G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RR2961
来源IDRR-2961-OSD
Fighting Shadows in the Dark: Understanding and Countering Coercion in Cyberspace
Quentin E. Hodgson; Logan Ma; Krystyna Marcinek; Karen Schwindt
发表日期2019-09-17
出版年2019
语种英语
结论

Cyber operations intended to coerce are a small subset of overall cyber operations globally

  • Espionage remains the predominant purpose of states' cyber operations.
  • Russian cyber operations appear to have had some coercive intent in Ukraine and Montenegro.
  • Chinese cyber operations show a continued focus on espionage, but potentially with some coercive intent as a secondary objective.
  • Iranian cyber operations appear more focused on retaliating against regional neighbors and the West, rather than serving a direct coercive purpose.
  • North Korea has routinely engaged in coercive acts in the physical world and sees cyber operations as another means to coerce others.
  • The assessment of these cases indicates how the threat, threat actor, and the desired change in behavior is often unclear or ambiguous, though this ambiguity does not appear to prevent countries from pursuing these coercive campaigns.
摘要

What is cyber coercion, and how have states used cyber operations to coerce others? Based on unclassified, open-source material, the authors of this report explore how four states — Russia, China, Iran, and North Korea — have used cyber operations, and whether that use constitutes cyber coercion.

,

States like Russia and North Korea appear to be more likely to have used cyber operations as a coercive tool than China and Iran. The authors also find that, contrary to what coercion theory would predict, states often do not make distinct threats with unambiguous demands for changes in behavior. Rather, states use cyber operations to try to coerce their neighbors while denying responsibility, often hiding behind proxies and without issuing clear demands. Despite the low probability of success, the authors anticipate states will continue to use and may, in fact, come to employ cyber operations more often in the future to coerce. To prepare for this outcome, the United States and its allies need to work now to develop methods to discern cyber coercion as it emerges and strategies to counter it in the future.

目录
  • Chapter One

    Introduction

  • Chapter Two

    Defining Coercion

  • Chapter Three

    Russia

  • Chapter Four

    China

  • Chapter Five

    North Korea

  • Chapter Six

    Conclusion and Next Steps

主题China ; Cyber Warfare ; Iran ; North Korea ; Russia
URLhttps://www.rand.org/pubs/research_reports/RR2961.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/523896
推荐引用方式
GB/T 7714
Quentin E. Hodgson,Logan Ma,Krystyna Marcinek,et al. Fighting Shadows in the Dark: Understanding and Countering Coercion in Cyberspace. 2019.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RR2961.pdf(938KB)智库出版物 限制开放CC BY-NC-SA浏览
1568754932655.jpg(7KB)智库出版物 限制开放CC BY-NC-SA缩略图
浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Quentin E. Hodgson]的文章
[Logan Ma]的文章
[Krystyna Marcinek]的文章
百度学术
百度学术中相似的文章
[Quentin E. Hodgson]的文章
[Logan Ma]的文章
[Krystyna Marcinek]的文章
必应学术
必应学术中相似的文章
[Quentin E. Hodgson]的文章
[Logan Ma]的文章
[Krystyna Marcinek]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RR2961.pdf
格式: Adobe PDF
文件名: 1568754932655.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。