Flexible Options for Cyber Deterrence: Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment Flexible Options for Cyber Deterrence: Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment

Flexible Options for Cyber Deterrence: Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment

    • 6,99 €
    • 6,99 €

Publisher Description

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This paper describes options for cyber deterrence to address both asymmetric threats from terrorists and the intimidation associated with nation-state peer competitors in the cyber domain. It presents recent National Security Strategy interests and demonstrates a lack of focus upon cyber infrastructure. The paper will examine challenges associated with legal aspects in the cyber domain as well as the issue of attribution. It will analyze terrorist and nation-state usage of cyberspace and potential threats aimed at the United States related to each. Finally, the paper concludes with several recommendations for tailored cyber deterrence focused on terrorists and peer nation-states.

The idea of deterrence has existed since the beginning of humanity. Lawrence Freedman in his book Deterrence uses the biblical tale of Adam, Eve, and the forbidden fruit as an example of deterrence. Webster defines deterrence as "maintenance of military power for the purpose of discouraging attack." The threat of war has always been a tool used by leaders to influence foreign powers to avoid acts of aggression. Ultimately, deterrence became synonymous with American Cold War strategic thinking and foreign policy.
Mutually assured destruction was a classic adoption of deterrence through punishment. However, deterrence through punishment requires the demonstration of offensive capabilities. The highly classified nature of the United States cyber-based offensive tools makes this approach unlikely. In addition, deterrence by punishment does not work without identification and attribution. Lastly, any assumption of rationality demonstrates the fallacy of Cold War deterrence applied to the cyber domain.

Today's multi-polar world provides multiple threats aimed at the United States in the cyber domain. From cyber terrorists to sophisticated nation-states, adversaries are increasing their cyber capabilities on a daily basis. Some argue for an offensive cyber doctrine of preemption, but as demonstrated in Iraq, preemption can be destabilizing. Acts of war may justify an offensive response, but conventional or nuclear deterrence is more appropriate when attempting to deter aggression defined by war. Complicating cyberspace deterrence is the lack of attribution, no traditional constraints associated with rational behavior of extremists, and a deficient United States cyber national strategy.

The next chapter of this paper reviews recent United States strategies and critical cyber infrastructure, attribution in the cyber domain, and cyber espionage. Chapter three provides analysis of cyber terrorism and nation-state operations in the cyber domain. Chapter four describes cyber deterrence recommendations aimed at countering terrorists as well as United States peer competitors. The final chapter presents conclusions.

Contents * Biography * Introduction * Background * National Security Strategy and Critical Infrastructure * The Problem of Attribution * Privacy and Attribution * Espionage versus Cyber-attack * Analysis * Cyber Terrorism: Does it Exist? * Terrorist Tactics and the Internet * Nation State Peer Competitors * Recommendations * Cyber Deterrence of Terrorism * Peer Competitors and Cyber Deterrence * Diplomatic and Economic Engagement as a Cyber Deterrent Option * Cyber Defense, More than Passwords * Conclusion * Bibliography

GENRE
History
RELEASED
2016
4 April
LANGUAGE
EN
English
LENGTH
451
Pages
PUBLISHER
Progressive Management
SIZE
433.3
KB

More Books by Progressive Management

Spain: Country Study with Multidisciplinary Analysis of Political, Economic, Social, and National Security Systems and Institutions, Spanish People, Origins, Beliefs and Values Spain: Country Study with Multidisciplinary Analysis of Political, Economic, Social, and National Security Systems and Institutions, Spanish People, Origins, Beliefs and Values
2017
The American Civil War Encyclopedia: Sweeping Account of All Aspects of the War Between the States - Army and Navy History and Timelines, Campaigns and Battles, Intelligence, Militias, Unique Stories The American Civil War Encyclopedia: Sweeping Account of All Aspects of the War Between the States - Army and Navy History and Timelines, Campaigns and Battles, Intelligence, Militias, Unique Stories
2012
The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108) The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108)
2012
21st Century U.S. Military Manuals: Marine Combat Water Survival, Water Rescues, Drowning Marine Corps Field Manual - FMFRP 0-13 (Value-Added Professional Format Series) 21st Century U.S. Military Manuals: Marine Combat Water Survival, Water Rescues, Drowning Marine Corps Field Manual - FMFRP 0-13 (Value-Added Professional Format Series)
2011
21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series) 21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series)
2011
Apollo and America's Moon Landing Program: Saturn V Flight Manual, Astronaut's Guide to the Apollo Moon Rocket, plus Flight Safety Plan and Review of Pogo Problems (Part 1) Apollo and America's Moon Landing Program: Saturn V Flight Manual, Astronaut's Guide to the Apollo Moon Rocket, plus Flight Safety Plan and Review of Pogo Problems (Part 1)
2014