International Journal of Cyber Threat Intelligence and Secure Networking

  1. Home
  2. Archives
  3. Vol. 2 No. 08 (2025): Volume 02 Issue 08
  4. Articles
International Journal of Cyber Threat Intelligence and Secure Networking

Article Details Page

Navigating the Digital Battlefield: A Systematic Review of Collateral Effects in Offensive Cyber Operations

Authors

  • Dr. Alistair Finch Centre for Security and Conflict Studies, King's College, London, United Kingdom

DOI:

https://doi.org/10.55640/ijctisn-v02i08-01

Keywords:

Offensive Cyber Operations, Collateral Damage, International Law

Abstract

Background: As nations increasingly integrate Offensive Cyber Operations (OCO) into their military and strategic arsenals [3, 15], the risk of unintended consequences and collateral damage to non-targeted systems and populations grows. Unlike conventional warfare, the interconnected and often ambiguous nature of cyberspace complicates the prediction, control, and assessment of these secondary effects [4, 11].

Objective: This systematic literature review aims to synthesize and analyze the existing doctrinal, legal, and academic literature to provide a comprehensive understanding of collateral effects in OCO. It seeks to define the problem, evaluate the applicability of traditional legal and military principles, and identify current methodologies for risk assessment.

Methods: A systematic review of 17 foundational sources was conducted. The selected literature includes peer-reviewed articles, key government reports, and military doctrine. A thematic analysis approach was employed to extract and synthesize data concerning definitions, legal frameworks (e.g., Law of Armed Conflict), strategic principles (e.g., distinction, proportionality), and assessment models [8, 16, 17].

Results: The analysis reveals three key themes. First, a significant gap exists between the doctrinal imperative to minimize collateral damage and the practical ability to do so in complex cyber-physical environments [7, 10]. Second, core principles of international law, such as distinction and proportionality, are exceptionally difficult to apply in OCO due to the shared nature of digital infrastructure [14]. Third, while nascent methodologies for assessing collateral damage exist [17], they are not yet widely adopted or sufficiently mature to address the full spectrum of potential unintended consequences.

Conclusion: The current understanding and management of collateral effects in OCO are dangerously underdeveloped. This review highlights an urgent need for more robust assessment frameworks, refined legal interpretations, and greater strategic foresight to mitigate the potentially catastrophic ripple effects of digital warfare.

References

Aiyer, B.; Caso, J.; Russell, P.; Sorel, M. Mckinsey: New Survey Reveals $2 Trillion Market Opportunity for Cybersecurity Technology and Service Providers. 2022. Available online: https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/cybersecurity/new-survey-reveals-2-trillion-dollar-market-opportunity-for-cybersecurity-technology-and-service-providers (accessed on 30 January 2024).

IBM Security; the Ponemon Institute. Cost of a Data Breach Report 2022. 2022. Available online: https://www.ibm.com/downloads/cas/3R8N1DZJ (accessed on 31 January 2024).

Hanson, F.; Uren, T. Australia’s Offensive Cyber Capability. 2018. Available online: https://www.aspi.org.au/report/australias-offensive-cyber-capability (accessed on 31 January 2024).

Farwell, J.P.; Rohozinski, R. Stuxnet and the Future of Cyber War. Survival 2011, 53, 23–40.

U.S. Department of Justice. Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe. 2022. Available online: https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and (accessed on 1 February 2024).

Schelling, T.C. Dispersal, deterrence, and damage. Oper. Res. 1961, 9, 363–370.

U.S. Air Force. Air Force Doctrine Publication 3–60, Targeting. 2021. Available online: https://www.doctrine.af.mil/Portals/61/documents/AFDP_3-60/3-60-AFDP-TARGETING.pdf (accessed on 1 February 2024).

Schmitt, M.N. (Ed.) Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations; Cambridge University Press: Cambridge, UK, 2017.

Arquilla, J.; Ronfeldt, D. Cyberwar is coming! Comp. Strategy 1993, 12, 141–165.

Lee, E.A.; Seshia, S.A. Introduction to Embedded Systems: A Cyber-Physical Systems Approach, 2nd ed.; MIT Press: Cambridge, MA, USA, 2017.

Downloads

Published

2025-08-01

How to Cite

Navigating the Digital Battlefield: A Systematic Review of Collateral Effects in Offensive Cyber Operations. (2025). International Journal of Cyber Threat Intelligence and Secure Networking, 2(08), 1-8. https://doi.org/10.55640/ijctisn-v02i08-01

How to Cite

Navigating the Digital Battlefield: A Systematic Review of Collateral Effects in Offensive Cyber Operations. (2025). International Journal of Cyber Threat Intelligence and Secure Networking, 2(08), 1-8. https://doi.org/10.55640/ijctisn-v02i08-01

Similar Articles

1-10 of 15

You may also start an advanced similarity search for this article.