Search Results
-
Conquest In Cyberspace: National Security And Information Warfare
Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how f... More
Language: ENGCopyright: 2007 -
Cyberdeterrence and Cyberwar
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but th... More
Language: ENGCopyright: 2009 -
Crisis and Escalation in Cyberspace
The chances are growing that the United States will find itself in a crisis in cyberspace-the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. Such crises can be managed by taking steps to reduce the incentives for o... More
Language: ENGCopyright: 2012 -
Brandishing Cyberattack Capabilities
Deterrence is possible only when others have at least a good idea of possible U.S. military reprisals, but cyberattack capabilities resist such demonstration. This report explores ways they can be and under what circumstances, then goes on to examine the difficulties and the drawbacks. Such "brandis... More
Language: ENGCopyright: 2013 -
How Insurgencies End
RAND studied 89 modern insurgency cases to test conventional understanding about how insurgencies end. Findings relevant to policymakers and analysts include that modern insurgencies last about ten years; withdrawal of state support cripples insurgencies; civil defense forces are useful for both sid... More
Language: ENGCopyright: 2010 -
How Terrorist Groups End: Lessons for Countering Al Qa'ida
All terrorist groups eventually end. But how do they end? The evidence since 1968 indicates that most groups have ended because (1) they joined the political process (43 percent) or (2) local police and intelligence agencies arrested or killed key members (40 percent). Military force has rarely been... More
Language: ENGCopyright: 2008 -
The Defender's Dilemma: Charting a Course Toward Cybersecurity
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures and the countermeas... More
Language: ENGCopyright: 2015 -
Dominant Battlespace Knowledge: The Winning Edge
The Department of Defense has been successfully exploiting rapidly developing advances in information technology for military gain. On tomorrow’s multidimensional battlefield—or “battlespace”—the increased density, acuity, and connectivity of sensors and many other information devices may allow U.S.... More
Language: ENGCopyright: 2020 -
H4cker5 Wanted: An Examination of the Cybersecurity Labor Market
The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government... More
Language: ENGCopyright: 2014 -
Global Demographic Change and Its Implications for Military Power
What is the impact of demographics on the prospective production of military power and the causes of war? This monograph analyzes this issue by projecting working-age populations through 2050; assessing the influence of demographics on manpower, national income and expenditures, and human capital; a... More
Language: ENGCopyright: 2011 -
Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals
This report examines the portfolio of tools funded by the State Department s Bureau of Democracy, Human Rights, and Labor that help support Internet freedom and assesses the impact of these tools in promoting U. S. interests (such as freedom of expression, freedom of the press, and the free flow of... More
Language: ENGCopyright: 2015 -
Getting to Yes with China in Cyberspace
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable ... More
Language: ENGCopyright: 2016 -
Exploring Terrorist Targeting Preferences
Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book examines various hypotheses of terrorist targeting: is it (1) to coerce, (2) to damage economies, (3) to rally the faithful, or (4) a decision left to... More
Language: ENGCopyright: 2007 -
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these mark... More
Language: ENGCopyright: 2014 -
Underkill: Scalable Capabilities for Military Operations amid Populations
The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly force against them can harm and alienate the very people whose cooperation U.S. forces are trying to earn. To solve this problem, a new RAND study proposes a "continuum of force"--a suite of capabilities ... More
Language: ENGCopyright: 2009 -
Byting Back: Regaining Information Superiority Against 21st-Century Insurgents
U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government a... More
Language: ENGCopyright: 2007 -
Internet Freedom & Political Space
by Lowell H. Schwartz • Martin C. Libicki • Jeffrey Martini • Julie E. Taylor • Caroline Baxter • Olesya TkachevaThe Internet is a new battleground between governments that censor online content and those who advocate freedom for all to browse, post, and share information online. This report examines how Internet freedom may transform state-society relations in nondemocratic regimes, using case studies of Chi... More
Language: ENGCopyright: 2013 -
The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017
by David R. Frelinger • Martin C. Libicki • Forrest E. Morgan • Jeff Hagen • Eric Heginbotham • David A. Shlapak • Paul Deluca • Kyle Brady • Lyle J. Morris • Jeffrey Engstrom • Michael Nixon • Jacob L. Heim • Sheng Li • Burgess LairdA RAND study analyzed Chinese and U. S. military capabilities in two scenarios (Taiwan and the Spratly Islands) from 1996 to 2017, finding that trends in most, but not all, areas run strongly against the United States. While U. S. aggregate power remains greater than China s, distance and geograp... More
Language: ENGCopyright: 2015