Recent years have seen growing concern over the use of cyber attacks in wartime, but little evidence that these new tools of coercion can change battlefield events. We present the first quantitative analysis of the relationship between cyber activities and physical violence during war. Using new event data from the armed conflict in Ukraine—and additional data from Syria’s civil war—we analyze the dynamics of cyber attacks and find that such activities have had little or no impact on fighting. In Ukraine—one of the first armed conflicts where both sides deployed such tools extensively—cyber activities failed to compel discernible changes in battlefield behavior. Indeed, hackers on both sides have had difficulty responding to battlefield events, much less shaping them. An analysis of conflict dynamics in Syria produces similar results: the timing of cyber actions is independent of fighting on the ground. Our finding—that cyber attacks are not (yet) effective as tools of coercion in war—has potentially significant implications for other armed conflicts with a digital front.

References

Andres, Richard . 2012 . “ The Emerging Structure of Strategic Cyber Offense, Cyber Defense, and Cyber Deterrence .” In Array Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World, 1st ed ., translated by Reveron, Derek S. , 89 – 104 . Washington, DC : Georgetown University Press .

Google Scholar

Andress, Jason, Winterfeld, Steve. 2013 . Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Boston, MA : Elsevier .

Google Scholar

Atran, Scott . 2003 . “ Genesis of Suicide Terrorism .” Science 299 (5612): 1534 – 39 .

Google Scholar Crossref | Medline | ISI

Axelrod, Robert . 2014 . “ A Repertory of Cyber Analogies .” In Cyber Analogies, edited by Goldman, Emily O., Arquilla, John. Monterey, CA : Department of Defense Information Operations Center for Research .

Google Scholar

Axelrod, Robert, Iliev, Rumen. 2014 . “ Timing of Cyber Conflict .” Proceedings of the National Academy of Sciences 111 (4): 1298 – 303 .

Google Scholar Crossref | Medline

Bailard, Catie Snow . 2015 . “ Ethnic Conflict Goes Mobile: Mobile Technology’s Effect on the Opportunities and Motivations for Violent Collective Action .” Journal of Peace Research 52 (3): 1 – 15 .

Google Scholar SAGE Journals

Baum, Matthew A., Zhukov, Yuri M.. 2015 . “ Filtering Revolution: Reporting Bias in International Newspaper Coverage of the Libyan Civil War .” Journal of Peace Research 9: 10 – 11 .

Google Scholar

Bejan, Vladimir, Parkin, William S.. 2015 . “ Examining the Effect of Repressive and Conciliatory Government Actions on Terrorism Activity in Israel .” Economics Letters 133: 55 – 58 .

Google Scholar Crossref

Cartwright, James, James, W.. 2010 . Joint Terminology for Cyberspace Operations. Memorandum. Washington, DC : Joint Chiefs of Staff (JCS) .

Google Scholar

Cha, Victor D. 2000 . “ Globalization and the Study of International Security .” Journal of Peace Research 37 (3): 391 – 403 .

Google Scholar SAGE Journals | ISI

Clarke, Richard A., Knake, Robert K.. 2010 . Cyber War: The Next Threat to National Security and What to Do about It. The Library of Congress. New York : Harper Collins .

Google Scholar

Crabtree, Charles, Darmofal, David, Kern, Holger L. 2014 . “ A Spatial Analysis of the Impact of West German Television on Protest Mobilization during the East German Revolution .” Journal of Peace Research 52: 269 – 84 .

Google Scholar SAGE Journals

Czosseck, Christian, Geers, Kenneth. 2009 . The Virtual Battlefield: Perspectives on Cyber Warfare, vol. 3. Amsterdam, the Netherlands : IOS Press .

Google Scholar

Davenport, Christian, Stam, Allan. 2006 . “ Rashomon Goes to Rwanda: Alternative Accounts of Political Violence and Their Implications for Policy and Analysis .” Unpublished manuscript. Accessed January 15, 2017. http://www.gvpt.umd.edu/davenport/dcawcp/paper/mar3104.pdf.

Google Scholar

Deibert, Ronald J., Rohozinski, Rafal, Crete-Nishihata, Masashi. 2012 . “ Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia–Georgia War .” Security Dialogue 43 (1): 3 – 24 .

Google Scholar SAGE Journals | ISI

Enders, Walter, Sandler, Todd. 2000 . “ Is Transnational Terrorism Becoming More Threatening? A Time-series Investigation .” Journal of Conflict Resolution 44 (3): 307 – 32 .

Google Scholar SAGE Journals | ISI

Eun, Yong-Soo, Aßmann, Judith Sita. 2014 . “ Cyberwar: Taking Stock of Security and Warfare in the Digital Age .” International Studies Perspectives 17: 343 – 60 .

Google Scholar

Gartzke, Erik . 2013 . “ The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth .” International Security 38 (2): 41 – 73 .

Google Scholar Crossref | ISI

Geers, Kenneth . 2015 . Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn, Estonia : CCDCOE .

Google Scholar

Gohdes, Anita R. 2014 . “ Pulling the Plug: Network Disruptions and Violence in Civil Conflict? ” Journal of Peace Research 52 (3): 352 – 67 .

Google Scholar SAGE Journals

Gohdes, Anita R., Carey, Sabine C.. 2017 . “ Canaries in a Coal-mine? What the Killings of Journalists Tell Us about Future Repression .” Journal of Peace Research 54 (2): 157 – 74 .

Google Scholar SAGE Journals | ISI

Griniaiev, Sergei . 2004 . “Pole bitvy: kiberprostranstvo [The battlefield is cyberspace].” (Po materialam inostrannoj pechati /) Mn: Harvest.

Google Scholar

Hare, Forrest . 2012 . “ The Significance of Attribution to Cyberspace Coercion: A Political Perspective .” In 2012 4th International Conference on Cyber Conflict (CYCON 2012, edited by Czosseck, C., Ottis, R., Ziolkowski, K., 1 – 15 . Tallinn, Estonia : NATO CCD COE

Google Scholar

Healey, Jason . 2013 . A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Arlington, VA : Cyber Conflict Studies Association .

Google Scholar

Il’chenko, Oleksandr . 2016 . “ Rozstily Oleha Kalashnikova i Olesya Buzyny - rik potomu [Shootings of Oleg Kalashnikov of Oles Buzina—a year later] .” Segodnya.

Google Scholar

Junio, Timothy J. 2013 . “ How Probable Is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate .” Journal of Strategic Studies 36 (1): 125 – 33 .

Google Scholar Crossref

Kello, Lucas . 2013 . “ The Meaning of the Cyber Revolution: Perils to Theory and Statecraft .” International Security 38 (2): 7 – 40 .

Google Scholar Crossref

Kissel, Richard . 2013 . Glossary of Key Information Security Terms. NISTIR 7298, Revision 2. Gaithersburg, MD : National Institute of Standards and Technology, the US Department of Commerce .

Google Scholar Crossref

Kostyuk, Nadiya, Zhukov, Yuri. 2017 . “ Online Appendix B: Interviews on Cyber and Information Warfare in Ukraine .” Journal of Conflict Resolution.

Google Scholar

Lemay, Antoine, Fernandeza, José M., Knight, Scott. 2010 . “ Pinprick Attacks, A Lesser Included Case .” In Conference on Cyber Conflict Proceedings, edited by Czosseck, C., Podins, K., 183 – 94 . Tallinn, Estonia : CCD COE .

Google Scholar

Libicki, Martin C. 2007 . Conquest in Cyberspace: National Security and Information Warfare. Cambridge, MA : Cambridge University Press .

Google Scholar Crossref

Libicki, Martin C. 2009 . Cyberdeterrence and Cyberwar. Santa Monica, CA : Rand Corporation .

Google Scholar

Libicki, Martin C. 2011 . “ Cyberwar as a Confidence Game .” Strategic Studies Quarterly 5 (1): 132 – 46 .

Google Scholar

Libicki, Martin C. 2015 . “ The Cyberwar that Wasn’t .” In Cyber War in Perspective: Russian Aggression against Ukraine, edited by Geers, Kenneth , 49 – 54 . Tallinn, Estonia : NATO Cyber Center of Excellence, NATO CCD COE .

Google Scholar

Liff, Adam P. 2012 . “ Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War .” Journal of Strategic Studies 35 (3): 401 – 28 .

Google Scholar Crossref

Lynn, William J. 2010 . “ Defending a New Domain: The Pentagon’s Cyberstrategy .” Foreign Affairs 89 (5): 97 – 108 .

Google Scholar

Martin-Shields, Charles Patrick . 2013 . “ Inter-ethnic Cooperation Revisited: Why Mobile Phones can Help Prevent Discrete Events of Violence, Using the Kenyan Case Study .” Stability: International Journal of Security and Development 2 (3): Art. 58.

Google Scholar

Maurer, Tim, Geers, Kenneth. 2015 . “ Cyber Proxies and the Crisis in Ukraine .” In Cyber War in Perspective: Russian Aggression against Ukraine, edited by Geers, Kenneth , 79 – 86 . Tallinn, Estonia : NATO Cyber Center of Excellence, NATO CCD COE .

Google Scholar

McGraw, Gary . 2013 . “ Cyber War is Inevitable (Unless We Build Security In) .” Journal of Strategic Studies 36 (1): 109 – 19 .

Google Scholar Crossref

Nye, Joseph S. . 2010 . Cyber Power. Cambridge, MA : Belfer Center for Science and International Affairs, Harvard Kennedy School .

Google Scholar

Ottis, Rain . 2010 . “ From Pitch Forks to Laptops: Volunteers in Cyber Conflicts .” In Conference on Cyber Conflict Proceedings 2010, edited by Czosseck, C., Podins, K., 97 – 109 . Tallinn, Estonia : CCD COE .

Google Scholar

Pape, Robert A. 2003 . “ The Strategic Logic of Suicide Terrorism .” American Political Science Review 97 (03): 343 – 61 .

Google Scholar Crossref

Pape, Robert A. 2014 . Bombing to Win: Air Power and Coercion in War. Ithaca, NY : Cornell University Press .

Google Scholar

Pevehouse, Jon C., Goldstein, Joshua S.. 1999 . “ Serbian Compliance or Defiance in Kosovo? Statistical Analysis and Real-time Predictions .” Journal of Conflict Resolution 43: 538 – 46 .

Google Scholar SAGE Journals | ISI

Pierskalla, Jan H., Hollenbach, Florian M.. 2013 . “ Technology and Collective Action: The Effect of Cell Phone Coverage on Political Violence in Africa .” American Political Science Review 107 (02): 207 – 24 .

Google Scholar Crossref | ISI

Rid, Thomas . 2012 . “ Cyber War Will Not Take Place .” Journal of Strategic Studies 35 (1): 5 – 32 .

Google Scholar Crossref | ISI

Rios, Billy K. 2009 . “ Sun Tzu was a Hacker: An Examination of the Tactics and Operations from a Real World Cyber Attack .” The Virtual Battlefield: Perspectives on Cyber Warfare 3: 143 .

Google Scholar

Sabah, Daily . 2016 . “ Cyber Bombs Being Used to Destroy Daesh: US Defense Chief .” February 29, 2016. Accessed March 15, 2017. https://www.dailysabah.com/mideast/2016/02/29/cyber-bombs-being-used-to-destroy-daesh-us-defense-chief.

Google Scholar

Sanger, David E. 2016 . “ U.S. Cyberattacks Target ISIS in a New Line of Combat .” The New York Times. Accessed March 15, 2017. https://www.nytimes.com/2016/04/25/us/politics/us-directs-cyberweapons-at-isis-for-first-time.html?_r=0.

Google Scholar

Sanger, David E., Schmitt, Eric. 2017 . “ U.S. Cyberweapons, Used Against Iran and North Korea, Are a Disappointment Against ISIS .” New York Times, p. A5. Accessed June 15, 2017. https://www.nytimes.com/2017/06/12/world/middleeast/isis-cyber.html.

Google Scholar

Schelling, Thomas C. 1966 . Arms and Influence. New Haven, CT : Yale .

Google Scholar

Schmitt, Michael N. 1999 . “ Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework .” Columbia Journal of Transnational Law 37: 1998 – 99 .

Google Scholar

Sharma, Amit . 2010 . “ Cyber Wars: A Paradigm Shift from Means to Ends .” Strategic Analysis 34 (1): 62 – 73 .

Google Scholar Crossref

Valeriano, Brandon, Maness, Ryan C.. 2014 . “ The Dynamics of Cyber Conflict between Rival Antagonists, 2001–11 .” Journal of Peace Research 51 (3): 347 – 60 .

Google Scholar SAGE Journals | ISI

Weidmann, Nils B. 2015 . “ Communication, Technology, and Political Conflict Introduction to the Special Issue .” Journal of Peace Research 52 (3): 263 – 68 .

Google Scholar SAGE Journals | ISI

Woolley, John T. 2000 . “ Using Media-based Data in Studies of Politics .” American Journal of Political Science 44: 156 – 73 .

Google Scholar Crossref | ISI