Crisis and Escalation in Cyberspace by Martin C. Libicki
Author:Martin C. Libicki [Libicki, Martin C.]
Language: eng
Format: epub
ISBN: 978-0-8330-7680-9
Publisher: RAND Corporation
Published: 2012-01-15T00:00:00+00:00
Escalation Risks for Contained Local Conflicts
In theory, operational cyberwarâcarrying out cyberattacks on targets that are considered legitimate war targetsâshould not be considered escalatory. It is just another way to accomplish the same end, and with fewer lives at risk. But sometimes, an act is judged escalatory based not on what it does but how it does it (e.g., taking out a bunker with chemical weapons is considered more heinous than doing the same job with high explosives).12 The Japanese considered the first use of firebombing (March 1945) to be escalatory even though the attack on Dresden, Germany, had already taken place. The use of cruise missiles in Bosnia (1995) was considered escalatory.13 Although it is unclear whether such sentiments were anything more than sentiments (because neither target could escalate in response), the broader point stands.
If opponents believe that cyberweapons have mysterious effects, their use will be seen as escalatory even though, measured in terms of actual effects, they should not be. Adversaries may also convince themselves that, although the cyberattacks per se were in bounds, their use against military targets portends their use against civilian targets because the latter can be surreptitiously attacked via cyberspace even if kinetic attacks on them would be universally considered off-limits. Again, it depends on what adversaries think.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(22238)
Hello! Python by Anthony Briggs(21442)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(19976)
Dependency Injection in .NET by Mark Seemann(19411)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(19128)
Kotlin in Action by Dmitry Jemerov(19022)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(18601)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(17435)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16957)
Grails in Action by Glen Smith Peter Ledbrook(16574)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(14130)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(12115)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(10845)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10592)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(9963)
Hit Refresh by Satya Nadella(9109)
The Kubernetes Operator Framework Book by Michael Dame(8535)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8359)
Robo-Advisor with Python by Aki Ranin(8305)