Cyber Deterrence

A Technical and Policy Toolkit for Cyber Deterrence and Stability

Abstract:

This study seeks to assist policymakers and scholars in building a theoretical, policy, and technical framework to address cyber conflict.Based on an analysis of deterrence theory and application and prior arms control regimes, the study presents a toolkit of policies and actions for national governments based on elements of deterrence and arms control that analysis demonstrates are potentially applicable to cyber conflict.The study illustrates how these could be prospectively applied in a treaty framework to facilitate attribution of hostile cyber actions.

Set Your Drones to Stun: Using Cyber-Secure Quadcopters to Disrupt Active Shooters

Abstract:

This paper will examine pairing the autonomous precision-flight capabilities of Micro- Unmanned Aerial Vehicles (UAVs) with the growing capability of Artificial Intelligence (specifically AI based on neuromorphic computing systems) to field cyber-secure, active-shooter response systems to counter the active-shooter threat to civilian ‘soft targets’, such as schools or train stations. This paper proposes a pilot to demonstrate the feasibility of disrupting terrorist attacks with a micro-UAV, armed with less than lethal weapons, for instance, a stun gun, where such a ‘stun-drone’ is part of an emergency-response system that is trustworthy and correctly engages only active shooters.

Some Thoughts on Deterrence in the Cyber Era

Abstract:

Although cyber is an increasingly important instrument of national policy for deterrence and coercion, our understanding of how it functions is still weak and underdeveloped. This article explores some traditional notions of deterrence that must be remembered and reinvigorated, and notes aspects peculiar to cyber that must also be explored. Traditional deterrence makes clear the importance of promises and the difficulty in telling what the other side values and fears, and how it sees the world. Cyber conflict poses special problems in the uncertainties and ambiguities involved in, and related to the lack of shared understandings about what would constitute escalation.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com