Creating selective overmatch: an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers
The 2022 National Defense Strategy calls for "integrated deterrence" in how the United States postures its cyberspace forces to address the strategic challenges posed by revisionist powers--in this case China. An integrated deterrence strategy entails combining cyber operations with other...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch Buch |
Sprache: | English |
Veröffentlicht: |
Santa Monica, Calif.
RAND Corporation
[2023]
|
Schriftenreihe: | Research report
|
Schlagworte: | |
Online-Zugang: | https://doi.org/10.7249/RRA1943-1 |
Zusammenfassung: | The 2022 National Defense Strategy calls for "integrated deterrence" in how the United States postures its cyberspace forces to address the strategic challenges posed by revisionist powers--in this case China. An integrated deterrence strategy entails combining cyber operations with other warfighting domains to reduce a competitor's perceptions of the net benefits of aggression relative to restraints. Such a strategy also represents a departure from the current U.S. Cyber Command (CYBERCOM) focus on technical operations in the cyber domain. The authors begin with an examination of various theories of international relations to highlight a variety of views on U.S.-China competition. They then apply the concept of selective overmatch to reevaluate current U.S. cyber operations in light of competition and possible conflict with China. Because the United States cannot maintain superiority in all aspects of cyber operations equally, it must selectively create advantage over China by targeting influence points--elements of the adversary's political, economic, or societal strength--that will most likely achieve U.S. objectives. By identifying the key influence points for China and the United States and the actions that might be taken against them, the authors explore selective overmatch as a framework for categorizing and assessing vulnerabilities in the Chinese and U.S. cyber domains, as well as for expanding the capabilities of cyber operations, integrating deterrence, and sustaining U.S. primacy. Selective overmatch, properly understood and applied, can provide a roadmap for CYBERCOM's future operations |
Beschreibung: | xv, 105 Seiten Illustrationen 23 cm |
ISBN: | 9781977411549 |
DOI: | 10.7249/RRA1943-1 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049880491 | ||
003 | DE-604 | ||
005 | 20241105 | ||
007 | t| | ||
008 | 240923s2023 xx a||| |||| 00||| eng d | ||
020 | |a 9781977411549 |c pbk |9 978-1-9774-1154-9 | ||
020 | |a 9781977411549 |9 9781977411549 | ||
035 | |a (OCoLC)1466914794 | ||
035 | |a (DE-599)BVBBV049880491 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 | ||
100 | 1 | |a Wingfield, Thomas C. |d 1962- |e Verfasser |0 (DE-588)1146325258 |4 aut | |
245 | 1 | 0 | |a Creating selective overmatch |b an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers |c Tom Wingfield [und 11 weitere] |
246 | 1 | 0 | |a Approach to developing cyberspace options to sustain U.S. primacy against revisionist powers |
264 | 1 | |a Santa Monica, Calif. |b RAND Corporation |c [2023] | |
264 | 4 | |c © 2023 | |
300 | |a xv, 105 Seiten |b Illustrationen |c 23 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
337 | |b c |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Research report | |
520 | 3 | |a The 2022 National Defense Strategy calls for "integrated deterrence" in how the United States postures its cyberspace forces to address the strategic challenges posed by revisionist powers--in this case China. An integrated deterrence strategy entails combining cyber operations with other warfighting domains to reduce a competitor's perceptions of the net benefits of aggression relative to restraints. Such a strategy also represents a departure from the current U.S. Cyber Command (CYBERCOM) focus on technical operations in the cyber domain. The authors begin with an examination of various theories of international relations to highlight a variety of views on U.S.-China competition. They then apply the concept of selective overmatch to reevaluate current U.S. cyber operations in light of competition and possible conflict with China. Because the United States cannot maintain superiority in all aspects of cyber operations equally, it must selectively create advantage over China by targeting influence points--elements of the adversary's political, economic, or societal strength--that will most likely achieve U.S. objectives. By identifying the key influence points for China and the United States and the actions that might be taken against them, the authors explore selective overmatch as a framework for categorizing and assessing vulnerabilities in the Chinese and U.S. cyber domains, as well as for expanding the capabilities of cyber operations, integrating deterrence, and sustaining U.S. primacy. Selective overmatch, properly understood and applied, can provide a roadmap for CYBERCOM's future operations | |
610 | 2 | 7 | |a USA |b Department of Defense |0 (DE-588)1019534-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Militärpolitik |0 (DE-588)4065004-2 |2 gnd |9 rswk-swf |
651 | 7 | |a China |0 (DE-588)4009937-4 |2 gnd |9 rswk-swf | |
653 | 2 | |a United States / Department of Defense / Decision making | |
653 | 0 | |a Cyberspace operations (Military science) / United States | |
653 | 0 | |a Information warfare / United States | |
653 | 0 | |a Cyber Warfare | |
653 | 0 | |a Decisionmaking | |
653 | 0 | |a Military Force Planning | |
653 | 0 | |a Cyberguerre (Science militaire) / États-Unis | |
653 | 0 | |a Guerre de l'information / États-Unis | |
653 | 2 | |a United States / Department of Defense | |
653 | 0 | |a Cyberspace operations (Military science) | |
653 | 0 | |a Decision making | |
653 | 0 | |a Information warfare | |
653 | 2 | |a United States | |
689 | 0 | 0 | |a China |0 (DE-588)4009937-4 |D g |
689 | 0 | 1 | |a USA |b Department of Defense |0 (DE-588)1019534-8 |D b |
689 | 0 | 2 | |a Militärpolitik |0 (DE-588)4065004-2 |D s |
689 | 0 | 3 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 1 | |u https://doi.org/10.7249/RRA1943-1 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035219862 |
Datensatz im Suchindex
_version_ | 1817696820787150848 |
---|---|
adam_text | |
any_adam_object | |
author | Wingfield, Thomas C. 1962- |
author_GND | (DE-588)1146325258 |
author_facet | Wingfield, Thomas C. 1962- |
author_role | aut |
author_sort | Wingfield, Thomas C. 1962- |
author_variant | t c w tc tcw |
building | Verbundindex |
bvnumber | BV049880491 |
contents | Chapter One: Introduction -- Chapter Two: The Application of International Relations Theory to Competition and Conflict in Cyberspace -- Chapter Three: Current U.S. Approach to Cyberspace Operations -- Chapter Four: Creating Selective Overmatch in Cyberspace -- Chapter Five: Identifying Chinese Influence Points and Actions to Affect Them -- Chapter Six: Defending U.S. Influence Points -- Chapter Seven: Conclusion and Recommendations |
ctrlnum | (OCoLC)1466914794 (DE-599)BVBBV049880491 |
doi_str_mv | 10.7249/RRA1943-1 |
format | Electronic Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049880491</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241105</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">240923s2023 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781977411549</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-9774-1154-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781977411549</subfield><subfield code="9">9781977411549</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1466914794</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049880491</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wingfield, Thomas C.</subfield><subfield code="d">1962-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1146325258</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Creating selective overmatch</subfield><subfield code="b">an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers</subfield><subfield code="c">Tom Wingfield [und 11 weitere]</subfield></datafield><datafield tag="246" ind1="1" ind2="0"><subfield code="a">Approach to developing cyberspace options to sustain U.S. primacy against revisionist powers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, Calif.</subfield><subfield code="b">RAND Corporation</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xv, 105 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">23 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Research report</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">The 2022 National Defense Strategy calls for "integrated deterrence" in how the United States postures its cyberspace forces to address the strategic challenges posed by revisionist powers--in this case China. An integrated deterrence strategy entails combining cyber operations with other warfighting domains to reduce a competitor's perceptions of the net benefits of aggression relative to restraints. Such a strategy also represents a departure from the current U.S. Cyber Command (CYBERCOM) focus on technical operations in the cyber domain. The authors begin with an examination of various theories of international relations to highlight a variety of views on U.S.-China competition. They then apply the concept of selective overmatch to reevaluate current U.S. cyber operations in light of competition and possible conflict with China. Because the United States cannot maintain superiority in all aspects of cyber operations equally, it must selectively create advantage over China by targeting influence points--elements of the adversary's political, economic, or societal strength--that will most likely achieve U.S. objectives. By identifying the key influence points for China and the United States and the actions that might be taken against them, the authors explore selective overmatch as a framework for categorizing and assessing vulnerabilities in the Chinese and U.S. cyber domains, as well as for expanding the capabilities of cyber operations, integrating deterrence, and sustaining U.S. primacy. Selective overmatch, properly understood and applied, can provide a roadmap for CYBERCOM's future operations</subfield></datafield><datafield tag="610" ind1="2" ind2="7"><subfield code="a">USA</subfield><subfield code="b">Department of Defense</subfield><subfield code="0">(DE-588)1019534-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Militärpolitik</subfield><subfield code="0">(DE-588)4065004-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">United States / Department of Defense / Decision making</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science) / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information warfare / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyber Warfare</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Decisionmaking</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Military Force Planning</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberguerre (Science militaire) / États-Unis</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Guerre de l'information / États-Unis</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">United States / Department of Defense</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Decision making</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">United States</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">USA</subfield><subfield code="b">Department of Defense</subfield><subfield code="0">(DE-588)1019534-8</subfield><subfield code="D">b</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Militärpolitik</subfield><subfield code="0">(DE-588)4065004-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.7249/RRA1943-1</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035219862</subfield></datafield></record></collection> |
geographic | China (DE-588)4009937-4 gnd |
geographic_facet | China |
id | DE-604.BV049880491 |
illustrated | Illustrated |
indexdate | 2024-12-06T13:12:52Z |
institution | BVB |
isbn | 9781977411549 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035219862 |
oclc_num | 1466914794 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | xv, 105 Seiten Illustrationen 23 cm |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | RAND Corporation |
record_format | marc |
series2 | Research report |
spelling | Wingfield, Thomas C. 1962- Verfasser (DE-588)1146325258 aut Creating selective overmatch an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers Tom Wingfield [und 11 weitere] Approach to developing cyberspace options to sustain U.S. primacy against revisionist powers Santa Monica, Calif. RAND Corporation [2023] © 2023 xv, 105 Seiten Illustrationen 23 cm txt rdacontent n rdamedia c rdamedia nc rdacarrier cr rdacarrier Research report The 2022 National Defense Strategy calls for "integrated deterrence" in how the United States postures its cyberspace forces to address the strategic challenges posed by revisionist powers--in this case China. An integrated deterrence strategy entails combining cyber operations with other warfighting domains to reduce a competitor's perceptions of the net benefits of aggression relative to restraints. Such a strategy also represents a departure from the current U.S. Cyber Command (CYBERCOM) focus on technical operations in the cyber domain. The authors begin with an examination of various theories of international relations to highlight a variety of views on U.S.-China competition. They then apply the concept of selective overmatch to reevaluate current U.S. cyber operations in light of competition and possible conflict with China. Because the United States cannot maintain superiority in all aspects of cyber operations equally, it must selectively create advantage over China by targeting influence points--elements of the adversary's political, economic, or societal strength--that will most likely achieve U.S. objectives. By identifying the key influence points for China and the United States and the actions that might be taken against them, the authors explore selective overmatch as a framework for categorizing and assessing vulnerabilities in the Chinese and U.S. cyber domains, as well as for expanding the capabilities of cyber operations, integrating deterrence, and sustaining U.S. primacy. Selective overmatch, properly understood and applied, can provide a roadmap for CYBERCOM's future operations USA Department of Defense (DE-588)1019534-8 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Militärpolitik (DE-588)4065004-2 gnd rswk-swf China (DE-588)4009937-4 gnd rswk-swf United States / Department of Defense / Decision making Cyberspace operations (Military science) / United States Information warfare / United States Cyber Warfare Decisionmaking Military Force Planning Cyberguerre (Science militaire) / États-Unis Guerre de l'information / États-Unis United States / Department of Defense Cyberspace operations (Military science) Decision making Information warfare United States China (DE-588)4009937-4 g USA Department of Defense (DE-588)1019534-8 b Militärpolitik (DE-588)4065004-2 s Information warfare (DE-588)4461975-3 s DE-604 https://doi.org/10.7249/RRA1943-1 |
spellingShingle | Wingfield, Thomas C. 1962- Creating selective overmatch an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers Chapter One: Introduction -- Chapter Two: The Application of International Relations Theory to Competition and Conflict in Cyberspace -- Chapter Three: Current U.S. Approach to Cyberspace Operations -- Chapter Four: Creating Selective Overmatch in Cyberspace -- Chapter Five: Identifying Chinese Influence Points and Actions to Affect Them -- Chapter Six: Defending U.S. Influence Points -- Chapter Seven: Conclusion and Recommendations USA Department of Defense (DE-588)1019534-8 gnd Information warfare (DE-588)4461975-3 gnd Militärpolitik (DE-588)4065004-2 gnd |
subject_GND | (DE-588)1019534-8 (DE-588)4461975-3 (DE-588)4065004-2 (DE-588)4009937-4 |
title | Creating selective overmatch an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers |
title_alt | Approach to developing cyberspace options to sustain U.S. primacy against revisionist powers |
title_auth | Creating selective overmatch an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers |
title_exact_search | Creating selective overmatch an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers |
title_full | Creating selective overmatch an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers Tom Wingfield [und 11 weitere] |
title_fullStr | Creating selective overmatch an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers Tom Wingfield [und 11 weitere] |
title_full_unstemmed | Creating selective overmatch an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers Tom Wingfield [und 11 weitere] |
title_short | Creating selective overmatch |
title_sort | creating selective overmatch an approach to developing cyberspace options to sustain u s primacy against revisionist powers |
title_sub | an approach to developing cyberspace options to sustain U.S. primacy against revisionist powers |
topic | USA Department of Defense (DE-588)1019534-8 gnd Information warfare (DE-588)4461975-3 gnd Militärpolitik (DE-588)4065004-2 gnd |
topic_facet | USA Department of Defense Information warfare Militärpolitik China |
url | https://doi.org/10.7249/RRA1943-1 |
work_keys_str_mv | AT wingfieldthomasc creatingselectiveovermatchanapproachtodevelopingcyberspaceoptionstosustainusprimacyagainstrevisionistpowers AT wingfieldthomasc approachtodevelopingcyberspaceoptionstosustainusprimacyagainstrevisionistpowers |