Three Essays on International Cyber Threats: Target Nation Characteristics, International Rivalry, and Asymmetric Information Exchange

Total Page:16

File Type:pdf, Size:1020Kb

Three Essays on International Cyber Threats: Target Nation Characteristics, International Rivalry, and Asymmetric Information Exchange THREE ESSAYS ON INTERNATIONAL CYBER THREATS: TARGET NATION CHARACTERISTICS, INTERNATIONAL RIVALRY, AND ASYMMETRIC INFORMATION EXCHANGE by JACOB A. MAUSLEIN B.A., Washburn University, 2007 M.A., Kansas State University, 2009 AN ABSTRACT OF A DISSERTATION submitted in partial fulfillment of the requirements for the degree DOCTOR OF PHILOSOPHY Department of Security Studies College of Arts and Sciences KANSAS STATE UNIVERSITY Manhattan, Kansas 2014 Abstract As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasing important to understand how state and sub-state groups can use Internet vulnerabilities as a conduit of attack. The current social science literature on cyber threats is largely dominated by descriptive, U.S.-centric research. While this scholarship is important, the findings are not generalizable and fail to address the global aspects of network vulnerabilities. As a result, this dissertation employs a unique dataset of cyber threats from around the world, spanning from 1990 to 2011. This dataset allows for three diverse empirical studies to be conducted. The first study investigates the political, social, and economic characteristics that increase the likelihood of a state being targeted for cyber threats. The results show that different state characteristics are likely to influence the forms of digital attack targeting. For example, states that experience increases in GDP per capita and military size are more likely to be targeted for cyber attacks. Inversely, states that experience increases in GDP per capita and those that are more democratic are less likely to be targeted for cyber terrorism. The second study investigates the role that international rivalries play in cyber threat targeting. The results suggest that states in rivalries may have more reason to strengthen their digital security, and rival actors may be cautious about employing serious, threatening forms of cyber activity against foes because of concerns about escalation. The final study, based upon the crisis bargaining theory, seeks to determine if cyber threat targeting decreases private information asymmetry and therefore decreases conflict participation. Empirical results show that the loss of digital information via cyber means may thus illicit a low intensity threat or militarized action by a target state, but it also simultaneously increases the likelihood that a bargain may be researched, preventing full scale war by reducing the amount of private information held between parties. THREE ESSAYS ON INTERNATIONAL CYBER THREATS: TARGET NATION CHARACTERISTICS, INTERNATIONAL RIVALRY, AND ASYMMETRIC INFORMATION EXCHANGE by JACOB A. MAUSLEIN B.A., Washburn University, 2007 M.A., Kansas State University, 2009 A DISSERTATION submitted in partial fulfillment of the requirements for the degree DOCTOR OF PHILOSOPHY Department of Security Studies College of Arts and Sciences KANSAS STATE UNIVERSITY Manhattan, Kansas 2014 Approved by: Major Professor Jeffrey Pickering Copyright JACOB A. MAUSLEIN 2014 Abstract As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasing important to understand how state and sub-state groups can use Internet vulnerabilities as a conduit of attack. The current social science literature on cyber threats is largely dominated by descriptive, U.S.-centric research. While this scholarship is important, the findings are not generalizable and fail to address the global aspects of network vulnerabilities. As a result, this dissertation employs a unique dataset of cyber threats from around the world, spanning from 1990 to 2011. This dataset allows for three diverse empirical studies to be conducted. The first study investigates the political, social, and economic characteristics that increase the likelihood of a state being targeted for cyber threats. The results show that different state characteristics are likely to influence the forms of digital attack targeting. For example, states that experience increases in GDP per capita and military size are more likely to be targeted for cyber attacks. Inversely, states that experience increases in GDP per capita and those that are more democratic are less likely to be targeted for cyber terrorism. The second study investigates the role that international rivalries play in cyber threat targeting. The results suggest that states in rivalries may have more reason to strengthen their digital security, and rival actors may be cautious about employing serious, threatening forms of cyber activity against foes because of concerns about escalation. The final study, based upon the crisis bargaining theory, seeks to determine if cyber threat targeting decreases private information asymmetry and therefore decreases conflict participation. Empirical results show that the loss of digital information via cyber means may thus illicit a low intensity threat or militarized action by a target state, but it also simultaneously increases the likelihood that a bargain may be researched, preventing full scale war by reducing the amount of private information held between parties. Table of Contents List of Figures ................................................................................................................................ ix List of Tables ................................................................................................................................ xii Acknowledgements ...................................................................................................................... xiii Dedication .................................................................................................................................... xiv Chapter 1 - Introduction .................................................................................................................. 1 Chapter 2 - Estimating the Likelihood of Cyber Threats, 1990-2009 .......................................... 17 Literature Review ..................................................................................................................... 18 Linking Terrorism and Cyber Threats: Theoretical Development ........................................... 24 Research Design ....................................................................................................................... 36 Cyber Dataset ........................................................................................................................ 36 Dependent Variable............................................................................................................... 39 Independent Variables........................................................................................................... 40 Gross Domestic Product – Per Capita ............................................................................... 40 Military Size...................................................................................................................... 40 Regime Type ..................................................................................................................... 41 Freedom of the Press ......................................................................................................... 41 International Conflict ........................................................................................................ 41 Methodology ......................................................................................................................... 42 Results & Discussion ................................................................................................................ 46 ZINB & Rare Event Logistic Results ................................................................................... 46 Discussion ............................................................................................................................. 53 Conclusion ................................................................................................................................ 57 Chapter 3 - International Rivalry and Cyber Attacks ................................................................... 61 Literature Review ..................................................................................................................... 62 Theoretical Development .......................................................................................................... 67 Research Design ....................................................................................................................... 74 Dependent Variable............................................................................................................... 76 Independent Variables........................................................................................................... 77 Control Variables .................................................................................................................. 79 vi GPD Per Capita ................................................................................................................. 80 Military Size...................................................................................................................... 81 Regime Type ..................................................................................................................... 82 Population ........................................................................................................................
Recommended publications
  • Hospital Ships in the War on Terror Richard J
    Naval War College Review Volume 58 Article 6 Number 1 Winter 2005 Hospital Ships in the War on Terror Richard J. Grunawalt Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Grunawalt, Richard J. (2005) "Hospital Ships in the War on Terror," Naval War College Review: Vol. 58 : No. 1 , Article 6. Available at: https://digital-commons.usnwc.edu/nwc-review/vol58/iss1/6 This Article is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Grunawalt: Hospital Ships in the War on Terror Professor Grunawalt, professor emeritus of the Naval War College, is the former director of the Oceans Law and Policy Department of the Center for Naval Warfare Studies. His publications include (with John E. King and Ronald S. McClain) Protection of the Environ- ment during Armed Conflict (1996) and Targeting Enemy Merchant Shipping (1993)—volumes 69 and 65 of the Naval War College International Law Studies Series. Naval War College Review, Winter 2005, Vol. 58, No. 1 Published by U.S. Naval War College Digital Commons, 2005 1 Naval War College Review, Vol. 58 [2005], No. 1, Art. 6 HOSPITAL SHIPS IN THE WAR ON TERROR Sanctuaries or Targets? Richard J. Grunawalt mployment of military hospital ships in support of the war on terror is mili- Etarily, politically, and morally appropriate.
    [Show full text]
  • The Counterinsurgency Campaign of the Nigerian Army: the Fight
    The Counterinsurgency Campaign of the Nigerian Army: The Fight against the Boko-Haram Insurgency in North-East Nigeria, 1999-2017 Gilbert La’ankwap Yalmi Department of Politics and Contemporary History School of Arts and Media, University of Salford, Manchester, UK Supervisors Dr Samantha Newbery Professor Searle Alaric Submitted in Partial Fulfilment of the Requirements of the Degree of Doctor of Philosophy September 2020 TABLE OF CONTENTS TABLE OF CONTENTS ....................................................................................... i List of Figures ...................................................................................................... iv Acknowledgements.............................................................................................. v Dedication ........................................................................................................... vi Abbreviations ....................................................................................................vii Abstract ................................................................................................................ x INTRODUCTION ................................................................................................ 1 Gaps in the Literature and Opportunities for New Research ............................ 2 Statement of the Problem ................................................................................... 7 Objective and Significance ...............................................................................
    [Show full text]
  • Conventional Missile Attacks Against Aircraft on Airfields and Aircraft Carriers
    MEMORANDUM RM-4718-PR AIR FORCE DECLASSIFICATION OFFICE Classification Re'ained__--------------- —.„. J A N U A R Y 1966 Classification Changed To: jp / Q l No Classified AF Equities \J --------—- Refer To:___________ Reviewers Declassified from SECRET by the Air Force Declassification Office on 23 Oct 2018 CONVENTIONAL MISSILE ATTACKS AGAINST AIRCRAFT ON AIRFIELDS AND AIRCRAFT CARRIERS J. G. H a m m e r an d W . R. E ls w ic k PREPARED FOR: UNITED STATES AIR FORCE PROJECT RAND 7 ¿ e RJMD(fyyfotatca# SANTA MONICA • CALIFORNIA MEMORANDUM RM -4718-PR JANUARY 1966 CONVENTIONAL MISSILE ATTACKS AGAINST AIRCRAFT ON AIRFIELDS AND AIRCRAFT CARRIERS J. G. H a m m e r an d W . R. E ls w ic k This research is sponsored by the United States Air Force under Project RAND—Con­ tract No. AF 49(638)-1700—monitored by the Directorate of Operational Requirements and Development Plans, Deputy Chief of Staff, Research and Development. Hq USAF. Views or conclusions contained in this Memorandum should not be interpreted as representing the official opinion or policy of the United States Air Force. ■7& IUIIII) 1700 S r • Sant O N I C A l l F o R • 90406 -11- Published by The Rand Corporltion — i i i — PREFACE This Memorandum considers the possibilities of specialized non­ nuclear b a llis tic missile attacks against U.S. airpower based on South Vietnam a irfield s and on board aircraft carriers operating in the vicin ity of the Gulf of Tonkin. The subject should be of interest to those concerned with non­ nuclear weapon systems and their role in limited war situations.
    [Show full text]
  • Hardening Soft Targets
    New Visions for Public Affairs, Volume 11, Spring 2019 || 14 Policy in Action Piece Hardening Soft Targets Daniel Henne University of Delaware Terrorism was once a scattered, intermittent concern for the global community. It is now an everyday security problem that primarily affects large urban centers that have not been secured. Proper risk assessment, intelligence collection, public awareness, organizational collaboration, and improvements in technology are key areas and points that need to be emphasized in terrorism prevention. When it comes to implementing effective counterterrorism practices, places such as New York City have made strides. The city’s ability to prevent attacks can be contributed to their extensive use of surveillance systems, as well as their robust information- sharing and collaborative abilities. This paper assesses the major findings in counterterrorism literature and in practice, providing examples of advances that New York City has utilized in order to keep people safe from terrorist attacks. Policy Problem and Historical Context keep counterterrorism and soft target hardening Terrorist attacks and their effects on at the forefront of their public safety concerns. people throughout the world have been a In addition to this analysis, the following paper protracted concern for the past twenty years. will recommend improvements that can be Although the methods in which these types of made to bolster practices and procedures in attacks have varied, a vast majority of them developing better public safety standards and have occurred in places that can be defined as outcomes. soft targets (French, 2015). Soft targets are locations that are accessible to large numbers of Terrorism and Soft Targets people and that have limited security or There is no universally accepted definition protection methods in case of an emergency.
    [Show full text]
  • Soft Targets Are Easy Terror Targets: Increased Frequency of Attacks, Practical Preparation, and Prevention
    Forensic Research & Criminology International Journal Research Article Open Access Soft targets are easy terror targets: increased frequency of attacks, practical preparation, and prevention Abstract Volume 3 Issue 2 - 2016 This article illustrates the vulnerability and the increased frequency of soft targets attacked Richard H Martin by terrorists. The article includes some of the latest soft target incidents conducted by Department of Leadership Studies, Mercer University, USA Islamic extremist terrorists. The frequency of attacks on soft targets is expected to continue increasing, especially in the United States. The article also provides a plan for various soft Correspondence: Richard H Martin, Homeland Security and targets to prepare a defense against such terror incidents. Soft targets are easy targets, so Emergency Management Program, Department of Leadership terrorists are dedicated to continue attacking these vulnerable entities. Soft targets include Studies, Mercer University, Macon, Georgia, USA, Tel 419/348- hospitals, restaurants, nightclubs, super markets, schools, sports venues, churches, malls, 4201, Email and areas where large numbers of people gather. Target hardening simply by adding security personnel is a key strategy to reduce vulnerability of soft targets. Received: September 28, 2016 | Published: November 21, 2016 Keywords: soft targets, lone wolf terrorists, islamic extremists, plans to defend, target hardening Introduction & Kappelar,6 illustrated that soft targets are those civilian in nature that have very little protection and are vulnerable to terrorist attacks. The definition of a soft target varies somewhat, but all definitions The vulnerable soft targets include critical infrastructure facilities of indicate the targets are soft and easy to attack. According to the water, energy, transportation, airlines, and hotels.
    [Show full text]
  • Holy Land Foundation for Relief and Development: Criminalizing Support for Non-Designated Charities
    Blocking Faith, Freezing Charity CHILLING MUSLIM CHARITABLE GIVING in the “WAR ON TERRORISM FINANCING” Blocking Faith, Freezing Charity: Chilling Muslim Charitable Giving in the “War on Terrorism Financing” PUBLISHED: June 2009 FRONT COVER PHOTOGRAPH: Alex Wong/Getty Images Members of a Muslim congregation in Virginia give Zakat donations for the needy before they enter a mosque for a service to mark the conclusion of the holy month of Ramadan, the height of annual Muslim charitable giving. Zakat is one of the core “five pillars” of Islam and a religious obligation for all observant Muslims. BACK COVER PHOTOGRAPHS: LEFT: Brandon Dill/Memphis Commercial Appeal RIGHT: LIFE for Relief and Development THE AMERICAN CIVIL LIBERTIES UNION is the nation’s premier guardian of liberty, working daily in courts, legislatures and communities to defend and preserve the individual rights and freedoms guaranteed by the Constitution, the laws and treaties of the United States. OFFICERS AND DIRECTORS Susan N. Herman, President Anthony D. Romero, Executive Director Richard Zacks, Treasurer ACLU NATIONAL OFFICE 125 Broad Street, 18th Fl. New York, NY 10004-2400 (212) 549-2500 www.aclu.org Contents I. EXECUTIVE SUMMARY AND INTRODUCTION ................................................................................ 7 a. Introduction .............................................................................................................................7 b. Executive Summary .................................................................................................................9
    [Show full text]
  • A Study of ISIS, Boko Haram, Al-Shabaab, and the US Policy Response Luke Phillips University of Mississippi
    University of Mississippi eGrove Honors College (Sally McDonnell Barksdale Honors Theses Honors College) 2017 The uturF e of ISIS and US Counterterrorism: A Study of ISIS, Boko Haram, Al-Shabaab, and the US Policy Response Luke Phillips University of Mississippi. Sally McDonnell Barksdale Honors College Follow this and additional works at: https://egrove.olemiss.edu/hon_thesis Part of the Public Affairs, Public Policy and Public Administration Commons Recommended Citation Phillips, Luke, "The uturF e of ISIS and US Counterterrorism: A Study of ISIS, Boko Haram, Al-Shabaab, and the US Policy Response" (2017). Honors Theses. 597. https://egrove.olemiss.edu/hon_thesis/597 This Undergraduate Thesis is brought to you for free and open access by the Honors College (Sally McDonnell Barksdale Honors College) at eGrove. It has been accepted for inclusion in Honors Theses by an authorized administrator of eGrove. For more information, please contact [email protected]. THE FUTURE OF ISIS AND US COUNTERTERRORISM: A STUDY OF ISIS, BOKO HARAM, AL-SHABAAB, AND THE US POLICY RESPONSE by Luke Phillips A thesis submitted to the faculty of The University of Mississippi in partial fulfillment of the requirements of the Sally McDonnell Barksdale Honors College. Oxford May 2017 Approved by ________________________________ Advisor: Dr. Weixing Chen ________________________________ Reader: Dr. David Bath ________________________________ Reader: Dr. Joshua First © 2017 Luke Phillips ALL RIGHTS RESERVED 2 ABSTRACT This study is comprised of two parts. Part 1 focuses on ISIS, Boko Haram, and Al-Shabaab, examining the structures, tactics, and motivations of the groups. Each group seeks territory in its respective region. After losing territories, Boko Haram and Al- Shabaab both turned to guerilla attacks and suicide bombing, destabilizing the areas formerly under their control.
    [Show full text]
  • China in U.S. Nuclear War Planning
    CHAPTER 3 China in U.S. Nuclear War Planning China has been a target for U.S. nuclear forces beginning soon after the founding of the People’s Republic of China in 1949. During the Korean War, after Chinese forces entered the conflict in October 1950, President Harry Truman considered using nuclear weapons against China, and even deployed nuclear-capable B-29 bombers and nine non-nuclear components to Guam in 1951 to be within range of key targets. President Dwight D. Eisenhower had his own series of crises with China in 1954 and 55 and in 1958 in the Taiwan Strait area, and the United States contemplated using nuclear weapons. These actions surely spurred Mao to decide to build a bomb. Until 1960, however, nuclear war planning against China was mainly an ad hoc, contingency-based effort. Throughout the late-1950s regional commanders sought to incorporate many of their new nuclear weapon systems into a growing number of contingency plans. Beginning in 1960 the Pentagon attempted to assemble the various strike plans under a coordinated execution planning system so as to avoid duplication. The result was the Single Integrated Operational Plan (SIOP). The first SIOP, dated December 1960, contained only one “plan,” under which the United States would launch all of its strategic nuclear delivery vehicles immediately upon the initiation of general war with the Soviet Union. Although the Soviet Union was the main focus, the single target list also included Chinese and Soviet satellite state cities, as well as airfields and other military bases and facilities within or on the outskirts of these cities.
    [Show full text]
  • Defining Law Enforcement's Role in Protecting American Agriculture
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Defining Law Enforcement’s Role in Protecting American Agriculture from Agroterrorism Author(s): Terry Knowles, James Lane, Dr. Gary Bayens, Dr. Nevil Speer, Dr. Jerry Jaax , Dr. David Carter, Dr. Andra Bannister Document No.: 212280 Date Received: December 2005 Award Number: 2003-IJ-CX-1024 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. NIJ Research Report Defining Law Enforcement’s Role in Protecting American Agriculture from Agroterrorism Prepared for: National Institute of Justice Washington, D.C. 30 June 2005 Researched and Written by: Terry Knowles Kansas Bureau of Investigation James Lane Ford County Sheriff’s Office Dr. Gary Bayens Washburn University Dr. Nevil Speer Western Kentucky University Dr. Jerry Jaax Kansas State University Dr. David Carter Michigan State University Dr. Andra Bannister Wichita State University Dr. Sandra L. Woerle NIJ Research Project Manager This research project was supported by Grant No. 2003-IJ-CX-1024 awarded by the National Institute of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the authors and do not necessarily represent the official position or policies of the U.S.
    [Show full text]
  • Marine Corps Intelligence Activity
    UNCLASSIFIED//FOR OFFICIAL USE ONLY Marine Corps Intelligence Activity Marine Corps Midrange Threat Estimate: 2005-2015 Information Cutoff Date: 1 July 2005 This is a Department of Defense Intelligence Document Prepared by: Global Threats Branch Production and Analysis Company Marine Corps Intelligence Activity This publication supersedes the Midrange Threat Estimate: 2001-2010 (Unclassified), MCIA-1586-001-01, August 2001. COPYRIGHT WARNING: Further dissemination of the images in this publication is not authorized. MCIA-1586-001-05 (Reverse Blank) UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY Marine Corps Midrange Threat Estimate 2005-2015 EXECUTIVE The degree to which the United States can maintain its security in the 21st century will be SUMMARY determined by how well the United States responds to a transitioning world. Marine Corps forces will be challenged by emerging technical, military, and geopolitical threats; by the growing resourcefulness and the ingenuity of non-state actors and terrorist networks; and by natural disasters. Globalization has both positive and negative effects on world dynamics. I States unable to keep pace with globalization will continue to grant increased powers to non-state actors (non-government organizations, private security/military organizations, criminals, gangs and terrorists). I Failing states heavily populated with a costly aging population and a highly unemployed youth provide breeding grounds for terrorist groups. I Demands of the modern and globalized state will continue to place increasing pressure on dwindling natural resources, including oil, water, and minerals. Unusual alliances will form to secure scarce resources. I Globalization has eroded national identity and unity through the expansion of media and communication systems, technology, and popular culture, resulting in a surge of global religious movements.
    [Show full text]
  • Strategic Framework for Countering Terrorism and Targeted Violence
    DEPARTMENT OF HOMELAND SECURITY STRATEGIC FRAMEWORK FOR COUNTERING TERRORISM AND TARGETED VIOLENCE SEPTEMBER 2019 The U.S. Department of Homeland Security was created in the wake of the devastating 9/11 attacks, and charged with coordinating and unifying the Nation’s homeland security efforts. Today, just past the eighteenth anniversary of those horrible events, the country confronts an evolving challenge of terrorism and targeted violence. While the threat posed by foreign terrorist organizations remains a priority for the Department, and for the Nation as a whole, we have made great progress in our ability to detect, prevent, protect against, and mitigate the threats that these groups pose. At the same time, we face a growing threat from domestic terrorism and other threats originating at home, including the mass attacks that have too frequently struck our houses of worship, our schools, our workplaces, our festivals, and our shopping spaces. I am proud to introduce DHS’s new Strategic Framework for Countering Terrorism and Targeted Violence, which explains how we Kevin McAleenan will use the tools and expertise that have protected and strengthened the country Secretary of Homeland Security from foreign terrorist organizations to address the evolving challenges of today. It is important to appreciate the great progress that the Department has made since it was founded. DHS has adopted a multi-tiered approach to the lines of security we pursue, including aviation security and border security. By gaining the ability to recognize hostile actors long before they reach our borders, we have made our Nation’s borders not our first line of defense, but one of many.
    [Show full text]
  • Suicide Bombing Operations
    Issue No. 5 March 2007 Security & Terrorism Research Bulletin Suicide Bombing Operations During the last three years, the world has witnessed a notable upsurge in the number of suicide attacks, as well as in the geographical spread of this tactic. As the suicide bombers become more sophisticated and inventive in their tactics, the number of victims of suicide bombing attacks around the world has also increased significantly. Counter measures designed to combat suicide bombing have proven largely ineffective. This is now an acknow- ledged reality, and despite all national and international efforts, success in the field of preventive and preemptive measures has been limited. The research team at the Department of Security and Terrorism Studies at the GRC, which has produced this study, felt the need to analyze the suicide bombing phenomenon. As part of a Middle East-based think-tank, the researcher at the GRC is living and working within a regional environment that has become familiar with the terrible consequences of suicide operations. With this modest contribution, the researchers at the S&T department hope to add some knowledge that will help in understanding the suicide bombing phenomenon, and contribute to efforts of combating the same. Dr. Mustafa Alani Senior Advisor Director, Security and Terrorism Department Gulf Research Center w w w. g r c . a e TARGET THE GULF ������������������������������� �������������������������������������������������������������������������������������� �������������������������� �������������������������������������
    [Show full text]