Defending Cyberspace, And Other Metaphors

E-Book Overview

Information warfare, as any casual observer of the Pentagon can attest, remains a hot-button topic in the military community. Thus does war follow commerce into cyberspace, pitting foes against one another for control of this clearly critical high ground. But does this facile comparison have a basis in reality? In this iconoclastic spirit, the six essays in this book are characterized by a continuing search for the meaning of information warfare.

E-Book Content

Defending Cyberspace and Other Metaphors Martin C. Libicki THE CENTER FOR ADVANCED Directorate of Advanced Concepts, Technologies and Information Strategies Institute for National Strategic Studies National Defense University Washington, DC DTIC QUALITY INSPECTED 4 . . Distribution Unlimited I NATIONAL DEFENSE UNIVERSITY President: Lieutenant General E ~ i J.n Rokke, USAF Vice President: Ambassador William G. Walker + + INSTITUTE FOR NATIONAL STRATEGIC STUDIES Director: Dr. Hans A. Binnendijk + DIRECTORATE OF ADVANCED CONCEF'TS, TECHNOLOGIES AND INFORMATION STRATEGIES (ACTIS) Director: Dr. David S. Alberts Fort Lesley J. McNair, Washington, DC 203 19-6000 Phone: (202) 685-2209 Facsimile: (202) 685-3664 + + + + Opinions, conclusions, and recommendations, expressed or implied, are those of the authors. They do not necessarily reflect the views of the National Defense University, the Department of Defense, or any other U.S. Government agency. Cleared for public release; distribution unlimited. . .. Portions of this publication may be quoted or reprinted without further permission, with credit to the Institute for National Strategic Studies, Washington, DC. Courtesy copies of reviews would be appreciated. Library of Congress Cataloging-in-Publication Data Defending Cyberspace and Other Metaphors / Martin C. Libicki. p. cm. ISBN 1-57906-031-5 1. Information Warfare-United States. 2. Information Superhighway-United States. I. Title U163.L52 1997 355.3'43-dc21 96-53238 CIP First Printing, February 1997 For sale by the U.S. Government Printing Office Superintendent of Documents, Mail Stop: SSOP Washington, DC 20402-9328 Phone: (202) 512-1800 Contents Introduction ........................ Essay One: Perspectives on Defending Cyberspace Potential Threats to the NII . . . . . . . . . . . . Everyday Threats Engender Everyday Defenses Deep Threats Focus the Risk on Attackers . . . Systems Can Be Protected . . . . . . . . . . . . . The NII's Vulnerability Should Not Be Exaggerated . . . . . . . . . . . . . . . . . . Information Attacks Offer Few Obvious Strategic Gains . . . . . . . . . . . . . . . . The Provision of Systems Security Is Inescapably Private . . . . . . . . . . . . . . Some Things Are Worth Doing . . . . . . . . . Things to Avoid . . . . . . . . . . . . . . . . . . . Conclusions . . . . . . . . . . . . . . . . . . . . . . Essay Two: Deterring Information Attacks . . . . Elements of Deterrence . . . . . . . . . . . . . . Defining the Incident . . . . . . . . . . . . . . . . Determining the Perpetrator . . . . . . . . . . . . Certainty of Response . . . . . . . . . . . . . . . Conclusions . . . . . . . . . . . . . . . . . . . . . . Essay Three: Indistinguishable from Magic . . . . Bosnia. Strategic Defense. and the NII . . . . . Assessing Information Warfare Capabilities . . . . . . . . . . . . . . . . . . . .............. 61 Essay Four: The Retro Revolution . . . . . . . . . . The Vocabulary of' Strategic Conflict . . . . . . The Ascendancy of Intelligence Operations . . Retarding Reform of Acquisition . . . . . . . . . A Concluding Thought . . . .
You might also like

High Performance Data Mining
Authors: Guo , Grossman. (eds.)    213    0


Computer Science Handbook
Authors: Allen B. Tucker    220    0



Introduction To Algorithms
Authors: Thomas H. Cormen , Charles E. Leiserson , Ronald L. Rivest , Clifford Stein    204    0


Introduction To Parallel Computing: [a Practical Guide With Examples In C]
Authors: W. P. Petersen , P. Arbenz    124    0



Introduction To Lambda Calculus
Authors: Barendregt H. , Barendsen E.    139    0


Python Developer's Handbook
Authors: Andre Lessa    154    0


Quantum Computing Explained
Authors: David McMahon    164    0


Algorithms For Computational Linguistics
Authors: Striegnitz K. , et al.    187    0