{"title":"网络武器转让:意义、限制和影响","authors":"M. Smeets","doi":"10.1080/09636412.2022.2041081","DOIUrl":null,"url":null,"abstract":"Abstract What are the motivations and opportunities for arms transfer in the cyber realm? Although scholarship has failed to systematically address this question, having an accurate answer is crucial for understanding the operationalization of cyber commands and intelligence alliances, the functioning of the North Atlantic Treaty Organization in the twenty-first century, and the viability of cyber arms controls. First, this article introduces a new conceptual framework—the people-exploits-tools-infrastructure-organization (PETIO) framework—to understand the elements of an offensive cyber capability. Second, I explain how the incentives of cyber arms transfer differ across the different elements of the PETIO framework. Though exploits and tools can be effortlessly replicated, their transitory nature and potential for operational tracking means there is little incentive to actually transfer these assets. If any incentives exist for state-to-state transfer, it would be in facilitating other state actors to develop their own offensive capabilities—that is, by providing expertise, infrastructure, and organizational capacity to adapt and innovate—as this does not reduce the effectiveness of one’s own arsenal. Third, I argue that the incentives for transferring cyber effect capabilities are weaker compared to cyber espionage capabilities, and attribution dynamics add an additional layer of complexity to these transfer dynamics.","PeriodicalId":47478,"journal":{"name":"Security Studies","volume":"31 1","pages":"65 - 91"},"PeriodicalIF":2.2000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Cyber Arms Transfer: Meaning, Limits, and Implications\",\"authors\":\"M. Smeets\",\"doi\":\"10.1080/09636412.2022.2041081\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract What are the motivations and opportunities for arms transfer in the cyber realm? Although scholarship has failed to systematically address this question, having an accurate answer is crucial for understanding the operationalization of cyber commands and intelligence alliances, the functioning of the North Atlantic Treaty Organization in the twenty-first century, and the viability of cyber arms controls. First, this article introduces a new conceptual framework—the people-exploits-tools-infrastructure-organization (PETIO) framework—to understand the elements of an offensive cyber capability. Second, I explain how the incentives of cyber arms transfer differ across the different elements of the PETIO framework. Though exploits and tools can be effortlessly replicated, their transitory nature and potential for operational tracking means there is little incentive to actually transfer these assets. If any incentives exist for state-to-state transfer, it would be in facilitating other state actors to develop their own offensive capabilities—that is, by providing expertise, infrastructure, and organizational capacity to adapt and innovate—as this does not reduce the effectiveness of one’s own arsenal. Third, I argue that the incentives for transferring cyber effect capabilities are weaker compared to cyber espionage capabilities, and attribution dynamics add an additional layer of complexity to these transfer dynamics.\",\"PeriodicalId\":47478,\"journal\":{\"name\":\"Security Studies\",\"volume\":\"31 1\",\"pages\":\"65 - 91\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Security Studies\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.1080/09636412.2022.2041081\",\"RegionNum\":2,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"INTERNATIONAL RELATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security Studies","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1080/09636412.2022.2041081","RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
Cyber Arms Transfer: Meaning, Limits, and Implications
Abstract What are the motivations and opportunities for arms transfer in the cyber realm? Although scholarship has failed to systematically address this question, having an accurate answer is crucial for understanding the operationalization of cyber commands and intelligence alliances, the functioning of the North Atlantic Treaty Organization in the twenty-first century, and the viability of cyber arms controls. First, this article introduces a new conceptual framework—the people-exploits-tools-infrastructure-organization (PETIO) framework—to understand the elements of an offensive cyber capability. Second, I explain how the incentives of cyber arms transfer differ across the different elements of the PETIO framework. Though exploits and tools can be effortlessly replicated, their transitory nature and potential for operational tracking means there is little incentive to actually transfer these assets. If any incentives exist for state-to-state transfer, it would be in facilitating other state actors to develop their own offensive capabilities—that is, by providing expertise, infrastructure, and organizational capacity to adapt and innovate—as this does not reduce the effectiveness of one’s own arsenal. Third, I argue that the incentives for transferring cyber effect capabilities are weaker compared to cyber espionage capabilities, and attribution dynamics add an additional layer of complexity to these transfer dynamics.
期刊介绍:
Security Studies publishes innovative scholarly manuscripts that make a significant contribution – whether theoretical, empirical, or both – to our understanding of international security. Studies that do not emphasize the causes and consequences of war or the sources and conditions of peace fall outside the journal’s domain. Security Studies features articles that develop, test, and debate theories of international security – that is, articles that address an important research question, display innovation in research, contribute in a novel way to a body of knowledge, and (as appropriate) demonstrate theoretical development with state-of-the art use of appropriate methodological tools. While we encourage authors to discuss the policy implications of their work, articles that are primarily policy-oriented do not fit the journal’s mission. The journal publishes articles that challenge the conventional wisdom in the area of international security studies. Security Studies includes a wide range of topics ranging from nuclear proliferation and deterrence, civil-military relations, strategic culture, ethnic conflicts and their resolution, epidemics and national security, democracy and foreign-policy decision making, developments in qualitative and multi-method research, and the future of security studies.