U.S. Army War College >> Strategic Studies Institute >> Publications >> Details
Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies
Authored by Dr. Mary Manjikian.
- Added December 02, 2016
- Type: Letort Papers
- 86 Pages
- Download Format: PDF
- Cost: Free
- Send this page to a colleague.
- Alert me when similar studies are published
Brief Synopsis
View the Executive Summary
Perhaps the best starting point for those looking to “borrow” a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence—due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy—among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America’s borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace.
You may also be interested in the following titles:
-
Strategic Landscape, 2050: Preparing the U.S. Military for New Era Dynamics -
The Clash of the Trinities: A New Theoretical Analysis of the General Nature of War -
What Should the U.S. Army Learn From History? Recovery From a Strategy Deficit -
Ends, Means, Ideology, and Pride: Why the Axis Lost and What We Can Learn from Its Defeat -
At Our Own Peril: DoD Risk Assessment in a Post-Primacy World -
Transforming the Force: The 11th Air Assault Division (Test) from 1963 to 1965
Also by the Author/Editor:
Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes
Do Fewer Resources Mean Less Influence? A Comparative Historical Case Study of Military Influence in a Time of Austerity
View other pubs in the following categories:
Homeland Security and Defense
Military Change and Transformation
21st Century Warfare
Future Technology
-
Download it Now!
- Download Format: PDF
- PDF File Size: 3.98MB
-
Hardcopies
- Study is: Available via Download Only
- View Cart
- All hardcopies are free of charge, shipping inclusive.
- For out of stock or digital only publications, refer to the new GPO on-demand site. For a small fee, recieve many prior publications. Click here to visit.
- All materials on our website are available as a free download.