Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-xfwgj Total loading time: 0 Render date: 2024-06-16T12:14:38.229Z Has data issue: false hasContentIssue false

11 - Managing Conquest in Cyberspace

Published online by Cambridge University Press:  05 June 2012

Martin C. Libicki
Affiliation:
RAND Corporation, California
Get access

Summary

Cyberspace lends itself to policy questions of the sort applicable to other media. How can one best use power in this medium to do unto others? How can one best maneuver in this medium to prevent being done unto? Insofar as conquest in cyberspace has hostile and friendly vectors, these two policy questions turn out to be four:

  • How can the method of hostile conquest be used wisely?

  • How can countries ensure that others cannot conquer those parts of cyberspace they deem worth protecting?

  • How can a country best pursue its interests by exercising friendly influence through cyberspace?

  • How can a country best resist the friendly accretion of unwarranted influence in cyberspace by others?

The first question can be interpreted as one of command and control, strategies, operations, techniques, and tools. Information warfare is not without its conceptual problems, such as the ability to define legitimate targets – but so are other domains.

The second question requires first determining what it is that must be defended and why. No one doubts that it is a government responsibility to defend Pittsburgh against Iranian missiles or chemical clouds; the good burghers are not expected to take this upon themselves. But, in cyberspace there are limits on what governments should be expected to contribute the common defense.

Type
Chapter
Information
Conquest in Cyberspace
National Security and Information Warfare
, pp. 256 - 290
Publisher: Cambridge University Press
Print publication year: 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×