Abstract
In the digital age, contemporary international security has dramatically changed and continues to rapidly evolve. These new security dynamics after the Cold War have caused a marked change in global power structures. Modern information and communication technologies have emboldened non-state actors (corporations, groups and individuals) with the ability to project strategic global power like never before. The power shifts have caused certain states to vow to assert physical force in response to the perceived threat. The polarising nature of this potential solution has stimulated international debate. Therefore, this article proposes a possible solution that should be further developed. The main argument is that to reduce the threat from cyberspace, states could apply swarming-based cyber defence built under the framework of collective security. Modelled on the United States’ current cyber security strategy and the North Atlantic Treaty Organization’s concrete efforts to strengthen collective responses, the article describes the challenges provided in the digital age and justifies the importance of adopting relevant approaches. Finally, the article explores how swarming-based cyber defence could serve as a viable solution under the existing concept of collective security in the international arena.
Similar content being viewed by others
References
Addicott, F.J. (2010) Cyberterrorism: Legal policy issues. In: J.N. Moore and R.F. Turner (eds.) Legal Issues in the Struggle against Terrorism. Durham, NC: Carolina Academic Press.
Albrow, M. and King, E. (1990) Globalization, Knowledge and Society: Readings from International Sociology. London: Sage Publications.
Alexander, K. (2010) Advance questions for Lieutenant General Keith Alexander, USA. Nominee For Commander, United States Cyber Command. 15 April, http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-035.pdf, accessed 11 November 2015.
Alperovitch, D. (2011) Towards establishment of cyberspace deterrence strategy. In: C. Czosseck, E. Tyugu, T. Wingfield (eds.) 3rd International Conference on Cyber Conflict, Tallinn, Estonia: NATO CCD COE Publications.
Alperovitch, D. (2015) Cyber deterrence in action? A story of one long HURRICANE PANDA campaign, 13 April, http://blog.crowdstrike.com/cyber-deterrence-in-action-a-story-of-one-long-hurricane-panda-campaign/, accessed 11 November 2015.
Andress, J. and Winterfeld, S. (2014) Cyberwarfare, Techniques, Tactics and Tools for Security Practitioners. 2nd edn. Waltham, MA: Elsevier.
Annan, K. (2004) A More Secure World: Our Shared Responsibility Report of the Secretary-General’s High-level Panel on Threats, Challenges and Change. New York: The United Nations.
Arquilla, J. and Ronfeldt, D. (2000) Swarming and the Future of Conflict. Santa Monica: RAND.
Ashford, W. (2015) Cyber-attacks top US national threat list, 27 February, http://www.computerweekly.com/news/2240241391/Cyber-attacks-top-US-national-threat-list, accessed 15 March 2016.
Asmus, R., Czmur, S., Donnelly, C., Ronis, A., Valasek, T. and Wittmann, K. (2010) NATO, new allies and reassurance. Center for European Reform, May, http://www.nato.int/strategic-concept/pdf/CER%20Reassurance%20(May%202010).pdf, accessed 11 November 2015.
BBC. (2014) Rwanda genocide: UN Ashamed, Says Ban Ki-moon. BBC News 7 April, http://www.bbc.com/news/world-africa-26917419, accessed 1 November 2015.
BBC. (2015) North Korea: ‘No apology’ for S Korea Cheonan sinking. BBC News March 24, http://www.bbc.com/news/world-asia-32013750, accessed 1 November 2015.
Bernard, B. (1959) ‘The Anatomy of Deterrence’ as found in Strategy in the Missile Age. Princeton, NJ: Princeton University Press.
Brenner, J. (2011) The calm before the storm. Foreign Policy, 6 September, http://foreignpolicy.com/2011/09/06/the-calm-before-the-storm-2/, accessed 1 November 2015.
Chipman, J. (2010) Press Statement by John Chipman, Director-General & Chief Executive of International Institute for Strategic Studies. Military Balance 2010, http://www.iiss.org/publications/military-balance/the-military-balance-2010/military-balance-2010-press-statement/, accessed 15 March 2015.
Coleman, K. (2007) International Organizations and Peace Enforcement: The Politics of International Legitimacy. New York: Cambridge University Press.
Cushing, T. (2015) UN Broadband Commission Releases Questionable Report On ‘Cyber Violence’ against Women. Techdirt, 29 September, https://www.techdirt.com/articles/20150927/13460532378/un-broadband-commission-releases-questionable-report-cyber-violence-against-women.shtml, accessed 10 October 2015.
Davis, P. (2014) Deterrence, influence, cyber-attack and cyberwar. RAND, June, https://www.rand.org/content/dam/rand/pubs/working_papers/WR1000/WR1049/RAND_WR1049.pdf, accessed 1 November 2015.
Department of Defense. (1991) Dictionary of Military and Associated Terms. Joint Publications, I-02, Washington DC USGPO, 1 December.
Dinstein, Y. (2002) Computer network attacks and self-defense. In: M.N. Schmitt and B.T. O’Donnell (eds.) Computer Network Attack and International Law. Newport: The U.S. Naval War College, p. 99.
Dunlap, C. (2011) Perspectives for cyber strategists on law for cyberwar. Strategic Study Quarterly 5(1): 81–99.
Edwards, S.J.A. (2000) Swarming on the Battlefield: Past, Present, and Future. Rand Monograph MR-1100. Santa Monica, CA: RAND Corporation.
Edwards, S.J.A. (2004) Swarming and the future of war. PhD thesis, RAND Graduate School, September.
Eneken, T.R. (2011) Comprehensive Legal Approach to Cyber Security. Estonia: Tartu University Press.
Etzioni, A. (2014) The private sector: A Reluctant Partner in Cybersecurity. Institute for Communitarian Policy Studies, Georgetown University, 19 December, https://icps.gwu.edu/private-sector-reluctant-partner-cybersecurity, accessed 29 October 2015.
ENISA. (2012) Baseline Capabilities of National/Governmental CERTs, European Network and Information Security Agency (ENISA), https://www.enisa.europa.eu/activities/cert/support/files/status-report-2012, accessed 1 November 2015.
Fink, G. and Oehmen, C. (2012) Final report for bio-inspired approaches to moving-target defense Strategies. The US Department of Energy, http://www.pnl.gov/main/publications/external/technical_reports/PNNL-21854.pdf, accessed 8 November 2015.
France 24. (2014) French businessman defends plans to build crimea Theme Park. 16 August, http://www.france24.com/en/20140816-french-businessman-villiers-theme-park-crimea-sanctions/, accessed 8 November 2015.
Haack, N.J., Fink, A.G., Maiden, M.W., McKinnon, A.D., Fulp, W.E. and Templeton, J.S. (2011) Ant Based Cyber Security. Eighth International Conference on Information Technology: New Generations (ITNG), Las Vegas.
Haroon, M. (2011) Lessons from Anonymous on Cyberwar. Al Jazeera, 10 March, http://www.aljazeera.com/indepth/opinion/2011/03/20113981026464808.html, accessed 1 November 2015.
Hinkle, C.K. (2011) Countermeasures in the cyber context: One more thing to worry about. Yale Journal of International Law 37(Fall): 11–21.
Hjortdal, M. (2011) China’s use of cyber warfare: Espionage meets strategic deterrence. Journal of Strategic Studies 4(2): 1–24.
Hogarth, F. (1987) Dynamic density: A deterrent for the OMG. RUSI Journal 132(2): 29–34.
Huth, P.K. (1999) Deterrence and international conflict: Empirical findings and theoretical debate. Annual Review of Political Science 2: 25–48.
ISACA. (2013) Advanced persistent threats awareness, February, http://www.isaca.org/knowledge-center/research/researchdeliverables/pages/advanced-persistent-threats-awareness-study-results.aspx, accessed 25 October 2015.
ISACA. (2014) Annual report. ISACA and IT Governance Institute, http://www.isaca.org/About-ISACA/annual-report/Documents/2014-isaca-annual-report_pre_Eng_0415.pdf, accessed 23 October 2015.
Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C. and Wang, X.S. (eds.) (2011) Moving Target Defense. Springer, p 184.
Jordan, T.K. (2014a) Reexamining Article 5: NATO’s Collective Defense in Times of Cyber Threats. The Huffington Post, 13 June, http://www.huffingtonpost.com/klara-tothova-jordan/reexamining-article-5-nat_b_5491577.html?utm_hp_ref=tw, accessed 24 October 2015.
Jordan, T.K. (2014b) Would NATO go to war over cyber attack? The National Interest, 4 September, http://nationalinterest.org/feature/would-nato-go-war-over-cyberattack-11199, accessed 1 November 2015.
Kesan, P.J. and Hayes, M.C. (2012) Mitigative counterstriking: Self-defense and deterrence in cyberspace. Harvard Journals of Law and Technology 25(2): 474–529.
Keymer, R. (2015) Are politically motivated cyber-attacks becoming a reality? IT News Africa February 24, http://www.itnewsafrica.com/2015/02/are-politically-motivated-cyber-attacks-becoming-a-reality/, accessed 20 October 2015.
Kissinger, H. (2014) The World Order. New York: Penguin Press.
Kufcak, J. (2014) NATO after the Wales Summit readying the alliance for the future. Association for International Affairs, October. Policy Paper 3/2014, Prague, Czech Republic.
Lawson, S. (2012) Putting the war into a cyber ‘war’: Metaphor, analogy, and cybersecurity discourse in the United States. First Monday 17(7).
Libitcki, M. (2015) Would deterrence in cyberspace work even with attribution. Georgetown Journal of International Affairs, 22 April, http://journal.georgetown.edu/would-deterrence-in-cyberspace-work-even-with-attribution/, accessed 1 November 2015.
Limnell, J. (2014) Deterrence in cyberspace helps prevent cyberwar. McAfee Labs Blog, 13 June, https://blogs.mcafee.com/mcafee-labs/deterrence-cyberspace-helps-prevent-cyberwar/, accessed 1 November 2015.
Man, M. (1997) Has Globalisation ended the rise and rise of the Nation state? Review of the International Political Economy 4(3): 472–496.
Mullen, M. (2008) From the chairman: It’s time for a new deterrence model. Joint Force Quarterly 51: 2–3.
Munoz, C. (2014) US, NATO exploring collective cyber defense. USNI News 17 June, http://news.usni.org/2014/06/17/u-s-nato-exploring-collective-cyber-defense, accessed 24 October 2015.
Nakashima, E. (2011) U.S. cyber approach ‘too predictable’ for one top general. The Washington Post 14 July, https://www.washingtonpost.com/national/national-security/us-cyber-approach-too-predictable-for-one-top-general/2011/07/14/gIQAYJC6EI_story.html, accessed 1 November 2015.
NATO. (2008) Policy on Cyber Defence NATO. NATO Bucharest Summit Declaration, April, http://www.nato.int/cps/en/natolive/official_texts_8443.htm, accessed 1 November 2015.
NATO. (2014) Defending Allies, sharing responsibility, upholding values. Speech by NATO Secretary General Anders Fogh Rasmussen at the Tallinn University. Estonia, 9 May, http://www.nato.int/cps/en/natohq/opinions_109757.htm?selectedLocale=en, accessed 25 October 2015.
NATO. (2015) NATO Transformation Seminar – Keynote Speech. NATO25 March, http://www.nato.int/cps/en/natohq/opinions_118435.htm, accessed 1 November 2015.
Nazario, J. (2009) Politically motivated denial of service attacks. In: C. Csozeek and K. Geers (eds.) The Virtual battlefield: Perspectives on Cyber Warfare. Amsterdam, The Netherlands: NATO, IOS Press release, pp. 163–182.
Norton, M.S. (2011) The United Nations charter’s collective security framework in the twenty-first century: A case study of the united states’ use of force in Pakistan. Loyola Law Review 57(1): 157–206.
O’Connell, E.M. (2012) Cyber Security and International Law. International Law Meeting Summary, Chatham House 29 May, https://www.chathamhouse.org/sites/files/chathamhouse/public/Research/International%20Law/290512summary.pdf, accessed 1 November 2015.
Pawlak, P. (2013) Cyber world: Site under construction. The European Union Institute for Security Studies, Brief 32, September, http://www.iss.europa.eu/uploads/media/Brief_32.pdf, accessed 1 November 2015.
Pitcairn, D. (2013) A missed chance for NATO’s cybersecurity future, Defence One, 23 October, http://www.defenseone.com/ideas/2013/10/missed-chance-natos-cybersecurity-future/72542/, accesse 25 October 2015.
Poarch, D., O’Leary, D. and Grahn, A. (2014) Combating advanced persistent threats. Focus, 11 September, http://focus.forsythe.com/articles/268/Combating-Advanced-Persistent-Threats, accessed 29 October 2015.
Radcliff, D. (2000) Should you hack back? Computerworld, 13 November, http://archives.cnn.com/2000/TECH/computing/06/01/hack.back.idg, accessed 1 November 2015.
Rid, T. (2012) Cyber war will not take place. Journal of Strategic Studies 35(1).
Sanger, D. (2013) U.S. Blames China’s military directly for cyberattacks. The New York Times 6 May, http://www.nytimes.com/2013/05/07/world/asia/us-accuses-chinas-military-in-cyberattacks.html?pagewanted=1, accessed 24 October 2015.
Schmitt, M. (1999) Computer network attack and the use of force in international law. The Columbia Journal of Transnational Law 37: 885–937.
Singer, W.P. (2011) Deterrence in cyberspace: Debating the right strategy with Ralph Langner and Dmitri Alperovitch, 20 September, http://www.brookings.edu/~/media/events/2011/9/20%20cyberspace%20deterrence/20110920_cyber_defense.pdf, accessed 1 November 2015.
Singer, W.P. and Friedman, A. (2014) Cyber Security and Cyber War: What Everyone Needs to Know. New York: Oxford University Press.
Sklerov, J.M. (2009) Solving the dilemma of state responses to cyberattacks: A justification for the use of active defenses against states who neglect their duty to prevent. Military Law Review 79.
Sterner, E. (2011) Retaliatory deterrence in cyberspace. Strategic Studies Quarterly. Quarterly Spring 5(1): 62–80.
Stewart, B. (2012) The Hackback Debate, Steptoe Cyberblog, 2 November, http://www.steptoecyberblog.com/2012/11/02/the-hackback-debate/, accessed 1 November 2015.
Stone, J. (2013) Cyber war will take place!. Journal of Strategic Studies 36(1): 101–108.
Symantec. (2011) Advanced persistent threats: A Symantec perspective. http://www.symantec.com/content/en/us/enterprise/white_papers/b-advanced_persistent_threats_WP_21215957.en-us.pdf, accessed 28 October, 2015.
Thaler, E.D. (1993) Strategies to tasks, a framework for linking means and ends. Project Air Force: RAND, https://www.rand.org/content/dam/rand/pubs/monograph_reports/2006/MR300.pdf, accessed 1 November 2015.
The Nuclear Threat Initiative. (2013) Hagel: NATO Must Do More to ‘Deal with’ Cyber Attacks, 24 October, http://www.nti.org/gsn/article/hagel-nato-must-do-more-deal-cyber-attacks/, accessed 15 March 2016.
The US Department of Defence. (2006) Deterrence Operations, Joint Operating Concept, Version 2.0. December, http://www.dtic.mil/doctrine/concepts/joint_concepts/joc_deterrence.pdf, accessed 2 November 2015.
The US Department of Defence. (2011) Strategy for operating in cyberspace. DoD, July, http://csrc.nist.gov/groups/SMA/ispab/documents/DOD-Strategy-for-Operating-in-Cyberspace.pdf, accessed 1 November 2015.
The US Joint Publication 3-12R. (2013) Cyberspace operations. The United States Department of Defence, 5 February, http://www.dtic.mil/doctrine/new_pubs/jp3_12R.pdf, accessed 1 November 2015.
The US National Security Strategy. (2010) The White House Washington DC, May, https://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf, accessed 1 November 2015.
The US White House. (2011) Strategy to combat transnational organized crime. National Security Council, 25 July, https://www.whitehouse.gov/administration/eop/nsc/transnational-crime, accessed 1 November 2015.
U.N. Doc A/65/201. (2010) Report of the group of governmental experts on development in the field of information & telecommunications in the context of international security. 65th Session, The United Nations, http://www.un.org/disarmament/HomePage/ODAPublications/DisarmamentStudySeries/PDF/DSS_33.pdf, accessed 15 March 2016.
Ungerere, C. (2014) Mutual deterrence strategy a reality in cyberspace cold war. The Australian, 22 February, http://www.theaustralian.com.au/national-affairs/opinion/mutual-deterrence-strategy-a-reality-in-cyberspace-cold-war/story-e6frgd0x-1226834121202, accessed 1 November 2015.
Vale, P. (2014) EU sanctions against Russian Elites could pose existential threat to Putin regime. The Huffington Post, 23 July, http://www.huffingtonpost.co.uk/2014/07/23/international-sanctions-against-russian-elites-could-pose-existential-threat-to-putin-regime_n_5612927.html, accessed 1 November 2015.
Valeriano, B. and Maness, R. (2012) The fog of cyberwar. Why the threat doesn’t live up to the hype. Foreign Affairs, November, https://www.foreignaffairs.com/articles/2012-11-21/fog-cyberwar, accessed 15 March 2016.
Wall, D. (2013) Policing identity crimes. Policing and Society: An International Journal of Research and Policy. Special Issue 23(4): 437–460.
Walters, S. (2013) Hammond’s £500m new cyber army, MailOnline, 28 September, http://www.dailymail.co.uk/news/article-2436946/Hammonds-500m-new-cyber-army-As-reveals-secret-Whitehall-bunker-time-Defence-Secretary-says-future-wars-fought-viruses.html, accessed 1 November 2015.
White, K. (2015) A few comments on the UN broadband commission’s ‘cyber violence against women and girls’ report. Popehat, 24 September, https://popehat.com/2015/09/24/a-few-comments-on-the-un-broadband-commissions-cyber-violence-against-women-and-girls-report/, accessed 10 October 2015.
Yujuan, H., Wenlian, L. and Shouhuai, X. (2014) Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics. New York: Cornell University Library.
Zagare, F.C. (2004) Reconciling rationality with deterrence: A re-examination of the logical foundations of deterrence theory. Journal of Theoretical Politics 16(2): 107–141.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Hadji-Janev, M., Bogdanoski, M. Swarming-based cyber defence under the framework of collective security. Secur J 30, 39–59 (2017). https://doi.org/10.1057/sj.2016.7
Published:
Issue Date:
DOI: https://doi.org/10.1057/sj.2016.7