, CYBERCOM is being positioned less as a strategic-weapons carrier and a key element of an overall strategic-deterrence capability, and more as a special-operations command.

This article sequentially addresses the first, second and third order effects of persistent-engagement. Beginning with the first-order effects of ‘out of band’ and ‘diagonal’ retaliation, the author argues that the assessed impact of persistent-engagement via instances of cyber attacks is too simplistic. Alternative avenues of response by US adversaries through ‘conventional’ support for malign actors or cyber-enabled means which defy simple characterisations contest the myopic assessment of the efficacy of the current doctrine.

The latter section of the article delves into the second-order effects of persistent-engagement, particularly in respect to the strategic dilemma of asymmetry between large and small nation states within the fifth domain. The destructive potential of emerging cyber capabilities amongst smaller nation states may be orders of magnitude less than that of the United States or a near-peer cyber power, but still possess a minimal deterrence capability that, much like the small nuclear arsenals of France, the UK and China, could inflict an unacceptable level of retaliatory punishment on a potential aggressor, no matter their overwhelming technical superiority.

Finally, the article addresses the implications of weaponized information within the changing internet landscape. In this new environment, all information is likely to be treated as a potential weapon, and thus subject to government intervention and state negotiations. By effectively encouraging cyber conflict, the persistent-engagement vision greatly increases the appeal of the argument that a much stronger government role in achieving ‘cyber peace’ is needed, and that ultimately, this perilous domain needs an intergovernmental model to manage it.

The significant increase in all forms of offensive cyber behaviour against the US after 2013 has been described as a deterrence failure. Yet advocates of persistent engagement have been unable to explain why deterrence failed, or to express whether the failure was complete or only partial. Instead of publicly reinforcing its dominant posture and conflating transparency with propaganda, the United States might be better served by walking more softly in cyberspace even as it retains a big stick.

For any questions, please contact info@HCSS.nl or the author alexklimburg@hcss.nl.

  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail

Experts

Alexander Klimburg

Related News

Related Content

Cyber Deterrence Final
Promises and Perils of Minumum Cyber Deterrence Posture (HCSS 2022)
EUISS Chaillot paper | Cyber Arms Watch and transparency on states’ cyber capabilities

Office Address

  • The Hague Centre for Strategic Studies
  • Lange Voorhout 1
  • 2514 EA The Hague
  • The Netherlands

Contact Us

  • Telephone: +31(70) 318 48 40
  • E-mail: info@hcss.nl
  • IBAN NL10INGB0666328730
  • BIC INGBNL2A
  • VAT NL.8101.32.436.B01
  • Contact

Legal & Privacy

  • Disclaimer & Privacy
  • Algemene Voorwaarden (NL) 
  • Terms & Conditions (ENG) 
  • Coordinated Vulnerability Disclosure
  • Ethical Standards
  • Manual for Responsible Use of AI

Follow us

© The Hague Centre for Strategic Studies
    Link to: HCSS Podcast serie “De Toekomst van de Landmacht” Link to: HCSS Podcast serie “De Toekomst van de Landmacht” HCSS Podcast serie “De Toekomst van de Landmacht” Link to: WNL: Han ten Broeke over de politieke rel in Duitsland Link to: WNL: Han ten Broeke over de politieke rel in Duitsland WNL: Han ten Broeke over de politieke rel in Duitsland
    Scroll to top Scroll to top Scroll to top

    GDPR Consent

    Your privacy is important to us. Here you can set which consent you are allowing us with regards to the collection of general information, the placing of cookies of the collection of personal information. You can click 'Forget my settings' at the bottom of this form to revoke all given consents.

    Privacy policy | Close
    Settings

    GDPR Consent Settings

    Your privacy is important to us. Here you can set which consent you are allowing us with regards to the collection of general information, the placing of cookies of the collection of personal information. You can click 'Forget my settings' at the bottom of this form to revoke all given consents.

    Website statistics collect anonymized information about how the site is used. This information is used to optimize the website and to ensure an optimal user experience.

    View details

    Functional cookies are used to ensure the website works properly and are neccessary to make the site function. These cookies do not collect any personal data.  

    View details
    Forget my settings Deleted!