Escalation Lens

Analyze how cyber operations move through phases of escalation — from initial access to strategic consequences — and how states signal, restrain, or intensify.

Unpeace Spectrum

Each incident is positioned on a 0–100 unpeace axis reflecting escalation severity, threshold crossings, and governance weight. Hover or tap an incident to inspect.

Stable (0–30)
Contested (30–60)
Escalatory (60–100)
0102030405060708090100

Escalation Categories

Cyber operations are classified along a six-tier escalation ladder. Each tier describes a qualitative shift in the nature and severity of the operation, not a linear progression.

ProbingTier 1

Scanning, reconnaissance, and testing defences without meaningful disruption. Establishes access potential.

0 incidents in dataset

IntrusionTier 2

Unauthorized access gained and maintained. Data may be collected but no operational effect is imposed on the target.

7 incidents in dataset

DisruptionTier 3

Operations that temporarily deny or degrade services. Systems recover without permanent damage, but operational continuity is interrupted.

6 incidents in dataset

DegradationTier 4

Sustained impairment of target capabilities. May involve data destruction, prolonged outages, or significant economic cost.

10 incidents in dataset

DestructionTier 5

Irreversible damage to systems, data, or infrastructure. Recovery requires rebuilding rather than restoring.

5 incidents in dataset

Strategic ImpactTier 6

Operations with national-security or international significance — affecting critical infrastructure, economic stability, or interstate relations.

2 incidents in dataset

Compellence vs. Deterrence

Thomas Schelling distinguished two coercive logics: compellence (forcing an adversary to change behaviour through imposed costs) and deterrence (dissuading action by signalling capability and willingness to retaliate). Cyber operations often blur this distinction — the same intrusion can serve as intelligence collection and a latent threat. This split offers an analytical lens, not a definitive classification.

Compellence

Operations that impose costs to force a change in behaviour

NotPetyaJune 2017

Crossed 2 thresholds: First cyber operation to cause >$10B in collateral economic damage.

Destructive100

Stuxnetcirca 2007 – 2010

Crossed 2 thresholds: First known cyber operation to cause physical destruction of industrial equipment.

Sabotage90

Sony PicturesNovember – December 2014

Crossed 2 thresholds: State-sponsored destructive attack against a private company over expressive content.

Destructive100

Ukraine Grid IDecember 2015

Crossed 2 thresholds: First publicly confirmed cyber attack to cause a power outage.

Sabotage80

Ukraine Grid IIDecember 2016

Crossed 2 thresholds: First known malware purpose-built to attack electric grid protocols.

Sabotage80

WannaCryMay 2017

Crossed 2 thresholds: First state-linked ransomware to cause widespread disruption to healthcare services.

Ransomware90

Colonial PipelineMay 2021

Crossed 2 thresholds: Ransomware caused a national-level fuel supply disruption for the first time.

Ransomware80

Oldsmar WaterFebruary 2021

Crossed 2 thresholds: Demonstrated that remote access to water treatment SCADA can enable potentially harmful chemical manipulation.

Sabotage60

Viasat KA-SATFebruary 2022

Crossed 2 thresholds: First confirmed cyber attack synchronized with the opening of a conventional military invasion.

Destructive100

Costa Rica / ContiApril – May 2022

Crossed 2 thresholds: First country to declare a national emergency over ransomware.

Ransomware80

Albania / IranJuly – September 2022

Crossed 2 thresholds: First known severance of diplomatic relations over a cyber attack.

Destructive100

Shamoon / AramcoAugust 2012

Crossed 2 thresholds: Largest destructive cyber attack against a single enterprise at that time.

Destructive90

Iran Nuclear Cyber2020 – 2021

Crossed 2 thresholds: If confirmed as cyber-enabled, represents continued willingness to physically damage nuclear infrastructure through non-kinetic means.

Sabotage80

Industroyer2April 2022

Crossed 2 thresholds: First known use of purpose-built ICS malware during an active conventional war.

Sabotage70

MGM / Scattered SpiderSeptember 2023

Crossed 2 thresholds: Demonstrated that social engineering alone can defeat sophisticated technical security at major enterprises.

Ransomware80

Change HealthcareFebruary 2024

Crossed 2 thresholds: Largest disruption to US healthcare infrastructure from a single cyber attack.

Ransomware80

KyivstarDecember 2023

Crossed 2 thresholds: Largest cyber attack on a telecommunications company during an active armed conflict.

Destructive100

Deterrence

Operations that signal capability without imposing irreversible harm

SolarWindsMarch 2020 – December 2020

Restraint observed: Operated within traditional espionage norms — collection, not disruption.

Espionage80

Exchange/HafniumJanuary – March 2021

Restraint observed: Initial phase was narrowly targeted espionage.

Espionage90

Bangladesh BankFebruary 2016

Restraint observed: A typo in a transfer request triggered manual review, limiting losses.

Hybrid90

Australia ParliamentJanuary – February 2019

Restraint observed: No destructive or disruptive actions taken — activity consistent with intelligence collection.

Espionage50

Taiwan Telecom2022 – 2023 (disclosed 2023)

Restraint observed: No disruptive or destructive actions observed.

Espionage60

Storm-0558May – July 2023

Restraint observed: Activity consistent with targeted intelligence collection, not disruption.

Espionage70

Volt Typhoon2023 – 2024 (disclosed 2024)

Restraint observed: No disruptive or destructive actions observed — activity consistent with preparation, not execution.

Espionage60

Midnight BlizzardNovember 2023 – January 2024 (disclosed January 2024)

Restraint observed: Activity consistent with espionage — no destructive or disruptive payload deployed.

Espionage50

India–Pakistan Cyber2016 – 2019 (multiple incidents)

Restraint observed: Operations remained within espionage parameters — no destructive payloads documented.

Espionage50

Gaza Cybergang2018 – 2022 (ongoing, landmark incidents)

Restraint observed: Operations remained focused on intelligence collection, not disruption.

Espionage50

Thailand Election2019

Restraint observed: No evidence of data manipulation or vote-count interference.

Espionage50

Ecuador Data ExposureSeptember 2019 (disclosed)

Restraint observed: Not an offensive cyber operation — exposure resulted from negligent security practices.

Hybrid60

Bangladesh e-Gov2021 – 2022

Restraint observed: No destructive payloads deployed.

Espionage60

Analytical note: This classification uses the operation's primary coercive function as a heuristic. Many operations serve both logics simultaneously — an espionage campaign that pre-positions destructive capabilities deters through demonstrated access while also enabling future compellence. The distinction is most useful as a teaching tool for examining how states signal intent through cyber operations, not as a rigid taxonomy.

On reading escalation

Escalation is not a conveyor belt — incidents do not inevitably progress from probing to destruction. Restraint is as analytically important as escalation. States frequently choose not to escalate, and understanding those choices requires examining governance constraints, norm commitments, and deterrence calculations alongside technical capabilities.

The categories and positions shown here are derived from the dataset's incident records. They reflect analytical judgement, not predictive modelling. All assessments should be read alongside the source material linked in each case.