The Great Power Competition, Volume 3: Cyberspace: The Fifth Domain

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

For millennia, humans waged war on land and sea. The 20th century opened the skies and the stars, introducing air and space as warfare domains. Now, the 21st century has revealed perhaps the most insidious domain of all: cyberspace, the fifth domain. A realm free of physical boundaries, cyberspace lies at the intersection of technology and psychology, where one cannot see one’s enemy, and the most potent weapon is information.


The third book in the Great Power Competition series, Cyberspace: The Fifth Domain, explores the emergence of cyberspace as a vector for espionage, sabotage, crime, and war. It examines how cyberspace rapidly evolved from a novelty to a weapon capable of influencing global economics and overthrowing regimes, wielded by nation-states and religious ideologies to stunning effect.


Cyberspace: The Fifth Domain offers a candid look at the United States’ role in cyberspace, offering realistic prescriptions for responding to international cyber threats on the tactical, strategic, and doctrinal levels, answering the questions of how can we respond to these threats versus how should we respond? What are the obstacles to and consequences of strategic and tactical response options? What technological solutions are on the horizon? Should the U.S. adopt a more multi-domain offensive posture that eschews the dominant “cyber vs. cyber” paradigm? To answer these questions, experts examine the technological threats to critical infrastructure; cyber operations strategy, tactics, and doctrine; information influence operations; the weaponization of social media; and much more.

Author(s): Adib Farhadi, Ronald P. Sanders, Anthony Masys
Series: Great Power Competition, 3
Publisher: Springer
Year: 2022

Language: English
Pages: 353
City: Cham

Foreword
Acknowledgments
Overview
Contents
Editors and Contributors
Cyberspace Strategy and Doctrine
Great Power Competition: Critical Infrastructure
Cyber Warfare
Critical Infrastructure Security
Logic Bombs
The Threat
Critical Infrastructure Defined
Critical Software
Application Software
System Software
Best Practices
Privileged Access Management (PAM)
Zero Trust Architecture
Critical Infrastructure Technology, Standards, and Models
Industrial Control Systems (ICS)
Industrial Internet of Things (IIoT)
References
The Cyber-Grand Strategy Gap
Grand Strategy and Cyber
Observing Grand Strategy and Cyber
Traditional Geopolitics
‘If You Build It, They Will Come’
Public–Private Networks
Network Penetration, Norms and Information Warfare
In Sum
The Strategic State of the Art from GPC
Defending Forward
Deterrence
Collective Defense
Findings
Context
Ends
Means
Discussion
Conclusion
References
Cybersecurity and Strategic Deterrence: Changing Adversary’s Risk Versus Reward Calculations
Introduction
The Attack Surface
The Case for Cyber Resiliency
The Human Dimension
Recommendation #1
Collective Security at Network Speed
Recommendation #2
It’s Time to Modernize Digital Laws
Recommendation #3
Challenges
A Complex Concept: Cyber Deterrence
Perceptions of the Target State
Signaling
The Nuclear Weapons Analogy
Conclusion
References
Examining Systemic Risk in the Cyber Landscape
Introduction
Systemic Risks
Cyber Systemic Risk
Discussion
Systems Thinking
Scenario Planning
Conclusion
References
5 Countering Violent Extremism in Central Asia and South Asia: Islamophobia and Cyber-Radicalization in the Digital Era
Abstract
Introduction
Stigmatized Islam and Radicalized Cyberspace
The Rise of Modern Islamophobia
Islamophobia in Cyberculture
Social Media and Radicalization
Weaponized Misinformation and Messaging
From Madrassas to Airwaves: Radicalization Among Afghan Youth Populations
Conclusion
References
Cyber and Great Power Competition in the Western Hemisphere
GPC in WHEM
Global Cyber Competition
Cybersecurity in the Western Hemisphere
Cyber Workforce in Latin America
State-Sponsored Cyber Operations in the Western Hemisphere
Diplomacy
Information
Military
Economic
Chinese and Russian Network Penetration
Their Friends
Chinese Technology Penetration
Advanced Technologies
E-Commerce
Digital Diplomacy
Opportunities and Challenges for Latin America
Improving the Region’s Technological Footprint
Increase Security and Law Enforcement Capacity
Intelligence and Data
Empowering Autocratic Governments
Conclusion
References
Operations in Cyberspace
When the Levee Breaks: A Global Trend of Cyber-Physical and Cyber-Operational Attacks Against Critical Infrastructure and Future Implications on the Great Power Competition
Introduction
Research Questions
Defining Cyber-Physical and Cyber-Operational Attacks
Definition of Disruptive Cyber-Physical Attacks
Definition of Disruptive Cyber-Operational Attacks
Inclusion Criteria
Dataset Overview
Findings
Conclusion
References
Alternate Reality—The Use of Disinformation to Normalize Extremism
Introduction
Apophenia
Gamification
Exploitation
Conclusion
References
The Commercialization of Influence Operations
Introduction
Background
Situation Today
2016 Presidential Election and The Brexit Movement
Russia, or Non-state Actors? or, Both?
Recommendations to Mitigate Vulnerabilities
Protecting Federal Elections
ITAR
Conclusion
References
The Future of Cyber-Enabled Influence Operations: Emergent Technologies, Disinformation, and the Destruction of Democracy
Executive Summary
Introduction
Background
Inauthentic Users and Astroturfing
Algorithmic Confounding
Information Laundering
Privacy
Deplatforming and Forced Migration
Generative Media
Data Poisoning and Contamination
Conclusion
References
The Cyber Pandemic that Could Redefine the Great Power Competition: Preparing the Defense Industrial Base
Introduction
Cybersecurity Maturity Model Certification (CMMC)
Understanding the Traditional DIB and Why It Matters in a Cyber-Pandemic
CMMC Gaps and Challenges to Private Industry
Security Information and Event Management Systems (SIEMs)
The Agile Methodology, Patching and Addressing Vulnerabilities
CMMC and Resilient Supply Chains
CMMC Third Party Assessor Organization (C3PAO)
Conceptual Changes to the CMMC Framework
Resilience and Vulnerability Disclosure
DIB Cybersecurity-Hygiene Score
Improving C3PAOs
Mandatory Disclosure and Public–Private Collaboration
Conclusion
References
Global Perspectives: Cyber Alliances and Partnerships in Great Power Competition
Great Power Competition
Hybrid Warfare, the Gray Zone and Political Warfare
Global Cyber Competition
Cyber Operations
US Cyber Cooperation
Cooperation in Offensive Cyber Operations
Cooperation in Defensive Cyber Operations
Recommendations
Conclusion
References
Cyber Leadership in the Era of the Great Power Competition
Introduction
How Critical Infrastructure and Software Breaches Often Happen
Who is a Cyber Leader?
What Virtues are Required of the Cyber Leader?
Technical Wisdom
Practical Wisdom
Theoretical Wisdom
Integrity and Constancy
Conclusion
References
Cyberspace Leadership and Management
The Need to Inoculate Military Servicemembers Against Information Threats: The Case for Digital Literacy Training for the Force
Introduction
The Case for Digital Literacy Training
Implementing Digital Literacy: What Would It Look Like?
“Pre–bunking” the Counterarguments
Conclusion
References
The War for Cyber Talent: Can the US Win It?
Introduction and Overview
The Price of Digital Dependence
Defining the Cyber Talent Gap
Measuring the Cyber Talent Gap: What Should We Count?
Closing the Gap, Part 1: Start with the K-12 Pipeline
Closing the Gap, Part 2: Cybersecurity Scholarships
Closing the Gap, Part 3: Adapting to Changing Career Paths
Closing the Gap, Part 4: Searching for (and Developing) Cyber Unicorns
Closing the Gap, Part 5: The Federal Government as Cyber Talent Source
Winning the War for Cyber Talent: Some Final Issues and Solutions
References
Leveraging Talent to Dominate in Cyber War—An Army Perspective
Introduction
U.S. Goal to Dominate in Cyber Warfare
Cyberspace Superiority
U.S. Cyber Capabilities
Commercial Competition
Adversaries in the Great-Power Competition in Cyberspace
Summary
Talent Recruitment: Acquiring the Most Talented
Cyber Warriors by the Numbers
Entering as a Department of the Army Civilian
Future Trends
Talent Development: Creating a Dominant Workforce
ARCYBER Development Pipeline
Commercial Sector
Summary
Talent Retention: Keeping the Best
Retention by the Numbers
Compensation
Civilian Comparison
Work Force Feedback—ARCYBER
Civilian Comparison
Conclusion
Appendix A
References