An official website of the United States government
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

The Cyber Defense Review

Bring on the Cyber Attacks – The increased predatory power of the restrained red queen in a nationstate cyber conflict

By Dr. Rosemary A. Burk, Dr. Jan Kallberg | August 01, 2018

The militarized and contested Internet with a multitude of state-sponsored cyberattacks can generate an evolutionary process when the targeted nation is strengthened by the abundance of information it receives from the attacks.When the targeted nation restrains from retaliating against the attacking adversarial state its systems are perfected, meanwhile the attacking state is denied the feedback needed to stay current and pose a long-term threat. The targeted nation has increased its potential to go from prey to predator, when the accrued knowledge far exceeds the attacker, and the game has changed. The targeted nation can then strike back far superior on the initial attacker compared to the initial attacker’s first moves. In contrast to the Red Queen hypothesis, our Restrained Red Queen model illustrates the adaptive advantage of a targeted nation that decides to selectively counterstrike its aggressor. The reticent targeted nation has benefited from restraining to counter-strike and increases its own survivability by embracing the initial attacks as information that can be converted to superiority over time.

 

Bring on the Cyber Attacks – The increased predatory power of the restrained red queen in a nationstate cyber conflict
Bring on the Cyber Attacks – The increased predatory power of the restrained red queen in a nationstate cyber conflictBring on the Cyber Attacks – The increased predatory power of the restrained red queen in a nationstate cyber conflict



US Army Comments Policy