Flexible Options for Cyber Deterrence: Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment
()
Currently unavailable
Currently unavailable
About this ebook
This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This paper describes options for cyber deterrence to address both asymmetric threats from terrorists and the intimidation associated with nation-state peer competitors in the cyber domain. It presents recent National Security Strategy interests and demonstrates a lack of focus upon cyber infrastructure. The paper will examine challenges associated with legal aspects in the cyber domain as well as the issue of attribution. It will analyze terrorist and nation-state usage of cyberspace and potential threats aimed at the United States related to each. Finally, the paper concludes with several recommendations for tailored cyber deterrence focused on terrorists and peer nation-states.
The idea of deterrence has existed since the beginning of humanity. Lawrence Freedman in his book Deterrence uses the biblical tale of Adam, Eve, and the forbidden fruit as an example of deterrence. Webster defines deterrence as "maintenance of military power for the purpose of discouraging attack." The threat of war has always been a tool used by leaders to influence foreign powers to avoid acts of aggression. Ultimately, deterrence became synonymous with American Cold War strategic thinking and foreign policy.
Mutually assured destruction was a classic adoption of deterrence through punishment. However, deterrence through punishment requires the demonstration of offensive capabilities. The highly classified nature of the United States cyber-based offensive tools makes this approach unlikely. In addition, deterrence by punishment does not work without identification and attribution. Lastly, any assumption of rationality demonstrates the fallacy of Cold War deterrence applied to the cyber domain.
Today's multi-polar world provides multiple threats aimed at the United States in the cyber domain. From cyber terrorists to sophisticated nation-states, adversaries are increasing their cyber capabilities on a daily basis. Some argue for an offensive cyber doctrine of preemption, but as demonstrated in Iraq, preemption can be destabilizing. Acts of war may justify an offensive response, but conventional or nuclear deterrence is more appropriate when attempting to deter aggression defined by war. Complicating cyberspace deterrence is the lack of attribution, no traditional constraints associated with rational behavior of extremists, and a deficient United States cyber national strategy.
The next chapter of this paper reviews recent United States strategies and critical cyber infrastructure, attribution in the cyber domain, and cyber espionage. Chapter three provides analysis of cyber terrorism and nation-state operations in the cyber domain. Chapter four describes cyber deterrence recommendations aimed at countering terrorists as well as United States peer competitors. The final chapter presents conclusions.
Contents * Biography * Introduction * Background * National Security Strategy and Critical Infrastructure * The Problem of Attribution * Privacy and Attribution * Espionage versus Cyber-attack * Analysis * Cyber Terrorism: Does it Exist? * Terrorist Tactics and the Internet * Nation State Peer Competitors * Recommendations * Cyber Deterrence of Terrorism * Peer Competitors and Cyber Deterrence * Diplomatic and Economic Engagement as a Cyber Deterrent Option * Cyber Defense, More than Passwords * Conclusion * Bibliography
Progressive Management
Progressive Management: For over a quarter of a century, our news, educational, technical, scientific, and medical publications have made unique and valuable references accessible to all people. Our imprints include PM Medical Health News, Advanced Professional Education and News Service, Auto Racing Analysis, and World Spaceflight News. Many of our publications synthesize official information with original material. They are designed to provide a convenient user-friendly reference work to uniformly present authoritative knowledge that can be rapidly read, reviewed or searched. Vast archives of important data that might otherwise remain inaccessible are available for instant review no matter where you are. The e-book format makes a great reference work and educational tool. There is no other reference book that is as convenient, comprehensive, thoroughly researched, and portable - everything you need to know, from renowned experts you trust. Our e-books put knowledge at your fingertips, and an expert in your pocket!
Related to Flexible Options for Cyber Deterrence
Related ebooks
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Rating: 4 out of 5 stars4/5Is There a Common Understanding of What Constitutes Cyber Warfare? Rating: 5 out of 5 stars5/5Cyber Weapons of Mass Psychological Destruction: And the People Who Use Them Rating: 0 out of 5 stars0 ratingsCurrent and Emerging Trends in Cyber Operations: Policy, Strategy and Practice Rating: 0 out of 5 stars0 ratingsThe Decision to Attack: Military and Intelligence Cyber Decision-Making Rating: 3 out of 5 stars3/5Cyber Attacks: Protecting National Infrastructure Rating: 4 out of 5 stars4/5Summary of Richard A. Clarke & Robert K. Knake's The Fifth Domain Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 2: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsCyberspace and the Era of Persistent Confrontation Rating: 0 out of 5 stars0 ratings21st Century Chinese Cyberwarfare Rating: 0 out of 5 stars0 ratingsCybersecurity and Infrastructure Protection Rating: 0 out of 5 stars0 ratingsCyber Conflict: Competing National Perspectives Rating: 0 out of 5 stars0 ratingsThe Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice Rating: 4 out of 5 stars4/5Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan Rating: 0 out of 5 stars0 ratingsDark Logic: Transnational Criminal Tactics and Global Security Rating: 4 out of 5 stars4/5Cybersecurity in China: The Next Wave Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 1: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsCyber Threats and Nuclear Weapons Rating: 0 out of 5 stars0 ratingsTechno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure Rating: 0 out of 5 stars0 ratingsCybersecurity in Our Digital Lives Rating: 5 out of 5 stars5/5Cyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsIntelligent Systems for Security Informatics Rating: 0 out of 5 stars0 ratingsWaging Cyber War: Technical Challenges and Operational Constraints Rating: 0 out of 5 stars0 ratingsDigital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratings“Computer Viruses Unveiled: Types, Trends and Mitigation Strategies”: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsDigital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 0 out of 5 stars0 ratingsHacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 3 out of 5 stars3/5Understanding Cyber Warfare and Its Implications for Indian Armed Forces Rating: 0 out of 5 stars0 ratingsCyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Rating: 0 out of 5 stars0 ratings
Wars & Military For You
Resistance: The Warsaw Ghetto Uprising Rating: 4 out of 5 stars4/5How to Hide an Empire: A History of the Greater United States Rating: 4 out of 5 stars4/5The Art of War Rating: 4 out of 5 stars4/5Sun Tzu's The Art of War: Bilingual Edition Complete Chinese and English Text Rating: 4 out of 5 stars4/5The Last Kingdom Rating: 4 out of 5 stars4/5Masters of the Air: America's Bomber Boys Who Fought the Air War Against Nazi Germany Rating: 4 out of 5 stars4/5The God Delusion Rating: 4 out of 5 stars4/5The Rise and Fall of the Third Reich Rating: 4 out of 5 stars4/5On Killing: The Psychological Cost of Learning to Kill in War and Society Rating: 4 out of 5 stars4/5Ordinary Men: Reserve Police Battalion 101 and the Final Solution in Poland Rating: 4 out of 5 stars4/5Killing the SS: The Hunt for the Worst War Criminals in History Rating: 4 out of 5 stars4/5The Ethnic Cleansing of Palestine Rating: 4 out of 5 stars4/5The Only Plane in the Sky: An Oral History of 9/11 Rating: 5 out of 5 stars5/5The Art of War & Other Classics of Eastern Philosophy Rating: 4 out of 5 stars4/577 Days of February: Living and Dying in Ukraine, Told by the Nation’s Own Journalists Rating: 5 out of 5 stars5/5The Rise of the Fourth Reich: The Secret Societies That Threaten to Take Over America Rating: 4 out of 5 stars4/5Blitzed: Drugs in the Third Reich Rating: 4 out of 5 stars4/5The Faithful Spy: Dietrich Bonhoeffer and the Plot to Kill Hitler Rating: 5 out of 5 stars5/5A Daily Creativity Journal Rating: 3 out of 5 stars3/5In Harm's Way: The Sinking of the USS Indianapolis and the Extraordinary Story of Its Survivors Rating: 4 out of 5 stars4/5The History of the Peloponnesian War: With linked Table of Contents Rating: 4 out of 5 stars4/5Unacknowledged: An Expose of the World's Greatest Secret Rating: 5 out of 5 stars5/5The Girls of Atomic City: The Untold Story of the Women Who Helped Win World War II Rating: 4 out of 5 stars4/5The Making of the Atomic Bomb Rating: 5 out of 5 stars5/5Bill O'Reilly's Legends and Lies: The Civil War Rating: 4 out of 5 stars4/5Art of War: The Definitive Interpretation of Sun Tzu's Classic Book of Strategy Rating: 4 out of 5 stars4/5The General and the Genius: Groves and Oppenheimer - The Unlikely Partnership that Built the Atom Bomb Rating: 4 out of 5 stars4/5Washington: The Indispensable Man Rating: 4 out of 5 stars4/5Doctors From Hell: The Horrific Account of Nazi Experiments on Humans Rating: 4 out of 5 stars4/5
Reviews for Flexible Options for Cyber Deterrence
0 ratings0 reviews