1 Cyber War Games: Strategic Jostling Among Traditional Adversaries 3
fundamental game theoretic concepts and some recent work on cyber warfare that
includes game theoretic models. Sect. 1.4 discusses the models in details followed
by a succinct conclusion.
1.2 Cyber Warfare
Definition of cyber attacks is contextual: depending on the actors, motivation, tar-
gets, and actions, they can be called cyber terrorism, cyber crime, cyber activism, etc.
There are several distinct modes of conflicts related to cyber warfare. Understanding
the relationships between actors, their behavior, and their motivations is essential
in order to understand cyber warfare better and to reduce chances of a serious cy-
ber conflict. We use game theoretic models to look at positions of the key players
on each of these conflicts to understand the dynamics among the players in these
conflicts. We select four modes of cyber conflict that are dominating international
cyber politics for further analysis including: (1) social media wars that influences a
country’s internal politics often with a goal of fomenting social uprisings that can
result in political change; (2) strategic war aimed at causing damage for the adver-
sary as well as pillaging resources (e.g., industrial espionage); for this, countries are
acquiring resources to conduct both espionage and develop tools that can be used to
disable the adversarial activities occurring in critical infrastructure including power,
communication, media, Internet, etc.; (3) ideological battle where fundamentalist
organizations use the Internet to spew their ideology and to recruit members in other
countries for their cause; (4) citizen-initiated war where a country’s civilians di-
rectly attack another country’s citizens and institutions as a part of larger conflict
(ideological or kinetic).
Foreign intervention through social media has become a significant fear for coun-
tries leading to aggressive monitoring if not outright controlling of social media
content. Some countries have already invested in censorship and control of the In-
ternet mainly driven by intention to decrease political unrest or ideological and
religion polluting. Social media-facilitated revolutions have driven some countries
to the point of paranoia regarding control of online activity. If this type of distrust
keeps growing, there is only one logical conclusion: separation of the Internet across
country borders. A separated Internet could have severe consequences with negative
impacts from the individual to national level from social relationships, educational
pursuits, commerce, and tourism. In a lot of the authoritarian and corrupt regimes
the conditions on the ground are ripe for popular revolutions. In the past, they have
been kept in check through censorship and coercion. Social media has provided a
forum for organizing large scale protests—which countries are prone to such attacks
and which countries have incentives to sponsor such attacks.
The strategic war of targeting the resources has each country building up their
cyber arsenals quietly while publicly denouncing similar activities by others. Each
country considers cyberspace a natural place for gaining strategic military advantage.
This is causing serious misgivings between different countries. For instance, the