Taking back the initiative: prospective intelligence and offensive capabilities enabling the proactive defense in the cyberspace

Authors

DOI:

https://doi.org/10.5902/2357797595736

Keywords:

Cyber sovereignty, Cyber power, Intelligence, Strategic prospective, Offensive cyber weapons

Abstract

Considering the application of cyber power, the states are currently divided into three groups. The first one consists of the liberal democracies, characterized by doubt, division and caution. The second comprises the authoritarian states, whose actions in cyberspace combine strategic vision, concealment and boldness. The third encompasses most of the remaining countries which, due to lack of capability, have little to no effective influence. In this scenario, cyber threats operate at large, taking risks and harming states, companies and individuals. This work hypothesis is that the use of prospective Cyber Intelligence, combined to the development of offensive cyber capabilities, forms the backbone of a strategy capable of aligning state, academia and industry, aimed to democratically strengthen security, contribute to strategic warning and challenge the freedom of action enjoyed by the cyber threats. After reviewing the concepts of sovereignty and power in cyberspace, the advantages of the attacker over the defender and the risks of a reactive posture will be analyzed, in order to explain the success that authoritarian states are achieving in cyber deterrence. 

Downloads

Download data is not yet available.

Author Biography

Jomar Barros de Andrade, Universidade Federal de Santa Maria

Mestre em Ciências Militares pela Escola de Comando e Estado-Maior do Exército; Oficial-General da Reserva do Exército Brasileiro; Pesquisador no Grupo de Análise Estratégica em Sistemas de Defesa, Universidade de Santa Maria, Santa Maria, RS, Brasil.

References

Baur, Michel. 2024. 360-defree Scenario Design and Development. Joint Warfare Centre. https://www.jwc.nato.int/our-work/scenario-development/

Borghard, Erica D.; Lonergan, Shawn W. 2018. Confidence Building Measures for the Cyber Domain. Strategic Studies Quarterly. https://www.airuniversity.af.edu/Portals/10/SSQ/documents/Volume-12_Issue-3/Borghard-Lonergan.pdf.

Brock, Julia V.; Lewis, James A. 2025. Mutual Defense in Cyberspace: Joint Action on Attribution. Center for Strategic and International Studies. https://www.csis.org/analysis/mutual-defense-cyberspace-joint-action-attribution

Cybersecurity and Infrastructure Security Agency (CISA). 2024. Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a U.S. Critical Infrastructure Sector Organization. https://www.cisa.gov/sites/default/files/2024-11/aa24-326a-enhancing-cyber-resilience-insights-from-cisa-red-team-assessment_0.pdf

Corn, Gary P.; Taylor, Robert. Sovereignty in the age of cyber. Cambridge University Press. https://doi.org/10.1017/aju.2017.57 DOI: https://doi.org/10.1017/aju.2017.57

Derian-Toth, Garrett; Walsh, Ryan; Sergueeva, Alexandra; Kim, Edward; Coon, Relieves; Hada, Hilda; Stancombe, Jared. Opportunities for Public and Private Atrribution of Cyber Operations. NATO Cooperative Cyber Defence Centre of Excellence. https://ccdcoe.org/uploads/2021/08/Tallinn_Papers_Attribution_18082021.pdf.

Dijk, Allard; Meier, Roland; Melella, Cosimo; Pihelgas, Mauno; Vaarandi, Risto; Lenders, Vincent. 2025. "Next Steps in Cyber Blue Tem Automation – Leveraging the Power of LLMs". 17th International Conference on Cyber Conflict: The Next Step. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/17th-international-conference-on-cyber-conflict-the-next-step/ DOI: https://doi.org/10.23919/CyCon65856.2025.11103720

Gartzke, Erik; Lindsay, Jon R. 2015. Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace. Security Studies. Routledge. http://dx.doi.org/10.1080/09636412.2015.1038188. DOI: https://doi.org/10.1080/09636412.2015.1038188

Gehri, Lina; Meier, Roland; Hulliger, Daniel; Lenders, Vincent. 2023. "Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic". 15th International Conference on Cyber Conflict: Meeting Reality. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/15th-international-conference-on-cyber-conflict-meeting-reality/. DOI: https://doi.org/10.23919/CyCon58705.2023.10182001

Goyal, Pankaj; Scott, Cody; Tucker, Todd. 2025. A FAIR Taxonomy for Cyber Risk Scenarios: An Analyst's Guide for Defining Risk Scenarios for Continuous Risk Management. FAIR Institute. https://www.fairinstitute.org/resources/fair-cyber-risk-scenario-taxonomy

Halisdemir, Emre; Karacan, Hacer; Pihelgas, Mauno; Lepik, Toomas; Cho, Sungbaek. 2022. "Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal". 14th International Conference on Cyber Conflict: Keeping Moving. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/cycon-2022-book/. DOI: https://doi.org/10.23919/CyCon55549.2022.9811014

Jacobsen, Jeppe T. 2021. "Cyber offense in NATO: challenges and opportunities". International Affairs 97. https://www.researchgate.net/publication/350527052_Cyber_offense_in_NATO_challenges_and_opportunities DOI: https://doi.org/10.1093/ia/iiab010

Kosseff, Jeff. 2020. "Retorsion as a Response to Ongoing Malign Cyber Operations". 12th International Conference on Cyber Conflict: 20/20 Vision – The Next Decade. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/12th-international-conference-on-cyber-conflict-20-20-vision-the-next-decade-proceedings-2020/ DOI: https://doi.org/10.23919/CyCon49761.2020.9131730

Leiter, Andrea. 2020. "Cyber Sovereignty: A Snapshot From A Field In Motion". Harvard International Law Journal Frontiers. https://journals.law.harvard.edu/ilj/wp-content/uploads/sites/84/Leiter-PDF-format.pdf.

Lewis, James A. 2022. "A Strategic Outlook for Cyberspace Operations". Cyberspace Strategic Outlook 2030: Horizon Scanning and Analysis. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/cyberspace-strategic-outlook-2030-horizon-scanning-and-analysis/.

Lewis, James A. 2015. "The role of offensive ciber operations in NATO's collective defence". Tallinn Paper No. 8. NATO CCDCOE Publications. https://ccdcoe.org/uploads/2018/10/TP_08_2015_0.pdf .

Lonergan, Erica D.; Montgomery, Mark. 2022. "The Promise and Perils of Allied Offensive Cyber Operations". 14th International Conference on Cyber Conflict: Keeping Moving. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/cycon-2022-book/. DOI: https://doi.org/10.23919/CyCon55549.2022.9811090

Neill, Martin; Hinkle, Wade P.; Morgan, Gary. 2016. Scenarios – International Best Practice: An Analysis of Their Use by the United States, United Kingdom and Republic of Korea. Institute for Defense Analysis. https://www.ida.org/research-and-publications/publications/all/s/sc/scenarios-international-best-practice-analysis-of-their-use-by-the-united-states-united-kingdom-and.

Nye, Joseph, Jr. 2010. Cyber Power. Belfer Center for Science and International Affairs". Harvard Kennedy School. https://www.belfercenter.org/publication/cyber-power.

Schmitt, Michael N (editor). 2016. Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press. DOI: https://doi.org/10.1017/9781316822524

Stejskal, Petr; Faix, Martin. 2022. "Legal Aspects of Misattribution Caused by Cyber Deception". 14th International Conference on Cyber Conflict: Keeping Moving. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/cycon-2022-book/. DOI: https://doi.org/10.23919/CyCon55549.2022.9810910

Sullivan, Scott. 2023. "Unpacking Cyber Neutrality". 15th International Conference on Cyber Conflict: Meeting Reality. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/15th-international-conference-on-cyber-conflict-meeting-reality/. DOI: https://doi.org/10.23919/CyCon58705.2023.10181864

Sullivan, Scott; Ricket, Iben. 2024. "Targeting in the Black Box". 16th International Conference on Cyber Conflict: Over the Horizon. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/16th-international-conference-on-cyber-conflict-over-the-horizon/ DOI: https://doi.org/10.23919/CyCon62501.2024.10685575

Vesnic-Alujevic, Lucia; d'Ambrosio, Salvatore. 2025. "Augmented foresight: The transformative power of generative AI for anticipatory governance". Policy Foresight Analysis. European Parliament. https://www.europarl.europa.eu/RegData/etudes/BRIE/2025/774665/EPRS_BRI(2025)774665_EN.pdf

Voo, Julia; Hemani, Irfan; Jones, Simon; From Sombre, Winnona. 2020. Reconceptualizing Cyber Power. Belfer Center for Science and International Affairs, Harvard Kennedy School. https://www.belfercenter.org/publication/reconceptualizing-cyber-power.

Voo, Julia; Hemani, Irfan; Cassidy, Daniel. 2022. National Cyber Power Index 2022. Belfer Center for Science and International Affairs, Harvard Kennedy School. https://www.belfercenter.org/publication/national-cyber-power-index-2022.

Vuuren, Ian van. 2025. The Dawn of Scenario Plannling 3.0). https://ianjvv2.substack.com/p/the-dawn-of-scenario-planning-30.

"Significant Cyber Incidents | Strategic Technologies Program | CSIS". 2025. https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents.

Taddeo, Mariarosaria. 2017. Deterrence by Norms to Stop Interstate Cyber Attacks. University of Oxford. https://ora.ox.ac.uk/objects/uuid:a58db80f-8661-4911-beb9-adf45f650c19.

Taddeo, Mariarosaria. 2018. "How to Deter in Cyberspace". Hybrid COE Strategic Analysis. https://www.hybridcoe.fi/publications/hybrid-coe-strategic-analysis-9-how-to-deter-in-cyberspace/

Wang, Wei-Che. 2024. "Legal, Policy and Compliance Issues in Using AI for Security: Using Taiwan's Cybersecuriy Management Act ans Penetration Testing as Examples". 16th International Conference on Cyber Conflict: Over the Horizon. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/16th-international-conference-on-cyber-conflict-over-the-horizon/ DOI: https://doi.org/10.23919/CyCon62501.2024.10685586

Yulianto, Semi; Soewito, Benfano; Gaol, Ford Lumban; Kurniawan, Aditya. 2025. "Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment". Cyber Security and Applications Volume 3. https://doi.org/10.1016/j.csa.2024.100077 DOI: https://doi.org/10.1016/j.csa.2024.100077

Downloads

Published

2026-03-20

How to Cite

Andrade, J. B. de. (2026). Taking back the initiative: prospective intelligence and offensive capabilities enabling the proactive defense in the cyberspace. InterAção, 17(1), e95736. https://doi.org/10.5902/2357797595736