Flexible Options for Cyber Deterrence: Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment Flexible Options for Cyber Deterrence: Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment

Flexible Options for Cyber Deterrence: Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment

    • $5.99
    • $5.99

Publisher Description

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This paper describes options for cyber deterrence to address both asymmetric threats from terrorists and the intimidation associated with nation-state peer competitors in the cyber domain. It presents recent National Security Strategy interests and demonstrates a lack of focus upon cyber infrastructure. The paper will examine challenges associated with legal aspects in the cyber domain as well as the issue of attribution. It will analyze terrorist and nation-state usage of cyberspace and potential threats aimed at the United States related to each. Finally, the paper concludes with several recommendations for tailored cyber deterrence focused on terrorists and peer nation-states.

The idea of deterrence has existed since the beginning of humanity. Lawrence Freedman in his book Deterrence uses the biblical tale of Adam, Eve, and the forbidden fruit as an example of deterrence. Webster defines deterrence as "maintenance of military power for the purpose of discouraging attack." The threat of war has always been a tool used by leaders to influence foreign powers to avoid acts of aggression. Ultimately, deterrence became synonymous with American Cold War strategic thinking and foreign policy.
Mutually assured destruction was a classic adoption of deterrence through punishment. However, deterrence through punishment requires the demonstration of offensive capabilities. The highly classified nature of the United States cyber-based offensive tools makes this approach unlikely. In addition, deterrence by punishment does not work without identification and attribution. Lastly, any assumption of rationality demonstrates the fallacy of Cold War deterrence applied to the cyber domain.

Today's multi-polar world provides multiple threats aimed at the United States in the cyber domain. From cyber terrorists to sophisticated nation-states, adversaries are increasing their cyber capabilities on a daily basis. Some argue for an offensive cyber doctrine of preemption, but as demonstrated in Iraq, preemption can be destabilizing. Acts of war may justify an offensive response, but conventional or nuclear deterrence is more appropriate when attempting to deter aggression defined by war. Complicating cyberspace deterrence is the lack of attribution, no traditional constraints associated with rational behavior of extremists, and a deficient United States cyber national strategy.

The next chapter of this paper reviews recent United States strategies and critical cyber infrastructure, attribution in the cyber domain, and cyber espionage. Chapter three provides analysis of cyber terrorism and nation-state operations in the cyber domain. Chapter four describes cyber deterrence recommendations aimed at countering terrorists as well as United States peer competitors. The final chapter presents conclusions.

Contents * Biography * Introduction * Background * National Security Strategy and Critical Infrastructure * The Problem of Attribution * Privacy and Attribution * Espionage versus Cyber-attack * Analysis * Cyber Terrorism: Does it Exist? * Terrorist Tactics and the Internet * Nation State Peer Competitors * Recommendations * Cyber Deterrence of Terrorism * Peer Competitors and Cyber Deterrence * Diplomatic and Economic Engagement as a Cyber Deterrent Option * Cyber Defense, More than Passwords * Conclusion * Bibliography

GENRE
History
RELEASED
2016
April 4
LANGUAGE
EN
English
LENGTH
451
Pages
PUBLISHER
Progressive Management
SELLER
Draft2Digital, LLC
SIZE
433.3
KB

More Books Like This

Realities of Deterrence and Retaliatory Options to Attacks in Space and Cyberspace - Characterizing the Asymmetric Threat, Hacking, Antisatellite Capabilities, Distributed Denial-of-Service (DDOS) Realities of Deterrence and Retaliatory Options to Attacks in Space and Cyberspace - Characterizing the Asymmetric Threat, Hacking, Antisatellite Capabilities, Distributed Denial-of-Service (DDOS)
2016
Military Deception: Hiding The Real - Showing The Fake - Denial Operations, Propaganda, Disinformation, Joint Doctrine, Soviet Maskirovka, Desert Storm Persian Gulf War Examples Military Deception: Hiding The Real - Showing The Fake - Denial Operations, Propaganda, Disinformation, Joint Doctrine, Soviet Maskirovka, Desert Storm Persian Gulf War Examples
2016
Busting Myths about Nuclear Deterrence: America Does Not Use Nuclear Weapons, Nuclear Weapons Have Only Limited Utility for Their Cost, Nukes are Going Away, U.S. Can Deter with Submarines Alone Busting Myths about Nuclear Deterrence: America Does Not Use Nuclear Weapons, Nuclear Weapons Have Only Limited Utility for Their Cost, Nukes are Going Away, U.S. Can Deter with Submarines Alone
2016

More Books by Progressive Management

21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series) 21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series)
2011
21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Leading Marines - Marine Corps Warfighting Publication (MCWP) 6-11 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Leading Marines - Marine Corps Warfighting Publication (MCWP) 6-11
2012
The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108) The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108)
2012
U.S. Navy Equipment Encyclopedia: Aircraft, Ships, Weapons, Programs, and Systems - Fighter Jets, Aircraft Carriers, Submarines, Surface Combatants, Missiles, plus the Navy Program Guide U.S. Navy Equipment Encyclopedia: Aircraft, Ships, Weapons, Programs, and Systems - Fighter Jets, Aircraft Carriers, Submarines, Surface Combatants, Missiles, plus the Navy Program Guide
2011
21st Century Essential Guide to U.S. Navy SEALs (Sea, Air, Land), Special Warfare Command, Special Operations Forces, Training, Weapons, Tactics, Dogs, Vehicles, History, bin Laden Killing 21st Century Essential Guide to U.S. Navy SEALs (Sea, Air, Land), Special Warfare Command, Special Operations Forces, Training, Weapons, Tactics, Dogs, Vehicles, History, bin Laden Killing
2011
Complete Guide to the 1963 JFK Assassination: The Full Text of Three Major Reports - Warren Commission, House Select Committee, Assassination Records Review Board - President Kennedy Complete Guide to the 1963 JFK Assassination: The Full Text of Three Major Reports - Warren Commission, House Select Committee, Assassination Records Review Board - President Kennedy
2013