Muutke küpsiste eelistusi

Many Hands in the Cookie Jar: Case Studies in Response Options to Cyber Incidents Affecting U.S. Government Networks and Implications for Future Response [Pehme köide]

  • Formaat: Paperback / softback, 52 pages, kõrgus x laius x paksus: 245x179x4 mm, kaal: 127 g
  • Ilmumisaeg: 15-Jun-2022
  • Kirjastus: RAND Corporation
  • ISBN-10: 1977409016
  • ISBN-13: 9781977409010
Teised raamatud teemal:
  • Formaat: Paperback / softback, 52 pages, kõrgus x laius x paksus: 245x179x4 mm, kaal: 127 g
  • Ilmumisaeg: 15-Jun-2022
  • Kirjastus: RAND Corporation
  • ISBN-10: 1977409016
  • ISBN-13: 9781977409010
Teised raamatud teemal:
Cyber-enabled espionage against the United States has been a challenge for more than 20 years and is likely to remain so in the future. In the aftermath of the 2020 SolarWinds cyber incident that affected U.S. government networks, policymakers, lawmakers, and the public asked: "Why does this keep happening, and what can the United States do to prevent it from reoccurring?" It is these questions that motivate this effort. Specifically, this report summarizes three cases of Russian cyber-enabled espionage and two cases of Chinese cyber-enabled espionage dating back to the compromise of multiple government agencies in the late 1990s up to the 2015 compromise of the Office of Personnel Management. The purpose of this inquiry is to address whether U.S. responses have changed over time, whether they led to changes in adversary behavior, and what the United States can learn from these cases to inform future policymaking. The authors show that policymakers typically consider a narrow set of response options, andthey often conclude that not much can be done beyond trying to improve network defenses, because the United States "does it too." The authors suggest that the U.S. government could broaden its policy response options by increasing focus on diplomatic engagement, including working with partners and allies to call out malicious cyber behavior; expanding the use of active defense measures to root out adversaries; and employing more-sophisticated counterintelligence techniques, such as deception, to decreasethe benefits that adversaries derive from cyber espionage.

This report describes major cyber incidents against U.S. government systems and addresses whether responses have changed, whether they changed adversary behavior, and what the United States can learn from these cases to inform future policymaking.

About This Report iii
Summary v
Tables
ix
Chapter One Introduction
1(6)
Methodology
3(2)
Organization of This Report
5(2)
Chapter Two Cyber Espionage, Deterrence, and Response
7(4)
What Options Are Available to Policymakers?
9(1)
What Would Constitute a Positive Outcome?
10(1)
Chapter Three Russia Case Studies
11(14)
Moonlight Maze
11(4)
Agent.btz
15(4)
White House and State Department
19(3)
U.S. Government Policy Response Considerations
22(3)
Chapter Four China Case Studies
25(6)
Titan Rain
25(1)
Office of Personnel Management
25(4)
U.S. Government Policy Response Considerations
29(2)
Chapter Five Conclusion and Recommendations
31(4)
Abbreviations 35(2)
References 37