The Department of Defense has been successfully exploiting rapidly developing advances in informa... more The Department of Defense has been successfully exploiting rapidly developing advances in information technology for military gain. On tomorrow's multidimensional battlefield-or "battlespace"-the increased density, acuity, and connectivity of sensors and many other information devices may allow U.S. Armed Forces to see almost everything worth seeing in real or near-real time. Such enhanced vision of the battlespace is no doubt a significant military advantage, but a question remains: How do we achieve dominant battlefield knowledge, namely, the ability to understand what we see and act on it decisively? The papers collected here address the most critical aspects of that problem-to wit: If the United States develops the means to acquire dominant battlespace knowledge (DBK), how might that affect the way it goes to war, the circumstances under which force can and will be used, the purposes for its employment, and the resulting alterations of the global geomilitary environment? Of particular interest is how the authors view the influence of DBK in light of the shift from global to regional stability issues that marks the post-Cold War world. While no definitive answer has yet emerged, it is clear that the implications of so profound a change in military technology are critical to the structure and function of the U.S. Armed Forces. In working toward a definitive answer, the authors of this volume make an important contribution to a debate whose resolution will shape the decades to come.
G fírf MW RAND The Role of Technical Standards in Today's Society and in the Future Martin C... more G fírf MW RAND The Role of Technical Standards in Today's Society and in the Future Martin C. Libicki CT-172 September 2000 DISTRIBUTION STATEMENT A Approved for Public Release Distribution Unlimited Science and Technology Policy Institute The RAND testimony ...
A quantum internet could provide more effective security against private cyber crime, Russian cyb... more A quantum internet could provide more effective security against private cyber crime, Russian cyber war and Chinese efforts to gain information dominance.
The most fundamental strategic challenge to the U.S. military is to convert the Military-Technolo... more The most fundamental strategic challenge to the U.S. military is to convert the Military-Technological Revolution (MTR, the impact of information technologies on warfare) into a Revolution in Military Affairs (RMA, the subsequent transformation of operations and organization). Although the U.S. military's grasp of the MTR is unquestioned, optimism that the U.S. will lead others in converting the MTR to an RMA is premature. Intellectual convergence on the conversion is a long way off. The core debate at the Conference was over the relative importance of today's small but irksome military tasks compared to potentially more critical but totally unknown tasks that may face the nation two decades from now. Although information technologies going into military systems have generally been no better, and often less current, than those of commercial systems available for military use, converting data into information remains a highly sophisticated art at which the United States excels. Other nations with clearer strategic purpose and less sunk capital at risk from an RMA could be the leaders in this new race. The U.S. would be better off if those nations were to waste decades trying to copy what they thought we could do in the 1990s rather than seeking to leapfrog us by grasping the RMA before we do. Discussion I: Strategic Challenges Those who assess future strategic challenges tend to look to Asian countries, and to categorize competitors as peer, regional, or niche. Asia and the Nation-State Most conference participants believe that, over the next twenty years, the fulcrum of world politics will continue to shift from Europe and its peripheries to the Asia-Pacific region. The period of European dominance produced innumerable wars as various countries challenged each other for power, resources, and sovereignty. With the formation of the European Union and the dissolution of the Warsaw Pact, great power rivalry in particular and the nation-state in general are fading somewhat in importance. The nation-state remains strong in Asia, however. The last fifty years have seen considerable economic progress as various nations have made themselves richer by grasping the secrets of rapid industrialization. This trend, which started in Japan in the 1950s and 1960s, spread to the Tigers in the 1970s, ASEAN countries in the 1980s, and China and perhaps India in the 1990s, has left no Asian country unaffected. Economic
Warfare is about to enter a new phase that will upset the traditional balance between information... more Warfare is about to enter a new phase that will upset the traditional balance between information and force. As firepower becomes an appendage to information, organizational transformations will begin to underpin a new architecture. A separate Information Corps could guide this revolution, create common doctrine for the diverse requirements of information warriors, and facilitate liaison among civilian information agencies. Such a corps could also obviate the need for the services to integrate their data systems because standardization would exist from the outset. Moreover, the corps could foster innovations more consonant with the logic of the information revolution than would be the case if the services were left to their own devices. But even though the proposal for such a corps has merit, a number of issues concerning its likely impact on operational autonomy, the critical functions of operational units, and certain joint imperatives must first be addressed.
Public reporting burden for the collection of information is estimated to average 1 hour per resp... more Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number.
This PDF document was made available from www.rand.org as a public service of the RAND Corporatio... more This PDF document was made available from www.rand.org as a public service of the RAND Corporation. Jump down to document6 The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. Support RAND Purchase this document
Like everyone else who is or has been in a US military uniform, I think of cyber as a domain. It ... more Like everyone else who is or has been in a US military uniform, I think of cyber as a domain. It is now enshrined in doctrine: land, sea, air, space, cyber. It trips off the tongue, and frankly I have found the concept liberating when I think about operationalizing this domain. But the other domains are natural, created by God, and this one is the creation of man. Man can actually change this geography, and anything that happens there actually creates a change in someone’s physical space. Are these differences important enough for us to rethink our doctrine?
This document and trademark(s) contained herein are protected by law. This representation of RAND... more This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.
2018 10th International Conference on Cyber Conflict (CyCon), 2018
To survive a confrontation, it helps to understand other side's capabilities and intensions. Esti... more To survive a confrontation, it helps to understand other side's capabilities and intensions. Estimates of opposing capabilities rest on an empirical basis but understanding the other side's intentions is inferred from words and deeds. Therein lies a dilemma common across all military domains: acts to alter the balance of a confrontation can also shape the inferences that the other side draws about one's intentions. The dilemma also operates in cyberspace, but in unique ways. First, efforts by one side to acquire information on the other can be read by the other side as preparations for a cyber attack prefatory to a military attack. Second, others may draw inferences from the fact of cyber espionage alone, even though the basis for believing in a cyber security dilemma is weak. Third, there are ways of carrying out cyber espionage that can mitigate inferences that others draw about the imminence of cyber attack by, for example, limiting which components within a network are targeted for eavesdropping or by using penetration methods that do not leave arbitrary code behind. Fourth, defenders themselves can also modulate their reactions in ways that limit drawing unnecessary inferences. Fifth, expectations of how well modulating cyber espionage can convey peaceful intentions should be very modest. All these are complicated by difficulties in the target's ascertaining a penetration's date, characterization, and authorship. We conclude with a call for those who would penetrate military-related systems to think about the inferences that the other side may draw if such penetrations are discovered.
This fact sheet is part of the RAND Corporation research brief series. RAND fact sheets summarize... more This fact sheet is part of the RAND Corporation research brief series. RAND fact sheets summarize published, peerreviewed documents.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking thro... more The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND-make a tax-deductible charitable contribution at www.rand.org/giving/contribute.html R ® is a registered trademark.
RAND Review is published periodically by the RAND Corporation, a nonprofit institution. The missi... more RAND Review is published periodically by the RAND Corporation, a nonprofit institution. The mission of the RAND Corporation is to help improve policy and decisionmaking through research and analysis. Opinions are those of the authors and do not reflect positions taken by RAND, its board, or its clients.
Children and Families eduCation and the arts energy and environment health and health Care inFras... more Children and Families eduCation and the arts energy and environment health and health Care inFrastruCture and transportation international aFFairs law and Business national seCurity population and aging puBliC saFety sCienCe and teChnology terrorism and homeland seCurity this product is part of the rand Corporation research brief series. rand research briefs present policy-oriented summaries of published, peer-reviewed documents. Corporate headquarters 1776 main street p.o.
RAND testimonies record testimony presented by RAND associates to federal, state, or local legisl... more RAND testimonies record testimony presented by RAND associates to federal, state, or local legislative committees; government-appointed commissions and panels; and private review and oversight bodies.
The Department of Defense has been successfully exploiting rapidly developing advances in informa... more The Department of Defense has been successfully exploiting rapidly developing advances in information technology for military gain. On tomorrow's multidimensional battlefield-or "battlespace"-the increased density, acuity, and connectivity of sensors and many other information devices may allow U.S. Armed Forces to see almost everything worth seeing in real or near-real time. Such enhanced vision of the battlespace is no doubt a significant military advantage, but a question remains: How do we achieve dominant battlefield knowledge, namely, the ability to understand what we see and act on it decisively? The papers collected here address the most critical aspects of that problem-to wit: If the United States develops the means to acquire dominant battlespace knowledge (DBK), how might that affect the way it goes to war, the circumstances under which force can and will be used, the purposes for its employment, and the resulting alterations of the global geomilitary environment? Of particular interest is how the authors view the influence of DBK in light of the shift from global to regional stability issues that marks the post-Cold War world. While no definitive answer has yet emerged, it is clear that the implications of so profound a change in military technology are critical to the structure and function of the U.S. Armed Forces. In working toward a definitive answer, the authors of this volume make an important contribution to a debate whose resolution will shape the decades to come.
G fírf MW RAND The Role of Technical Standards in Today's Society and in the Future Martin C... more G fírf MW RAND The Role of Technical Standards in Today's Society and in the Future Martin C. Libicki CT-172 September 2000 DISTRIBUTION STATEMENT A Approved for Public Release Distribution Unlimited Science and Technology Policy Institute The RAND testimony ...
A quantum internet could provide more effective security against private cyber crime, Russian cyb... more A quantum internet could provide more effective security against private cyber crime, Russian cyber war and Chinese efforts to gain information dominance.
The most fundamental strategic challenge to the U.S. military is to convert the Military-Technolo... more The most fundamental strategic challenge to the U.S. military is to convert the Military-Technological Revolution (MTR, the impact of information technologies on warfare) into a Revolution in Military Affairs (RMA, the subsequent transformation of operations and organization). Although the U.S. military's grasp of the MTR is unquestioned, optimism that the U.S. will lead others in converting the MTR to an RMA is premature. Intellectual convergence on the conversion is a long way off. The core debate at the Conference was over the relative importance of today's small but irksome military tasks compared to potentially more critical but totally unknown tasks that may face the nation two decades from now. Although information technologies going into military systems have generally been no better, and often less current, than those of commercial systems available for military use, converting data into information remains a highly sophisticated art at which the United States excels. Other nations with clearer strategic purpose and less sunk capital at risk from an RMA could be the leaders in this new race. The U.S. would be better off if those nations were to waste decades trying to copy what they thought we could do in the 1990s rather than seeking to leapfrog us by grasping the RMA before we do. Discussion I: Strategic Challenges Those who assess future strategic challenges tend to look to Asian countries, and to categorize competitors as peer, regional, or niche. Asia and the Nation-State Most conference participants believe that, over the next twenty years, the fulcrum of world politics will continue to shift from Europe and its peripheries to the Asia-Pacific region. The period of European dominance produced innumerable wars as various countries challenged each other for power, resources, and sovereignty. With the formation of the European Union and the dissolution of the Warsaw Pact, great power rivalry in particular and the nation-state in general are fading somewhat in importance. The nation-state remains strong in Asia, however. The last fifty years have seen considerable economic progress as various nations have made themselves richer by grasping the secrets of rapid industrialization. This trend, which started in Japan in the 1950s and 1960s, spread to the Tigers in the 1970s, ASEAN countries in the 1980s, and China and perhaps India in the 1990s, has left no Asian country unaffected. Economic
Warfare is about to enter a new phase that will upset the traditional balance between information... more Warfare is about to enter a new phase that will upset the traditional balance between information and force. As firepower becomes an appendage to information, organizational transformations will begin to underpin a new architecture. A separate Information Corps could guide this revolution, create common doctrine for the diverse requirements of information warriors, and facilitate liaison among civilian information agencies. Such a corps could also obviate the need for the services to integrate their data systems because standardization would exist from the outset. Moreover, the corps could foster innovations more consonant with the logic of the information revolution than would be the case if the services were left to their own devices. But even though the proposal for such a corps has merit, a number of issues concerning its likely impact on operational autonomy, the critical functions of operational units, and certain joint imperatives must first be addressed.
Public reporting burden for the collection of information is estimated to average 1 hour per resp... more Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number.
This PDF document was made available from www.rand.org as a public service of the RAND Corporatio... more This PDF document was made available from www.rand.org as a public service of the RAND Corporation. Jump down to document6 The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. Support RAND Purchase this document
Like everyone else who is or has been in a US military uniform, I think of cyber as a domain. It ... more Like everyone else who is or has been in a US military uniform, I think of cyber as a domain. It is now enshrined in doctrine: land, sea, air, space, cyber. It trips off the tongue, and frankly I have found the concept liberating when I think about operationalizing this domain. But the other domains are natural, created by God, and this one is the creation of man. Man can actually change this geography, and anything that happens there actually creates a change in someone’s physical space. Are these differences important enough for us to rethink our doctrine?
This document and trademark(s) contained herein are protected by law. This representation of RAND... more This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.
2018 10th International Conference on Cyber Conflict (CyCon), 2018
To survive a confrontation, it helps to understand other side's capabilities and intensions. Esti... more To survive a confrontation, it helps to understand other side's capabilities and intensions. Estimates of opposing capabilities rest on an empirical basis but understanding the other side's intentions is inferred from words and deeds. Therein lies a dilemma common across all military domains: acts to alter the balance of a confrontation can also shape the inferences that the other side draws about one's intentions. The dilemma also operates in cyberspace, but in unique ways. First, efforts by one side to acquire information on the other can be read by the other side as preparations for a cyber attack prefatory to a military attack. Second, others may draw inferences from the fact of cyber espionage alone, even though the basis for believing in a cyber security dilemma is weak. Third, there are ways of carrying out cyber espionage that can mitigate inferences that others draw about the imminence of cyber attack by, for example, limiting which components within a network are targeted for eavesdropping or by using penetration methods that do not leave arbitrary code behind. Fourth, defenders themselves can also modulate their reactions in ways that limit drawing unnecessary inferences. Fifth, expectations of how well modulating cyber espionage can convey peaceful intentions should be very modest. All these are complicated by difficulties in the target's ascertaining a penetration's date, characterization, and authorship. We conclude with a call for those who would penetrate military-related systems to think about the inferences that the other side may draw if such penetrations are discovered.
This fact sheet is part of the RAND Corporation research brief series. RAND fact sheets summarize... more This fact sheet is part of the RAND Corporation research brief series. RAND fact sheets summarize published, peerreviewed documents.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking thro... more The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND-make a tax-deductible charitable contribution at www.rand.org/giving/contribute.html R ® is a registered trademark.
RAND Review is published periodically by the RAND Corporation, a nonprofit institution. The missi... more RAND Review is published periodically by the RAND Corporation, a nonprofit institution. The mission of the RAND Corporation is to help improve policy and decisionmaking through research and analysis. Opinions are those of the authors and do not reflect positions taken by RAND, its board, or its clients.
Children and Families eduCation and the arts energy and environment health and health Care inFras... more Children and Families eduCation and the arts energy and environment health and health Care inFrastruCture and transportation international aFFairs law and Business national seCurity population and aging puBliC saFety sCienCe and teChnology terrorism and homeland seCurity this product is part of the rand Corporation research brief series. rand research briefs present policy-oriented summaries of published, peer-reviewed documents. Corporate headquarters 1776 main street p.o.
RAND testimonies record testimony presented by RAND associates to federal, state, or local legisl... more RAND testimonies record testimony presented by RAND associates to federal, state, or local legislative committees; government-appointed commissions and panels; and private review and oversight bodies.
Uploads
Papers by Martin Libicki