G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RRA1190-1
来源IDRR-A1190-1
Many Hands in the Cookie Jar: Case Studies in Response Options to Cyber Incidents Affecting U.S. Government Networks and Implications for Future Response
Quentin E. Hodgson; Yuliya Shokh; Jonathan Balk
发表日期2022-04-29
出版年2022
语种英语
结论

Available response options are not limited to the cyber domain, and no one should expect them to be

  • The response options that U.S. policymakers consider for cyber espionage cases do not appear to have changed much over the past two decades — and, in some respects, they may be even more constrained today.

The benefits of cyber-enabled espionage continue to outweigh any perceived repercussions for such countries as Russia and China

  • The historical record suggests that the United States has felt constrained in its ability to respond vigorously against Russia or China because of the notion that cyber espionage is a standard and accepted practice by nations.
  • The record also suggests that the United States would not want to take steps to constrain its own ability to engage in similar intelligence activities in cyberspace.
  • U.S. policymakers have assessed that breaches of confidentiality, although damaging in the long term, did not rise to the same level of acute damage to national security that another, more destructive form of cyber operation might entail.
  • The United States has proved especially vulnerable to cyber incidents, and a lack of response appears to have emboldened the Russians and Chinese to continue and expand their cyber espionage activities over the years.
  • Improving the U.S. ability to deter by denial — by strengthening the cybersecurity of the U.S. government — remains an elusive but vital priority.
摘要

Cyber-enabled espionage against the United States has been a challenge for more than 20 years and is likely to remain so in the future. In the aftermath of the 2020 SolarWinds cyber incident that affected U.S. government networks, policymakers, lawmakers, and the public asked: "Why does this keep happening, and what can the United States do to prevent it from reoccurring?" It is these questions that motivate this effort. Specifically, this report summarizes three cases of Russian cyber-enabled espionage and two cases of Chinese cyber-enabled espionage dating back to the compromise of multiple government agencies in the late 1990s up to the 2015 compromise of the Office of Personnel Management. The purpose of this inquiry is to address whether U.S. responses have changed over time, whether they led to changes in adversary behavior, and what the United States can learn from these cases to inform future policymaking. The authors show that policymakers typically consider a narrow set of response options, and they often conclude that not much can be done beyond trying to improve network defenses, because the United States "does it too." The authors suggest that the U.S. government could broaden its policy response options by increasing focus on diplomatic engagement, including working with partners and allies to call out malicious cyber behavior; expanding the use of active defense measures to root out adversaries; and employing more-sophisticated counterintelligence techniques, such as deception, to decrease the benefits that adversaries derive from cyber espionage.

目录
  • Chapter One

    Introduction

  • Chapter Two

    Cyber Espionage, Deterrence, and Response

  • Chapter Three

    Russia Case Studies

  • Chapter Four

    China Case Studies

  • Chapter Five

    Conclusion and Recommendations

主题China ; Cyber Warfare ; Cybercrime ; Cybersecurity ; Intelligence Community ; Russia ; United States
URLhttps://www.rand.org/pubs/research_reports/RRA1190-1.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/524780
推荐引用方式
GB/T 7714
Quentin E. Hodgson,Yuliya Shokh,Jonathan Balk. Many Hands in the Cookie Jar: Case Studies in Response Options to Cyber Incidents Affecting U.S. Government Networks and Implications for Future Response. 2022.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RRA1190-1.pdf(620KB)智库出版物 限制开放CC BY-NC-SA浏览
x1650476892192.jpg.p(3KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Quentin E. Hodgson]的文章
[Yuliya Shokh]的文章
[Jonathan Balk]的文章
百度学术
百度学术中相似的文章
[Quentin E. Hodgson]的文章
[Yuliya Shokh]的文章
[Jonathan Balk]的文章
必应学术
必应学术中相似的文章
[Quentin E. Hodgson]的文章
[Yuliya Shokh]的文章
[Jonathan Balk]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RRA1190-1.pdf
格式: Adobe PDF
文件名: x1650476892192.jpg.pagespeed.ic.mHC2-4blAH.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。