Jump to ContentJump to Main Navigation
Inside the Enemy's ComputerIdentifying Cyber Attackers$
Users without a subscription are not able to see the full content.

Clement Guitton

Print publication date: 2017

Print ISBN-13: 9780190699994

Published to Oxford Scholarship Online: August 2017

DOI: 10.1093/oso/9780190699994.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 25 September 2021

Plausible Deniability

Plausible Deniability

(p.163) 6 Plausible Deniability
Inside the Enemy's Computer

Clement Guitton

Oxford University Press

What does it mean for a cyber attack to be plausibly deniable? And, more to the point, how can states engineer plausible deniability? This chapter makes two related arguments that run against common assumptions in the literature. Firstly, states engineer plausible deniability by relying not on foreign and distant hacking groups, but usually on domestic proxies. Although this reliance increases the state’s likelihood of being exposed, it also gives the state a greater ability to control the hired group. Secondly, connecting a state to an attack makes the state open to retaliation and largely accounts for why a state can be zealous in plausibly denying its involvement. Strategically, however, it does not make sense for states to seek plausible deniability for all types of attack. Espionage operations almost always prompt a backlash and can warrant special precautionary measures. But sabotage operations aimed at coercing an actor into a change of behavior require clarity. The instigator needs to ensure that the victim is cognizant of the motive behind the attack so that the threat can inform their potential decision to change policy. By revealing its identity while leaving room for ambiguity, a state can simultaneously send this signal and avoid retaliation.

Keywords:   Cyber attack, Plausible deniability, Proxies, Ambiguity

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .