The Paradox of Cyber Warfare and Clausewitz’s Conception of War

Authors

  • Nageen Ashraf Assistant Research Associate (ARA) at the Islamabad Policy Research Institute (IPRI), Islamabad, Pakistan

DOI:

https://doi.org/10.37540/njips.v8i1.183

Keywords:

Cyber warfare, cyber security, national security, Clausewitz’s trinity

Abstract

The technological advancements of the 21st century have broadened the traditional concepts of warfare and security. This broadened notion of warfare and security contains an important element of cyberspace. Cyberspace is the virtual space created through the linkages of the internet and internet devices. Because of certain developments, cyberspace is now considered the fifth operational domain for warfare, with the other four domains being land, sea, air, and space. This new realm of confrontation has encouraged states worldwide to secure their cyberspaces and build offensive or defensive cyber warfare capabilities as per their potential. Where traditional realists argue that cyber warfare does not fit the concept of warfare (as proposed by Clausewitz), this article justifies otherwise. The study employs content analysis as a method and adopts a qualitative approach to data analysis, posing the following research question: How does cyber warfare fit Clausewitz’s conception of war? In exploring this, the research hypothesizes that an in-depth analysis of Clausewitz’s trinity -- the elements of violence, combat, and policy -- indicates that these elements are also the salient features of cyber warfare, making it a valid form of war despite its anomalies.

References

Abdyraeva, C. (2020). Cyber Warfare. In The Use of Cyberspace in the Context of Hybrid Warfare.: Means, Challenges and Trends (pp. 15–20). OIIP - Austrian Institute for International Affairs. http://www.jstor.org/stable/resrep25102.7

Arif, S. (2021). Militarization of Artificial Intelligence: Progress and Implications. In: Keskin, T., Kiggins, R.D. (eds) Towards an International Political Economy of Artificial Intelligence. International Political Economy Series. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-74420-5_10

Ashraf, M. N., & Kayani, S. A. (2023). India's Cyber Warfare Capabilities: Repercussions for Pakistan's National Security. NDU Journal, 37, 34-45. https://ndujournal.ndu.edu.pk/site/article/view/152/114 DOI: https://doi.org/10.54690/ndujournal.37.152

Bassford, C. (2007). ‘The Primacy of Policy and the ‘Trinity’ in Clausewitz’s Mature Thought’, in H. Strachan and A. Herberg Rothe (eds), Clausewitz in the Twenty-First Century (Oxford, Oxford University Press, 2007). DOI: https://doi.org/10.1093/acprof:oso/9780199232024.003.0005

Bell, C. H. (2018). Cyber Warfare and International Law: The Need for Clarity. Towson University Journal of International Affairs, 51(2). p. 21-43

https://cpb-us-w2.wpmucdn.com/wp.towson.edu/dist/b/55/files/2018/05/SPRING-2018-ISSUE-1zf1eiz.pdf#page=27

Billo, C., & Chang, W. (2004). Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States. Dartmouth University Institute for Security and Technology Studies. http://web.elastic.org/~fche/mirrors/www.cryptome.org/2013/07/cyber-war-racket-0003.pdf

Bussell, J. (2023, October 15). cyberspace. Encyclopedia Britannica. https://www.britannica.com/topic/cyberspace

Cavelty, M. D. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics. 20 (3), 701-715. https://doi.org/10.1007/s11948-014-9551-y DOI: https://doi.org/10.1007/s11948-014-9551-y

Cepik, M., Canabarro, D. R., & Borne, T. (2015). Cyberwar: Clausewitzian Encounters. Space & Defense-USAF Academy, 8(1), 19-33. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3144752 DOI: https://doi.org/10.32873/uno.dc.sd.08.01.1125

Chen, T. M. (2010). Stuxnet, the real start of cyber warfare? [Editor’s Note]. IEEE Network, 24(6), 2-3. https://ieeexplore.ieee.org/abstract/document/5634434/ DOI: https://doi.org/10.1109/MNET.2010.5634434

Choucri, N. (2012). Cyberpolitics in International Relations. The MIT Press. https://mitpress.mit.edu/9780262517690/cyberpolitics-in-international-relations/ DOI: https://doi.org/10.7551/mitpress/7736.001.0001

Clarke, R. A., & Knake, R. K. (2010). The Next Threat to National Security and What to Do About It. HarperCollins Publishers.

Clausewitz, C. V. (2007). On War. Oxford, UK, Oxford University Press.

Ebert, H. (2020). Hacked IT superpower: how India secures its cyberspace as a rising digital democracy. India Review, 19(4), 376-413.

https://doi.org/10.1080/14736489.2020.1797317 DOI: https://doi.org/10.1080/14736489.2020.1797317

Edward Snowden: Leaks that exposed US spy programme. (2014). BBC News. https://www.bbc.com/news/world-us-canada-23123964

Fang, B. (2018). Cyberspace Sovereignty: Reflections on building a community of common future in cyberspace. Springer. http://file.fouladi.ir/courses/cyber/books/Binxing.pdf

Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the Future of Cyber War. Survival, 53(1), 23-40. https://doi.org/10.1080/00396338.2011.555586 DOI: https://doi.org/10.1080/00396338.2011.555586

Geers, K. (2010). The challenge of cyber attack deterrence. Computer Law & Security Review, 26(3), 298-303. https://www.sciencedirect.com/science/article/pii/S0267364910000506 DOI: https://doi.org/10.1016/j.clsr.2010.03.003

Ghate, S. & Agrawal, P. K. (2017). A literature review on cyber security in the Indian context. J. Comput. Inf. Technol, 8(5), 30-36. https://www.tandfonline.com/doi/full/10.1080/15205436.2017.1382285 DOI: https://doi.org/10.22147/jucit/080501

Goel, S. (2020). How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race. Connections. 19(1). 87-95. https://www.jstor.org/stable/26934538 DOI: https://doi.org/10.11610/Connections.19.1.08

Goldsmith, J. (2010). The New Vulnerability. The New Republic. http://www.tnr.com/article/books-and-arts/75262/the-new-vulnerability

Green, K. (2020). Does War Ever Change? A Clausewitzian Critique of Hybrid Warfare. E-International Relations. https://www.e-ir.info/2020/09/28/does-war-ever-change-a-clausewitzian-critique-of-hybrid-warfare/

Hadfield, D. (2016). What Constitutes Cyber War? War and Global Conflict in the Contemporary World.

Hathaway, M. E. (2008). Cyber Security: An Economic and National Security Crisis. The Intelligencer: Journal of US Intelligence Studies, 16(2), 31-36. https://www.belfercenter.org/publication/cyber-security-economic-and-national-security-crisis

Jervis, R. (2017). Perception and misperception in international politics: New edition. Princeton University Press. DOI: https://doi.org/10.2307/j.ctvc77bx3

Jinghua, L. (2019). What are China’s cyber capabilities and intentions? IPI Global Observatory. https://carnegieendowment.org/2019/04/01/what-are-china-s-cyber-capabilities-and-intentions-pub-78734

Kemp, S. (2020, January 30). Digital 2020: Global Digital Overview. DATAEPORTAL. https://datareportal.com/reports/digital-2020-global-digital-overview

Lebow, R. N., & Stein, J. G. (1995). Deterrence and the Cold War. Political Science Quarterly, 110(2), 157-181. https://www.jstor.org/stable/pdf/2152358.pdf DOI: https://doi.org/10.2307/2152358

Lewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats (p. 12). Washington, DC: Center for Strategic & International Studies.

Liff, A. P. (2012). Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War. Journal of Strategic Studies, 35(3), 401-428. https://doi.org/10.1080/01402390.2012.663252 DOI: https://doi.org/10.1080/01402390.2012.663252

Lin, H. S. (2010). Offensive cyber operations and the use of force. Journal of National Security Law and Policy, 4(63). https://jnslp.com/wp-content/uploads/2010/08/06_Lin.pdf

Missiroli, A., Stoltenberg, J., & Peach, S. (2020). From hybrid warfare to “cybrid” campaigns: the new normal? In T. Tardy (Ed.), NATO at 70: No Time to Retire (pp. 65-72). NATO Defense College. http://www.jstor.org/stable/resrep23663.14

Mueller, G.B. Jensen, B., Valeriano, B., Maness, R.C., and Macias, J.M. (2023). Cyber Operations during the Russo-Ukrainian War: From Strange Patterns to Alternative Futures. Center for. Center for Strategic and International Studies. https://www.csis.org/analysis/cyber-operations-during-russo-ukrainian-war#h2-russian-cyber-operations

Myers, N. (2020). Cyber Security: Cyber-crimes, attacks, and terrorism. ODU Model United Nations Society. https://www.odu.edu/content/dam/odu/offices/mun/docs/1st-cyber-attacks-un-day.pdf

Netolická, V., & Mareš, M. (2018). Arms race “in cyberspace”–A case study of Iran and Israel. Comparative Strategy, 37(5), 414-429. https://doi.org/10.1080/01495933.2018.1526568 DOI: https://doi.org/10.1080/01495933.2018.1526568

Nisar, M. (2018). 5 GW and hybrid warfare its implications and response options. https://bdex.eb.mil.br/jspui/bitstream/123456789/2827/1/MO%200023%20-%20MAAZ.pdf

Otaiku, A. A. (2018). A framework for hybrid warfare: Threats, challenges and solutions. J Def Manag, 8(178), 374-2167. Doi:10.4178/2167-0374.1000178

Paleri, P. (2008). National Security: Imperatives and Challenges. Tata McGraw-Hill.

Panwar, R. S. (2017). The Changing Nature of Warfare - Part II. Future Wars. http://futurewars.rspanwar.net/the-changing-nature-of-warfare-part-ii/

Poindexter, D. F. (2015). The new cyberwar: Technology and the redefinition of warfare. McFarland.

Rai, A. (2017). Tit for tat hack attack! Pakistan black hats hit back after Indian cyber strike to avenge naval officer’s death penalty. Mail Online India. Retrieved from http://www.dailymail.co.uk/indiahome/indianews/article-4445606/Pakistan-black-hats-hit-Indian-cyber-strike.html

Renz, B. (2014). Russian Military Capabilities after 20 Years of Reform. Survival, 56(3), 61-84. https://doi.org/10.1080/00396338.2014.920145 DOI: https://doi.org/10.1080/00396338.2014.920145

Renz, B. (2016). Russia and ‘hybrid warfare.’ Contemporary Politics, 22(3), 283-300. https://doi.org/10.1080/13569775.2016.1201316 DOI: https://doi.org/10.1080/13569775.2016.1201316

Rid, T. (2011). Cyber War Will Not Take Place. Journal of Strategic Studies, 35(1), 5-32. https://doi.org/10.1080/01402390.2011.608939 . DOI: https://doi.org/10.1080/01402390.2011.608939

Sharma, D. (2011). China’s Cyber Warfare Capability and India’s Concerns. Journal of Defence Studies. 5(2), 62-76. http://www.idsa.in/system/files/jds_5_2_dsharma.pdf

Subramanian, R. (2020). Historical Consciousness of Cyber Security in India. IEEE Annals of the History of Computing, 42(4), 71-93. https://ieeexplore.ieee.org/ DOI: https://doi.org/10.1109/MAHC.2020.3001215

Syed, F. Z., & Javed, S. (2017). Deterrence: A Security Strategy against Non-Traditional Security Threats to Pakistan. International Journal of Social Sciences and Management, 4(4), 267-274. https://doi.org/10.3126/ijssm.v4i4.18503 DOI: https://doi.org/10.3126/ijssm.v4i4.18503

Tiirmaa-Klaar, H. (2011). Cyber security threats and responses at global, nation-state, industry and individual levels. Ceri SciencesPo, 1-10. https://www.sciencespo.fr/ceri/sites/sciencespo.fr.ceri/files/art_htk.pdf

Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press, USA.

Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press, USA. DOI: https://doi.org/10.1093/acprof:oso/9780190204792.001.0001

Willett, M. (2024). The cyber dimension of the Russia–Ukraine war. Adelphi Series, 64(511–513), 105–124. https://doi.org/10.1080/19445571.2024.2417541 DOI: https://doi.org/10.1080/19445571.2024.2417541

Wilson, C. (2008). Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress. Library of Congress Washington DC Congressional Research Service. https://corpora.tika.apache.org/base/docs/govdocs1/080/080803.pdf

Wu, Y., & Huang, Y. (2020, August). Will Cyber Warfare Become a Threat to Contemporary International Security? In 2020 4th International Seminar on Education, Management and Social Sciences (ISEMSS 2020) (pp. 31-34). Atlantis Press. 10.2991/assehr.k.200826.007 DOI: https://doi.org/10.2991/assehr.k.200826.007

Ziegler, C. E. (2018). International dimensions of electoral processes: Russia, the USA, and the 2016 elections. International Politics, 55(5), 557-574. https://doi.org/10.1057/s41311-017-0113-1 DOI: https://doi.org/10.1057/s41311-017-0113-1

Downloads

Published

31-01-2025

How to Cite

Nageen Ashraf. (2025). The Paradox of Cyber Warfare and Clausewitz’s Conception of War. NUST Journal of International Peace & Stability, 8(1), 17–29. https://doi.org/10.37540/njips.v8i1.183

Issue

Section

Articles

Categories

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.