Cyber Intelligence: Strategic Warning Is Possible

被引:0
|
作者
Gentry, John A. [1 ,2 ]
机构
[1] Georgetown Univ, Edmund A Walsh Sch Foreign Serv, Washington, DC 20057 USA
[2] Cent Intelligence Agcy, Mclean, VA USA
关键词
D O I
10.1080/08850607.2022.2095544
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
Governments and private security firms have studied many intelligence aspects of cyberconflict, but the public literature has not described the existence of a strategic cyber warning function or addressed the question of whether strategic warning of significant cyberattacks is possible. This article argues that it is, but technical characteristics of cyberspace and the rapidly evolving nature of cyber-related conflict make cyber warning more difficult than traditional strategic warning. Addressing these complexities requires specialized teams of experts. In the U.S. case, new warning skills and institutions are needed.
引用
收藏
页码:729 / 754
页数:26
相关论文
共 50 条
  • [41] A Strategic Framework for Cyber Attacks in the Military
    Roldan, Hector
    Reith, Mark
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 622 - 626
  • [42] Anticipating surprise: Analysis for strategic warning
    Hall, RD
    [J]. JOURNAL OF STRATEGIC STUDIES, 2005, 28 (06) : 1078 - 1080
  • [43] Cyber Camouflage Games for Strategic Deception
    Thakoor, Omkar
    Tambe, Milind
    Vayanos, Phebe
    Xu, Haifeng
    Kiekintveld, Christopher
    Fang, Fei
    [J]. DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 525 - 541
  • [44] Cyber Offense and a Changing Strategic Paradigm
    Spector, Leonard S.
    [J]. WASHINGTON QUARTERLY, 2022, 45 (01): : 38 - 56
  • [45] Cyber Deterrence: Challenges and Strategic Approaches
    Ashraf, Mubeen
    [J]. IPRI JOURNAL, 2024, 24 (01): : 63 - 90
  • [46] By Executive Order: Delivery of Cyber Intelligence Imparts Cyber Responsibilities
    Trope, Roland L.
    Humes, Stephen J.
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (02) : 63 - 67
  • [47] Combining Cyber Security Intelligence to Refine Automotive Cyber Threats
    Sommer, Florian
    Gierl, Mona
    Kriesten, Reiner
    Kargl, Frank
    Sax, Eric
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (02)
  • [48] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    [J]. 2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
  • [49] Strategic intelligence: a concentrated and diffused intelligence model
    Barnea, Avner
    [J]. INTELLIGENCE AND NATIONAL SECURITY, 2020, 35 (05) : 701 - 716
  • [50] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios
    Bromander, Siri
    [J]. 2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98