so. thesis 1 has been turned in, to be discussed soon.
i did, in fact, stray pretty far from the original idea (as discussed in the post below), mostly as i realised that this original insight was 1) not particularly relevant to the curriculum i would have graduated with and 2) closely associated with a more relevant line of inquiry, i.e. the one i ended up picking.
i haven’t put it all up yet, mostly because i harbour delusions of publishing a couple papers based on it. below is the final table of contents.
looking forward to getting absolutely skewered.
A Bomb under Every Bridge:
The Role of Persistence and Prepositioning in Cyber Deterrence
- INTRODUCTION
- METHODS: CASE STUDIES
- Prepositioning and/or persistence through direct cyber means
- Prepositioning and/or persistence through software supply chains
- Prepositioning and/or persistence through kinetic means
- Prepositioning and/or persistence in non-cyber, non-kinetic ways
- LITERATURE REVIEW
- ESTABLISHING THE RELEVANCE OF PREPOSITIONING AND PERSISTENCE
- TECHNICAL MODELS CONNECTED TO PREPOSITIONING AND PERSISTENCE
- Lockheed Cyber Killchain
- Diamond model
- MITRE ATT&CK
- OSI model
- CYBER DETERRENCE LITERATURE
- Cyber deterrence – first understanding
- Cyber deterrence – second understanding
- HYPOTHESIS
- DEFINING TERMS
- Defining deterrence and deterrent
- Choosing an understanding of cyber deterrence
- Deterrence on a spectrum: deterrents rather than absolute deterrence
- The role of uncertainty
- State or nonstate actors?
- Requirements for the definitions of prepositioning and persistence
- Defining persistence
- Defining prepositioning
- Defining deterrence and deterrent
- HYPOTHESIS FORMULATION
- On cyber deterrence
- The relationship between persistence and deterrence
- The relationship between prepositioning and deterrence
- DEFINING TERMS
- CASE STUDIES
- PREPOSITIONING AND/OR PERSISTENCE THROUGH DIRECT CYBER MEANS
- Case study 1. Volt Typhoon
- Brief overview
- Analysis – I. On the role of prepositioning as a deterrent
- Analysis – II. On the two conceptions of cyber deterrence
- Analysis – III. Uncertainty and signalling in prepositioning as a deterrent
- Summation
- Case study 2. Salt Typhoon
- Brief overview
- Analysis – I. On the role of persistence as deterrent
- Analysis – II. On the two conceptions of cyber deterrence
- Summation
- Case study 1. Volt Typhoon
- PREPOSITIONING AND/OR PERSISTENCE THROUGH SOFTWARE SUPPLY CHAINS
- Case study 3. SUNBURST / Solarwinds
- Brief overview
- Analysis – I. On the role of persistence as deterrent
- Analysis – II. On counterintelligence
- Analysis – III. On the role of uncertainty
- Analysis – IV. On an element of prepositioning
- Summation
- Case study 4. XZ Utils backdoor
- Brief overview
- Analysis – I. Prepositioning and social engineering
- Analysis – II. Software dependencies, open source development, and SBOMs
- Summation
- Case study 5. Log4Shell
- Brief overview
- Analysis – I. On the potential gravity of persistence
- Analysis – II. On the role of persistence and uncertainty in deterrence
- Summation
- Case study 3. SUNBURST / Solarwinds
- PREPOSITIONING AND/OR PERSISTENCE THROUGH KINETIC MEANS
- Case study 6. Supermicro
- Brief overview
- Analysis – I. Prepositioning and deterrence
- Analysis – II. Persistence and deterrence
- Analysis – III. Uncertainty and deterrence
- Summation
- Case study 7. Hezbollah’s exploding pagers
- Brief overview
- Analysis – I. On persistence, deterrence and uncertainty
- Analysis – II. On prepositioning and deterrence
- Summation
- Case study 6. Supermicro
- PREPOSITIONING AND/OR PERSISTENCE IN NON-CYBER, NON-KINETIC WAYS?
- Case study 8. New IP and Internet Protocol standardisation
- Brief overview
- Analysis – On persistence
- Analysis – On prepositioning
- Summation
- Case study 8. New IP and Internet Protocol standardisation
- PREPOSITIONING AND/OR PERSISTENCE THROUGH DIRECT CYBER MEANS
- DISCUSSION
- HYPOTHESIS TESTING
- On cyber deterrence
- On cyber persistence
- On cyber prepositioning
- INTERPRETATION
- A bomb under every bridge
- The role of uncertainty
- Clandestine activity
- The view from the other side: Chinese cyber deterrence doctrine
- HYPOTHESIS TESTING
- CONCLUSION
- BIBLIOGRAPHY