Preface |
|
iii | |
|
|
ix | |
Summary |
|
xi | |
Acknowledgments |
|
xxiii | |
Abbreviations |
|
xxv | |
|
|
1 | (18) |
|
|
2 | (3) |
|
Mutual Mistrust Is Likely to Characterize a Cybercrisis |
|
|
5 | (5) |
|
States May Have Room for Maneuver in a Cybercrisis |
|
|
10 | (6) |
|
|
16 | (1) |
|
|
17 | (2) |
|
Chapter Two Avoiding Crises by Creating Norms |
|
|
19 | (20) |
|
What Kind of Norms Might Be Useful? |
|
|
20 | (1) |
|
Enforce Laws Against Hacking |
|
|
20 | (2) |
|
Dissociate from Freelance Hackers |
|
|
22 | (1) |
|
Discourage Commercial Espionage |
|
|
23 | (1) |
|
Be Careful About the Obligation to Suppress Cybertraffic |
|
|
24 | (1) |
|
|
24 | (2) |
|
Confidence-Building Measures |
|
|
26 | (2) |
|
Norms for Victims of Cyberattacks |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
Military Necessity and Collateral Damage |
|
|
31 | (2) |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
36 | (3) |
|
Chapter Three Narratives, Dialogue, and Signals |
|
|
39 | (34) |
|
Narratives to Promote Control |
|
|
40 | (1) |
|
A Narrative Framework for Cyberspace |
|
|
41 | (3) |
|
Victimization, Attribution, Retaliation, and Aggression |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (2) |
|
|
49 | (1) |
|
Emollients: Narratives to Walk Back a Crisis |
|
|
50 | (1) |
|
|
51 | (3) |
|
"Well, At Least Not on Our Orders" |
|
|
54 | (3) |
|
|
57 | (1) |
|
|
58 | (2) |
|
"At Least It Does Not Portend Anything" |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
62 | (3) |
|
|
65 | (2) |
|
|
67 | (2) |
|
Signaling That Cybercombat Is Not Kinetic Combat |
|
|
69 | (1) |
|
|
70 | (3) |
|
Chapter Four Escalation Management |
|
|
73 | (50) |
|
|
74 | (2) |
|
|
76 | (2) |
|
|
78 | (1) |
|
Escalation Risks in Phase 0 |
|
|
78 | (2) |
|
Escalation Risks for Contained Local Conflicts |
|
|
80 | (1) |
|
Escalation Risks for Uncontained Conflicts |
|
|
81 | (3) |
|
Managing Proxy Cyberattacks |
|
|
84 | (1) |
|
What Hidden Combatants Imply for Horizontal Escalation |
|
|
84 | (4) |
|
Managing Overt Proxy Conflict |
|
|
88 | (1) |
|
The Difficulties of Tit-for-Tat Management |
|
|
89 | (1) |
|
The Importance of Preplanning |
|
|
90 | (1) |
|
Disjunctions Among Effort, Effect, and Perception |
|
|
91 | (2) |
|
|
93 | (4) |
|
Escalation into Kinetic Warfare |
|
|
97 | (2) |
|
Escalation into Economic Warfare |
|
|
99 | (4) |
|
|
103 | (3) |
|
Managing the Third-Party Problem |
|
|
106 | (2) |
|
The Need for a Clean Shot |
|
|
108 | (2) |
|
|
110 | (4) |
|
|
114 | (1) |
|
|
114 | (3) |
|
|
117 | (3) |
|
|
120 | (3) |
|
Chapter Five Implications for Strategic Stability |
|
|
123 | (24) |
|
Translating Sources of Cold War Instability to Cyberspace |
|
|
123 | (1) |
|
What Influence Can Cyberwar Have If Nuclear Weapons Exist? |
|
|
124 | (1) |
|
Can a Cyberattack Disarm a Target State's Nuclear Capabilities? |
|
|
125 | (1) |
|
Can a Cyberattack Disarm a Target State's Cyberwarriors? |
|
|
126 | (3) |
|
Does Cyberwar Lend Itself to Alert-Reaction Cycles? |
|
|
129 | (1) |
|
Are Cyberdefenses Inherently Destabilizing? |
|
|
129 | (1) |
|
Would a Cyberspace Arms Race Be Destabilizing? |
|
|
130 | (3) |
|
Surprise Attack as a Source of Instability |
|
|
133 | (2) |
|
Misperception as a Source of Crisis |
|
|
135 | (1) |
|
One Side Takes Great Exception to Cyberespionage |
|
|
136 | (1) |
|
Defenses Are Misinterpreted as Preparations for War |
|
|
136 | (2) |
|
Too Much Confidence in Attribution |
|
|
138 | (1) |
|
Too Much Confidence in or Fear of Preemption |
|
|
139 | (2) |
|
Supposedly Risk-Free Cyberattacks |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
144 | (3) |
|
Chapter Six Can Cybercrises Be Managed? |
|
|
147 | (4) |
|
|
|
A Distributed Denial-of-Service Attacks |
|
|
151 | (4) |
|
B Overt, Obvious, and Covert Cyberattacks and Responses |
|
|
155 | (4) |
|
C Can Good Cyberdefenses Discourage Attacks? |
|
|
159 | (4) |
Bibliography |
|
163 | |