Thermonuclear cyberwar

Nuclear command and control increasingly relies on computing networks that might be vulnerable to cyber attack. Yet nuclear deterrence and cyber operations have quite different political properties. For the most part, nuclear actors can openly advertise their weapons to signal the costs of aggression to potential adversaries, thereby reducing the danger of misperception and war. Cyber actors, in contrast, must typically hide their capabilities, as revelation allows adversaries to patch, reconfigure, or otherwise neutralize the threat. Offensive cyber operations are better used than threatened, while the opposite, fortunately, is true for nuclear weapons. When combined, the warfighting advantages of cyber operations become dangerous liabilities for nuclear deterrence. Increased uncertainty about the nuclear/cyber balance of power raises the risk of miscalculation during a brinksmanship crisis. We should expect strategic stability in nuclear dyads to be, in part, a function of relative offensive and defensive cyber capacity. To reduce the risk of crisis miscalculation, states should improve rather than degrade mutual understanding of their nuclear deterrents.

[1]  David E. Hoffman,et al.  The dead hand : the untold story of the Cold War arms race and its dangerous legacy , 2009 .

[2]  A. Long Deterrence From Cold War to Long War: Lessons from Six Decades of RAND Research , 2008 .

[3]  T. Schelling,et al.  The Strategy of Conflict. , 1961 .

[4]  James Sullivan,et al.  Cross-domain deterrence: strategy in an era of complexity , 2019, International Affairs.

[5]  William G. Hyland,et al.  Managing Nuclear Operations , 1987 .

[6]  Glenn Herald Snyder,et al.  Deterrence and defense : toward a theory of national security , 1962 .

[7]  Benjamin B. Fischer CANOPY WING: The U.S. War Plan That Gave the East Germans Goose Bumps , 2014 .

[8]  Stephen J. Cimbala Nuclear cyberwar and crisis management , 2016 .

[9]  Janice Gross Stein,et al.  Psychology and Deterrence , 1986 .

[10]  Lucas Kello The Meaning of the Cyber Revolution: Perils to Theory and Statecraft , 2013, International Security.

[11]  Trey Herr,et al.  Combating Complexity: Offensive Cyber Capabilities and Integrated Warfighting , 2016 .

[12]  J. Lindsay,et al.  Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace , 2015 .

[13]  Lawrence Freedman Perception and Misperception in International Politics , 1978 .

[14]  Andrea Berger,et al.  Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety , 2014 .

[15]  Erik Gartzke,et al.  The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth , 2013, International Security.

[16]  R. K. Betts,et al.  Is Strategy an Illusion? , 2000, International Security.

[17]  Branislav L. Slantchev Feigning Weakness , 2010, International Organization.

[18]  Jon R. Lindsay,et al.  The Impact of China on Cybersecurity: Fiction and Friction , 2015, International Security.

[19]  Stephen J. Cimbala Nuclear Deterrence and Cyber: The Quest for Concept , 2014 .

[20]  Martin C. Libicki,et al.  Cyber Warfare and Sino-American Crisis Instability , 2014 .

[21]  Joel Brenner America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare , 2011 .

[22]  James R. Holmes,et al.  Strategy in the Second Nuclear Age: Power, Ambition, and the Ultimate Weapon , 2012 .

[23]  Albert Wohlstetter The Delicate Balance of Terror , 1959 .

[24]  Dale Peterson,et al.  Offensive Cyber Weapons: Construction, Development, and Employment , 2013 .

[25]  Philip E. Tetlock,et al.  Psychology and International Relations Theory , 2003 .

[26]  Gerald Sperrazzo Psychology and international relations , 1965 .

[27]  James J. Wirtz Nuclear weapons in the information age , 2018 .

[28]  Shaun Gregory,et al.  The Hidden Cost of Deterrence: Nuclear Weapons Accidents 1950-88 , 1989 .

[29]  Keren Yarhi-Milo,et al.  Covert Communication: The Intelligibility and Credibility of Signaling in Secret , 2017 .

[30]  P. Baran,et al.  On Distributed Communications Networks , 1964 .

[31]  Jon R. Lindsay,et al.  Stuxnet and the Limits of Cyber Warfare , 2013 .

[32]  Shiping Tang,et al.  The Security Dilemma: A Conceptual Analysis , 2009 .

[33]  Dan Reiter Exploring the Bargaining Model of War , 2003, Perspectives on Politics.

[34]  J. Fearon Rationalist explanations for war , 1995, International Organization.

[35]  R. Powell War as a Commitment Problem , 2004, International Organization.

[36]  Raymond L. Garthoff,et al.  The Meaning of the Nuclear Revolution: Statecraft and the Prospect of Armageddon. , 1990 .

[37]  Herbert S. Lin,et al.  Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities , 2009 .

[38]  Bruce G. Blair,et al.  Strategic command and control , 1985 .

[39]  Barry R. Posen Inadvertent Escalation: Conventional War and Nuclear Risks , 1991 .

[40]  Avery E. Goldstein,et al.  First Things First: The Pressing Danger of Crisis Instability in U.S.-China Relations , 2013, International Security.

[41]  D. Benson,et al.  Why the Internet Is Not Increasing Terrorism , 2014 .

[42]  Scott Borg Economically Complex Cyberattacks , 2005, IEEE Secur. Priv..

[43]  A. Long,et al.  Stalking the Secure Second Strike: Intelligence, Counterforce, and Nuclear Strategy , 2015 .

[44]  Paul Bracken,et al.  The political command and control of nuclear forces , 1986 .

[45]  Robert Powell,et al.  Nuclear Brinkmanship with Two-Sided Incomplete Information , 1988, American Political Science Review.

[46]  Erik Gartzke,et al.  War Is in the Error Term , 1999, International Organization.

[47]  Vincenzo A. Sainato,et al.  Cyber War Will Not Take Place , 2012 .

[48]  Jon R. Lindsay,et al.  Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack , 2015, J. Cybersecur..

[49]  S. V. Evera,et al.  Causes of War , 2019 .

[50]  Roftiel Constantine Man without a Face: The Autobiography of Communism's Greatest Spymaster , 2008 .

[51]  Erik Gartzke,et al.  Nukes with Numbers: Empirical Research on the Consequences of Nuclear Weapons for International Conflict , 2016 .

[52]  Ashok Kumar Saini Profit-Function of Two- Similar Cold Standby Nuclear Missiles System subject to failure due to engineering or failure shuts down Squadron of Nuclear Missiles , 2015 .

[53]  Richard A. Clarke,et al.  Cyber War: The Next Threat to National Security and What to Do About It , 2010 .

[54]  Stephanie Ricker Schulte,et al.  “The WarGames Scenario” , 2008 .

[55]  R. Harrison Wagner War and the State: The Theory of International Politics , 2007 .

[56]  Bernard Brodie,et al.  The Absolute Weapon: Atomic Power and World Order. , 1946 .

[57]  Marc Trachtenberg,et al.  History and Strategy , 2020 .

[58]  Herman Kahn On Thermonuclear War , 1960 .

[59]  Scott D. Sagan,et al.  The spread of nuclear weapons : an enduring debate : with new chapters on Iran, Iraq, and North Korea, and on the prospects for global nuclear disarmament , 2013 .

[60]  R. Powell Nuclear Brinkmanship, Limited War, and Military Power , 2015, International Organization.

[61]  Campbell Craig Nuclear Statecraft: History and Strategy in America's Atomic Age , 2015 .

[62]  Amitai Etzioni,et al.  Conflict and Defense: A General Theory. , 1963 .

[63]  J. Abbate,et al.  Inventing the Internet , 1999 .

[64]  Scott D. Sagan The Limits of Safety: Organizations, Accidents, and Nuclear Weapons , 1993 .

[65]  Austin Long,et al.  Signaling with Secrets , 2019, Cross-Domain Deterrence.

[66]  John E. Gudgel Cyber War versus Cyber Realities: Cyber Conflict in the International System , 2016 .

[67]  Erik Gartzke,et al.  Coercion through Cyberspace : The Stability-Instability Paradox Revisited , 2015 .

[68]  Robert Jervis,et al.  The Illogic of American Nuclear Strategy , 1985 .

[69]  Caitlin Talmadge,et al.  Would China Go Nuclear? Assessing the Risk of Chinese Nuclear Escalation in a Conventional War with the United States , 2017, International Security.

[70]  Frank C. Zagare,et al.  Rationality and Deterrence , 1990, World Politics.

[71]  Myriam Dunn Cavelty Cyber-Terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate , 2008 .

[72]  B. Buchanan,et al.  Attributing Cyber Attacks , 2015 .

[73]  Sean Lawson,et al.  Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats , 2013 .

[74]  Ben Buchanan The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations , 2016 .

[75]  Michael Warner,et al.  Cybersecurity: A Pre-history , 2012 .

[76]  R. Powell,et al.  Nuclear Deterrence Theory: The Search for Credibility , 1990 .