Professional Documents
Culture Documents
Textbook Conflict and Cooperation in Cyberspace The Challenge To National Security 1St Edition Panayotis A Yannakogeorgos Ebook All Chapter PDF
Textbook Conflict and Cooperation in Cyberspace The Challenge To National Security 1St Edition Panayotis A Yannakogeorgos Ebook All Chapter PDF
https://textbookfull.com/product/cyber-arms-security-in-
cyberspace-1st-edition-stanislav-abaimov/
https://textbookfull.com/product/greece-and-turkey-in-conflict-
and-cooperation-from-europeanization-to-de-europeanization-
alexis-heraclides/
https://textbookfull.com/product/cyber-arms-security-in-
cyberspace-1st-edition-stanislav-abaimov-author/
https://textbookfull.com/product/transnational-security-
cooperation-in-the-mediterranean-robert-mason/
Diffusion in Franco-German Relations: A Different
Perspective on a History of Cooperation and Conflict
Eric Sangar
https://textbookfull.com/product/diffusion-in-franco-german-
relations-a-different-perspective-on-a-history-of-cooperation-
and-conflict-eric-sangar/
https://textbookfull.com/product/understanding-global-conflict-
and-cooperation-an-introduction-to-theory-and-history-10th-
edition-joseph-nye/
https://textbookfull.com/product/climate-change-conflict-and-in-
security-1st-edition-panos-constantinides/
https://textbookfull.com/product/the-russian-challenge-to-the-
european-security-environment-1st-edition-roger-e-kanet-eds/
https://textbookfull.com/product/cooperation-and-protracted-
conflict-in-international-affairs-cycles-of-reciprocity-1st-
edition-anat-niv-solomon-auth/
Conflict and Cooperation
in Cyberspace
The Challenge to National Security
Edited by
Panayotis A. Yannakogeorgos and Adam B. Lowther
Conflict and Cooperation
in Cyberspace
The Challenge to National Security
OTHER INFORMATION SECURITY BOOKS FROM AUERBACH
Asset Protection through Security Awareness Guide to the De-Identification of Personal
Tyler Justin Speed Health Information
ISBN 978-1-4398-0982-2 Khaled El Emam
Automatic Defense Against Zero-day ISBN 978-1-4665-7906-4
Polymorphic Worms in Communication Information Security Governance Simplified:
Networks From the Boardroom to the Keyboard
Mohssen Mohammed and Al-Sakib Khan Pathan Todd Fitzgerald
ISBN 978-1-4665-5727-7 ISBN 978-1-4398-1163-4
The Complete Book of Data Anonymization: Information Security Policy Development for
From Planning to Implementation Compliance: ISO/IEC 27001, NIST SP 800-53,
Balaji Raghunathan HIPAA Standard, PCI DSS V2.0, and AUP V5.0
ISBN 978-1-4398-7730-2 Barry L. Williams
The Complete Guide to Physical Security ISBN 978-1-4665-8058-9
Paul R. Baker and Daniel J. Benny Information Technology Control and Audit,
ISBN 978-1-4200-9963-8 Fourth Edition
Conflict and Cooperation in Cyberspace: Sandra Senft, Frederick Gallegos, and Aleksandra Davis
The Challenge to National Security ISBN 978-1-4398-9320-3
Panayotis A Yannakogeorgos and Adam B Lowther Iris Biometric Model for Secured Network Access
(Editors) Franjieh El Khoury
ISBN 978-1-4665-9201-8 ISBN 978-1-4665-0213-0
Cybersecurity: Public Sector Threats Managing the Insider Threat: No Dark Corners
and Responses Nick Catrantzos
Kim J. Andreasson ISBN 978-1-4398-7292-5
ISBN 978-1-4398-4663-6 Network Attacks and Defenses: A Hands-on
The Definitive Guide to Complying with the Approach
HIPAA/HITECH Privacy and Security Rules Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki,
John J. Trinckes, Jr. and Sujith Samuel Mathew
ISBN 978-1-4665-0767-8 ISBN 978-1-4665-1794-3
Digital Forensics Explained Noiseless Steganography: The Key to Covert
Greg Gogolin Communications
ISBN 978-1-4398-7495-0 Abdelrahman Desoky
ISBN 978-1-4398-4621-6
Digital Forensics for Handheld Devices
Eamon P. Doherty PRAGMATIC Security Metrics: Applying
ISBN 978-1-4398-9877-2 Metametrics to Information Security
W. Krag Brotby and Gary Hinson
Effective Surveillance for Homeland Security:
ISBN 978-1-4398-8152-1
Balancing Technology and Social Issues
Francesco Flammini, Roberto Setola, and Giorgio Securing Cloud and Mobility: A Practitioner’s Guide
Franceschetti (Editors) Ian Lim, E. Coleen Coolidge, and Paul Hourani
ISBN 978-1-4398-8324-2 ISBN 978-1-4398-5055-8
Electronically Stored Information: Security and Privacy in Smart Grids
The Complete Guide to Management, Yang Xiao (Editor)
Understanding, Acquisition, Storage, ISBN 978-1-4398-7783-8
Search, and Retrieval Security for Wireless Sensor Networks using
David R. Matthews Identity-Based Cryptography
ISBN 978-1-4398-7726-5 Harsh Kupwade Patil and Stephen A. Szygenda
Enterprise Architecture and Information ISBN 978-1-4398-6901-7
Assurance: Developing a Secure Foundation The 7 Qualities of Highly Secure Software
James A. Scholz Mano Paul
ISBN 978-1-4398-4159-4 ISBN 978-1-4398-1446-8
AUERBACH PUBLICATIONS
www.auerbach-publications.com • To Order Call: 1-800-272-7737 • E-mail: orders@crcpress.com
Conflict and Cooperation
in Cyberspace
The Challenge to National Security
Edited by
Panayotis A. Yannakogeorgos
Adam B. Lowther
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been
made to publish reliable data and information, but the author and publisher cannot assume responsibility for the
validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the
copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to
publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let
us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted,
or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, includ-
ing photocopying, microfilming, and recording, or in any information storage or retrieval system, without written
permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com
(http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers,
MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety
of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment
has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
Fo re wo rd ix
Acknowledgments xiii
Introduction xv
Editors xxv
Contributors xxvii
Pa r t I K e y C o n s i d e r at i o n s
C h ap t e r 1 Th e F u t u r e of Th i n g s C y b e r 3
M I C H A E L V. H AY D E N
C h ap t e r 2 Ta m i n g t h e “ 21s t C e n t u r y ’ s W i l d W e s t ”
o f C y b e r s pa c e ? 9
LY N N M AT T I C E
C h ap t e r 3 C y b e r s pa c e S u p e r i o r i t y C o n s i d e r at i o n s 13
F R E D TAY L O R , J R . A N D J E R RY C A R T E R
C h ap t e r 4 Tw o , M ay b e Th r e e C h e e r s for Ambiguity 27
M A RT I N C. LI BICK I
C h ap t e r 5 Th e E s s e n t ia l F e at u r e s of an O n t o l o gy
f o r C y b e r wa r fa r e 35
R A N DA L L R . D I P E R T
C h ap t e r 6 Th e P r o s p e c t s f o r C y b e r D e t e r r e n c e :
A m e r i c a n S p o n s o r s h ip o f G l o b a l N o r m s 49
PA N AYO T I S A . YA N N A KO GE O RG O S A N D
A DA M B . L OW T H E R
Pa r t II Te c h n o l o gy
C h ap t e r 7 C h a l l e n g e s in Monitoring Cyberarms
C o m p l ia n c e 81
N E I L C . ROW E , S I M S O N L .
G A R F I N K E L , RO BE R T BE V E R LY, A N D
PA N AYO T I S A . YA N N A KO GE O RG O S
C h ap t e r 8 D i g i ta l P o l i cy M a n a g e m e n t : A F o u n d at i o n
f o r To m o r r o w 101
N AT I O N A L S E C U R I T Y AGE N C Y ( N S A ),
E N T E R P R I S E S E RV I C E S D I V I S I O N , I D E N T I T Y A N D
AC C E S S M A N AGE M E N T BR A N C H
C h ap t e r 9 O n M i s s i o n A s s u r a n c e 107
K A M A L J A BB O U R A N D S A R A H M U C C I O
C h ap t e r 10 S t u x n e t : A C a s e S t u dy in C y b e r W a r fa r e 127
E R I C P. O L I V E R
C h ap t e r 11 Th e I n t e r n e t a n d D i s s e n t in
A u t h o r i ta r ia n S tat e s 161
J A M E S D. F I E L D E R
Pa r t III E t h i c s , L aw , and P o l i cy
C h ap t e r 12 C a n Th e r e B e an E t h i c a l C y b e r Wa r? 195
GE O RGE R . L U C A S , J R .
C h ap t e r 13 P e r s p e c t i v e s f o r C y b e r s t r at e g i s t s on
C y b e r l aw f o r C y b e r wa r 211
C H A R L E S J . D U N L A P, J R .
C h ap t e r 14 A N e w N o r m a l? Th e C u lt i vat i o n
o f G l o b a l N o r m s a s Pa r t o f a
C y b e r s e c u r i t y S t r at e gy 233
RO GE R H U R W I T Z
C h ap t e r 15 C y b e r d e f e n s e a s E n v i r o n m e n ta l
P r o t e c t i o n —Th e B r o a d e r P o t e n t ia l
I m pa c t o f Fai l e d D e f e n s i v e C o u n t e r
C y b e r O p e r at i o n s 265
J A N K A L L BE RG A N D RO S E M A RY A . B U R K
C h ap t e r 16 C y b e r S o v e r e i g n t y 277
STEPHEN K. GOUR LEY
C h ap t e r 17 A m e r i c a n C y b e r s e c u r i t y Tr ia d :
G o v e r n m e n t w i d e I n t e g r at i o n ,
Te c h n o l o g i c a l C o u n t e r i n t e l l i g e n c e , and
E d u c at i o n a l M o b i l i z at i o n 291
SU NGH Y U N K I M
In recent years, large-scale cyber threats that include the Stuxnet worm,
the emergence of hacker networks, and the militarization of cyberspace
have been raising the awareness of government decision makers and
the private sector to the vulnerability of a networked and digital world.
The risks such threats pose to vital systems and infrastructures—upon
which societies and economies depend—are beginning to receive the
serious attention they deserve. While there is widespread understand-
ing that cyber security is important for the public and private sectors,
key players in government and industry often offer a collective shrug
of the shoulders when asked who bears responsibility for the defense
of American networks and the information they contain. Within the
government and the Department of Defense (DoD), in particular, a
lively debate is underway. Many within the military wonder what role
they may be asked to play in defending the nation’s cyber assets in
coming years—some advocating an expanded role and some advocat-
ing limiting DoD’s efforts to its own network defense. In an effort to
address this and related questions, actors across the national security
system are actively seeking to develop legal and policy solutions that
protect the nation while limiting government regulation and intrusion
into what is largely a privately owned and operated domain.
Within the DoD, the US Air Force (USAF) is a key player in
cyberspace. Given the service’s technology focus, it should come as
no surprise that the “organize, train, and equip” function of the Air
Force—in cyberspace—is taking center stage. In recent years, the ser-
vice activated 24th Air Force (2009) as its dedicated cyber component,
created a career specialty for cyber specialists, developed the cyber
corps tactical school, and made a number of additional changes to
better address its cyber needs. This continues a long tradition of Air
Force involvement in cyberspace starting from the mid-1990s when
Air Force Office of Special Investigations (OSI) investigator Jim
Christy tracked down an East German cyber espionage ring, which
became the stuff of hacker legend in The Cuckoo’s Egg. The Air Force
was the first service to stand up a Computer Emergency Response
Team (CERT) as well as to develop an information warfare doctrine.
However, the complexity and changing nature of the domain creates
an environment that appears unsettlingly new, when indeed it should
be familiar.
In order to assist the service in grappling with some of the complex
questions that must be answered before the Air Force can best serve
the nation, on 26–27 October 2011, the Air Force Research Institute
(AFRI) convened. “Cyber Power: The Quest towards a Common
Ground” at Maxwell AFB was the first in a series of conferences and
workshops focusing on contemporary cyber challenges. The objective
was to open avenues of dialogue and shared understanding among
cyber stakeholders, while advocating a “whole of society” approach to
cyber security.
As part of its mission, AFRI seeks to enhance the unity of cyber
efforts across the military, government, industry, academia, and inter-
national communities. Through its conferences and workshops the
organization is creating a forum for the exchange of ideas and experi-
ences among cyber professionals from all sectors. Recent events gave
particular attention to articulating and anticipating the need to fos-
ter a common methodology on which to base new-style partnerships
among relevant cyber security stakeholders. The quest for common
ground, with respect to cyberspace, refers to the lack of accepted stan-
dards for definitions, data structures, threat assessments, and policies
both within and across communities that employ cyber—a central
challenge in the short term.
© 2010 Taylor & Francis Group, LLC
In t r o d u c ti o n x vii
When practitioners and scholars discuss the air, land, sea, and space
domains, there is little confusion as to what they mean. Common
definitions and an accepted lexicon are the foundation of any debate.
Thus, it is rare for individuals to talk past one another or enter a dis-
cussion with very different assumptions about the domain under dis-
cussion. With cyberspace the same cannot be said.
To illustrate this point, it is interesting to point out that Daniel
Kuehl, of the National Defense University, identifies at least 13
definitions of cyberspace in circulation.1 Since the United States, its
allies, and other nations invest vast sums of treasure into cyberspace,
a domain that is identified not only as part of the nation’s critical
national infrastructure—with myriad vulnerabilities—but also a war-
fighting domain, it should come as no surprise that developing widely
accepted concepts and norms is of central interest to both the public
and private sectors. With the Air Force playing a greater role in the
domain, it is also natural for the service to take the lead in facilitating
such agreement and collaboration.
Recent Efforts
The purpose of this book is to expand the formal debate that began
at AFRI in 2011 as AFRI and the USAF continue to discuss and
debate the service’s role in cyberspace. As part of this effort, forg-
ing common cyberspace terms, definitions, and methodologies that
will eventually lead to more coherent cyberspace policy, strategy, and
doctrine is important. This is not a topic of mere academic semantics,
but necessary for reaching a common framework that those involved
in the debate and decision making can employ when operating in a
dangerous world.
In a recent Strategic Studies Quarterly article, Gen. Michael
Hayden writes:
Rarely has something been so important and so talked about with less
clarity and less apparent understanding than this phenomenon. But few
of us (myself included) have created the broad structural framework
within which to comfortably and confidently place these varied phe-
nomena. And that matters. I have sat in very small group meetings in
Format
Key Considerations
Technology
Part 2 opens with Neil Rowe, Simson Garfinkel, Robert Beverly, and
Panayotis A. Yannakogeorgos’ “Challenges in Monitoring Cyberarms
Compliance.” Rowe and his colleagues argue that the technical means
exist, or are in development, to enable cyberarms control and monitor-
ing. Where some scholars suggest that international cyberarms agree-
ments are not technically feasible, the authors offer illustrations of
technologies that will enable the very agreements many states desire
but believe are not technically possible. While some of the approaches
offered would likely face challenging political obstacles, the options
discussed are certainly thought provoking.
The National Security Agency’s (NSA) Enterprise Services
Division, Identity and Access Management Branch succinctly
describes the challenges posed in today’s networked world in “Digital
© 2010 Taylor & Francis Group, LLC
x x ii In t r o d u c ti o n
Conclusion
Endnotes
1. See Daniel T. Kuehl, “From Cyberspace to Cyberpower: Defining the
Problem,” in Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz
(eds.), Cyberpower and National Security (Washington, DC: Potomac
Press, 2009), 26–27.
2. Gen. Michael Hayden, “The Future of Things Cyber,” in Strategic Studies
Quarterly Vol. 5, No. 1 (Spring 2011), 3.
3. Jan Kallberg is co-author, with Bhavani Thuraisingham, of the forthcom-
ing book, Digital National Security: Cyberdefense and Cyber Operations.
Length to end of tail 3 7 1/2/12 inches; bill along the ridge 8 3/4/12; wing
from flexure 1 10/12; tail 1 1 1/2/12.
Cleome heptaphylla.
Strix Tengmalmi, Gmel. Syst. Nat. vol. i. p. 291.—Lath. Ind. Ornith. vol. i. p.
65.
Strix Tengmalmi, Tengmalm’s Owl, Swains. and Richards. Fauna Bor.-
Amer. vol. ii. p. 94.
Anas hyperborea, Gmel. Syst. Nat. vol. i. p. 504.—Lath. Ind. Orn. vol. ii. p.
837.
Snow Goose, Anas hyperborea, Wils. Amer. Ornith. vol. viii. p. 76, pl. 68,
fig. 3, Male, and p. 89, pl. 69, fig. 5, Young.
Anser hyperboreus, Ch. Bonaparte, Synopsis of Birds of United States, p.
376.
Anser hyperboreus, Snow Goose, Richards. and Swains. Fauna Bor.-
Amer. vol. ii. p. 467.
Snow Goose, Nuttall, Manual, vol. ii. p. 344.
Tetrao Phasianellus, Linn. Syst. Nat. vol. i. p. 273.—Lath. Ind. Ornith. vol.
ii. p. 635.—Ch. Bonaparte, Synopsis of Birds of United States, p. 127.
Tetrao Phasianellus, Sharp-tailed Grous, Ch. Bonaparte, Amer. Ornith.
vol. iii. p. 37, pl. 19.
Tetrao (centrocercus) Phasianellus, Swains. Sharp-tailed Grous,
Richards. and Swains. Fauna Bor.-Amer. vol. ii. p. 361.
Sharp-tailed Grous, Nuttall, Manual, vol. i. p. 669.
This Owl is much more abundant in our Middle and Eastern Atlantic
Districts than in the Southern or Western parts. My friend Dr
Bachman has never observed it in South Carolina; nor have I met
with it in Louisiana, or any where on the Mississippi below the
junction of the Ohio. It is not very rare in the upper parts of Indiana,
Illinois, Ohio, and Kentucky, wherever the country is well wooded. In
the Barrens of Kentucky its predilection for woods is rendered
apparent by its not being found elsewhere than in the “Groves;” and
it would seem that it very rarely extends its search for food beyond
the skirts of those delightful retreats. In Pennsylvania, and elsewhere
to the eastward, I have found it most numerous on or near the banks
of our numerous clear mountain streams, where, during the day, it is
not uncommon to see it perched on the top of a low bush or fir. At
such times it stands with the body erect, but the tarsi bent and
resting on a branch, as is the manner of almost all our Owls. The
head then seems the largest part, the body being much more
slender than it is usually represented. Now and then it raises itself
and stands with its legs and neck extended, as if the better to mark
the approach of an intruder. Its eyes, which were closed when it was
first observed, are opened on the least noise, and it seems to squint
at you in a most grotesque manner, although it is not difficult to