Cyber Warfare

(External Content) Cyber Deterrence Theory

Abstract: This study endeavors to identify the shortfalls of the United States current utilization of deterrence theory in light of a growing amount of asymmetric warfare, warfare from afar, and cyber warfare that may rise to the level of weapons of mass destruction level. It proposes that this deterrence theory should be modernized to less developing a strategic common practice where some aggression is tolerated, and intolerable acts of aggression are retaliated with through diplomatic and economic tools against individuals involved within the organization perpetuating the aggression.

Citation: Hallock, Danial (2018).  "Modernizing Deterrence Theory." AMU. Accessed at: https://www.danialhallock.com/blog/2018/4/1/modernizing-deterrence-theory

Related Articles: Paradox of ProgressRedefining the Cold War; Syria, North Korea, and Trump

Abstract: This study identifies prior authoritative research into attribution assessments, their shortfalls, and recommends several potential avenues of improvement, namely the targeting of individual persons within non-state actors and advanced persistent threat actors conducting cyber attacks against the U.S. and her allies utilizing prior research into pyschology and motivational theories. 

Citation: Hallock, Danial (2018).  "Solving the Issue of Attribution, Targeting, and Retaliation." AMU. Accessed at: https://www.danialhallock.com/blog/2018/4/1/modernizing-deterrence-theory

Related Articles: When Bots Become Bombs, Paradox of Progress, The Accidental World War



Paradox of Progress

Paradox of Progress

Every five years the Director of National Intelligence releases a pretty substantial report on growing trends and they've recently released one called "The Paradox of Progress."  It's a fairly substantial report with numerous implications on American geopolitical positioning based on the assessments and assumptions made within it, and it's a report that most Americans will never consider reading. So I wanted to unpack it, key point by key point, and provide context as much as possible to help at least a handful of Americans slug through it.

Bush, Xi, and McCain walk into an Auditorium

Bush, Xi, and McCain walk into an Auditorium

The face of conflict is changing.  While leaders like Kim Jong Un and Donald Trump still see conflict in the traditional light, many of their peers - and certainly the next generation - see conflict differently:  Cultural, Economical, and Ecological. The kinetic warfare of the 19th and 20th century is a relic of past generations, a fact never more poignant than after recent speeches by three prominent politicians across two countries.

When Bots Become Bombs

When Bots Become Bombs

Ambiguity in cyberspace and the legality of hacking and manipulating sovereign nations; does it benefit the attacker, or the victim?  We've all but survived the potential catastrophe of the 2016 election, and the Russian interference within it, but what does that mean for the future of cyber and psychological warfare throughout the world?

New Opportunities & A Book Recommendation

New Opportunities & A Book Recommendation

In late May, a former supervisor contacted me about an exciting new position he was helping to create conducting predictive cyber threat analysis, and in mid-June, I accepted a job offer to work for him. Moving from IT security implementation to IT security research & development was a huge intellectual challenge for me, and it's only been recently that I've been able to consider pursuing other intellectual hobbies, like blogging - or reading. The first novel I picked up was recommended to me by other security researchers: Ghost Fleet; it's only fitting that my return to blogging be about that novel.

While the plot of Ghost Fleet is very Tom Clancy's The Hunt for Red October-esque, it's better sourced and details a only slightly less probable prelude to war for which Tom Clancy was famous.  Ghost Fleet depicts a dramatic fight-for-survival scenario wherein an arrogant and complacent America is caught off guard by a virtual (and literal) Pearl Harbor attack by the Chinese. The U.S., now denied its ability to utilize satellites for precision guided munitions, encrypted communications, and Google Glass (called "viz" in the novel) is now in a fight for survival against a technologically superior enemy. Left to repel the invaders using guerrilla-style tactics and antiquated pre-digital technologies, America can no longer rely on its technological advantage that enabled the humble JDAM and the fearsome F-35.