Hostname: page-component-586b7cd67f-t8hqh Total loading time: 0 Render date: 2024-11-23T20:48:56.178Z Has data issue: false hasContentIssue false

Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online

Published online by Cambridge University Press:  19 May 2020

Christopher Whyte*
Affiliation:
Virginia Commonwealth University, Richmond, Virginia
*
*Corresponding author. Email: [email protected]

Abstract

At present, most scholarship on the potential for escalation in cyberspace couches analysis in terms of the technological dynamics of the domain for relative power maneuvering. The result has been a conceptualisation of the logic of operation in cyberspace as one of ‘tit-for-tat’ exchanges motivated by attribution problems and limited opportunity for strategic gain. This article argues that this dominant perspective overlooks alternative notions of how cyber tools are used to influence. This, in turn, has largely led scholars to ignore second-order effects – meaning follow-on effects triggered by a more direct outcome of an initial cyber action – on domestic conditions, institutions, and individual stakeholders. This article uses the case of cyber-enabled political warfare targeting the United States in 2016 to show how escalation can occur as a second-order effect of cyber operations. Specifically, the episode led to a re-evaluation of foreign cyber strategy on the part of American defence thinkers that motivated an offensive shift in doctrine by 2018. The episode also directly affected both the political positions taken by important domestic actors and the attitude of parts of the electorate towards interference, both of which have reinforced the commitment of military planners towards assertive cyber actions.

Type
Research Article
Copyright
Copyright © British International Studies Association 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 Among others, see Manzo, Vincent, ‘Deterrence and escalation in cross-domain operations’, Joint Force Quarterly, 66 (2011), pp. 814Google Scholar; Lin, Herbert, ‘Escalation dynamics and conflict termination in cyberspace’, Strategic Studies Quarterly, 6:3 (2012), pp. 4670Google Scholar; Libicki, Martin C., Crisis and Escalation in Cyberspace (Santa Monica: Rand Corporation, 2012)Google Scholar; Gompert, David C. and Libicki, Martin, ‘Cyber warfare and Sino-American crisis instability’, Survival, 56:4 (2014), pp. 722CrossRefGoogle Scholar; Deibert, Ronald J., ‘Bounding cyber power: Escalation and restraint in global cyberspace’, Organized Chaos: Reimagining the Internet (2014), p. 49Google Scholar; Valeriano, Brandon and Maness, Ryan C., Cyber War Versus Cyber Realities: Cyber Conflict in the International System (New York: Oxford University Press, 2015)CrossRefGoogle Scholar; Kostyuk, Nadiya, Powell, Scott, and Skach, Matt, ‘Determinants of the cyber escalation ladder’, The Cyber Defense Review, 3:1 (2018), pp. 123–34Google Scholar; Kreps, Sarah and Schneider, Jacquelyn, ‘Escalation firebreaks in the cyber, conventional, and nuclear domains: Moving beyond effects-based logics’, Journal of Cybersecurity, 5:1 (2019)CrossRefGoogle Scholar; Hansel, Mischa, ‘Cyber-attacks and psychological IR perspectives: Explaining misperceptions and escalation risks’, Journal of International Relations and Development, 21:3 (2018), pp. 523–51CrossRefGoogle Scholar; Valeriano, Brandon, Jensen, Benjamin M., and Maness, Ryan C., Cyber Strategy: The Evolving Character of Power and Coercion (Oxford: Oxford University Press, 2018)CrossRefGoogle Scholar.

2 Valeriano, Jensen, and Maness, Cyber Strategy.

3 Libicki, Crisis and Escalation in Cyberspace.

4 Wilner, Alex, ‘Cyber deterrence and critical-infrastructure protection: Expectation, application, and limitation’, Comparative Strategy, 36:4 (2017), pp. 309–18CrossRefGoogle Scholar; Wilner, Alex S., ‘US cyber deterrence: Practice guiding theory’, Journal of Strategic Studies, 43:2 (2020), pp. 245–80CrossRefGoogle Scholar.

5 Gartzke, Erik, ‘The myth of cyberwar: Bringing war in cyberspace back down to earth’, International Security, 38:2 (2013), pp. 4173CrossRefGoogle Scholar.

6 This acknowledgement can be found in a range of works on cyber conflict processes (among others, Lindsay, Jon R., ‘Stuxnet and the limits of cyber warfare’, Security Studies, 22:3 (2013), pp. 365404CrossRefGoogle Scholar; Whyte, Christopher, ‘Ending cyber coercion: Computer network attack, exploitation and the case of North Korea’, Comparative Strategy, 35:2 (2016), pp. 93102CrossRefGoogle Scholar; Lindsay, Jon R., Gartzke, and Erik, ‘Coercion through cyberspace: The stability-instability paradox revisited’, in Greenhill, K. M. and Krause, P. J. P. (eds), The Power to Hurt: Coercion in Theory and in Practice (New York: Oxford University Press, 2016)Google Scholar; Whyte, Christopher, ‘Dissecting the digital world: A review of the construction and constitution of cyber conflict research’, International Studies Review, 20:3 (2018), pp. 520–32CrossRefGoogle Scholar; Poznansky, Michael and Perkoski, Evan, ‘Rethinking secrecy in cyberspace: The politics of voluntary attribution’, Journal of Global Security Studies, 3:4 (2018), pp. 402–16CrossRefGoogle Scholar. Though the study of Valeriano, Jensen, and Maness (Cyber Strategy) stands somewhat apart in that the authors inductively study the contours of escalation in response to cyber incidents and campaigns, their analysis nevertheless only tees up a logical question that has yet to be addressed by scholars: might minor cyber actions that enable other forms of conflict be as likely to provoke an escalatory response as major incidents? Might such minor actions produce disproportionate escalatory risks?

7 This term is often used interchangeably within discussions of cyber conflict alongside others such as active measures, hybrid warfare, irregular warfare, and information warfare. For work on hybrid or political warfare as it intersects with cyber operations in the recent Russian context, see, among others, Monaghan, Andrew, ‘The “war” in Russia's “hybrid warfare”’, Parameters, 45:4 (2016), pp. 6574Google Scholar; Lanoszka, Alexander, ‘Russian hybrid warfare and extended deterrence in eastern Europe’, International Affairs, 92:1 (2016), pp. 175–95CrossRefGoogle Scholar; Renz, Bettina, ‘Russia and “hybrid warfare”’, Contemporary Politics, 22:3 (2016), pp. 283300CrossRefGoogle Scholar; Christopher S. Chivvis, ‘Understanding Russian hybrid warfare’, Rand Corporation (2017); and Jensen, Benjamin, ‘The cyber character of political warfare’, The Brown Journal of World Affairs, 24 (2017), p. 159Google Scholar.

8 Lin, ‘Escalation dynamics and conflict termination in cyberspace’; Libicki, Crisis and Escalation in Cyberspace; Gompert, David C. and Libicki, Martin. ‘Waging cyber war the American way’, Survival, 57:4 (2015), pp. 728CrossRefGoogle Scholar; Deibert, ‘Bounding cyber power’; Kreps and Schneider, ‘Escalation firebreaks in the cyber, conventional, and nuclear domains’; Hansel, ‘Cyber-attacks and psychological IR perspectives’.

9 Valeriano, Jensen, and Maness, Cyber Strategy, p. 117.

10 Ibid., p. 49.

11 Geller, Daniel S., ‘Nuclear weapons, deterrence, and crisis escalation’, Journal of Conflict Resolution, 34:2 (1990), pp. 291310CrossRefGoogle Scholar; Carlson, Lisa J., ‘A theory of escalation and international conflict’, Journal of Conflict Resolution, 39:3 (1995), pp. 511–34CrossRefGoogle Scholar; Morgan, Forrest E., Mueller, Karl P., Medeiros, Evan S., Pollpeter, Kevin L., and Cliff, Roger, Dangerous Thresholds: Managing Escalation in the 21st Century (Santa Monica: RAND Corporation, 2008)Google Scholar; Libicki, Crisis and Escalation in Cyberspace.

12 Perhaps the best discussion of this is found in Schelling, Thomas C., ‘Arms and influence’, in Strategic Studies (New Haven, CT: Yale University Press, 2008), pp. 96114Google Scholar and in Kahn, Herman, On Escalation: Metaphors and Scenarios (Abingdon: Routledge, 2017)Google Scholar.

13 Neuman, Craig, Poznansky, and Michael, ‘Swaggering in cyberspace: Busting the conventional wisdom and cyber coercion’, War on the Rocks, 28 (2016)Google Scholar; Borghard and Lonergan, ‘The logic of coercion in cyberspace’; Valeriano, Jensen, and Maness, Cyber Strategy; Max Smeets and Herbert S. Lin, ‘Offensive Cyber Capabilities: To What Ends?’, 10th International Conference on Cyber Conflict (CyCon) (IEEE, 2018), pp. 55–72.

14 Libicki, Crisis and Escalation in Cyberspace, p. 75.

15 See, among others, Huth, Paul and Russett, Bruce, ‘Deterrence failure and crisis escalation’, International Studies Quarterly, 32:1 (1988), pp. 2945CrossRefGoogle Scholar; Geller, ‘Nuclear weapons, deterrence, and crisis escalation’; Fearon, James D., ‘Signaling versus the balance of power and interests: An empirical test of a crisis bargaining model’, Journal of Conflict Resolution, 38:2 (1994), pp. 236–69CrossRefGoogle Scholar; Kinsella, David and Russett, Bruce, ‘Conflict emergence and escalation in interactive international dyads’, The Journal of Politics, 64:4 (2002), pp. 1045–68CrossRefGoogle Scholar; Kahn, On Escalation.

16 Posen, Barry R., Inadvertent Escalation: Conventional War and Nuclear Risks (Ithaca: Cornell University Press, 2014)CrossRefGoogle Scholar.

17 See, for instance, de Sola Pool, Ithiel and Kessler, Allan, ‘The Kaiser, the Tsar, and the computer: Information processing in a crisis’, American Behavioral Scientist, 8:9 (1965), pp. 31–8CrossRefGoogle Scholar.

18 Jervis, Robert, Perception and Misperception in International Politics: New Edition (Princeton: Princeton University Press, 2017)Google Scholar.

19 Such as the literatures on the marketplace of ideas (Snyder, Jack and Ballentine, Karen, ‘Nationalism and the marketplace of ideas’, International Security, 21:2 (1996), pp. 540CrossRefGoogle Scholar; Kaufmann, Chaim, ‘Threat inflation and the failure of the marketplace of ideas: The selling of the Iraq War’, International Security, 29:1 (2004), pp. 548CrossRefGoogle Scholar; Thrall, Trevor A., ‘A bear in the woods? Threat framing and the marketplace of values’, Security Studies, 16:3 (2007), pp. 452–88CrossRefGoogle Scholar) and the democratic peace (Owen, John M., ‘How liberalism produces democratic peace’, International Security, 19:2 (1994), pp. 87125CrossRefGoogle Scholar; Layne, Christopher, ‘Kant or cant: The myth of the democratic peace’, International Security, 19:2 (1994), pp. 549CrossRefGoogle Scholar; Kinsella, David and Russett, Bruce, ‘Conflict emergence and escalation in interactive international dyads’, The Journal of Politics, 64:4 (2002), pp. 1045–68CrossRefGoogle Scholar.

20 See, for instance, Schultz, Kenneth A., ‘Looking for audience costs’, Journal of Conflict Resolution, 45:1 (2001), pp. 3260CrossRefGoogle Scholar; Slantchev, Branislav L., ‘Politicians, the media, and domestic audience costs’, International Studies Quarterly, 50:2 (2006), pp. 445–77CrossRefGoogle Scholar; Tomz, Michael, ‘Domestic audience costs in international relations: An experimental approach’, International Organization, 61:4 (2007), pp. 821–40CrossRefGoogle Scholar.

21 Valeriano, Jensen, and Maness, Cyber Strategy, as well as Buchanan, Ben, The Cybersecurity Dilemma: Hacking, Trust, and Fear between Nations (Oxford: Oxford University Press, 2016)Google Scholar; Whyte, ‘Ending cyber coercion’; Gartzke, Erik and Lindsay, Jon R., ‘Weaving tangled webs: Offense, defense, and deception in cyberspace’, Security Studies, 24:2 (2015), pp. 316–48CrossRefGoogle Scholar; Slayton, Rebecca, ‘What is the cyber offense-defense balance? Conceptions, causes, and assessment’, International Security, 41:3 (2017), pp. 72109CrossRefGoogle Scholar; Jensen, Benjamin, Valeriano, Brandon, and Maness, Ryan, ‘Fancy bears and digital trolls: Cyber strategy with a Russian twist’, Journal of Strategic Studies, 42:2 (2019), pp. 212–34CrossRefGoogle Scholar.

22 Kostyuk, Powell, and Skach, ‘Determinants of the cyber escalation ladder’.

23 Liff, Adam P., ‘Cyberwar: A new “absolute weapon”? The proliferation of cyberwarfare capabilities and interstate war’, Journal of Strategic Studies, 35:3 (2012), pp. 401–28CrossRefGoogle Scholar; Rid, Thomas and Buchanan, Ben, ‘Hacking democracy’, SAIS Review of International Affairs, 38:1 (2018), pp. 316CrossRefGoogle Scholar; Gartzke and Lindsay, ‘Weaving tangled webs’.

24 Borghard, Erica D. and Lonergan, Shawn W., ‘The logic of coercion in cyberspace’, Security Studies, 26:3 (2017), pp. 452–81CrossRefGoogle Scholar.

25 Buchanan, The Cybersecurity Dilemma.

26 Gompert and Libicki, ‘Cyber warfare and Sino-American crisis instability’.

27 Haggard, Stephen and Lindsay, Jon R., ‘North Korea and the Sony hack: Exporting instability through cyberspace’, AsiaPacific Issues, 117 (2015)Google Scholar; Whyte, ‘Dissecting the digital world’.

28 Henry Farrell and Bruce Schneier, ‘Common-Knowledge Attacks on Democracy’, Berkman Klein Center Research Publication 2018–7 (2018); Breitenbauch, Henrik and Byrjalsen, Niels, ‘Subversion, statecraft and liberal democracy’, Survival, 61:4 (2019), pp. 3141CrossRefGoogle Scholar; Zilincik, Samuel, Myklin, Michael, and Kovanda, Petr, ‘Cyber power and control: A perspective from strategic theory’, Journal of Cyber Policy, 4:2 (2019), pp. 290301CrossRefGoogle Scholar.

29 See Pierce, Joseph and Williams, Olivia R., ‘Against power? Distinguishing between acquisitive resistance and subversion’, Geografiska Annaler: Series B, Human Geography, 98:3 (2016), pp. 171–88Google Scholar. Subversion is a concept that has received some significant focus in the past two years by scholars seeking to better understand how both state and non-state actors have employed cyber instruments in their efforts to spread or gain influence. Subversion differs from coercion insofar as it is a strategy that does not aim to degrade power in direct relational power terms, but rather by the challenging and derailing of authority. Subversion involves disruption of process and the normative degradation of symbols of the status quo so as to disempower a foe and create opportunities for more conventional forms of contestation. For more work on subversion, see Kahin, Audrey and Kahin, George McTurnan, Subversion as Foreign Policy: The Secret Eisenhower and Dulles Debacle in Indonesia (Seattle: University of Washington Press, 1997)Google Scholar; Beilenson, Laurence W., Power through Subversion (Washington, DC: Public Affairs Press, 1972)Google Scholar; Rosenau, William, Subversion and Insurgency, Vol. II (Santa Monica: RAND Corporation, 2007)Google Scholar; Christopher Whyte, ‘Out of the Shadows: Subversion and Counterculture in the Digital Age’ (PhD dissertation, George Mason University, Fairfax, VA, 2017); Breitenbauch and Byrjalsen, ‘Subversion, statecraft and liberal democracy’; and Zilincik, Myklin, and Kovanda, ‘Cyber power and control’.

30 This is a common assertion of policy theory on democratic process, particularly focused on the marketplace of ideas. See, among others, Kaufmann, ‘Threat inflation and the failure of the marketplace of ideas’ and Thrall, ‘A bear in the woods?’. For a recent assessment of democratic vulnerability to ‘hacking’ that makes the same overarching assertion, see Farrell and Schneier, ‘Common-knowledge attacks on democracy’.

31 McCombs, Maxwell E. and Shaw, Donald L., ‘The evolution of agenda-setting research: Twenty-five years in the marketplace of ideas’, Journal of Communication, 43:2 (1993), pp. 5867CrossRefGoogle Scholar.

32 See also Owen, John M., ‘How liberalism produces democratic peace’, International Security, 19:2 (1994), pp. 87125CrossRefGoogle Scholar; Layne, ‘Kant or cant’; Snyder and Ballentine, ‘Nationalism and the marketplace of ideas’; Krebs, Ronald R. and Kaufmann, Chaim, ‘Selling the market short? The marketplace of ideas and the Iraq war’, International Security, 29:4 (2005), pp. 196207Google Scholar; and Dunne, Tim, ‘Liberalism, international terrorism, and democratic wars’, International Relations, 23:1 (2009), pp. 107–14CrossRefGoogle Scholar.

33 Gannon, Andres, Gartzke, Erik, and Lindsay, Jon, Working Paper (San Diego: University of California, 2018)Google Scholar.

34 Gomez, Miguel Alberto N., ‘Sound the alarm! Updating beliefs and degradative cyber operations’, European Journal of International Security, 4:2 (2019), pp. 190208CrossRefGoogle Scholar.

35 It is important to recognise here that political warfare is a term often used interchangeably and with some degree of conceptual confusion along with terms like active measures, hybrid warfare, irregular warfare, and information warfare. Political warfare is seminally described as efforts that ‘range from such covert actions as political alliances, economic measures, and white propaganda to such covert operations as clandestine support to friendly foreign elements, black psychological warfare and even encouragement of underground resistance in hostile states'; see Policy Planning Staff Memorandum, available at: {https://history.state.gov/historicaldocuments/frus1945-50Intel/d269}. For George Kennan, political warfare simply represented states’ attempts to politick in conflictual fashion outside times of declared hostilities. Given the maintaining peace in such times is paramount, this means using all available mechanisms of approach beyond (though sometimes involving) military ones and avoiding actions that might be seen as provocative. For work on political warfare prosecuted by the Russian Federation, as is the main focus of this section, see, among others, Monaghan, ‘The “war” in Russia's “hybrid warfare”’; Lanoszka, ‘Russian hybrid warfare and extended deterrence in eastern Europe’; Renz, ‘Russia and “hybrid warfare”’; and Chivvis, ‘Understanding Russian hybrid warfare’.

36 For one of the most up to date summaries of the episode to date, see Scott Shane and Mark Mazetti, ‘The plot to subvert an election: Unraveling the Russia story so far’, New York Times (2018).

37 Valeriano, Jensen, and Maness, Cyber Strategy; M. Mazzetti and K. Benner, ‘12 Russian agents indicted in Mueller investigation’, The New York Times (13 July 2018), available at: {https://www.nytimes.com/2018/07/13/us/politics/mueller-indictment-russian-intelligence-hacking.html}.

38 Thomas Rid, ‘Disinformation: A primer in Russian active measures and influence campaigns’, Hearings before the Select Committee on Intelligence, United States Senate, One Hundred Fifteenth Congress, 30 (2017).

39 Eric Lipton, David E. Sanger, and Scott Shane, ‘The perfect weapon: How Russian cyberpower invaded the US’, The New York Times (2016).

40 David E. Sanger and Rick Corasaniti, ‘DNC says Russian hackers penetrated its files, including dossier on Donald Trump’, The New York Times (2016).

41 Johan Farkas and Marco Bastos, ‘IRA Propaganda on Twitter: Stoking Antagonism and Tweeting Local News’, Proceedings of the 9th International Conference on Social Media and Society (2018), pp. 281–5; Brandon C. Boatwright, Darren L. Linvill, and Patrick L. Warren, ‘Troll Factories: The Internet Research Agency and State-Sponsored Agenda Building’, Resource Centre on Media Freedom in Europe (2018).

42 Farkas and Bastos, ‘IRA Propaganda on Twitter’; Farwell, James P., ‘Countering Russian meddling in US political processes’, Parameters, 48:1 (2018), pp. 3747Google Scholar. Also see Whyte, Christopher, ‘Of commissars, cults and conspiratorial communities: The role of countercultural spaces in “democracy hacking” campaigns’, First Monday, 25:4 (2020)Google Scholar.

43 Raphael Satter, Jeff Donn, and Chad Day, ‘Inside story: How Russians hacked the Democrats’ emails’, APNews. com (2017).

44 Linvill, Darren L. and Warren, Patrick L., ‘Troll factories: Manufacturing specialized disinformation on Twitter’, Political Communication (2020), pp. 121CrossRefGoogle Scholar.

45 Dan Keating, Kevin Schaul, and Leslie Shapiro, ‘The Facebook ads Russians targeted at different groups’, Washington Post (2017).

46 Sarah Posner, ‘What Facebook can tell us about Russian sabotage of our election’ (2017), available at: {https://www.washingtonpost.com/blogs/plum-line/wp/2017/09/27/what-facebook-can-tell-us-about-russian-sabotage-of-our-election/}.

47 Valeriano, Benjamin M. Jensen, and Ryan C. Maness, Cyber Strategy.

48 Karoun Demirjian, ‘Republican lawmakers move to restrain President-Elect Trump on Russia’, The Washington Post (16 November 2016).

49 Katina, Michael, ‘Bots trending now: Disinformation and calculated manipulation of the masses’, IEEE Technology and Society Magazine, 36:2 (2017), pp. 611Google Scholar; Keller, Tobias R. and Klinger, Ulrike, ‘Social bots in election campaigns: Theoretical, empirical, and methodological implications’, Political Communication, 36:1 (2019), pp. 171–89CrossRefGoogle Scholar.

50 Satter, Donn, and Day, ‘Inside story’.

51 Heikkilä, Niko, ‘Online antagonism of the alt-right in the 2016 election’, European Journal of American Studies, 12:12–2 (2017)CrossRefGoogle Scholar.

52 Jamieson, Kathleen Hall, Cyberwar: How Russian Hackers and Trolls Helped Elect a President: What We Don't, Can't, and Do Know (Oxford: Oxford University Press, 2018)Google Scholar.

53 See, for instance Sanger and Corasaniti, ‘DNC Says Russian Hackers Penetrated Its Files’, with the description of the Obama administration's paralysis given uncertain circumstances determined by both unprecedented assault and the context of domestic political processes unfolding.

54 Ibid.

55 For instance, Nakasone, Paul M. and Lewis, Charlie, ‘Cyberspace in multi-domain battle’, The Cyber Defense Review, 2:1 (2017), pp. 1526Google Scholar; Gartzke, Erik and Lindsay, Jon R. (eds), Cross-domain Deterrence: Strategy in an Era of Complexity (Oxford: Oxford University Press, 2019)CrossRefGoogle Scholar; Schneider, Jacquelyn, ‘Cyber and Cross Domain Deterrence: Deterring Within and From Cyberspace’ (Naval War College, 2019)Google Scholar.

56 Chart inspired by that found in Mallory, King, New Challenges in Cross-Domain Deterrence (Santa Monica: RAND Corporation, 2018)CrossRefGoogle Scholar.

57 Nina Kollars and Jacquelyn Schneider, ‘Defending forward: The 2018 cyber strategy is here’, War on the Rocks (20 September 2018), available at: {https://warontherocks.com/2018/09/defending-forward-the-2018-cyber-strategy-is-here/}; Jeff Kosseff, ‘The Contours of “Defend Forward” under International Law’, 11th International Conference on Cyber Conflict (CyCon) (IEEE, 2019), pp. 1–13.