Read Cybersecurity and Cyberwar Online

Authors: Peter W. Singer Allan Friedman,Allan Friedman

Cybersecurity and Cyberwar (49 page)

US government entity
(Who Controls Our Servers),”
International Financial News
, August 20, 2009, p. 2,
http://paper.people.com.cn/gjjrb/html/2009-08/20/content_323598.htm
.


fight the Internet war”
Eyder Peralta, “Chinese Military Scholars Accuse U.S. of Launching ‘Internet War,'” NPR, June 3, 2011,
http://www.npr.org/blogs/thetwo-way/2011/06/03/136923033/chinese-military-scholars-accuse-u-s-of-launching-internet-war
.

According to government sources
Jan van Tol, Mark Gunzinger, Andrew Krepinevich, et al., “AirSea Battle: A Point-of-Departure Operational Concept,” Center for Strategic and Budgetary Assessments, May 18, 2010,
http://www.csbaonline.org/publications/2010/05/airsea-battle-concept/
.

some 130,000 personnel
William Matthews, “Chinese Attacks Bring Cyber Spying into the Open,”
Defense News
(January 18, 2010): p. 4.

10 subdivisions
Gertz, “Cyber Spies Spotted.”

“informationized Blue Team”
Krekel, “Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation.”

across the newspaper's front page
David Sanger, “Chinese Army Unit Is Seen as Tied to Hacking against U.S.,”
New York Times
, February 18, 2013,
http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?hp
.

40 other APT operations
“What Mandiant Brings,” Strategic News Service, e-mail message to authors, March 11, 2013.

“2003-class”
Nicole Perloff, “Internet Sleuths Add Evidence to Chinese Military Hacking Accusations,”
New York Times
, February 27, 2013,
http://bits.blogs.nytimes.com/2013/02/27/internet-sleuths-add-evidence-to-chinese-military-hacking-accusations/
.

“new strategic high ground”
Ibid.

“enemy information equipment”
Office of the Secretary of Defense, “Annual Report to Congress: Military Power of the People's Republic of China 2009,” 2009, p. 27,
http://www.defenselink.mil/pubs/pdfs/China_Military_Power_Report_2009.pdf
, accessed August 11, 2013.

reduced risk of counterattack
Krekel, “Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation.”

“electronic Maginot line”
Qiao Liang and Wang Xiansui,
Unrestricted Warfare
(Panama City, Panama: Pan American Publishing, 2002), cited in Timothy L. Thomas,
The Dragon's Quantum Leap
(Fort Leavenworth, KS: Foreign Military Studies Office, 2009).

“level of informationization”
Bryan Krekel, Patton Adams, and George Bakos, “Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage,” Northrop Grumman Corporation, March 7, 2012, p. 25,
http://www.uscc.gov/RFP/2012/USCC%20Report_Chinese_CapabilitiesforComputer_NetworkOperationsandCyberEspionage.pdf
.

“China has big stones”
Menn, “Agreement on Cybersecurity ‘Badly Needed.'”

W
HAT
A
BOUT
D
ETERRENCE IN AN
E
RA OF
C
YBERWAR?

“deterrence ladder”
Department of Defense, “Resilient Military Systems and the Advanced Cyber Threat,” Defense Science Board task force report, Washington,
DC, January 2013,
http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf
, accessed August 11, 2013.

“Conventional Prompt Global Strike”
Ibid.

“sums it up the best”
John Reed, “DoD Panel Recommends Special Bomber-Armed Cyber Deterrence Force,”
Killer Apps
(blog),
Foreign Policy
, March 6, 2013,
http://killerapps.foreignpolicy.com/posts/2013/03/06/dod_panel_recommends_ special_bomber_armed_cyber_deterrent_force
.

“unacceptable counteraction”
“Deterrence,”
Department of Defense Dictionary of Military and Associated Terms Joint Publication 1-02
(Washington, DC: The Joint Staff, November 8, 2010, as amended through December 15, 2012), p. 85,
http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf
.

deter or retaliate against
See T. V. Paul, Patrick M. Morgan, and James J. Wirtz,
Complex Deterrence: Strategy in the Global Age
(Chicago: University of Chicago Press, 2009).

“try to harm America”
Leon E. Panetta, “Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security,” remarks at the Intrepid Sea, Air And Space Museum, New York, October 11, 2012,
http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136
.

“analysis of these operations”
Alperovitch, “Deterrence in Cyberspace.”

W
HY
I
S
T
HREAT
A
SSESSMENT
S
O
H
ARD IN
C
YBERSPACE?

“just as many nuclear wars”
Nye, “Nuclear Lessons for Cyber Security?” p. 25.

“feasibility of adversaries”
Herbert Lin, “Thoughts on Threat Assessment in Cyberspace,” presentation at the Conference on Cybersecurity: Shared Risks, Shared Responsibilities, Ohio State University, April 1, 2011.

“harboring fears”
Smithsonian National Air and Space Museum, “Satellite Reconnaissance: Secret Eyes in Space,”
http://www.nasm.si.edu/exhibitions/gal114/SpaceRace/sec400/sec400.htm
, accessed January 8, 2013.

“never in doubt”
Owens, Dam, and Lin,
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
, p. 142.

D
OES THE
C
YBERSECURITY
W
ORLD
F
AVOR THE
W
EAK OR THE
S
TRONG?

various insurgent groups
Siobhan Gorman, August Cole, and Yochi Dreazen, “Insurgents Hack U.S. Drones,”
Wall Street Journal
, December 17, 2009,
http://online.wsj.com/article/SB126102247889095011.html
.

“preserve of great states”
Lewis, “The Threat,” p. 20.

“the most to lose”
Clayton, “The New Cyber Arms Race.”

“tons of vulnerabilities”
Ibid.

“power equalization”
Nye, “Power and National Security in Cyberspace,” p. 14.

dummy set of centrifuges
William J. Broad, John Markoff, and David E. Sanger, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,”
New York Times
, January 15, 2011,
http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html? pagewanted=all&_r=0
.

“smaller dogs bite”
Nye, “Power and National Security in Cyberspace,” p. 14.

escalation dominance
Mahnken, “Cyberwar and Cyber Warfare,” p. 61.

W
HO
H
AS THE
A
DVANTAGE, THE
O
FFENSE OR THE
D
EFENSE?

“military law in 1913”
Barbara W. Tuchman,
August 1914
(London: Constable, 1962), p. 44.

“cult of the offensive”
Stephen Van Evera, “The Cult of the Offensive and the Origins of the First World War,”
International Security
9, no. 1 (Summer 1984): pp. 58–107.

offense-dominant for the foreseeable future
van Tol et al., “AirSea Battle.”

cheaper and easier
Ibid.

10 million
Defense Advanced Research Projects Agency Director Regina E. Dugan, submitted testimony before the House Armed Services Committee, Subcommittee on Emerging Threats and Capabilities, March 1, 2011, pp. 16–17,
www.darpa.mil/WorkArea/DownloadAsset.aspx?id=2929
, accessed January 8, 2013.

“less investment by the attacker”
Ibid.

difficult to estimate
Owens, Dam, and Lin,
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
.

“stop the attack at any step”
Graham Warwick, “Cyberhunters: Aerospace and Defense Primes See Automation of Cyberdefenses as an Opportunity to Apply Their System-Integration Skills,”
Aviation Week & Space Technology
173, no. 18 (May 23, 2011).

even a cyber counterattack
Owens, Dam and Lin,
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
.

“fight through the intrusion”
Vint Cerf, e-mail message to authors, September 5, 2011.

sow doubt in the offense
Mark Clayton, “10 Ways to Prevent Cyberconflict,”
Christian Science Monitor
, March 7, 2011,
http://www.csmonitor.com/USA/Military/2011/0307/10-ways-to-prevent-cyberconflict/Start-cyberwar-limitation-talks
.

“it doesn't scare you”
Andrea Shalal-Esa, “Ex-U.S. General Urges Frank Talk on Cyber Weapons,” Reuters, November 6, 2011,
http://www.reuters.com/article/2011/11/06/us-cyber-cartwright-idUSTRE7A514C20111106
.

A
N
EW
K
IND OF
A
RMS
R
ACE:
W
HAT
A
RE THE
D
ANGERS OF
C
YBER
P
ROLIFERATION?

“we shall be utterly ruined”
Plutarch,
The Parallel Lives
, vol. 9, last modified May 4, 2012,
http://penelope.uchicago.edu/Thayer/E/Roman/Texts/Plutarch/Lives/Pyrrhus*.html#21
.

“amassing cybermilitary capabilities”
Clayton, “The New Cyber Arms Race.”

Stuxnet-like weapon
Ibid.

“it is very intense”
Michael Nacht, interview with the authors, February 24, 2011.

10 experts
Langner, “Deterrence in Cyberspace.”

vulnerabilities that Stuxnet attacked
Ibid.

case of inspiration
Tom Espiner, “McAfee: Why Duqu Is a Big Deal,”
ZDNet UK
, October 26, 2011,
http://www.zdnet.co.uk/news/security-threats/2011/10/26/mcafee-why-duqu-is-a-big-deal-40094263/
.

“copy so much from Stuxnet”
Clayton, “From the Man Who Discovered Stuxnet, Dire Warnings One Year Later.”

smoother and more worrisome
“Security in Embedded Devices” presentation, McAfee, June 22, 2011.

A
RE
T
HERE
L
ESSONS FROM
P
AST
A
RMS
R
ACES?

“world peace or world destruction”
Bernard Baruch, “The Baruch Plan,” remarks to the United Nations Atomic Energy Commission, June 14, 1946.

“ill-formed, undeveloped, and highly uncertain”
Owens, Dam, and Lin,
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
, p. 4.

“millions and millions”
Clayton, “The New Cyber Arms Race.”

Rebecca Bonner
Rebecca Bonner, “Arms Race in Cyberspace?” International Security Project, Yale Law School, May 2011,
http://www.yaleisp.org/2011/05/arms-race-in-cyberspace
.

B
EHIND THE
S
CENES:
I
S
T
HERE A
C
YBER
-I
NDUSTRIAL
C
OMPLEX?

“the conference for you”
Invitation to Cyber Security Conference, e-mail to authors, May 27, 2013. More at
www.cyberarmsrace.com
.

65 billion
Guy Andersen, “Cyber Security: Corporate Challenges and Responses to Emerging Opportunities,”
Jane's Defence Weekly
48, no. 36 (September 7, 2011): pp. 30–32.

6 percent to 9 percent
Market Media Research, “U.S. Federal Cybersecurity Market Forecast 2013–2018,”
http://www.marketresearchmedia.com/?p=206
, accessed January 2013.

“$80 billion and $150 billion”
Eric Schmidt and Jared Cohen,
The New Digital Age
(New York: Knopf, 2013), p. 110.

“rare oasis”
Andersen, “Cyber Security,” pp. 30–32.

Professor Peter Sommer
Susan Watts, “Proposal for Cyber War Rules of Engagement,” BBC News, last modified February 3, 2011,
http://news.bbc.co.uk/2/hi/programmes/newsnight/9386445.stm
.

“wealth of opportunity”
Invitation to Cyber Security Conference, e-mail to authors.

15 percent of all mergers
Andersen, “Cyber Security,” pp. 30–32.

anti-money-laundering specialist
Ibid.

Other books

Death Wish by Brian Garfield
The Bombay Boomerang by Franklin W. Dixon
DUALITY: The World of Lies by Paul Barufaldi
Red Cloak of Abandon by Shirl Anders
The Bridesmaid by Julia London
Hero! by Dave Duncan
Screw Loose by Chris Wheat
The Best American Essays 2016 by Jonathan Franzen
The Santa Mug by Patric Michael


readsbookonline.com Copyright 2016 - 2024