Skip to main content

A Revisitation of Clausewitz’s Thinking from the Cyber Situational Awareness Perspective

  • Conference paper
  • First Online:
Computer Security. ESORICS 2022 International Workshops (ESORICS 2022)

Abstract

This paper has as main purpose to revisit some of the foundations of Western military thinking, and its evolution derived from the increasingly attenuated need on making use of cyberspace as domain for resolving state-level conflicts through the use of force. This will be done on the basis of the work of the Prussian military theorist Carl von Clausewitz, and focalized in their implications when developing and operating cyber situational awareness capabilities. Rather than remaining a mere retrospective the paper will analyze the present and possible projection of some of the key concepts in geostrategic, operational planning and international law directed from the following dimensions: 1) the nature of cyber conflicts as part of war; 2) the digitalization of the society; 3) the friction forces on cyberspace operations; 4) the centers of gravity in cyberspace; and 5) decisive conditions and culminating points on cyberspace operations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This concept, meaning the study of war, was first introduced by Gaston Bouthoul, a French-Tunisian Doctor in Law, Politics and Social Sciences. Bouthoul later founded the Institut Français de Polémologie, one of the few research institutes focused on the social phenomenon of war.

References

  1. Ramon Y Cajal Ramo, P., Maestre Vidal, J.: Understanding the ethical and regulatory boundaries of the military actuation on the cyberspace. In: Proceedings of 16th International Conference on Availability, Reliability and Security, Vienna, Austria (2021)

    Google Scholar 

  2. von Clausewitz, C., Graham, J.J., Maude, F.N.: On war by Carl von Clausewitz, (translated by J.J. Graham). New & rev. ed. with introduction and notes by F.N. Maude. Kegan Paul, Trench, Trubner London (1911)

    Google Scholar 

  3. Semmel, B. Marxism and the Science of War. Oxford University Press, Oxford (1981). ISBN 9780198761129

    Google Scholar 

  4. Malesevic, S.: The Sociology of War and Violence. Cambridge University Press, Cambridge (2010). https://doi.org/10.1017/CBO9780511777752

    Book  Google Scholar 

  5. Brantly, A.F.: The violence of hacking: state violence and cyberspace. Cyber Defence Rev. 2(1), 73–92 (2017)

    Google Scholar 

  6. Roucek, J.S.: La sociologia de la violencia. Rev. Mexicana Opin. Publica 16, 139–148 (2014)

    Google Scholar 

  7. Durkheim, É., Kerr White Health Care Collection and Simpson, G., Spaulding, J.A.: Suicide: A Study in Sociology. Free Press (1951). ISBN 9780029086605

    Google Scholar 

  8. Bouthoul, G.: Sur les fonctions présumées et la périodicité des guerres. Revue Sci. Econ. (Lieja) 161–174 (1939)

    Google Scholar 

  9. Bouthoul, G.: La guerra. Oikos-Tau (1971). ISBN 8428101779

    Google Scholar 

  10. Eichensehr, K.: Ukraine, cyberattacks, and the lessons for international law. Am. J. Int. Law 116, 145–149 (2022)

    Google Scholar 

  11. Zhou, M.J., Huang, J.B., Chen, J.Y.: Time and frequency spillovers between political risk and the stock returns of China’s rare earths. Resour. Policy 75, 102464 (2022)

    Article  Google Scholar 

  12. Llanten-Quiroz, N.F.L.: polemología como aporte metodológico para profundizar la historia de la guerra. Rev. Cientifica Gener. Jose Maria Cordova 19(35), 705–721 (2021)

    Article  Google Scholar 

  13. Bada, M. and Nurse, J.R.C. The social and psychological impact of cyberattacks. In: Emerging Cyber Threats and Cognitive Vulnerabilities, pp. 73–92 (2020)

    Google Scholar 

  14. Basic Aerospace Doctrine of the USAF. Air Force Manual 1-1 (1992)

    Google Scholar 

  15. Fairburn, N., Shelton, A., Ackroyd, F., Selfe, R.: Beyond Murphy’s law: applying wider human factors behavioural science approaches in cyber-security resilience. In: Proceedings of 23rd International Conference on Human-Computer Interaction, Washington, D.C., USA, pp. 123–138 (2021)

    Google Scholar 

  16. Rauti, S.: Controlling uncertainty with proactive cyber defense: a Clausewitzian perspective. In: Proceedings of International Symposium on Security in Computing and Communication, Chennai, India (2019)

    Google Scholar 

  17. Sotelo Monge, M.A., Maestre Vidal, J.: Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge. Future Gener. Comput. Syst. 125, 869–890 (2021)

    Article  Google Scholar 

  18. NATO AJP 3–13. Allied Joint Doctrine for the Deployment and Redeployment of Forces (2021)

    Google Scholar 

  19. Rizzo, M.J., Dold, M.: Knightian uncertainty: through a Jamesian window. Camb. J. Econ. 45(5), 967–988 (2021)

    Article  Google Scholar 

  20. Brantly, A.F.: Risk and uncertainty can be analyzed in cyberspace. J. Cybersecur. 7(1) (2021)

    Google Scholar 

  21. Gartzke, E., Lindsay, J.R.: Weaving tangled webs: offense, defense, and deception in cyberspace. Secur. Stud. 24, 316–348 (2015)

    Article  Google Scholar 

  22. Buck, C., Olenberg, C., Schweizer, A., Volter, F., Eymann, T.: Never trust, always verify: a multivocal literature review on current knowledge and research gaps of zero-trust. Comput. Secur. 110, 102436 (2021)

    Article  Google Scholar 

  23. Molinero, X., Riquelme, F.: Influence decision models: From cooperative game theory to social network analysis. Comput. Sci. Rev. 39, 100343 (2021)

    Article  MathSciNet  Google Scholar 

  24. Pauwels, E.: Hybrid CoE strategic analysis 26: how to protect biotechnology from adversarial AI attacks (2021). https://www.hybridcoe.fi/publications/cyber-biosecurity-how-to-protect-biotechnology-from-adversarial-ai-attacks/

  25. Baldor, L.C.: Army officer: China, Russia Don’t Fear US Cyber Retaliation (2018). https://www.washingtonpost.com/politics/army-officer-china-russia-dont-fear-us-cyber-retaliation/2018/03/01/0470ca36-1dab-11e8-98f5_ceecfa8741b6_story.html

  26. NATO AJP-3.20. Allied Joint Doctrine for Cyberspace Operations (2020)

    Google Scholar 

  27. Lin, H.: Cyberspace and national security threats, opportunities, and power in a virtual world. In: Operational considerations in cyber attack and cyber exploitation. Georgetown University Press (2012). ISBN 9781589019195

    Google Scholar 

  28. Bartles, C.: Getting gerasimov right. Milit. Rev. 96, 30–38 (2016)

    Google Scholar 

  29. Gunning, D., Stefik, M., Choi, J., Miller, T., Stumpf, S., Yang, J.Z.: XAI: explainable artificial intelligence. Sci. Robot. 4, 37 (2019)

    Article  Google Scholar 

  30. Thomas, R.: Cyber war will not take place. J. Strategic Stud. 35, 5–32 (2012)

    Article  Google Scholar 

  31. Yoo, J.D., et al.: Cyber attack and defense emulation agents. Appl. Sci. 10(6), 2140 (2020)

    Article  Google Scholar 

  32. Luis Martinez, A., Maestre Vidal, J., Villagrá González, V.A.: Understanding and assessment of mission-centric key cyber terrains for joint military operations. CoRR, abs/2111.07005 (2021). https://arxiv.org/abs/2111.07005

  33. Sengupta, S.: A survey of moving target defenses for network security. IEEE Commun. Surv. Tutor. 22(3), 1909–1941 (2020)

    Article  Google Scholar 

  34. US JP 3–13.4. Military Deception (2012)

    Google Scholar 

  35. Sandoval Rodríguez-Bermejo, D., Maestre Vidal, J., Estévez Tapiador, J.: The stress as adversarial factor for cyber decision making. In: Proceedings 16th International Conference on Availability, Reliability and Security, Vienna, Austria (2021)

    Google Scholar 

  36. NATO AJP-5. Allied Joint Doctrine for the planning of operations (2019)

    Google Scholar 

  37. Gonzalez, C., Ben-Asher, N., Morrison, D.: Dynamics of decision making in cyber defense: using multi-agent cognitive modeling to understand CyberWar. In: Liu, P., Jajodia, S., Wang, C. (eds.) Theory and Models for Cyber Situation Awareness. LNCS, vol. 10030, pp. 113–127. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61152-5_5

    Chapter  Google Scholar 

  38. Roldan, H., Reith, M.: A strategic framework for cyber attacks in the military. In: Proceedings of International Conference on Cyber Warfare and Security, Washington, USA (2018)

    Google Scholar 

  39. Strange, J.L., Iron, R.: Center of gravity what clausewitz really meant. US Marine Coprs Wal Coll Quantico VA (2004)

    Google Scholar 

  40. Starbird, K., Ahmer, A., Tom, W.: Disinformation as collaborative work: surfacing the participatory nature of strategic information operations. In: Proceedings of the ACM on Human-Computer Interaction, CSCW, vol. 3, p. 127 (2019)

    Google Scholar 

  41. Hakala, J., Melnychuk, J.: Russia’s strategy in cyberspace. NATO CCDCOE (2021). ISBN 9789934564901

    Google Scholar 

  42. US FM 3-12. Cyberspace Operations and Electromagnetic Warfare (2021)

    Google Scholar 

  43. US JP 3–12. Cyberspace Operations (2018)

    Google Scholar 

  44. Orye, E., Maennel, O.M.: Recommendations for enhancing the results of cyber effects. In: Proceedings of 11th International Conference on Cyber Conflict (CyCon), Tallin, Estonia (2019)

    Google Scholar 

  45. Wilson, A.: La ideología que lleva al desastre: dentro de la mente geopolítica rusa (2022). https://www.elconfidencial.com/mundo/2022-05-08/ideologia-lleva-desastre-mente-geopolitica-rusa_3420170/

  46. Brizhinev, D., Ryan, R., Bradbury, R.: Modelling hegemonic power transition in cyberspace. Complexity 2018, 9306128 (2018)

    Article  Google Scholar 

  47. Axelrod, R., Illiev, R.: The strategic timing of cyber exploits. In: Proceedings of American Political Science Association Annual Meeting, Chicago, IL, USA (2013)

    Google Scholar 

  48. Nye, J.S.: The Future of Power. Public Affairs, New York (2011)

    Google Scholar 

  49. Steed, D.: The Politics and Technology of Cyberspace. Routledge, London. ISBN 9781351265928

    Google Scholar 

  50. Sotelo Monge, M.A., Maestre Vidal, J., Martínez Pérez, G.: Detection of economic denial of sustainability (EDoS) threats in self-organizing networks. Comput. Commun. 145, 284–308 (2019)

    Google Scholar 

  51. Maestre Vidal, J., Sotelo Monge, M.A.: Obfuscation of malicious behaviors for thwarting masquerade detection systems based on locality features. Sensors 20(7), 2084 (2020)

    Google Scholar 

  52. Maestre Vidal, J., Sotelo Monge, M.A.: Framework for anticipatory self-protective 5G environments. In: Proceedings of 14th International Conference on Availability, Reliability and Security (ARES), Canterbury, Kent, UK (2019)

    Google Scholar 

  53. Maestre Vidal, J., Sotelo Monge, M.A., Villalba, L.J.G.: A novel pattern recognition system for detecting android malware by analyzing suspicious boot sequences. Knowl.-Based Syst. 150, 198–217 (2018)

    Google Scholar 

  54. Maestre Vidal, J., Orozco, A.L.S., Villalba, L.J.G.: Adaptive artificial immune networks for mitigating DoS flooding attacks. Swarm Evol. Comput. 38, 94–108 (2018)

    Article  Google Scholar 

  55. Maestre Vidal, J., Sotelo Monge, M.A.: Denial of sustainability on military tactical clouds. In: Proceedings of 15th International Conference on Availability, Reliability and Security (ARES), Dublin, Ireland, pp. 1–9 (2020)

    Google Scholar 

  56. Sandoval Rodriguez-Bermejo, D., Daton Medenou, R., Ramis Pasqual de Riquelme, G., Maestre Vidal, J., Torelli, F., Llopis Sánchez, S.: Evaluation methodology for mission-centric cyber situational awareness capabilities. In: Proceedings of 15th International Conference on Availability, Reliability and Security (ARES), Dublin, Ireland, pp. 1–9 (2020)

    Google Scholar 

  57. Sotelo Monge, M.A., Maestre Vidal, J., Villalba, L.J.G.: Reasoning and knowledge acquisition framework for 5G network analytics. Sensors 17(10), 2405 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

figure a

This research has received funding from the European Defence Industrial Development Programme (EDIDP) under the grant agreement Number EDIDP-CSAMN-SSC-2019-022-ECYSAP (European Cyber Situational Awareness Platform).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jorge Maestre Vidal .

Editor information

Editors and Affiliations

Ethics declarations

Disclaimer

The contents reported in the paper reflect the opinions of the authors and do not necessarily reflect the opinions of the respective agencies, institutions or companies.

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ramón y Cajal Ramo, P., Arias, C.C., Manzanares Martínez, J.C., Vidal, J.M. (2023). A Revisitation of Clausewitz’s Thinking from the Cyber Situational Awareness Perspective. In: Katsikas, S., et al. Computer Security. ESORICS 2022 International Workshops. ESORICS 2022. Lecture Notes in Computer Science, vol 13785. Springer, Cham. https://doi.org/10.1007/978-3-031-25460-4_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25460-4_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25459-8

  • Online ISBN: 978-3-031-25460-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics