WWW.DIS.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Thesis, dissertations, books
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 10 | 11 || 13 | 14 |   ...   | 23 |

«Workshop held 9-10 January 2008 in Arlington, VA Prepared for US Strategic Command Global Innovation and Strategy Center (USSTRATCOM/GISC) Prepared ...»

-- [ Page 12 ] --

Assuming the continued emergence of adaptive adversaries, one of the key deficiencies of current thinking is its implicit state-centrism. The implication is a tendency to discount domestic or internal determinants and causes of behavior by assuming that actors are more significantly There certainly have been numerous attempts to influence, assure and persuade outside the military realm, but these have typically been identified as “diplomatic” rather than part of a deterrence policy.

Deterring VNSA in Cyberspace influenced by external factors like a deterrer’s threat (Morgan, 1983). Even retaining the rational actor assumption, albeit relaxed to allow for goal-directed gain “maximizers” with broader ranges of interests and goals, the luxury of this degree of analytic simplification may be too costly. We do not mean to suggest that cost imposition – if no longer mainly kinetic – and provision of benefits are no longer valid modes of influencing the behaviors of would-be cyber aggressors. Rather that, no longer assuming an adversary with a set of essentially static basic objectives (e.g., economic prosperity, territorial sovereignty and security, etc. derived from its identity as a nation-state) means more work and a radically increased demand for information about the opponent within his own (subjective) context.

Likewise, the presumption of complete or nearly complete information about the adversary’s core values, cost-benefit calculations and risk propensities – as we believed we possessed about the Soviet Union – may be a significant miscalculation. A cyber deterrence concept that required this quantity of context- and actor-specific information over a range of potential adversaries – to the extent that they are knowable – would be an enormous burden on national capabilities.

The bottom line is this: There appears to be level of generality problem in using our current rational deterrence thinking as the primary bases of security policy. That approach is a largely simplified model for assessing the strategic interactions between actors assumed to be singularlyfocused and with relatively few and simple options available to them. Security policy is generally most effective when it is tailored to address specific actors and actions in context;

actors that typically have a range of incremental options available to them spanning the space between conflict and cooperation. When the focus is shifted from identifiable state actors to possibly unknown adversaries in unknown locations both in cyber and physical space, this deficiency becomes more apparent.

It is clear that today’s policy planners and practitioners must confront a series of concepts most likely unconsidered by their mid- 20th century counterparts: cyberspace, cyber defense, cyber attack and cyber terrorism, and thus cyber deterrence. At the end of the day, the purpose of a cyber deterrence policy is to influence a range of moderate to extreme individuals, and influence a range of actions from tacit support of anti-Western activities to acts of enormous violence. US actions will need to be at times tailorable to target populations and specific undesirable behaviors. At other times, action will be necessary under extreme uncertainty regarding the exact adversary and his specific plans. A number of issues deserve careful consideration as US deterrence thinking is reshaped to serve as a policy guide for protecting US interests in the cybernetworked world.

Defining Concepts. One approach to assessing the nature of cyberspace has been presented • here, but there are certainly other ways to take a comprehensive and insight-generating look at the cyber realm. It is such a rapidly developing, and in many ways still untapped communication and interaction arena that overlooking its fundamental aspects risks forming an inaccurate understanding of its importance and influence as well as its limitations.

Similarly, a broader, less restrictive understanding of deterrence than currently is suggested in official publications is likely warranted. Does refining our deterrence concept as encompassing a range of actions including the ability to shape a potential adversary’s choice environment before negative intent is generated help reduce the problem of multiple potential threats in multiple cyberspaces? Is influencing opponents through international and cyber Deterring VNSA in Cyberspace community norms a valid approach to deterring the unknown threat? Does expanding the “deterrence” concept to include providing benefits as well as imposing costs help policy makers address the multiplicity of cyber threats?

Defining Thresholds. There is the critical issue of communicating to the adversary what • exactly is considered to be an “attack” as well as the thresholds between nuisance, disruption, serious security breach and acts of war. Does hacking into a system to make preparations for a future attack, for example, constitute an attack? Are all breaches to be treated the same way? Do those causing disruption but no damage or loss of life receive attention at all?

Setting these thresholds and the response principles (e.g., response in kind, proportional response, massive retaliation, flexible response, etc.) that will accompany them in the cyber realm should be the first order of business.

Attribution Capabilities. Precise and timely attribution of cyber activities is of critical • importance for a number of reasons. First, the more precisely we can identify the adversary the more information we can collect about his interests, goals and what he sees as the benefits of the actions we would seek to prevent. The more we understand these factors, the more closely US deterrent threats and actions can be tailored to that adversary. Second, a precise attribution capability will be required to demonstrate and maintain the credibility especially of cost imposition deterrent threats. The threat of retaliation can be perceived as inherently weak when an opponent lacks a fixed location and critical infrastructure to target.





If the adversary does not believe he can be seen, discovered or located he is not likely to fear threatened retaliation. Third, the ability to precisely attribute cyber aggressions is extremely important in avoiding the kinds of spoofing and deception in our conceptual cyberspace that could make us believe an attack was coming from somewhere other than where it is. This is the problem at the base of the threat of “catalytic warfare” where an actor successfully misrepresents its actions in order to prompt conflict between others. How precise do our attribution capabilities need to be?, and critically, how do we convince a potential adversary of a cyber capability without inviting counter-measures?

Second-order Effects. In the introduction to Beyond Nuclear Deterrence, Arbatov and • Dyorkin (2006) provide a cautionary tale of the effects on Russia security thinking of a US effort to deter terrorists and other adversaries. They cite Russian decision makers’ reactions to a US plan to build nuclear ‘bunker-buster’ warheads able to penetrate underground facilities in terrorist-held areas and rogue states. In fact, many Russians believed this effort was actually aimed at Russia’s own deeply-buried and hardened sites. They conclude with a quote from Defense Minister, Sergei Ivanov, who explained that,

–  –  –

In light of such thinking, how should deterrence policy be reconceived in order to capture and control this type of signaling – both material and communicated – or secondary effect?

Deterring VNSA in Cyberspace Are efforts to shape international cyber standards and ethics the issue here? How do we gauge the deterrent effects of US actions in cyber- and non-cyber spaces?

These are weighty and difficult questions and unfortunately we offer no simple solutions within this report, just a reference to Der Derian’s (2000) riff on Von Clausewitz where he asks whether “virtualization is the continuation of war (and politics) by other means?” Perhaps. It is certainly something to consider.

Deterring VNSA in Cyberspace 4 The Cyber-Physical Nexus: Movement between the Worlds: Non-State Actor’s Use of the Internet by Dr. S. K. Numrich, Institute for Defense Analyses Mazer then grew serious and said, “Ender Wiggin for the last months you have been the commander of our fleets. There were not games. The battles were real. Your only enemy was the enemy. You won every battle. And finally today you fought them at their home world, and you destroyed their world, their fleet, you destroyed them completely, and they’ll never come against us again. You did it. You.”(Carr, 1977) On that fateful day, Ender Wiggin, student in the flight academy, found himself quite unwittingly in the cyber-physical Nexus – the place where simulator space had become physical space.

Without his consent, Wiggin’s teachers, people we would probably call manipulators, enabled the student’s actions in cyber media to destroy people and places in his and their real world. The alternate reality and the physical reality met and physical reality was conquered.

The Nexus: A Vital Intersection

In the world of synthetic training, “Ender’s Game” has been the tacit ideal for developing synthetic worlds, worlds in cyberspace – worlds so real to the student that tactics, command and control and overall skills learned and practiced in the cyber world could translate immediately to the physical world. The cyber world today, like the simulator in Wiggin’s world, is becoming a critical tool in the hands of modern manipulators, terrorist organizations among others, and the most frightening consequences of cyber use emerge in the Nexus, where the cyber world intersects with the geophysical world in which we live.

The world of the Internet, developed in science and engineering laboratories to facilitate collaboration across facilities and delivered to the public by the Department of Defense through the ARPANET project, has subtly revolutionized today’s world as did prior technological developments of the printing press and industrial machines changed the world in their eras. The information highway that has given us direct communication capability through electronic mail and chat, online conferencing, a huge distributed library of data and information (everything from trash to the highest quality technical references) and virtually immediate global access has grown beyond the computer-based Internet to hand-held devices linked to the Internet via cellular communications. As the capability has grown, the cost of entry into cyberspace has decreased -- from the availability of low cost cellular devices to development of software that makes publishing simple for the novice. Once the domain of the technocrats, cyberspace is a domain where anyone can find a place, given access.

Our dependence on the cyber world for daily life has increased dramatically. As individuals we shop, bank, maintain records and contacts online. We depend upon cyber resources to control our air traffic, our “fast pass” toll capabilities on highways, our banking and other financial networks, our power grids, our dams, our traffic lights and trains. We depend on credit cards and Deterring VNSA in Cyberspace cash from automated teller machines to enable both our life at home and our travels abroad. Our understanding of the world around us comes through cyber media, not just the online press, but the images captured by the individual and posted to the Internet through which we feel we have both global presence and immediacy with events anywhere in the world.

The specter of cyber crime weighs heavily upon us simply because activity in cyberspace can and does impact the way we live our daily lives.

Terrorist Uses of Cyber Media – It’s More than the Internet On the international scene, the Internet was championed as a way of enabling the free exchange of ideas, as a means for organizations and individuals to communicate with each other, as a way of breaking down barriers and creating the opportunity to form the “global village”. But with the good has come the bad. The Internet has also enabled the spread of pornographic and violent content and the same facilities that fostered international business led to the use of the Internet by criminals of every sort, including terrorists. The attributes of the Internet – its decentralized structure, anonymity and ease of communication – align readily with the loosely networked structures and anonymity desired by criminal and terrorist groups. In examining the use of cyberspace by terrorists, Maura Conway (Conway, 2005) summarized current literature on the topic in the following table.

–  –  –

Conway chooses to categorize the use of cyberspace by terrorists as information provision, financing, networking, recruitment and information gathering, subsuming under these four all those listed in Table I. Weimann’s list, reiterated in his more recent book Terror on the Internet (Weimann, 2006), provides a somewhat more fruitful ground for examining the intersection of the cyber and physical worlds. The categories he uses in his book differ somewhat from those listed above.

The War of Minds and Hearts – Psychological Warfare

We often think of the war against terrorists and insurgents as a war to win the minds and hearts of the people. However in this context, it is relatively easy for the terrorist to gain the upper hand. Terrorists often engage in psychological warfare by using one or more incidents of physical damage to create a sense of fear and uncertainty that extends far beyond the original Deterring VNSA in Cyberspace physical act. The cyberspace is a wonderful medium for extending an incident in time and space.

Images of children killed and maimed by explosives, captives with eyes blindfolded beheaded by captors, and videos of people jumping from the collapsing World Trade Center broadcast and rebroadcast across the world with an immediacy hitherto unavailable brings acts of terror into the living room. By using and reusing such footage, the terrorist seeks to provoke a reaction disproportionate to the original act.



Pages:     | 1 |   ...   | 10 | 11 || 13 | 14 |   ...   | 23 |


Similar works:

«The Transformation and Development of Badminton as a Global Sport Dominated by Asian Players, Teams, Sponsors and Brands, 1893-2012: Multidisciplinary Perspectives Dr. Lim Peng Han, Visiting Research Fellow, Sports Centre, University of Malaya Associate Professor Dr. Mohd Salleh Aman, Director/Dean, Sports Centre, University of Malaya Abstract The game of badminton has grown to be a global sport dominated by Asian players, sponsors and Asian brands of badminton equipment. A series of...»

«East Surrey Morris Men Dance Notes Prepared by Clayton Francis April 5th, 2012 Page 1 Table of Contents Abbreviations’ Key Handkerchief Dance Stick Dance Adderbury Beaux of London City Constant Billy Lads A' Bunchum Postmans Knock Flowing Bowl Bluebells of Scotland Shepherds Hey Buffoon Badby Beaux of London City (S) Broad Cupid (CD) Old Black Joe Shepherds Hey (S) Bampton Bobbing Around The Rose Tree The Quaker Bonny Green Garters Bledington Idbury Hill Over the Water to Charlie Young...»

«PASS Sample Size Software NCSS.com Chapter 471 Confidence Intervals for the Difference Between Two Means Introduction This procedure calculates the sample size necessary to achieve a specified distance from the difference in sample means to the confidence limit(s) at a stated confidence level for a confidence interval about the difference in means when the underlying data distribution is normal. Caution: This procedure assumes that the standard deviations of the future samples will be the same...»

«CORPORATE GOVERNANCE: THE TURNING POINTS By: ADEYINKA OLUMIDE-FUSIKA LL.B (HONS) (IFE), B.L, M.A (PHIL) (Lagos), Solicitor and Advocate of the Supreme Court Of Nigeria; Managing Partner, Citipoint (Legal Practitioners) January 16th, 2009 The GMD’s Inspirational Lecture INTRODUCTION Let me start by inviting you to accompany me on a road trip from Lagos to Nsukka (or from whichever point to which other destination in Nigeria), with the award winner Nigerian writer, Chimamanda Ngozi Adichie,...»

«!#$!%$&'()#$*+,*-%'./)-01$23 45657'!#$!%$489:1;$ -4$4';*=2*'$%? Free expression, media freedom and 2015 elections in Myanmar !#$!%$&'()#$*+,*-%'./)-01$23 45657'!#$!%$489:1;$ -4$4';*=2*'$%? Content !#$!%$&' ()#$*+'$*-%'./)01;$@ A*=2%B48 Freedom of Expression !#$!%$&'()#$*+,*-%'./)-01$2 9:1;$45657' Freedom of Expression and the Media $CD#$0EF%$0E7$484E'29:1;$ GH)IB6 Regulation and Pluralism 9/)1$1J*=2#1$%BI1$01;$9:1;$4?*%2%/)$1$01;$ Right to Political Participation and to Vote *=2*'$%?...»

«Data Processing Agreement (DPA) for Circuit Version 1.1a, as of 18 November 2015 pursuant to section 11 of the German Federal Data Protection Act (Bundesdatenschutzgesetz, BDSG) by and between and [Customer Name] Unify Software and Solutions GmbH & Co. KG [Address] Mies-van-der-Rohe-Strasse 6 [Address] 80807 München [Country] Deutschland/Germany hereinafter: “Controller” or “Customer” hereinafter: “Processor” or “Unify”, Controller and Processor each a “Party” and,...»

«Computer Science Honours School of Computer Science Important Degree Information: B.Sc./M.A. Honours The general requirements are 480 credits over a period of normally 4 years (and not more than 5 years) or part-time equivalent; the final two years being an approved honours programme of 240 credits, of which 90 credits are at 4000 level and at least a further 120 credits at 3000 and/or 4000 (H) levels. Refer to the appropriate Faculty regulations for lists of subjects recognised as qualifying...»

«Koon Leai Larry Tan and Kenneth J. Turner. Automated Analysis and Implementation of Composed Grid Services. In Dimitrios Dranidis and Ilias Sakellariou, editors, Proc. 3rd South-East European Workshop on Formal Methods pages 51-64, Thessaloniki, Greece, November 2007. Automated Analysis and Implementation of Composed Grid Services Koon Leai Larry Tan and Kenneth J. Turner Computing Science and Mathematics, University of Stirling, Stirling FK9 4LA, UK klt | kjt @cs.stir.ac.uk Abstract. Service...»

«Conga support@congamerge.com Conga Composer Microsoft Word Templates Release 7 Winter '13 Welcome Conga Composer lets you generate documents, spreadsheets and presentations by gathering data from salesforce.com and merging to a template. The resulting file(s) can be printed or emailed and you can log the actions you’ve taken in Salesforce. Conga Composer solutions let you create individual documents by clicking a button from a record in Salesforce. Prerequisite Before using this guide,...»

«Day, M. (2008) Toward distributed infrastructures for digital preservation:The roles of collaboration and trust. International Journal of Digital Curation, 3 (1). pp. 15-28. ISSN 1746-8256 Link to official URL (if available): http://www.ijdc.net/ijdc/article/view/60/61 Opus: University of Bath Online Publication Store http://opus.bath.ac.uk/ This version is made available in accordance with publisher policies. Please cite only the published version using the reference above. See...»

«Complicating “White Privilege”: Race, Poverty, and the Nature of the Knapsack By Paul C. Gorski (gorski@EdChange.org) http://www.EdChange.org January 1, 2012 In my favorite photograph of my Grandma Wilma, taken during her early teens, she stands outside her Kitzmiller, Maryland, house. The house’s exterior, cracking and worn, hints at the working poor life she and her family are living in Appalachia. Evidence, too, is her attire: full-length overalls, dusty and stained, hang over a plain...»

«Running Head: Relational Dialectics 1 Catherine Ziemann Faculty Sponsor Dr. Mark Vail Relational Dialectics: Friends or More? Introduction In every intimate relationship, there are bound to be some tensions couples will need to overcome in order to carry out successful partnerships and connections. Researchers and theorists study the tensions between couples in order to identify communication strategies that can be used to manage or diminish these dialectical tensions. By analyzing a fictional...»





 
<<  HOME   |    CONTACTS
2016 www.dis.xlibx.info - Thesis, dissertations, books

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.