Cyber Operations Do not Risk Inadvertent Escalation Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Mar 13th, 2024

Escalation, as generally defined, refers to a significant change in the character or severity of a dispute. It happens when at least one side in a disagreement passes what that party views as a crucial barrier (Borghard & Lonergan, 2019). Consequently, a state can choose between deterrence and compellence strategies. Knope (2009) claims that deterrence is a preventative influence that primarily relies on negative incentives. When employed as a deliberate technique, deterrence seeks to prevent an action that another party could do. This approach contrasts deterrence with the alternative coercive technique of compellence, which seeks to force the target to conduct a new activity or halt or reverse an existing activity (Knope, 2009). Schelling (2009) suggests that it is always up to the governments involved whether or not to retaliate in kind; there are dangers of further escalation and military efficacy to consider. Moreover, there is no suggestion that a corresponding response cancels the first act, tactically or quantitatively.

We will write a custom essay on your topic a custom Essay on Cyber Operations Do not Risk Inadvertent Escalation
808 writers online

The crucial question is whether the cyber operations may risk inadvertent escalation. Borghard and Lonergan (2019) emphasize that escalation might proceed via comparable channels in cyberspace. Notably, cyber literature is primarily concerned with situations in which one state’s deployment of aggressive cyber capabilities may unwittingly start an escalation with a competitor in another state (Borghard & Lonergan, 2019). This scenario may potentially happen if the target replies with more severe and costly cyber methods, cyber escalation within the cyber domain, or cyber-kinetic threshold breaching — in other words, cross-domain escalation. Borghard and Lonergan (2019) state that the offensive cyber operations’ deployment will not result in escalatory responses, both inside cyberspace and across other domains. Cyber operations have neither proven escalatory nor particularly efficient in attaining decisive results to the present (Valeriano & Jenson, 2019). Therefore, cyber operations and capabilities do not risk inadvertent escalation.

Although cyberspace may pose serious escalation threats, cyber escalation has not yet happened. According to Borghard and Lonergan (2019), cyber escalation has not materialized since cyber operations are ineffective escalation instruments. Borghard and Lonergan (2019) provide four essential features of offensive cyber operations that constrain escalation. Firstly, aggressive retaliatory cyber operations may not exist within the specified employment duration. Secondly, their effects are often unexpected and limited even when they do emerge. Furthermore, several aspects of offensive cyber operations are significant determinants for decision-makers. Finally, due to the limited cost-generation capability of offensive cyber activities, cross-domain escalation is unlikely to be used unless in extreme circumstances.

To conclude, just as offensive cyber activities’ limited capacity to create real and persistent consequences against a target decreases their appeal as weapons of escalation, so does the possibility of cross-domain escalatory reactions to a cyber event. Borghard and Lonergan (2019) mention that cyber operations, such as cyberattacks on power grids, can exert a substantial economic influence and, in some cases, second-order effects on human life. They have not, meanwhile, generated the physical carnage and atrocities of kinetic conflict or even terrorism that would elicit a severe public reaction that would compel decision-makers into escalatory measures (Borghard & Lonergan, 2019). The technological aspects of offensive cyber operations play a crucial role in limiting governments’ alternatives (Borghard & Lonergan, 2019). For instance, they produce trade-offs for decision-makers to evaluate, as well as breathing room during emergencies, which, when combined, limit possible escalation paths.

References

Borghard, E. D., & Lonergan, S. W. (2019). . Strategic Studies Quarterly, 13(3), 122-145. Web.

Knope, J. W. (2009). Three items in one: Deterrence as concept, research program, and political issue. In T.V. Paul, P. M. Morgan, & J. J. Wirtz, Complex deterrence: Strategy in the global age (pp. 31-58). University of Chicago Press.

Schelling, T. C. (2009). Arms and influence. Yale University Press.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Valeriano, B. G., & Jenson, B. (2019). . Cato Institute Policy Analysis, (862). Web.

Print
Need an custom research paper on Cyber Operations Do not Risk Inadvertent Escalation written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, March 13). Cyber Operations Do not Risk Inadvertent Escalation. https://ivypanda.com/essays/cyber-operations-do-not-risk-inadvertent-escalation/

Work Cited

"Cyber Operations Do not Risk Inadvertent Escalation." IvyPanda, 13 Mar. 2024, ivypanda.com/essays/cyber-operations-do-not-risk-inadvertent-escalation/.

References

IvyPanda. (2024) 'Cyber Operations Do not Risk Inadvertent Escalation'. 13 March.

References

IvyPanda. 2024. "Cyber Operations Do not Risk Inadvertent Escalation." March 13, 2024. https://ivypanda.com/essays/cyber-operations-do-not-risk-inadvertent-escalation/.

1. IvyPanda. "Cyber Operations Do not Risk Inadvertent Escalation." March 13, 2024. https://ivypanda.com/essays/cyber-operations-do-not-risk-inadvertent-escalation/.


Bibliography


IvyPanda. "Cyber Operations Do not Risk Inadvertent Escalation." March 13, 2024. https://ivypanda.com/essays/cyber-operations-do-not-risk-inadvertent-escalation/.

Powered by CiteTotal, online essay referencing tool
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1