Gateway to Think Tanks
来源类型 | Report |
规范类型 | 报告 |
DOI | https://doi.org/10.7249/RR2961 |
来源ID | RR-2961-OSD |
Fighting Shadows in the Dark: Understanding and Countering Coercion in Cyberspace | |
Quentin E. Hodgson; Logan Ma; Krystyna Marcinek; Karen Schwindt | |
发表日期 | 2019-09-17 |
出版年 | 2019 |
语种 | 英语 |
结论 | Cyber operations intended to coerce are a small subset of overall cyber operations globally
|
摘要 | What is cyber coercion, and how have states used cyber operations to coerce others? Based on unclassified, open-source material, the authors of this report explore how four states — Russia, China, Iran, and North Korea — have used cyber operations, and whether that use constitutes cyber coercion. ,States like Russia and North Korea appear to be more likely to have used cyber operations as a coercive tool than China and Iran. The authors also find that, contrary to what coercion theory would predict, states often do not make distinct threats with unambiguous demands for changes in behavior. Rather, states use cyber operations to try to coerce their neighbors while denying responsibility, often hiding behind proxies and without issuing clear demands. Despite the low probability of success, the authors anticipate states will continue to use and may, in fact, come to employ cyber operations more often in the future to coerce. To prepare for this outcome, the United States and its allies need to work now to develop methods to discern cyber coercion as it emerges and strategies to counter it in the future. |
目录 |
|
主题 | China ; Cyber Warfare ; Iran ; North Korea ; Russia |
URL | https://www.rand.org/pubs/research_reports/RR2961.html |
来源智库 | RAND Corporation (United States) |
引用统计 | |
资源类型 | 智库出版物 |
条目标识符 | http://119.78.100.153/handle/2XGU8XDN/523896 |
推荐引用方式 GB/T 7714 | Quentin E. Hodgson,Logan Ma,Krystyna Marcinek,et al. Fighting Shadows in the Dark: Understanding and Countering Coercion in Cyberspace. 2019. |
条目包含的文件 | ||||||
文件名称/大小 | 资源类型 | 版本类型 | 开放类型 | 使用许可 | ||
RAND_RR2961.pdf(938KB) | 智库出版物 | 限制开放 | CC BY-NC-SA | 浏览 | ||
1568754932655.jpg(7KB) | 智库出版物 | 限制开放 | CC BY-NC-SA | ![]() 浏览 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。