Muutke küpsiste eelistusi

Crisis and Escalation in Cyberspace [Pehme köide]

  • Formaat: Paperback / softback, 198 pages, kõrgus x laius: 229x152 mm
  • Ilmumisaeg: 16-Dec-2012
  • Kirjastus: RAND
  • ISBN-10: 0833076787
  • ISBN-13: 9780833076786
Teised raamatud teemal:
  • Formaat: Paperback / softback, 198 pages, kõrgus x laius: 229x152 mm
  • Ilmumisaeg: 16-Dec-2012
  • Kirjastus: RAND
  • ISBN-10: 0833076787
  • ISBN-13: 9780833076786
Teised raamatud teemal:

The chances are growing that the United States will find itself in a crisis in cyberspace—the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. Such crises can be managed by taking steps to reduce the incentives for other states to step in, controlling the narrative, understanding the stability parameters of the crises, and recognizing escalation risks.

Preface iii
Figures and Table
ix
Summary xi
Acknowledgments xxiii
Abbreviations xxv
Chapter One Introduction
1(18)
Some Hypothetical Crises
2(3)
Mutual Mistrust Is Likely to Characterize a Cybercrisis
5(5)
States May Have Room for Maneuver in a Cybercrisis
10(6)
A Note on Methodology
16(1)
Purpose and Organization
17(2)
Chapter Two Avoiding Crises by Creating Norms
19(20)
What Kind of Norms Might Be Useful?
20(1)
Enforce Laws Against Hacking
20(2)
Dissociate from Freelance Hackers
22(1)
Discourage Commercial Espionage
23(1)
Be Careful About the Obligation to Suppress Cybertraffic
24(1)
How Do We Enforce Norms?
24(2)
Confidence-Building Measures
26(2)
Norms for Victims of Cyberattacks
28(1)
Norms for War
29(1)
Deception
30(1)
Military Necessity and Collateral Damage
31(2)
Proportionality
33(2)
Reversibility
35(1)
Conclusions
36(3)
Chapter Three Narratives, Dialogue, and Signals
39(34)
Narratives to Promote Control
40(1)
A Narrative Framework for Cyberspace
41(3)
Victimization, Attribution, Retaliation, and Aggression
44(1)
Victimization
45(1)
Attribution
46(1)
Retaliation
47(2)
Aggression
49(1)
Emollients: Narratives to Walk Back a Crisis
50(1)
"We Did Nothing"
51(3)
"Well, At Least Not on Our Orders"
54(3)
"It Was an Accident"
57(1)
"This Is Nothing New"
58(2)
"At Least It Does Not Portend Anything"
60(1)
Broader Considerations
61(1)
Signals
62(3)
Ambiguity in Signaling
65(2)
Signaling Resolve
67(2)
Signaling That Cybercombat Is Not Kinetic Combat
69(1)
Conclusions
70(3)
Chapter Four Escalation Management
73(50)
Motives for Escalation
74(2)
Does Escalation Matter?
76(2)
Escalation Risks
78(1)
Escalation Risks in Phase 0
78(2)
Escalation Risks for Contained Local Conflicts
80(1)
Escalation Risks for Uncontained Conflicts
81(3)
Managing Proxy Cyberattacks
84(1)
What Hidden Combatants Imply for Horizontal Escalation
84(4)
Managing Overt Proxy Conflict
88(1)
The Difficulties of Tit-for-Tat Management
89(1)
The Importance of Preplanning
90(1)
Disjunctions Among Effort, Effect, and Perception
91(2)
Inadvertent Escalation
93(4)
Escalation into Kinetic Warfare
97(2)
Escalation into Economic Warfare
99(4)
Sub-Rosa Escalation
103(3)
Managing the Third-Party Problem
106(2)
The Need for a Clean Shot
108(2)
Inference and Narrative
110(4)
Command and Control
114(1)
Commanders
114(3)
Those They Command
117(3)
Conclusions
120(3)
Chapter Five Implications for Strategic Stability
123(24)
Translating Sources of Cold War Instability to Cyberspace
123(1)
What Influence Can Cyberwar Have If Nuclear Weapons Exist?
124(1)
Can a Cyberattack Disarm a Target State's Nuclear Capabilities?
125(1)
Can a Cyberattack Disarm a Target State's Cyberwarriors?
126(3)
Does Cyberwar Lend Itself to Alert-Reaction Cycles?
129(1)
Are Cyberdefenses Inherently Destabilizing?
129(1)
Would a Cyberspace Arms Race Be Destabilizing?
130(3)
Surprise Attack as a Source of Instability
133(2)
Misperception as a Source of Crisis
135(1)
One Side Takes Great Exception to Cyberespionage
136(1)
Defenses Are Misinterpreted as Preparations for War
136(2)
Too Much Confidence in Attribution
138(1)
Too Much Confidence in or Fear of Preemption
139(2)
Supposedly Risk-Free Cyberattacks
141(2)
Neutrality
143(1)
Conclusions
144(3)
Chapter Six Can Cybercrises Be Managed?
147(4)
APPENDIXES
A Distributed Denial-of-Service Attacks
151(4)
B Overt, Obvious, and Covert Cyberattacks and Responses
155(4)
C Can Good Cyberdefenses Discourage Attacks?
159(4)
Bibliography 163