Optimizing Cyberdeterrence
eBook - ePub

Optimizing Cyberdeterrence

A Comprehensive Strategy for Preventing Foreign Cyberattacks

  1. 302 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Optimizing Cyberdeterrence

A Comprehensive Strategy for Preventing Foreign Cyberattacks

About this book

Cyberattacks are one of the greatest fears for governments and the private sector. The attacks come without warning and can be extremely costly and embarrassing.

Robert Mandel offers a unique and comprehensive strategic vision for how governments, in partnership with the private sector, can deter cyberattacks from both nonstate and state actors. Cyberdeterrence must be different from conventional military or nuclear deterrence, which are mainly based on dissuading an attack by forcing the aggressor to face unacceptable costs. In the cyber realm, where attributing a specific attack to a specific actor is extremely difficult, conventional deterrence principles are not enough. Mandel argues that cyberdeterrence must alter a potential attacker’s decision calculus by not only raising costs for the attacker but also by limiting the prospects for gain. Cyberdeterrence must also involve indirect unorthodox restraints, such as exposure to negative blowback and deceptive diversionary measures, and cross-domain measures rather than just retaliation in kind.

The book includes twelve twenty-first-century cyberattack case studies to draw insights into cyberdeterrence and determine the conditions under which it works most effectively. Mandel concludes by making recommendations for implementing cyberdeterrence and integrating it into broader national security policy. Cyber policy practitioners and scholars will gain valuable and current knowledge from this excellent study.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Optimizing Cyberdeterrence by Robert Mandel in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & National Security. We have over one million books available in our catalogue for you to explore.

CHAPTER 1

Foreign Cyberthreat Dangers

In the United States at least, there is no security threat today that government policymakers, private businesses, and the public fear more than major cyberattacks. For example, since 2013 the American director of national intelligence has named cyberthreat as “the number one strategic threat to the United States, placing it ahead of terrorism for the first time since the attacks of September 11, 2001.”1 The relative invisibility, tracking difficulty, inexpensive initiation, technical obtuseness, fluid content, speedy impact, and broad scope of cyberthreat make it seem unintelligible, unpredictable, unmanageable, and ultimately catastrophic. On a global level, potential victims find themselves both frustrated and baffled about how to cope with cyberthreat more successfully. In light of this threat, this chapter analyzes the rising perceived importance of foreign cyberthreat, its changing nature, the legacy of ineffective target responses, and the ramifications of resulting global sea changes.

Rising Perceived Importance of Foreign Cyberthreat

Since the 1990s cyberattacks on global computer networks have risen in number (as well as in sophistication), reaching 1.7 billion in 2013, up from 1.6 billion in 2012.2 For the United States, over time “the frequency and sophistication of intrusions into U.S. military networks have increased exponentially.”3 In 2011 the Government Accountability Office estimated that “the number of unauthorized access or installations of malicious software on U.S. government computers has increased by 650 percent since 2006.”4 From October 2011 through February 2012, the Department of Homeland Security reported over 50,000 cyberattacks on private and government networks, with 86 on critical infrastructure networks.5 In 2014 a report to Congress revealed that “hackers have penetrated, taken control of, caused damage to and/or stolen sensitive personal and official information from computer systems at the Departments of Homeland Security, Justice, Defense, State, Labor, Energy, and Commerce; NASA [National Aeronautics and Space Administration]; the Environmental Protection Agency; the Office of Personnel Management; the Federal Reserve; the Commodity Futures Trading Commission; the Food and Drug Administration; the US Copyright Office; and the National Weather Service.”6 Aside from governments, cyberattacks also have targeted private businesses. For example, in 2010 “proprietary corporate data, e-mails, credit-card transaction data and login credentials at companies in the health and technology industries,” involving over 75,000 computers at more than 2,500 businesses in 196 countries, were hacked.7 Today nobody seems immune—regardless of the protection system—to cyber penetration.
The monetary scope of the damage wrought in cyberattacks has also grown. Regarding government targets, in 2009 the Pentagon reported that costs of repairing cyberattack damage—in terms of “manpower, computer technology, and contractors hired to clean up after both external probes and internal mistakes”—was more than $100 million a year.8 Outside of government targets, in 2008 cybercriminal groups reportedly stole more than $1 trillion in global data and intellectual property.9 Critical infrastructure operators across the globe report that their networks and control systems are “under repeated cyberattack, often from high-level adversaries like foreign nationstates,” and that in 2010 their downtime costs from such breaches exceeded $6 million per day.10 In May 2013 the Commission on the Theft of American Intellectual Property reported that hackers cost the United States $300 billion a year.11 The cost of cyberattacks on private business is dramatically rising as well. Including abnormal turnover of customers, reputation loss, diminished goodwill, and paying for credit reports and aid to affected customers, the average cost of a computer breach in 2015 was $3.79 million for large private companies globally, up 23 percent from 2013; and it ran $6.5 million for American companies, up 11 percent from 2013.12 Although such estimates are inherently imprecise, they do provide a glimmer of the massive, global financial impact of cyberintrusions.
Even more than most global threats, cyberspace dangers can certainly be socially constructed to a great extent. Given that cyberspace is man made, objectively determining to what extent cyberthreat is actually rising or actually poses greater dangers than other security threats would be extremely difficult. However, to call cyberthreat completely artificial and illusory goes too far, for tangible cyberattacks have generated concrete damage to data, information systems, and (indirectly) physical structures. Moreover, regardless of the level of existing threat, there is little doubt that government officials, corporate executives, and the public are now more scared of cyberattacks than ever before in the digital age.

Changing Nature of Foreign Cyberthreat

Possessing a unique set of characteristics, the virtual domain of cyberspace is now as important a source of threat as the physical domains of land, sea, air, and space.13 However, considerable confusion surrounds the rapidly changing cyberthreat. Continuing transformations in cyberattackers, their goals and motivations, their targets, and their attack styles have complicated understanding ongoing trends. Figure 1.1 summarizes the changing nature of foreign cyberthreat.

Cyberattackers

Not surprising, the most dangerous cyberattackers come from “groups with the resources and commitment to relentlessly target a company or government agency until they succeed in breaking in and then take value out.”14 Thus, today “the main threats no longer come from teenage hackers or petty criminals, although such actors are still around; instead, sophisticated criminals and state-sponsored spies pose the most danger for businesses and governments.”15 The Government Accountability Office lists the primary cyberattack sources as intelligence services, criminal groups, hackers and hacktivists, disgruntled insiders, and terrorists.16
Cyber disruption has wide appeal, requiring no more than “a powerful computer, a keen mind, and an underlying grudge.”17 The initiators range from “script kiddies” to “elite hackers” and from rich states and poor states. Cyberattacks’ attraction to both the powerful and the weak lies in their “low relative cost, high potential impact and general lack of transparency. Powerful actors such as the United States can combine cyber power with existing military capabilities, economic assets and soft power networks. Less powerful actors—states, organizations, individuals or any combination thereof—can gain asymmetrically in cyberspace by inflicting extensive damage on vulnerable targets.”18 Major powers seeking to protect the status quo often may find themselves thwarted by cyberinitiatives from smaller, weaker players.
Unlike many other forms of aggression, most states with relevant capabilities have not been reluctant to engage in foreign cyberintrusion, leading to intensified international cross penetration. Following security dilemma logic, other states can see a given state’s offensive cyberdefense strategy as violating their sovereignty. For example, former US deputy secretary of defense William Lynn suggests that over a hundred foreign intelligence organizations have been illegitimately trying to break into American defense networks.19 Today’s tightly networked information systems can serve equally as weapons...

Table of contents

  1. Cover
  2. Half title
  3. Title
  4. Copyright
  5. Contents
  6. List of Illustrations
  7. Acknowledgments
  8. Introduction
  9. 1 Foreign Cyberthreat Dangers
  10. 2 Cyberdeterrence Paradoxes
  11. 3 Obstacles to Forward Progress
  12. 4 Cyberattack Case Studies
  13. 5 Case Study Patterns
  14. 6 Improving Cyberdeterrence Planning
  15. 7 Improving Cyberdeterrence Execution
  16. 8 When Cyberdeterrence Works Best
  17. Conclusion
  18. Bibliography
  19. Index
  20. About the Author