Defense Horizons. Cyber Influence and International Security. Number 61


Book Description

Cyber influence is an ongoing source of power in the international security arena. Although the United States has an enormous cyber information capacity, its cyber influence is not proportional to that capacity. Impediments to American cyber influence include the vastness and complexity of the international information environment, multiplicity of cultures and differing audiences to which communications must be addressed, extensiveness and significance of contending or alternative messages, and complexity and importance of using appropriate influential messengers and message mechanisms. Enhancing the influence of the United States in cyberspace will require a multifaceted strategy that differentiates the circumstances of the messages, key places of delivery, and sophistication with which messages are created and delivered, with particular focus on channels and messengers. To improve in these areas, the United States must focus on actions that include discerning the nature of the audiences, societies, and cultures into which messages will be delivered; increasing the number of experts in geographic and cultural arenas, particularly in languages; augmenting resources for overall strategic communications and cyber influence efforts; encouraging long-term communications and cyber influence efforts along with short-term responses; and understanding that successful strategic communications and cyber influence operations cannot be achieved by the United States acting on its own; allies and partners are needed both to shape our messages and to support theirs.




Cyber Influence and International Security


Book Description

Cyber influence is an ongoing source of power in the international security arena. Although the U.S. has an enormous cyber information capacity, its cyber influence is not proportional to that capacity. This pub. by the Nat. Defense University Center for Technology and National Security Policy discusses impediments to American cyber influence. It also offers a multifaceted strategy to enhance the influence of the U.S in cyberspace that differentiates the circumstances of the messages, key places of delivery, and sophistication with which message are created and delivered, with particular focus on channels and messengers.










Strategic Forum


Book Description







Cashing in on Cyberpower


Book Description

As the world has become increasingly digitally interconnected, military leaders and other actors are ditching symmetric power strategies in favor of cyberstrategies. Cyberpower enables actors to change actual economic outcomes without the massive resource investment required for military force deployments. Cashing In on Cyberpower addresses the question, Why and to what end are state and nonstate actors using cybertools to influence economic outcomes? The most devastating uses of cyberpower can include intellectual property theft, espionage to uncover carefully planned trade strategies, and outright market manipulation through resource and currency values. Offering eight hypotheses to address this central question, Mark T. Peters II considers every major cyberattack (almost two hundred) over the past ten years, providing both a quick reference and a comparative analysis. He also develops new case studies depicting the 2010 intellectual property theft of a gold-detector design from the Australian Codan corporation, the 2012 trade negotiation espionage in the Japanese Trans-Pacific Partnership preparations, and the 2015 cyberattacks on Ukrainian SCADA systems. All these hypotheses combine to identify new data and provide a concrete baseline of how leaders use cybermeans to achieve economic outcomes.




Joint Force Quarterly


Book Description




Cyber Infrastructure Protection


Book Description

Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.




So Many Zebras, So Little Time


Book Description

Force ratios are an important variable in warfare and in nature. On the Serengeti, large zebra herds are hunted by small prides of lions. But with their overwhelming majority, why don¿t the zebras unite and attack the lions? Ecological interactions between predators and their prey are complex. The mathematics underlying different types of survival strategies for attacker and evader have been worked out by ecologists. While not a perfect metaphor, these quantitative ecology models greatly resemble behavioral interactions during counterinsurgency operations. This paper suggests a framework for other researchers to adapt and expand. Indeed, many of the models discussed are common to both ecologists and economists.