Three Essays on International Cyber Threats: Target Nation Characteristics, International Rivalry, and Asymmetric Information Exchange
Total Page:16
File Type:pdf, Size:1020Kb
THREE ESSAYS ON INTERNATIONAL CYBER THREATS: TARGET NATION CHARACTERISTICS, INTERNATIONAL RIVALRY, AND ASYMMETRIC INFORMATION EXCHANGE by JACOB A. MAUSLEIN B.A., Washburn University, 2007 M.A., Kansas State University, 2009 AN ABSTRACT OF A DISSERTATION submitted in partial fulfillment of the requirements for the degree DOCTOR OF PHILOSOPHY Department of Security Studies College of Arts and Sciences KANSAS STATE UNIVERSITY Manhattan, Kansas 2014 Abstract As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasing important to understand how state and sub-state groups can use Internet vulnerabilities as a conduit of attack. The current social science literature on cyber threats is largely dominated by descriptive, U.S.-centric research. While this scholarship is important, the findings are not generalizable and fail to address the global aspects of network vulnerabilities. As a result, this dissertation employs a unique dataset of cyber threats from around the world, spanning from 1990 to 2011. This dataset allows for three diverse empirical studies to be conducted. The first study investigates the political, social, and economic characteristics that increase the likelihood of a state being targeted for cyber threats. The results show that different state characteristics are likely to influence the forms of digital attack targeting. For example, states that experience increases in GDP per capita and military size are more likely to be targeted for cyber attacks. Inversely, states that experience increases in GDP per capita and those that are more democratic are less likely to be targeted for cyber terrorism. The second study investigates the role that international rivalries play in cyber threat targeting. The results suggest that states in rivalries may have more reason to strengthen their digital security, and rival actors may be cautious about employing serious, threatening forms of cyber activity against foes because of concerns about escalation. The final study, based upon the crisis bargaining theory, seeks to determine if cyber threat targeting decreases private information asymmetry and therefore decreases conflict participation. Empirical results show that the loss of digital information via cyber means may thus illicit a low intensity threat or militarized action by a target state, but it also simultaneously increases the likelihood that a bargain may be researched, preventing full scale war by reducing the amount of private information held between parties. THREE ESSAYS ON INTERNATIONAL CYBER THREATS: TARGET NATION CHARACTERISTICS, INTERNATIONAL RIVALRY, AND ASYMMETRIC INFORMATION EXCHANGE by JACOB A. MAUSLEIN B.A., Washburn University, 2007 M.A., Kansas State University, 2009 A DISSERTATION submitted in partial fulfillment of the requirements for the degree DOCTOR OF PHILOSOPHY Department of Security Studies College of Arts and Sciences KANSAS STATE UNIVERSITY Manhattan, Kansas 2014 Approved by: Major Professor Jeffrey Pickering Copyright JACOB A. MAUSLEIN 2014 Abstract As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasing important to understand how state and sub-state groups can use Internet vulnerabilities as a conduit of attack. The current social science literature on cyber threats is largely dominated by descriptive, U.S.-centric research. While this scholarship is important, the findings are not generalizable and fail to address the global aspects of network vulnerabilities. As a result, this dissertation employs a unique dataset of cyber threats from around the world, spanning from 1990 to 2011. This dataset allows for three diverse empirical studies to be conducted. The first study investigates the political, social, and economic characteristics that increase the likelihood of a state being targeted for cyber threats. The results show that different state characteristics are likely to influence the forms of digital attack targeting. For example, states that experience increases in GDP per capita and military size are more likely to be targeted for cyber attacks. Inversely, states that experience increases in GDP per capita and those that are more democratic are less likely to be targeted for cyber terrorism. The second study investigates the role that international rivalries play in cyber threat targeting. The results suggest that states in rivalries may have more reason to strengthen their digital security, and rival actors may be cautious about employing serious, threatening forms of cyber activity against foes because of concerns about escalation. The final study, based upon the crisis bargaining theory, seeks to determine if cyber threat targeting decreases private information asymmetry and therefore decreases conflict participation. Empirical results show that the loss of digital information via cyber means may thus illicit a low intensity threat or militarized action by a target state, but it also simultaneously increases the likelihood that a bargain may be researched, preventing full scale war by reducing the amount of private information held between parties. Table of Contents List of Figures ................................................................................................................................ ix List of Tables ................................................................................................................................ xii Acknowledgements ...................................................................................................................... xiii Dedication .................................................................................................................................... xiv Chapter 1 - Introduction .................................................................................................................. 1 Chapter 2 - Estimating the Likelihood of Cyber Threats, 1990-2009 .......................................... 17 Literature Review ..................................................................................................................... 18 Linking Terrorism and Cyber Threats: Theoretical Development ........................................... 24 Research Design ....................................................................................................................... 36 Cyber Dataset ........................................................................................................................ 36 Dependent Variable............................................................................................................... 39 Independent Variables........................................................................................................... 40 Gross Domestic Product – Per Capita ............................................................................... 40 Military Size...................................................................................................................... 40 Regime Type ..................................................................................................................... 41 Freedom of the Press ......................................................................................................... 41 International Conflict ........................................................................................................ 41 Methodology ......................................................................................................................... 42 Results & Discussion ................................................................................................................ 46 ZINB & Rare Event Logistic Results ................................................................................... 46 Discussion ............................................................................................................................. 53 Conclusion ................................................................................................................................ 57 Chapter 3 - International Rivalry and Cyber Attacks ................................................................... 61 Literature Review ..................................................................................................................... 62 Theoretical Development .......................................................................................................... 67 Research Design ....................................................................................................................... 74 Dependent Variable............................................................................................................... 76 Independent Variables........................................................................................................... 77 Control Variables .................................................................................................................. 79 vi GPD Per Capita ................................................................................................................. 80 Military Size...................................................................................................................... 81 Regime Type ..................................................................................................................... 82 Population ........................................................................................................................