Crisis and escalation in cyberspace:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA
RAND
[2012]
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Prepared for the United States Air Force ... Rand Project Air Force." Print version record and CIP data provided by publisher; resource not viewed |
Beschreibung: | 1 online resource |
ISBN: | 0833076787 0833076795 0833076809 0833076817 9780833076786 9780833076793 9780833076809 9780833076816 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043036689 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151120s2012 |||| o||u| ||||||eng d | ||
020 | |a 0833076787 |9 0-8330-7678-7 | ||
020 | |a 0833076795 |c electronic bk. |9 0-8330-7679-5 | ||
020 | |a 0833076809 |c electronic bk. |9 0-8330-7680-9 | ||
020 | |a 0833076817 |9 0-8330-7681-7 | ||
020 | |a 9780833076786 |9 978-0-8330-7678-6 | ||
020 | |a 9780833076786 |c pbk. : alk. paper |9 978-0-8330-7678-6 | ||
020 | |a 9780833076793 |c electronic bk. |9 978-0-8330-7679-3 | ||
020 | |a 9780833076809 |c electronic bk. |9 978-0-8330-7680-9 | ||
020 | |a 9780833076816 |9 978-0-8330-7681-6 | ||
035 | |a (OCoLC)818866398 | ||
035 | |a (DE-599)BVBBV043036689 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 358.4/141 |2 23 | |
100 | 1 | |a Libicki, Martin C. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Crisis and escalation in cyberspace |c Martin C. Libicki |
264 | 1 | |a Santa Monica, CA |b RAND |c [2012] | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "Prepared for the United States Air Force ... Rand Project Air Force." | ||
500 | |a Print version record and CIP data provided by publisher; resource not viewed | ||
505 | 8 | |a Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- | |
505 | 8 | |a Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- | |
505 | 8 | |a Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- | |
505 | 8 | |a A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses | |
505 | 8 | |a "The chances are growing that the United States will find itself in a crisis in cyberspace, with the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. The genesis for this work was the broader issue of how the Air Force should integrate kinetic and nonkinetic operations. Central to this process was careful consideration of how escalation options and risks should be treated, which, in turn, demanded a broader consideration across the entire crisis-management spectrum. Such crises can be managed by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise from crises."--Page 4 of cover | |
610 | 1 | 4 | |a United States / Air Force |
610 | 2 | 4 | |a United States |b Air Force |x Organization |
610 | 2 | 4 | |a United States |b Air Force |x Decision making |
610 | 2 | 7 | |a USA |b Air Force |0 (DE-588)872-2 |2 gnd |9 rswk-swf |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Military Science |2 bisacsh | |
650 | 4 | |a Politik | |
650 | 4 | |a Information warfare |z United States | |
650 | 4 | |a Escalation (Military science) | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Crisis management |x Government policy |z United States | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Conflict management | |
650 | 0 | 7 | |a Krisenmanagement |0 (DE-588)4127374-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
689 | 0 | 0 | |a USA |b Air Force |0 (DE-588)872-2 |D b |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 2 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 3 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 4 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 0 | 5 | |a Krisenmanagement |0 (DE-588)4127374-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
710 | 2 | |a Project Air Force (U.S.) |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Libicki, Martin C |t . Crisis and escalation in cyberspace |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=674641 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028461337 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=674641 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=674641 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175397483446272 |
---|---|
any_adam_object | |
author | Libicki, Martin C. |
author_facet | Libicki, Martin C. |
author_role | aut |
author_sort | Libicki, Martin C. |
author_variant | m c l mc mcl |
building | Verbundindex |
bvnumber | BV043036689 |
collection | ZDB-4-EBA |
contents | Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses "The chances are growing that the United States will find itself in a crisis in cyberspace, with the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. The genesis for this work was the broader issue of how the Air Force should integrate kinetic and nonkinetic operations. Central to this process was careful consideration of how escalation options and risks should be treated, which, in turn, demanded a broader consideration across the entire crisis-management spectrum. Such crises can be managed by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise from crises."--Page 4 of cover |
ctrlnum | (OCoLC)818866398 (DE-599)BVBBV043036689 |
dewey-full | 358.4/141 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 358 - Air & other specialized forces |
dewey-raw | 358.4/141 |
dewey-search | 358.4/141 |
dewey-sort | 3358.4 3141 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07786nmm a2200841zc 4500</leader><controlfield tag="001">BV043036689</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833076787</subfield><subfield code="9">0-8330-7678-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833076795</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-8330-7679-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833076809</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-8330-7680-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833076817</subfield><subfield code="9">0-8330-7681-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833076786</subfield><subfield code="9">978-0-8330-7678-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833076786</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">978-0-8330-7678-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833076793</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-8330-7679-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833076809</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-8330-7680-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833076816</subfield><subfield code="9">978-0-8330-7681-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)818866398</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043036689</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">358.4/141</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Crisis and escalation in cyberspace</subfield><subfield code="c">Martin C. Libicki</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA</subfield><subfield code="b">RAND</subfield><subfield code="c">[2012]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Prepared for the United States Air Force ... Rand Project Air Force."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record and CIP data provided by publisher; resource not viewed</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">"The chances are growing that the United States will find itself in a crisis in cyberspace, with the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. The genesis for this work was the broader issue of how the Air Force should integrate kinetic and nonkinetic operations. Central to this process was careful consideration of how escalation options and risks should be treated, which, in turn, demanded a broader consideration across the entire crisis-management spectrum. Such crises can be managed by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise from crises."--Page 4 of cover</subfield></datafield><datafield tag="610" ind1="1" ind2="4"><subfield code="a">United States / Air Force</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States</subfield><subfield code="b">Air Force</subfield><subfield code="x">Organization</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States</subfield><subfield code="b">Air Force</subfield><subfield code="x">Decision making</subfield></datafield><datafield tag="610" ind1="2" ind2="7"><subfield code="a">USA</subfield><subfield code="b">Air Force</subfield><subfield code="0">(DE-588)872-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Military Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Escalation (Military science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crisis management</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Conflict management</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Krisenmanagement</subfield><subfield code="0">(DE-588)4127374-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="b">Air Force</subfield><subfield code="0">(DE-588)872-2</subfield><subfield code="D">b</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Krisenmanagement</subfield><subfield code="0">(DE-588)4127374-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Project Air Force (U.S.)</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Libicki, Martin C</subfield><subfield code="t">. Crisis and escalation in cyberspace</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=674641</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028461337</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=674641</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=674641</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043036689 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:38Z |
institution | BVB |
isbn | 0833076787 0833076795 0833076809 0833076817 9780833076786 9780833076793 9780833076809 9780833076816 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028461337 |
oclc_num | 818866398 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 online resource |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | RAND |
record_format | marc |
spelling | Libicki, Martin C. Verfasser aut Crisis and escalation in cyberspace Martin C. Libicki Santa Monica, CA RAND [2012] 1 online resource txt rdacontent c rdamedia cr rdacarrier "Prepared for the United States Air Force ... Rand Project Air Force." Print version record and CIP data provided by publisher; resource not viewed Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses "The chances are growing that the United States will find itself in a crisis in cyberspace, with the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. The genesis for this work was the broader issue of how the Air Force should integrate kinetic and nonkinetic operations. Central to this process was careful consideration of how escalation options and risks should be treated, which, in turn, demanded a broader consideration across the entire crisis-management spectrum. Such crises can be managed by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise from crises."--Page 4 of cover United States / Air Force United States Air Force Organization United States Air Force Decision making USA Air Force (DE-588)872-2 gnd rswk-swf COMPUTERS / Networking / Security bisacsh TECHNOLOGY & ENGINEERING / Military Science bisacsh Politik Information warfare United States Escalation (Military science) Cyberspace Security measures Crisis management Government policy United States Cyberterrorism Prevention Conflict management Krisenmanagement (DE-588)4127374-6 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Bekämpfung (DE-588)4112701-8 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf USA USA Air Force (DE-588)872-2 b Information warfare (DE-588)4461975-3 s Cyberspace (DE-588)4266146-8 s Terrorismus (DE-588)4059534-1 s Bekämpfung (DE-588)4112701-8 s Krisenmanagement (DE-588)4127374-6 s 1\p DE-604 Project Air Force (U.S.) Sonstige oth Erscheint auch als Druck-Ausgabe Libicki, Martin C . Crisis and escalation in cyberspace http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=674641 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Libicki, Martin C. Crisis and escalation in cyberspace Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses "The chances are growing that the United States will find itself in a crisis in cyberspace, with the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. The genesis for this work was the broader issue of how the Air Force should integrate kinetic and nonkinetic operations. Central to this process was careful consideration of how escalation options and risks should be treated, which, in turn, demanded a broader consideration across the entire crisis-management spectrum. Such crises can be managed by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise from crises."--Page 4 of cover United States / Air Force United States Air Force Organization United States Air Force Decision making USA Air Force (DE-588)872-2 gnd COMPUTERS / Networking / Security bisacsh TECHNOLOGY & ENGINEERING / Military Science bisacsh Politik Information warfare United States Escalation (Military science) Cyberspace Security measures Crisis management Government policy United States Cyberterrorism Prevention Conflict management Krisenmanagement (DE-588)4127374-6 gnd Terrorismus (DE-588)4059534-1 gnd Bekämpfung (DE-588)4112701-8 gnd Cyberspace (DE-588)4266146-8 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)872-2 (DE-588)4127374-6 (DE-588)4059534-1 (DE-588)4112701-8 (DE-588)4266146-8 (DE-588)4461975-3 |
title | Crisis and escalation in cyberspace |
title_auth | Crisis and escalation in cyberspace |
title_exact_search | Crisis and escalation in cyberspace |
title_full | Crisis and escalation in cyberspace Martin C. Libicki |
title_fullStr | Crisis and escalation in cyberspace Martin C. Libicki |
title_full_unstemmed | Crisis and escalation in cyberspace Martin C. Libicki |
title_short | Crisis and escalation in cyberspace |
title_sort | crisis and escalation in cyberspace |
topic | United States / Air Force United States Air Force Organization United States Air Force Decision making USA Air Force (DE-588)872-2 gnd COMPUTERS / Networking / Security bisacsh TECHNOLOGY & ENGINEERING / Military Science bisacsh Politik Information warfare United States Escalation (Military science) Cyberspace Security measures Crisis management Government policy United States Cyberterrorism Prevention Conflict management Krisenmanagement (DE-588)4127374-6 gnd Terrorismus (DE-588)4059534-1 gnd Bekämpfung (DE-588)4112701-8 gnd Cyberspace (DE-588)4266146-8 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | United States / Air Force United States Air Force Organization United States Air Force Decision making USA Air Force COMPUTERS / Networking / Security TECHNOLOGY & ENGINEERING / Military Science Politik Information warfare United States Escalation (Military science) Cyberspace Security measures Crisis management Government policy United States Cyberterrorism Prevention Conflict management Krisenmanagement Terrorismus Bekämpfung Cyberspace Information warfare USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=674641 |
work_keys_str_mv | AT libickimartinc crisisandescalationincyberspace AT projectairforceus crisisandescalationincyberspace |