Logo: to the web site of the Swedish Defence University

fhs.se
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Projecting Power in the Fifth Domain: An assessment of why states use proxies for offensive cyber operations
Swedish Defence University.
2021 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

In the 21st century, cyber operations have become the modern manifestation of political warfare between great powers. Many states have made considerable efforts to build up their respective cyber commands. Contrary, or as a complement to this, some states choses to rely upon actors detached from the state for conducting their operations online. What incentives explain this strategy? There are inherent risks with employing proxies and states nowadays have an ability to conduct cyber operations from central military commands. This presents a puzzle. By using a comparative case study approach, this thesis provides a portrait of how two leading cyber actors, Russia and The United States employ different strategies in the digital domain. To understand the motivations behind state delegation of cyber conflict, this thesis applies Principal-Agent theory to explain the relationships states cultivate with non-state actors. I propose a framework containing three hypotheses that ought to affect the decision to delegate; cyber proxies offer states a possibility to enhance their capabilities, save cost and evade accountability. Through analysing the cases, I find that the use of cyber proxies could partly be explained by my hypotheses rooted in the PA theory. Lower internal cyber capability and the desire to save costs may explain why states choses to use proxies in the digital domain. However, the empirical evidence is not strong enough to suggest that cyber proxies offer states a possibility to evade accountability. Rather, it is the cyber domain itself that complicates attribution efforts. Consequently, the findings do not confirm the hypothesis that cyber proxies provide enhanced plausible deniability benefits compared to government agents. In spite of that, this thesis concludes that cyber proxies together with their implications for escalatory dynamics will probably remain challenging in the foreseeable future. 

Place, publisher, year, edition, pages
2021. , p. 57
Keywords [en]
Cyber operations, PA theory, Proxy, Russia, The United States.
National Category
Political Science
Identifiers
URN: urn:nbn:se:fhs:diva-9980OAI: oai:DiVA.org:fhs-9980DiVA, id: diva2:1564267
Subject / course
War Studies, Thesis
Educational program
Master's programme in Politics and War
Supervisors
Examiners
Available from: 2021-06-30 Created: 2021-06-11 Last updated: 2025-09-29Bibliographically approved

Open Access in DiVA

fulltext(558 kB)655 downloads
File information
File name FULLTEXT01.pdfFile size 558 kBChecksum SHA-512
f70cd60ee032eefb895b0efbb03b559330d6ad004cad30ef9de726a1a5b8d9861a4aaaceb32803b74781004af41a1e5bef0e96b72bf33cfea9ed433058c7ca5a
Type fulltextMimetype application/pdf

By organisation
Swedish Defence University
Political Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 655 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 1168 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf