Query Result Set
Skip Navigation Links
   ActiveUsers:1138Hits:19542143Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
OFFENSIVE CYBER OPERATIONS (4) answer(s).
 
SrlItem
1
ID:   138792


Cyber house rules: on war, retaliation and escalation / Cavaiola, Lawrence J; Gompert, David C ; Libicki, Martin   Article
Gompert, David C Article
0 Rating(s) & 0 Review(s)
Summary/Abstract When it comes to cyber war, the United States is ambivalent. While persuaded of the utility of offensive cyber operations, it dreads where they might lead. The advantages of cyber war are swamped by the disadvantages if it cannot be kept under control – and there are nagging doubts about whether it can. That computer systems are often interconnected and ultipurpose, and that there are no sharp ‘firebreaks’ in cyber war, compounds the dangers of escalation to unintended levels and effects, including the disruption of critical civilian services. In a crisis or war, the United States might, despite misgivings, feel compelled to attack computer systems that enable the enemy to strike US forces, only to find itself engaged in cycles of attack and retaliation that produce more pain than gain.
        Export Export
2
ID:   154923


Does the internet need a hegemon? / Rovner, Joshua ; Moore, Tyler   Journal Article
Rovner, Joshua Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Hegemonic stability theory holds that a dominant power can produce international cooperation by providing public goods and resolving collective action dilemmas. Successful hegemons also resist the temptation to exploit their advantages in order to reduce other states’ fear of domination. This article asks whether or not the internet needs the United States to play a similar role. If so, Washington should pursue policies designed to strengthen internet security while eschewing espionage and cyberattacks that rely on some degree of internet insecurity. If not, it can go on the offensive without fear of undermining the system as a whole. We examine the technical and political fallout from revealed offensive cyberoperations to assess the relative fragility of the internet. Our findings suggest that it is relatively resilient.
        Export Export
3
ID:   161522


Integrating offensive cyber capabilities: meaning, dilemmas, and assessment / Smeets, Max   Journal Article
Smeets, Max Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities. One of the key dilemmas faced by these states is whether (and how) to integrate their intelligence and military capabilities to develop a meaningful offensive cyber capacity. This topic, however, has received little theoretical treatment. The purpose of this paper is therefore to address the following question: What are the benefits and risks of organizational integration of offensive cyber capabilities (OIOCC)? I argue that organizational integration may lead to three benefits: enhanced interaction efficiency of intelligence and military activities, better(and more diverse) knowledge transfer and reduced mission overlap. Yet, there are also several negative effects attached to OIOCC. It may lead to 'cyber mission creep' and an intensification of the cyber security dilemma. It could also result in arsenal cost ineffectiveness in the long run. Although the benefits of OIOCC are seen to outweighs the risks, failing to grasp the negative effects may lead to unnecessary cycles of provocation, with potentially disastrous consequences.
        Export Export
4
ID:   151780


On the offensive: UK declares cyber war on Islamic State / Haggman, Andreas   Journal Article
Haggman, Andreas Journal Article
0 Rating(s) & 0 Review(s)
        Export Export