Affiliation:
1. Center for Security Studies (CSS), ETH Zürich, Zürich, Switzerland
2. Institute of Security and Global Affairs, Leiden University, The Hague, Netherlands
Abstract
Abstract
Offensive cyber capabilities (OCCs) are the combination of people, technologies, and organizational attributes that jointly enable offensive cyber operations: the adversarial manipulation of digital services or networks. Most works on OCCs focus on their (de-)escalatory potential in terms of diplomatic tension, instability, or power. This article argues for a re-orientation toward the normatively prior question of their relative violence. It asks: how are OCCs integrated into violent state capacities and what are the consequences? The article proposes three logics of integration by which OCCs are included in violent state actions, in both repressive and interstate situations. These logics—substitution, support, and complement—weigh the benefits of using OCCs against an adversary instead of, as part of, and in addition to other means of violence, respectively. The article argues that the violence of OCCs depends on two things: first, whether one adopts a narrowly physical or a more expansive definition of violence and, second, which logic of integration governs their use. On a narrow definition of violence, substitutive and supportive uses of OCCs are less likely to be violent than conventional alternatives, and complementary uses of OCCs are not violent at all. On a wider definition, both substitutive and supportive uses of OCCs can lead to more violence than conventional alternatives, while complementary uses of OCCs are highly likely to increase violence overall. Acknowledging the different logics of integration for OCCs, and understanding their violent effects, has important analytical and policy benefits for global security studies.
Publisher
Oxford University Press (OUP)
Reference137 articles.
1. The Hunt for the Kill Switch: IEEE Spectrum;Adee,2008
2. Exclusive: U.S. Carried out Secret Cyber Strike on Iran in Wake of Saudi Oil Attack: Officials;Ali,2019
3. Choosing Air Strikes;Allen;Journal of Global Security Studies,2018
4. Cyber Warriors in the Middle East: The Case of the Syrian Electronic Army;Al-Rawi;Public Relations Review,2014
5. Repression, Education, and Politically Motivated Cyberattacks;Asal;Journal of Global Security Studies,2016
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献