Taking back the initiative: prospective intelligence and offensive capabilities enabling the proactive defense in the cyberspace
DOI:
https://doi.org/10.5902/2357797595736Keywords:
Cyber sovereignty, Cyber power, Intelligence, Strategic prospective, Offensive cyber weaponsAbstract
Considering the application of cyber power, the states are currently divided into three groups. The first one consists of the liberal democracies, characterized by doubt, division and caution. The second comprises the authoritarian states, whose actions in cyberspace combine strategic vision, concealment and boldness. The third encompasses most of the remaining countries which, due to lack of capability, have little to no effective influence. In this scenario, cyber threats operate at large, taking risks and harming states, companies and individuals. This work hypothesis is that the use of prospective Cyber Intelligence, combined to the development of offensive cyber capabilities, forms the backbone of a strategy capable of aligning state, academia and industry, aimed to democratically strengthen security, contribute to strategic warning and challenge the freedom of action enjoyed by the cyber threats. After reviewing the concepts of sovereignty and power in cyberspace, the advantages of the attacker over the defender and the risks of a reactive posture will be analyzed, in order to explain the success that authoritarian states are achieving in cyber deterrence.
Downloads
References
Baur, Michel. 2024. 360-defree Scenario Design and Development. Joint Warfare Centre. https://www.jwc.nato.int/our-work/scenario-development/
Borghard, Erica D.; Lonergan, Shawn W. 2018. Confidence Building Measures for the Cyber Domain. Strategic Studies Quarterly. https://www.airuniversity.af.edu/Portals/10/SSQ/documents/Volume-12_Issue-3/Borghard-Lonergan.pdf.
Brock, Julia V.; Lewis, James A. 2025. Mutual Defense in Cyberspace: Joint Action on Attribution. Center for Strategic and International Studies. https://www.csis.org/analysis/mutual-defense-cyberspace-joint-action-attribution
Cybersecurity and Infrastructure Security Agency (CISA). 2024. Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a U.S. Critical Infrastructure Sector Organization. https://www.cisa.gov/sites/default/files/2024-11/aa24-326a-enhancing-cyber-resilience-insights-from-cisa-red-team-assessment_0.pdf
Corn, Gary P.; Taylor, Robert. Sovereignty in the age of cyber. Cambridge University Press. https://doi.org/10.1017/aju.2017.57 DOI: https://doi.org/10.1017/aju.2017.57
Derian-Toth, Garrett; Walsh, Ryan; Sergueeva, Alexandra; Kim, Edward; Coon, Relieves; Hada, Hilda; Stancombe, Jared. Opportunities for Public and Private Atrribution of Cyber Operations. NATO Cooperative Cyber Defence Centre of Excellence. https://ccdcoe.org/uploads/2021/08/Tallinn_Papers_Attribution_18082021.pdf.
Dijk, Allard; Meier, Roland; Melella, Cosimo; Pihelgas, Mauno; Vaarandi, Risto; Lenders, Vincent. 2025. "Next Steps in Cyber Blue Tem Automation – Leveraging the Power of LLMs". 17th International Conference on Cyber Conflict: The Next Step. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/17th-international-conference-on-cyber-conflict-the-next-step/ DOI: https://doi.org/10.23919/CyCon65856.2025.11103720
Gartzke, Erik; Lindsay, Jon R. 2015. Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace. Security Studies. Routledge. http://dx.doi.org/10.1080/09636412.2015.1038188. DOI: https://doi.org/10.1080/09636412.2015.1038188
Gehri, Lina; Meier, Roland; Hulliger, Daniel; Lenders, Vincent. 2023. "Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic". 15th International Conference on Cyber Conflict: Meeting Reality. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/15th-international-conference-on-cyber-conflict-meeting-reality/. DOI: https://doi.org/10.23919/CyCon58705.2023.10182001
Goyal, Pankaj; Scott, Cody; Tucker, Todd. 2025. A FAIR Taxonomy for Cyber Risk Scenarios: An Analyst's Guide for Defining Risk Scenarios for Continuous Risk Management. FAIR Institute. https://www.fairinstitute.org/resources/fair-cyber-risk-scenario-taxonomy
Halisdemir, Emre; Karacan, Hacer; Pihelgas, Mauno; Lepik, Toomas; Cho, Sungbaek. 2022. "Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal". 14th International Conference on Cyber Conflict: Keeping Moving. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/cycon-2022-book/. DOI: https://doi.org/10.23919/CyCon55549.2022.9811014
Jacobsen, Jeppe T. 2021. "Cyber offense in NATO: challenges and opportunities". International Affairs 97. https://www.researchgate.net/publication/350527052_Cyber_offense_in_NATO_challenges_and_opportunities DOI: https://doi.org/10.1093/ia/iiab010
Kosseff, Jeff. 2020. "Retorsion as a Response to Ongoing Malign Cyber Operations". 12th International Conference on Cyber Conflict: 20/20 Vision – The Next Decade. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/12th-international-conference-on-cyber-conflict-20-20-vision-the-next-decade-proceedings-2020/ DOI: https://doi.org/10.23919/CyCon49761.2020.9131730
Leiter, Andrea. 2020. "Cyber Sovereignty: A Snapshot From A Field In Motion". Harvard International Law Journal Frontiers. https://journals.law.harvard.edu/ilj/wp-content/uploads/sites/84/Leiter-PDF-format.pdf.
Lewis, James A. 2022. "A Strategic Outlook for Cyberspace Operations". Cyberspace Strategic Outlook 2030: Horizon Scanning and Analysis. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/cyberspace-strategic-outlook-2030-horizon-scanning-and-analysis/.
Lewis, James A. 2015. "The role of offensive ciber operations in NATO's collective defence". Tallinn Paper No. 8. NATO CCDCOE Publications. https://ccdcoe.org/uploads/2018/10/TP_08_2015_0.pdf .
Lonergan, Erica D.; Montgomery, Mark. 2022. "The Promise and Perils of Allied Offensive Cyber Operations". 14th International Conference on Cyber Conflict: Keeping Moving. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/cycon-2022-book/. DOI: https://doi.org/10.23919/CyCon55549.2022.9811090
Neill, Martin; Hinkle, Wade P.; Morgan, Gary. 2016. Scenarios – International Best Practice: An Analysis of Their Use by the United States, United Kingdom and Republic of Korea. Institute for Defense Analysis. https://www.ida.org/research-and-publications/publications/all/s/sc/scenarios-international-best-practice-analysis-of-their-use-by-the-united-states-united-kingdom-and.
Nye, Joseph, Jr. 2010. Cyber Power. Belfer Center for Science and International Affairs". Harvard Kennedy School. https://www.belfercenter.org/publication/cyber-power.
Schmitt, Michael N (editor). 2016. Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press. DOI: https://doi.org/10.1017/9781316822524
Stejskal, Petr; Faix, Martin. 2022. "Legal Aspects of Misattribution Caused by Cyber Deception". 14th International Conference on Cyber Conflict: Keeping Moving. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/cycon-2022-book/. DOI: https://doi.org/10.23919/CyCon55549.2022.9810910
Sullivan, Scott. 2023. "Unpacking Cyber Neutrality". 15th International Conference on Cyber Conflict: Meeting Reality. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/15th-international-conference-on-cyber-conflict-meeting-reality/. DOI: https://doi.org/10.23919/CyCon58705.2023.10181864
Sullivan, Scott; Ricket, Iben. 2024. "Targeting in the Black Box". 16th International Conference on Cyber Conflict: Over the Horizon. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/16th-international-conference-on-cyber-conflict-over-the-horizon/ DOI: https://doi.org/10.23919/CyCon62501.2024.10685575
Vesnic-Alujevic, Lucia; d'Ambrosio, Salvatore. 2025. "Augmented foresight: The transformative power of generative AI for anticipatory governance". Policy Foresight Analysis. European Parliament. https://www.europarl.europa.eu/RegData/etudes/BRIE/2025/774665/EPRS_BRI(2025)774665_EN.pdf
Voo, Julia; Hemani, Irfan; Jones, Simon; From Sombre, Winnona. 2020. Reconceptualizing Cyber Power. Belfer Center for Science and International Affairs, Harvard Kennedy School. https://www.belfercenter.org/publication/reconceptualizing-cyber-power.
Voo, Julia; Hemani, Irfan; Cassidy, Daniel. 2022. National Cyber Power Index 2022. Belfer Center for Science and International Affairs, Harvard Kennedy School. https://www.belfercenter.org/publication/national-cyber-power-index-2022.
Vuuren, Ian van. 2025. The Dawn of Scenario Plannling 3.0). https://ianjvv2.substack.com/p/the-dawn-of-scenario-planning-30.
"Significant Cyber Incidents | Strategic Technologies Program | CSIS". 2025. https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents.
Taddeo, Mariarosaria. 2017. Deterrence by Norms to Stop Interstate Cyber Attacks. University of Oxford. https://ora.ox.ac.uk/objects/uuid:a58db80f-8661-4911-beb9-adf45f650c19.
Taddeo, Mariarosaria. 2018. "How to Deter in Cyberspace". Hybrid COE Strategic Analysis. https://www.hybridcoe.fi/publications/hybrid-coe-strategic-analysis-9-how-to-deter-in-cyberspace/
Wang, Wei-Che. 2024. "Legal, Policy and Compliance Issues in Using AI for Security: Using Taiwan's Cybersecuriy Management Act ans Penetration Testing as Examples". 16th International Conference on Cyber Conflict: Over the Horizon. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/16th-international-conference-on-cyber-conflict-over-the-horizon/ DOI: https://doi.org/10.23919/CyCon62501.2024.10685586
Yulianto, Semi; Soewito, Benfano; Gaol, Ford Lumban; Kurniawan, Aditya. 2025. "Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment". Cyber Security and Applications Volume 3. https://doi.org/10.1016/j.csa.2024.100077 DOI: https://doi.org/10.1016/j.csa.2024.100077
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


