Query Result Set
Skip Navigation Links
   ActiveUsers:552Hits:20437753Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
JOURNAL OF STRATEGIC STUDIES VOL: 46 NO 3 (7) answer(s).
 
SrlItem
1
ID:   190773


Deterrence by denial in cyberspace / Borghard, Erica D; Lonergan, Shawn W   Journal Article
Borghard, Erica D Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Many scholars and practitioners are unconvinced that cyber deterrence is possible. This article aims to demonstrate why some of this skepticism is misplaced, as well as provide greater clarity and conceptual rigor to the proliferation of arguments within the United States about deterrence in cyberspace. Specifically, we argue that cyber deterrence frameworks that draw from the traditional nuclear deterrence literature and the logic of deterrence by punishment are mismatched to deterrence challenges in cyberspace. Instead, we advocate for a deterrence by denial approach, but one that is oriented around counter-cyber operations rather than simply improving defenses. While there has been some scholarship and work by practitioners that implicitly rests on a deterrence by denial logic, they suffer from a lack of systematic assessment of how traditional denial concepts, especially those developed in the conventional deterrence literature, could be extended to cyberspace. Therefore, in this article, we review different deterrence concepts in theory and practice, articulate a logic of cyber deterrence by denial, and provide policy recommendations for the United States.
        Export Export
2
ID:   190776


Helping or hurting? the impact of foreign fighters on militant group behavior / Bacon, Tricia; Ellis, Grace ; Milton, Daniel   Journal Article
Milton, Daniel Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract How do foreign fighters affect militant group behavior? Recent studies have examined the impact of foreign fighters on broader conflict outcomes, but we explore their specific impact on group behavior. Using foreign fighter data, we find that the presence of foreign fighters is positively related to group longevity, use of suicide operations, and the geographic spread of its operations. We elaborate on these findings in a case study of foreign fighters in al-Shabaab. This article provides important contributions to both scholarship and policy, elucidating the ideological and logistical impact of foreign fighters on tactics, target choices, and group lifespan.
Key Words Terrorism  Insurgency  Foreign fighters  Militants Groups 
        Export Export
3
ID:   190775


In the blind spot: influence operations and sub-threshold situational awareness in Norway / Notaker, Hallvard   Journal Article
Notaker, Hallvard Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Situational awareness in the face of hybrid campaigns is undermined by ‘blind spots’, which this article conceptualises. Blind spots are where legal or political frameworks preclude intelligence gathering below the threshold of war. Drawing on a historical case study of alterations in legislation and security police directives in Norway from 1950–2021, the analysis shows how an influence operation’s blind spot varied along with shifts in the balance between national security concerns and democratic individual rights. Recent initiatives to criminalise domestic collaboration with foreign influence operators are discussed, and the advent of AI and microtargeting presented as a challenge out of reach of such legislation.
        Export Export
4
ID:   190778


Iranian proxies in the Syrian conflict: Tehran’s ‘forward-defence’ in action / Akbarzadeh, Shahram; Gourlay, William ; Ehteshami, Anoushiravan   Journal Article
Ehteshami, Anoushiravan Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article examines Iran’s ‘forward-defence’ strategy, in particular its deployment of proxy forces in the Syrian conflict. Iran’s expanded presence in regional conflicts is regarded by its adversaries as indication of hegemonic intent, while Tehran posits its regional posture as a defensive response to security threats. We argue that Iran’s ‘forward-defence’ strategy offers practical benefits, shaping strategic realities, and performative benefits, allowing Tehran to propagate a discourse of military fortitude. On balance, however, the strategy has fed suspicions of Iran’s intentions and increased hostility towards the Iranian leadership, thus is likely to be counterproductive.
Key Words Iran  Syria  Security Dilemmas  Forward - Defence  Proxy Forces 
        Export Export
5
ID:   190774


New and better quiet option? strategies of subversion and cyber conflict / Maschmeyer, Lennart   Journal Article
Maschmeyer, Lennart Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Theorizing on cyber conflict has moved from warfare to conflict short of war, but strategic thought has not kept pace. This article argues cyber conflict is subversive, builds on intelligence scholarship to identify strategies of subversion, and examines their applicability in cyber conflict. It distinguishes three subversive strategies: manipulation, erosion and overthrow. The analysis shows cyber operations can only implement one of these strategies (erosion), indicating they offer less strategic value than traditional counterparts. Accordingly, although cyber operations offer superior scale, I argue their scope of influence is more limited. Finally, the article discusses strategic implications and identifies possible counterstrategies.
Key Words Subversion  Cyber Conflict  Cybersecurity  Covert Operations  Strategy 
        Export Export
6
ID:   190772


Publicly attributing cyber attacks: a framework / Egloff, Florian J; Smeets, Max   Journal Article
Smeets, Max Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract When should states publicly attribute cyber intrusions? Whilst this is a question governments increasingly grapple with, academia has hardly helped in providing answers. This article describes the stages of public attribution and provides a Public Attribution Framework designed to explain, guide, and improve decision making of public attribution by states. Our general argument is that public attribution is a highly complex process which requires trade-offs of multiple considerations. Effective public attribution not only necessitates a clear understanding of the attributed cyber operation and the cyber threat actor, but also the broader geopolitical environment, allied positions and activities, and the legal context. This also implies that more public attribution is not always better. Public attribution carries significant risks, which are often badly understood. We propose the decision maker’s attitude towards public attribution should be one of ‘strategic, coordinated pragmatism’. Public attribution – as part of a strategy – can only be successful if there is a consistent goal, whilst the avenues for potential negative counter effects are assessed on a case-by-case basis.
        Export Export
7
ID:   190777


Why jihadist foreign fighter leave local battlefields: evidence from Chechnya / Souleimanov, Emil A   Journal Article
Souleimanov, Emil A Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Why do jihadi foreign fighters leave local insurgencies? While the literature on jihadi foreign fighters has mushroomed over the last decade, it has largely covered the perspective of individual motivations to join jihadi foreign fighter groups. The critical question of why individual jihadi foreign fighters leave local insurgencies, de facto recognizing the failure of their initial motives to join a distant armed conflict, has remained understudied. Drawing on the case study of Russo-Chechen wars, this article shows that a combination of popular hostility, loss of status, and poor living conditions urged jihadi foreign fighters to abandon local armed conflict.
        Export Export