Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (5)
  • Libicki, Martin C.  (5)
  • Santa Monica, CA : RAND  (5)
  • United States  (4)
  • HISTORY ; Military ; Other  (2)
Datasource
Material
Language
  • English  (5)
Years
  • 1
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833076809 , 0833076809 , 9780833076786 , 0833076795 , 0833076787 , 0833076817 , 9780833076816 , 9780833076793
    Language: English
    Pages: 1 Online-Ressource (xxvi, 172 pages)
    Parallel Title: Print version Libicki, Martin C Crisis and escalation in cyberspace
    DDC: 358.4/141
    Keywords: United States Decision making ; United States Organization ; United States ; United States ; Information warfare ; Escalation (Military science) ; Cyberspace Security measures ; Crisis management Government policy ; Cyberterrorism Prevention ; Conflict management ; Information warfare ; Escalation (Military science) ; Cyberspace ; Crisis management ; Cyberterrorism ; Conflict management ; United States ; COMPUTERS ; Networking ; Security ; TECHNOLOGY & ENGINEERING ; Military Science ; Armed Forces ; Organization ; Conflict management ; Cyberterrorism ; Prevention ; Escalation (Military science) ; Information warfare ; United States ; Electronic books
    Abstract: Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses
    Abstract: Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses
    Note: "Prepared for the United States Air Force ... Rand Project Air Force , Includes bibliographical references (pages 163-172)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833052452 , 0833052454 , 9780833051776 , 0833052470 , 0833051776 , 9780833052476
    Language: English
    Pages: 1 Online-Ressource (xxviii, 141 pages)
    Series Statement: Rand Corporation monograph series MG-1091-AF
    Parallel Title: Print version Libicki, Martin C Global demographic change and its implications for military power
    Keywords: United States Manpower ; Forecasting ; United States ; Balance of power Forecasting ; Balance of power ; Military policy ; Forecasting ; Population forecasting ; Military & Naval Science ; Law, Politics & Government ; Armies ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; SOCIAL SCIENCE ; Demography ; Armed Forces (United States) ; Manpower ; Forecasting ; United States Military policy ; Forecasting ; United States Population ; Forecasting ; United States ; United States ; Electronic books
    Abstract: What is the impact of demographics on the prospective production of military power and the causes of war? This monograph analyzes this issue by projecting working-age populations through 2050; assessing the influence of demographics on manpower, national income and expenditures, and human capital; and examining how changes in these factors may affect the ability of states to carry out military missions. It also looks at some implications of these changes for other aspects of international security. The authors find that the United States, alone of all the large affluent nations, will continue to see (modest) increases in its working-age population thanks to replacement-level fertility rates and a likely return to vigorous levels of immigration. Meanwhile, the working-age populations of Europe and Japan are slated to fall by as much as 10 to 15 percent by 2030 and as much as 30 to 40 percent by 2050. The United States will thus account for a larger percentage of the population of its Atlantic and Pacific alliances; in other words, the capacity of traditional alliances to multiply U.S. demographic power is likely to decline, perhaps sharply, through 2050. India's working-age population is likely to overtake China's by 2030. The United States, which has 4.7 percent of the world's working-age population, will still have 4.3 percent by 2050, and the current share of global gross domestic product accounted for by the U.S. economy is likely to stay quite high
    Abstract: What is the impact of demographics on the prospective production of military power and the causes of war? This monograph analyzes this issue by projecting working-age populations through 2050; assessing the influence of demographics on manpower, national income and expenditures, and human capital; and examining how changes in these factors may affect the ability of states to carry out military missions. It also looks at some implications of these changes for other aspects of international security. The authors find that the United States, alone of all the large affluent nations, will continue to see (modest) increases in its working-age population thanks to replacement-level fertility rates and a likely return to vigorous levels of immigration. Meanwhile, the working-age populations of Europe and Japan are slated to fall by as much as 10 to 15 percent by 2030 and as much as 30 to 40 percent by 2050. The United States will thus account for a larger percentage of the population of its Atlantic and Pacific alliances; in other words, the capacity of traditional alliances to multiply U.S. demographic power is likely to decline, perhaps sharply, through 2050. India's working-age population is likely to overtake China's by 2030. The United States, which has 4.7 percent of the world's working-age population, will still have 4.3 percent by 2050, and the current share of global gross domestic product accounted for by the U.S. economy is likely to stay quite high
    Note: Includes bibliographical references (pages 131-141)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833049520 , 0833049836 , 0833049526 , 9780833049834
    Language: English
    Pages: 1 Online-Ressource (xxiv, 244 pages)
    Series Statement: Rand Corporation monograph series MG-965-MCIA
    Parallel Title: Print version Connable, Ben How insurgencies end
    Keywords: Counterinsurgency Case studies ; Insurgency ; Counterinsurgency ; Insurgency Case studies ; Insurgency Case studies ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; Security (National & International) ; Upprorsbekämpning ; Uppror ; Law, Politics & Government ; Political Science ; Political Theory of the State ; insurgency ; Insurgency ; Counterinsurgency ; Case studies ; Statistics ; Electronic books
    Abstract: "This study tested conventional wisdom about how insurgencies end against the evidence from 89 insurgencies. It compares a quantitative and qualitative analysis of 89 insurgency case studies with lessons from insurgency and counterinsurgency (COIN) literature. While no two insurgencies are the same, the authors find that modern insurgencies last about ten years and that a government's chances of winning may increase slightly over time. Insurgencies are suited to hierarchical organization and rural terrain, and sanctuary is vital to insurgents. Insurgent use of terrorism often backfires, and withdrawal of state sponsorship can cripple an insurgency, typically leading to its defeat. Inconsistent support to either side generally presages defeat for that side, although weak insurgencies can still win. Anocracies (pseudodemocracies) rarely succeed against insurgencies. Historically derived force ratios are neither accurate nor predictive, and civil defense forces are very useful for both sides. Key indicators of possible trends and tipping points in an insurgency include changes in desertions, defections, and the flow of information to the COIN effort. The more parties in an insurgency, the more likely it is to have a complex and protracted ending. There are no COIN shortcuts."--Rand web site
    Abstract: "This study tested conventional wisdom about how insurgencies end against the evidence from 89 insurgencies. It compares a quantitative and qualitative analysis of 89 insurgency case studies with lessons from insurgency and counterinsurgency (COIN) literature. While no two insurgencies are the same, the authors find that modern insurgencies last about ten years and that a government's chances of winning may increase slightly over time. Insurgencies are suited to hierarchical organization and rural terrain, and sanctuary is vital to insurgents. Insurgent use of terrorism often backfires, and withdrawal of state sponsorship can cripple an insurgency, typically leading to its defeat. Inconsistent support to either side generally presages defeat for that side, although weak insurgencies can still win. Anocracies (pseudodemocracies) rarely succeed against insurgencies. Historically derived force ratios are neither accurate nor predictive, and civil defense forces are very useful for both sides. Key indicators of possible trends and tipping points in an insurgency include changes in desertions, defections, and the flow of information to the COIN effort. The more parties in an insurgency, the more likely it is to have a complex and protracted ending. There are no COIN shortcuts."--Rand web site
    Note: Includes bibliographical references (pages 223-244)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833047342 , 0833048759 , 0833047345 , 9780833048752
    Language: English
    Pages: 1 Online-Ressource (xxiv, 214 pages)
    Series Statement: RAND Corporation monograph series
    Parallel Title: Print version Libicki, Martin C Cyberdeterrence and cyberwar
    DDC: 355.343
    Keywords: Cyberspace Security measures ; Computer networks Security measures ; Civil defense ; Cyberterrorism Prevention ; Information warfare ; Cyberspace ; Computer networks ; Civil defense ; Cyberterrorism ; Information warfare ; COMPUTERS ; Security ; General ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; TECHNOLOGY ; Military Science ; Civil defense ; Computer networks ; Security measures ; Cyberterrorism ; Prevention ; Information warfare ; United States ; Electronic books
    Abstract: Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack
    Abstract: Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack
    Note: Includes bibliographical references (pages 225-214)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833039132 , 0833042483 , 9781281180919 , 1281180912 , 9780833042484 , 083303913X
    Language: English
    Pages: 1 Online-Ressource (xxii, 107 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Libicki, Martin C Exploring terrorist targeting preferences
    DDC: 363.325
    Keywords: Terrorism Prevention ; Terrorism ; POLITICAL SCIENCE ; International Relations ; General ; POLITICAL SCIENCE ; Political Freedom & Security ; International Security ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Terrorism ; Prevention ; Terrorismus ; Attentat ; Ziel ; United States ; USA ; al-Qaida ; Electronic books
    Abstract: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Glossary; Chapter One -- Introduction; Chapter Two -- What Drives al Qaeda's Choice of Targets?; The al Qaeda Targeting Process: Four Hypotheses; Some Observations on Rationality; Alternatives to Rational Action; Organization; Chapter Three -- Hypothesis Testing: Quantitative and Qualitative Measures; Measuring Intent; Modeling Intent; Testing Hypotheses Against Past Attacks; Chapter Four -- Hypothesis Testing: Al Qaeda Statements and Expert Observations; Al Qaeda's Reading of History Suggests the Leverage ofTerrorism
    Abstract: Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Glossary; Chapter One -- Introduction; Chapter Two -- What Drives al Qaeda's Choice of Targets?; The al Qaeda Targeting Process: Four Hypotheses; Some Observations on Rationality; Alternatives to Rational Action; Organization; Chapter Three -- Hypothesis Testing: Quantitative and Qualitative Measures; Measuring Intent; Modeling Intent; Testing Hypotheses Against Past Attacks; Chapter Four -- Hypothesis Testing: Al Qaeda Statements and Expert Observations; Al Qaeda's Reading of History Suggests the Leverage ofTerrorism
    Note: "MG-483-DHS"--Page 4 of cover , "Prepared for the Department of Homeland Security , Includes bibliographical references (pages 95-107)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...