MIT Logo

Commodification of Cyber Capabilities: A Grand Cyber Arms Bazaar

Abstract:

The world continues to be more and more interconnected, both intra- and inter-state, as well as between smaller actors. This piece provides a framework for analysis of the availability of cyber tools to actors of all sizes, regardless of their status and technical ability. The report identifies three types of actors in their framework: established, emerging, and opportunistic. Established actors have the most advanced cyber tools, and can include nation-states with ample time and resources to develop such tools. Emerging actors are similar to established actors, but the difference comes in the frequency of success achieved. Emerging actors are less successful than established actors. Finally, opportunistic actors are actors with irregular activity associated with low-level cyber activity. They initiate attacks with lower accuracy and technicality due to their limited resources and knowledge. The report goes on to apply this framework to try to explain the ways in which actors acquire cyber tools.

Author:
Public-Private Analytic Exchange Program
Year:
2019
Domain:
Dimension:
Region:
Data Type: ,
Keywords: , ,
MIT Political Science
MIT Political Science
ECIR
GSS