TY - JOUR
T1 - Public Secrets
T2 - The Dynamics of Publicity and Secrecy in Offensive Cyber Operations
AU - Baram, Gil
N1 - Publisher Copyright:
© The Author(s) (2023). Published by Oxford University Press on behalf of the International Studies Association. All rights reserved.
PY - 2023/9/1
Y1 - 2023/9/1
N2 - Historically, offensive cyber operations (OCOs) have been considered a practice that states could carry out covertly, away from the public eye, with both perpetrators and defenders having incentives to remain silent. Over the past few years, however, perpetrators and defenders have publicly acknowledged their involvement in OCOs. How common is this strategic choice among states? What are its characteristics? In this research note I show that this is not a binary choice, and that there is variance in the strategies available to either side. I then examine what state behavior patterns can be identified by using compiled data of OCOs between 1996 and 2019. I show that this phenomenon of giving up secrecy is occurring and point out on states’ characteristics and probabilities of choosing each strategy. Initial findings show significant use of public strategies by perpetrators (20 percent) and more so by defenders (50 percent), and that democracies tend toward public credit claiming and attribution, while less democratic countries tend toward public denial. As governments increasingly engage in OCOs, the implications of this research note are of interest to scholars and practitioners alike.
AB - Historically, offensive cyber operations (OCOs) have been considered a practice that states could carry out covertly, away from the public eye, with both perpetrators and defenders having incentives to remain silent. Over the past few years, however, perpetrators and defenders have publicly acknowledged their involvement in OCOs. How common is this strategic choice among states? What are its characteristics? In this research note I show that this is not a binary choice, and that there is variance in the strategies available to either side. I then examine what state behavior patterns can be identified by using compiled data of OCOs between 1996 and 2019. I show that this phenomenon of giving up secrecy is occurring and point out on states’ characteristics and probabilities of choosing each strategy. Initial findings show significant use of public strategies by perpetrators (20 percent) and more so by defenders (50 percent), and that democracies tend toward public credit claiming and attribution, while less democratic countries tend toward public denial. As governments increasingly engage in OCOs, the implications of this research note are of interest to scholars and practitioners alike.
KW - covert actions
KW - cyberattacks
KW - offensive cyber operations
UR - http://www.scopus.com/inward/record.url?scp=85163498687&partnerID=8YFLogxK
U2 - 10.1093/jogss/ogad013
DO - 10.1093/jogss/ogad013
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85163498687
SN - 2057-3170
VL - 8
JO - Journal of Global Security Studies
JF - Journal of Global Security Studies
IS - 3
M1 - ogad013
ER -