Abstract
This paper has as main purpose to revisit some of the foundations of Western military thinking, and its evolution derived from the increasingly attenuated need on making use of cyberspace as domain for resolving state-level conflicts through the use of force. This will be done on the basis of the work of the Prussian military theorist Carl von Clausewitz, and focalized in their implications when developing and operating cyber situational awareness capabilities. Rather than remaining a mere retrospective the paper will analyze the present and possible projection of some of the key concepts in geostrategic, operational planning and international law directed from the following dimensions: 1) the nature of cyber conflicts as part of war; 2) the digitalization of the society; 3) the friction forces on cyberspace operations; 4) the centers of gravity in cyberspace; and 5) decisive conditions and culminating points on cyberspace operations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
This concept, meaning the study of war, was first introduced by Gaston Bouthoul, a French-Tunisian Doctor in Law, Politics and Social Sciences. Bouthoul later founded the Institut Français de Polémologie, one of the few research institutes focused on the social phenomenon of war.
References
Ramon Y Cajal Ramo, P., Maestre Vidal, J.: Understanding the ethical and regulatory boundaries of the military actuation on the cyberspace. In: Proceedings of 16th International Conference on Availability, Reliability and Security, Vienna, Austria (2021)
von Clausewitz, C., Graham, J.J., Maude, F.N.: On war by Carl von Clausewitz, (translated by J.J. Graham). New & rev. ed. with introduction and notes by F.N. Maude. Kegan Paul, Trench, Trubner London (1911)
Semmel, B. Marxism and the Science of War. Oxford University Press, Oxford (1981). ISBN 9780198761129
Malesevic, S.: The Sociology of War and Violence. Cambridge University Press, Cambridge (2010). https://doi.org/10.1017/CBO9780511777752
Brantly, A.F.: The violence of hacking: state violence and cyberspace. Cyber Defence Rev. 2(1), 73–92 (2017)
Roucek, J.S.: La sociologia de la violencia. Rev. Mexicana Opin. Publica 16, 139–148 (2014)
Durkheim, É., Kerr White Health Care Collection and Simpson, G., Spaulding, J.A.: Suicide: A Study in Sociology. Free Press (1951). ISBN 9780029086605
Bouthoul, G.: Sur les fonctions présumées et la périodicité des guerres. Revue Sci. Econ. (Lieja) 161–174 (1939)
Bouthoul, G.: La guerra. Oikos-Tau (1971). ISBN 8428101779
Eichensehr, K.: Ukraine, cyberattacks, and the lessons for international law. Am. J. Int. Law 116, 145–149 (2022)
Zhou, M.J., Huang, J.B., Chen, J.Y.: Time and frequency spillovers between political risk and the stock returns of China’s rare earths. Resour. Policy 75, 102464 (2022)
Llanten-Quiroz, N.F.L.: polemología como aporte metodológico para profundizar la historia de la guerra. Rev. Cientifica Gener. Jose Maria Cordova 19(35), 705–721 (2021)
Bada, M. and Nurse, J.R.C. The social and psychological impact of cyberattacks. In: Emerging Cyber Threats and Cognitive Vulnerabilities, pp. 73–92 (2020)
Basic Aerospace Doctrine of the USAF. Air Force Manual 1-1 (1992)
Fairburn, N., Shelton, A., Ackroyd, F., Selfe, R.: Beyond Murphy’s law: applying wider human factors behavioural science approaches in cyber-security resilience. In: Proceedings of 23rd International Conference on Human-Computer Interaction, Washington, D.C., USA, pp. 123–138 (2021)
Rauti, S.: Controlling uncertainty with proactive cyber defense: a Clausewitzian perspective. In: Proceedings of International Symposium on Security in Computing and Communication, Chennai, India (2019)
Sotelo Monge, M.A., Maestre Vidal, J.: Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge. Future Gener. Comput. Syst. 125, 869–890 (2021)
NATO AJP 3–13. Allied Joint Doctrine for the Deployment and Redeployment of Forces (2021)
Rizzo, M.J., Dold, M.: Knightian uncertainty: through a Jamesian window. Camb. J. Econ. 45(5), 967–988 (2021)
Brantly, A.F.: Risk and uncertainty can be analyzed in cyberspace. J. Cybersecur. 7(1) (2021)
Gartzke, E., Lindsay, J.R.: Weaving tangled webs: offense, defense, and deception in cyberspace. Secur. Stud. 24, 316–348 (2015)
Buck, C., Olenberg, C., Schweizer, A., Volter, F., Eymann, T.: Never trust, always verify: a multivocal literature review on current knowledge and research gaps of zero-trust. Comput. Secur. 110, 102436 (2021)
Molinero, X., Riquelme, F.: Influence decision models: From cooperative game theory to social network analysis. Comput. Sci. Rev. 39, 100343 (2021)
Pauwels, E.: Hybrid CoE strategic analysis 26: how to protect biotechnology from adversarial AI attacks (2021). https://www.hybridcoe.fi/publications/cyber-biosecurity-how-to-protect-biotechnology-from-adversarial-ai-attacks/
Baldor, L.C.: Army officer: China, Russia Don’t Fear US Cyber Retaliation (2018). https://www.washingtonpost.com/politics/army-officer-china-russia-dont-fear-us-cyber-retaliation/2018/03/01/0470ca36-1dab-11e8-98f5_ceecfa8741b6_story.html
NATO AJP-3.20. Allied Joint Doctrine for Cyberspace Operations (2020)
Lin, H.: Cyberspace and national security threats, opportunities, and power in a virtual world. In: Operational considerations in cyber attack and cyber exploitation. Georgetown University Press (2012). ISBN 9781589019195
Bartles, C.: Getting gerasimov right. Milit. Rev. 96, 30–38 (2016)
Gunning, D., Stefik, M., Choi, J., Miller, T., Stumpf, S., Yang, J.Z.: XAI: explainable artificial intelligence. Sci. Robot. 4, 37 (2019)
Thomas, R.: Cyber war will not take place. J. Strategic Stud. 35, 5–32 (2012)
Yoo, J.D., et al.: Cyber attack and defense emulation agents. Appl. Sci. 10(6), 2140 (2020)
Luis Martinez, A., Maestre Vidal, J., Villagrá González, V.A.: Understanding and assessment of mission-centric key cyber terrains for joint military operations. CoRR, abs/2111.07005 (2021). https://arxiv.org/abs/2111.07005
Sengupta, S.: A survey of moving target defenses for network security. IEEE Commun. Surv. Tutor. 22(3), 1909–1941 (2020)
US JP 3–13.4. Military Deception (2012)
Sandoval Rodríguez-Bermejo, D., Maestre Vidal, J., Estévez Tapiador, J.: The stress as adversarial factor for cyber decision making. In: Proceedings 16th International Conference on Availability, Reliability and Security, Vienna, Austria (2021)
NATO AJP-5. Allied Joint Doctrine for the planning of operations (2019)
Gonzalez, C., Ben-Asher, N., Morrison, D.: Dynamics of decision making in cyber defense: using multi-agent cognitive modeling to understand CyberWar. In: Liu, P., Jajodia, S., Wang, C. (eds.) Theory and Models for Cyber Situation Awareness. LNCS, vol. 10030, pp. 113–127. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61152-5_5
Roldan, H., Reith, M.: A strategic framework for cyber attacks in the military. In: Proceedings of International Conference on Cyber Warfare and Security, Washington, USA (2018)
Strange, J.L., Iron, R.: Center of gravity what clausewitz really meant. US Marine Coprs Wal Coll Quantico VA (2004)
Starbird, K., Ahmer, A., Tom, W.: Disinformation as collaborative work: surfacing the participatory nature of strategic information operations. In: Proceedings of the ACM on Human-Computer Interaction, CSCW, vol. 3, p. 127 (2019)
Hakala, J., Melnychuk, J.: Russia’s strategy in cyberspace. NATO CCDCOE (2021). ISBN 9789934564901
US FM 3-12. Cyberspace Operations and Electromagnetic Warfare (2021)
US JP 3–12. Cyberspace Operations (2018)
Orye, E., Maennel, O.M.: Recommendations for enhancing the results of cyber effects. In: Proceedings of 11th International Conference on Cyber Conflict (CyCon), Tallin, Estonia (2019)
Wilson, A.: La ideología que lleva al desastre: dentro de la mente geopolítica rusa (2022). https://www.elconfidencial.com/mundo/2022-05-08/ideologia-lleva-desastre-mente-geopolitica-rusa_3420170/
Brizhinev, D., Ryan, R., Bradbury, R.: Modelling hegemonic power transition in cyberspace. Complexity 2018, 9306128 (2018)
Axelrod, R., Illiev, R.: The strategic timing of cyber exploits. In: Proceedings of American Political Science Association Annual Meeting, Chicago, IL, USA (2013)
Nye, J.S.: The Future of Power. Public Affairs, New York (2011)
Steed, D.: The Politics and Technology of Cyberspace. Routledge, London. ISBN 9781351265928
Sotelo Monge, M.A., Maestre Vidal, J., Martínez Pérez, G.: Detection of economic denial of sustainability (EDoS) threats in self-organizing networks. Comput. Commun. 145, 284–308 (2019)
Maestre Vidal, J., Sotelo Monge, M.A.: Obfuscation of malicious behaviors for thwarting masquerade detection systems based on locality features. Sensors 20(7), 2084 (2020)
Maestre Vidal, J., Sotelo Monge, M.A.: Framework for anticipatory self-protective 5G environments. In: Proceedings of 14th International Conference on Availability, Reliability and Security (ARES), Canterbury, Kent, UK (2019)
Maestre Vidal, J., Sotelo Monge, M.A., Villalba, L.J.G.: A novel pattern recognition system for detecting android malware by analyzing suspicious boot sequences. Knowl.-Based Syst. 150, 198–217 (2018)
Maestre Vidal, J., Orozco, A.L.S., Villalba, L.J.G.: Adaptive artificial immune networks for mitigating DoS flooding attacks. Swarm Evol. Comput. 38, 94–108 (2018)
Maestre Vidal, J., Sotelo Monge, M.A.: Denial of sustainability on military tactical clouds. In: Proceedings of 15th International Conference on Availability, Reliability and Security (ARES), Dublin, Ireland, pp. 1–9 (2020)
Sandoval Rodriguez-Bermejo, D., Daton Medenou, R., Ramis Pasqual de Riquelme, G., Maestre Vidal, J., Torelli, F., Llopis Sánchez, S.: Evaluation methodology for mission-centric cyber situational awareness capabilities. In: Proceedings of 15th International Conference on Availability, Reliability and Security (ARES), Dublin, Ireland, pp. 1–9 (2020)
Sotelo Monge, M.A., Maestre Vidal, J., Villalba, L.J.G.: Reasoning and knowledge acquisition framework for 5G network analytics. Sensors 17(10), 2405 (2017)
Acknowledgements

This research has received funding from the European Defence Industrial Development Programme (EDIDP) under the grant agreement Number EDIDP-CSAMN-SSC-2019-022-ECYSAP (European Cyber Situational Awareness Platform).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
Disclaimer
The contents reported in the paper reflect the opinions of the authors and do not necessarily reflect the opinions of the respective agencies, institutions or companies.
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ramón y Cajal Ramo, P., Arias, C.C., Manzanares Martínez, J.C., Vidal, J.M. (2023). A Revisitation of Clausewitz’s Thinking from the Cyber Situational Awareness Perspective. In: Katsikas, S., et al. Computer Security. ESORICS 2022 International Workshops. ESORICS 2022. Lecture Notes in Computer Science, vol 13785. Springer, Cham. https://doi.org/10.1007/978-3-031-25460-4_25
Download citation
DOI: https://doi.org/10.1007/978-3-031-25460-4_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25459-8
Online ISBN: 978-3-031-25460-4
eBook Packages: Computer ScienceComputer Science (R0)