The Pros And Cons Of Cyber Deterrence

Superior Essays
Cyber deterrence has been thrown out in the public, governmental, and military sectors for the better part of the first half of the decade, stretching into discussions currently in organizations like NATO, and governments worldwide. The theory is simple: “deter someone from doing something out of fear of repercussion or retaliation.” Theory and concept however, are very different premises and conclusions. Everyone in the information warfare area knows that attribution is a slippery slope, and with the quick typing of a few characters on a keyboard, an attacker can choose to be anyone they want to appear to be. Officials pounding any “attribution” on any pulpit, continue to learn nothing, and attackers will continue with their cyber-shenanigans. These discussions (cyber deterrence) are not scaring, nor deterring anyone.

Attribution is a rather mystical thing when it comes to cyber-attacks. “Cyber related” companies offering response based services - incident response, investigations - know this very well and play up the fear to continue to sell their services. As an offensive penetration tester, I have many tricks up my sleeve that
…show more content…
Proof via way of an attacker caught red-handed, with data on their machine. What level of proof would we be willing to offer if all we did is state: “Dmitri Russianov was caught in the act. He has a personal website that lists him as a cyber expert in Russian government.” Would we be willing to investigate this Dmitri without blinders. “What exactly did he do, how, and why.” Are we willing to make sure that perhaps his machine was not compromised and used as a proxy? The answer is: “Probably not.” We would be so content with pointing the finger, we would just settle. But what if for a moment, someone in China compromised Dmitri’s machine, and leveraged his credentials to pull off other attacks? Another country skates away scott-free. See the

Related Documents

  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Moreover, there are other types of cyber-attacks and acts of cyber warfare that are not solely military and defense concentrated, but nevertheless are dangerous. An example of this type of attack is explained in columnists, DJ Summers (2014) article “Fighting in the Cyber Trenches”. In his example, he explains how an honest biomedical company going through the process of creating a new technological innovation may have to wait up to five years to be able to release a new product. On the other hand, a different company who is trying to release the same product may use a hacker to release this new product into the market in as shorter span of time for instance, as 18 months (Summers, 2014). Summers explains how hackers are able to infiltrate…

    • 230 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    It is possible that the soviets are lying all this time. no one thought so until the release of the FBI documents. Is it…

    • 770 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    While businesses on the other hand take more extreme measures, and acquire personal secret services. “Faced with rampant crime, many Russian businesses are taking matters into their own hands and hiring private security agents and bodyguards.” (CATO). No level of the Russian government today is immune from organized crime. For example, Gregori Miroshnik was a well-known established criminal who had previously been imprisoned four times; but he eventually went on to become the economic advisor to the vice president in 1991 according to Lukas and Dempsey of the CATO Institute.…

    • 669 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    Cyber attackers have come from in the country and outside of the country, and these other countries need to know that we aren’t going to accept it. In the debate, Clinton said, “the United States has much greater capacity. And we are not going to sit idly by and permit state actors to go after our information, our private-sector information or our public-sector information.” (Washington Post)…

    • 1185 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    In Sweden recently, that has meant series of bizarre forged letters new articles about NATO and some links to Russia. One forgery, the Defense Ministry letterhead over Mr. Hultqvist signature, encouraged a major Swedish firm to sell artillery to Ukraine, a move that would be illegal in Sweden. They heavily invested in a program of "weaponized" information. But not all Russian disinformation succeed because Sputnik websites in various Scandinavian languages failed to attract enough readers and were closed after less than a year. Mainly Russia tried to sent false information to the Sweden people and general officers because Russia wanted to win the war between the two.…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    I think the possibility of Russian tampering should be investigated because people believe this is a possibility, also Michael Flynn Trump’s National Security Advisor was asked to resign because of contacts with Russia, and Trump calls these allegations “fake news”.…

    • 631 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Contrary to its reputation, it has been quite a long time since the KGB did an assassination in a foreign state for minor matters. Conversely, their brutality extends inwards towards their own. In the U.S., if one was caught reporting to the KGB, he or she would probably be fired and maybe tried in a court of law with a state-supplied attorney who has an obligation to defend the traitor. In Russia the trial will be, in almost all cases, purely ceremonial, and the penalty will be pretty much set long before the trial even starts. The concrete realities of the intelligence business, which are obvious to Zaitzev due to the fact that he works for the KGB’s communications department, are not the only things that nearly held him back.…

    • 800 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    As a repercussion the Russian government expelled two Swedish diplomats. Some see this as a return to ‘Cold War’ diplomacy by the Russians. One may now ask, what is the line for unethical information gathering by companies or…

    • 1663 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays

Related Topics