Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/118745
題名: 網路戰爭與嚇阻 : 以美國與俄羅斯為例
Warfare and Deterrence in the Cyber Realm: The Cases of the United States and Russia
作者: 倪可思
Sidman, Nicholas
貢獻者: 林永芳
Lin, Yung-Fang
倪可思
Nicholas Sidman
關鍵詞: 網路戰爭
俄羅斯
美國
中國
東歐
嚇阻
日期: 2018
上傳時間: 18-Jul-2018
摘要: 本研究檢視了美國和俄羅斯的網路運作。透過檢視這兩個不同的國家以及與他們網路發展相關的個案,研究者舉例說明威嚇的概念是如何在網路領域中發展起來的。目前各國在網路空間的威嚇上面臨的主要問題是歸因問題,知道有哪些人參與網路運作即屬歸因問題。然而,透過約瑟夫·奈爾(Joseph Nye)對網路運作和威嚇的方法,對美國和俄羅斯的網路行動進行分析,我以實例說明未來眾所周知的攻擊性優勢可能會減少。具體而言,除了組織完善且資金充足的國家之外,其他參與者可能會發現網路運作成本太高、風險太大。這不僅是因為改進了歸因技術,而且還因為各國在網路防禦方面有所改善,並普遍改善了網路衛生。此外,有關網路的雙邊與多邊協議的嘗試可能會進一步減少網路運作攻擊,或至少,減少各種官方情報單位範圍以外的行動。最終,人們會發現與20世紀初的空軍戰力和20世紀中期的核武器類似,各國可能會開發有形和無形的方法來應對網路作戰的威脅。但是,在現今的強權國家如美國,接受有關網路之具有法律約束力的多邊條約和協議的情況下,俄羅斯等其他國家也不願意失去在使混合作戰行動中可行的重要角色。在未來,關於網路的爭論與發展可能涉及兩個明確的陣營,即指那些支持現狀和所謂修正主義的陣營。
This thesis examines the cyber operations of the United States and Russia. By examining these two separate states, and the individual cases related to their cyber development, I illustrate how notions of deterrence are developing in the cyber realm. A major problem currently facing states with regards to deterrence in cyber space, is attribution. Knowing who engages in what cyber operations is attribution. However, through analysis of United States and Russian cyber operations through the lens of Joseph Nye`s approach to cyber operations and deterrence I illustrate that in the future the well known offensive advantage may lessen. Specifically, those actors besides well-organized and sufficiently funded nation-states may find cyber operations too costly and too risky to be of value. This is as a result of not just improved attribution technology, but also due to improvements in nation-state`s cyber defensive postures and generally improved cyber hygiene. Further, attempts at bilateral and multilateral agreements with regards to cyber may further reduce operations; or at least, reduce operations outside of the purview of the intelligence services of various official actors. Ultimately, it is found that, in similar fashion to air power in the early 20th century and nuclear weapons in the middle of the 20th century, states will likely develop both tangible and intangible approaches to dealing with the threat of cyber operations. However, where status-quo powers like the United States embrace the adoption of legally binding multilateral treaties and agreements regarding cyber, other states such as Russia would rather not potentially lose an important part of what makes Hybrid Warfare operations viable. The debates on and development of cyber may involve two clear camps in the future, those supporting the status-quo and so-called revisionist powers.
參考文獻: Acılar, Ali & Markin, Maxim & Nazarbaeva, Elena. (2011). Exploring the Digital Divide: A Case of Russia and Turkey. 584.\n"Active Cyber Defense (ACD)." Information Assurance by the National Security Agency. https://www.iad.gov/iad/programs/iad-initiatives/active-cyber-defense.cfm.\n"Advanced Persistent Threat Groups." FireEye. Accessed March 27, 2018.\nhttps://www.fireeye.com/current-threats/apt-groups.html.\nAndrew, Christopher M.& Mitrokhin, Vasili. (1999). The Mitrokhin archive : the KGB in Europe and the West. London : Allen Lane 296-297, 298, 308-309, 310.\nApplegate, Scott D. “The Dawn of Kinetic Cyber.” Presented at the 5th International Conference on Cyber Conflict, Tallin, Estonia, 2013.\nhttps://ccdcoe.org/cycon/2013/proceedings/d2r1s4_applegate.pdf\nAPT28—A Window Into Russia’s Cyber Espionage Operations?. Special Report. FireEye, 2014. https://www2.fireeye.com/apt28.html.\nBaylon, Caroline, Roger Brunt, and David Livingstone. “Cyber Security at Civil Nuclear Facilities: Understanding the Risk.” Chatham House. 2015.\n"Assessments: Cyber Resilience Review (CRR)." United States Computer Emergency Readiness Team.\nhttps://www.us-cert.gov/ccubedvp/assessments.\nBaraniuk, Chris. "Why the Forgotten Soviet Internet Was Doomed from the Start." BBC Future. October 26, 2016.\nhttp://www.bbc.com/future/story/20161026-why-the-forgotten-soviet-internet-was- doomed-from-the-start.\nBerry, Alex, Josh Homan, and Randi Eitzman. "WannaCry Malware Profile." FireEye. May 23, 2017.\nhttps://www.fireeye.com/blog/threat-research/2017/05/wannacry-malware-profile.html.\nBiddle, Stephen. “The Gulf War Debate Redux: Why Skill and Technology Are the Right Answer.” International Security 22, no. 2 (1997): 163-174. doi:10.2307/2539372\nhttps://www.jstor.org/stable/2539372?seq=1#page_scan_tab_contents\nBlank, Stephen. "Cyber War and Information War a la Russe." In Understanding Cyber Conflict: Fourteen Analogies. Georgetown University Press. 89.\nBuchan, Russell. “The International Legal Regulation of State-Sponsored Cyber Espionage.” In International Cyber Norms: Legal, policy & Industry Perspectives edited by Anna- Maria Osula and Henry Rõigas, 65-86. Tallinn: NATO CCD COE Publication, 2016.\nBumgarner, John and Scott Borg, “Overview by the US-CCU of the Cyber Campaign against Georgia in August of 2008” United States Cyber Consequences Unit, August, 2009, 4, http://www.registan.net/wp- content/uploads/2009/08/US-CCU-Georgia-Cyber- Campaign-Overview.pdf\nCarr, Jeff, “Project Grey Goose Phase II Report: The evolving state of cyber warfare” greylogic, March, 2009, 5\nhttp://fserror.com/pdf/GreyGoose2.pdf\nClarke, Richard A. and Robert K. Knake. Cyber War: The Next Threat to National\nSecurity and What To Do About It. New York, NY: Ecco, 2010: 6\nClayton, Blake and Adam Segal. “Addressing Cyber Threats to Oil and Gas Suppliers.” Council on Foreign Relations. 2013.\nComScore. "ComScore Releases Overview of European Internet Usage in September 2011." News release, November 14, 2011.\nhttps://www.comscore.com/Insights/Press-Releases/2011/11/comScore-Releases- Overview-of-European-Internet-Usage-in-September-2011?cs_edgescape_cc=TW.\nCordesman, Anthony H. with the assistance of Charles Ayers. Korean Special, Asymetric, and Paramilitary Forces. Washington, DC: Center for Strategic and International Studies, 2016. 29.\nhttps://csis-prod.s3.amazonaws.com/s3fs- public/publication/160809_Korean_Special_Asymmetric_Paramilitary_Forces.pdf\nDemchak, Chris C. and Peter J. Dombrowski. “Rise of a Cybered Westphalian Age”. Strategic Studies Quarterly, (Spring 2011): 31-62.\nDenning, Dorothy E., and Bradley J. Strawser. "Active Cyber Defense: Applying Air Defense to the Cyber Domain." In Understanding Cyber Conflict: Fourteen Analogies. Georgetown University Press.\n"Doctrine of Information Security of the Russian Federation." The Ministry of Foreign Affairs of the Russian Federation. December 5, 2016\nhttp://www.mid.ru/en/foreign_policy/official_documents/-/asset_publisher/CptICkB6BZ2\n9/content/id/2563163.\nDunn, Elizabeth Cullen and Michael S. Bobick, AMERICAN ETHNOLOGIST, Vol. 41, No. 3, 405, ISSN 0094- 0496, online ISSN 1548-1425. C 2014 by the American Anthropological Association. All rights reserved. DOI: 10.1111/amet.12086\nhttps://static1.squarespace.com/static/55f7642be4b07229ccbb16e7/t/5665d74ba976af1373\n1334c6/14495148274 9 8/Dunn_Bobick-2014-Empire+strikes+back_war%26occupation.pdf\nDzyubenko, Olga. "U.S. Vacates Base in Central Asia as Russia`s Clout Rises." Reuters. June 3, 2014.\nhttps://www.reuters.com/article/us-kyrgyzstan-usa-manas/u-s-vacates-base-in-central- asia-as-russias-clout- rises-idUSKBN0EE1LH20140603.\nFahrenkrug, David T. “Countering the Offensive Advantage in Cyberspace: An Integrated\nDefensive Strategy.” Presented at the 4th International Conference on Cyber Conflict, Tallinn, Estonia, 2013.\nhttps://ccdcoe.org/cycon/2012/proceedings/fahrenkrug.pdf\n“Foreign Ministers` Joint Statement on Georgia” U.S Department of State, Office of the Spokesman. August, 2008\nhttps://web.archive.org/web/20080831110250/http://www.america.gov/st/texttrans- english/2008/August/20080827152352xjsnommis0.9067346.html\nFriedman, George. The Medvedev Doctrine and American Strategy, Stratfor Enterprises LLC., September, 2008\nhttps://www.stratfor.com/weekly/medvedev_doctrine_and_american_strategy\nGeist, Edward. “Deterrence Stability in the Cyber Age.” Strategic Studies Quarterly, (Winter 2015): 44-62.\nGellman, Barton, and Ashkan Soltani. "NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say." Washington Post, October 30, 2013. Accessed March 24, 2018.\nhttps://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo- google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166- 11e3-8b74-d89d714ca4dd_story.html?utm_term=.12576195b082.\nGiles, Keir. “’Information Troops’ – a Russian Cyber Command?” Presented at the 3rd International Conference on Cyber Conflict, Tallinn, Estonia, 2011. http://conflictstudies.org.uk/files/Russian_Cyber_Command.pdf\nGiles, Keir, “Russia’s Public Stance on Cyberspace Issues,” presented at the 4th International Conference on Cyber Conflict, Tallinn: Cooperative Cyber Defense Centre of Excellence (2012): 63-74,\nhttps://ccdcoe.org/publications/2012proceedings/2_1_Giles_RussiasPublicStanceOnCyb\nerInformationWarfare.pdf\nHAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group. Special Report. FireEye, 2015.\nhttps://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf\nHarding, Luke, and Alec Luhn. "Putin Says Russian Role in Election Hacking `theoretically Possible`." The Guardian. June 1, 2017.\nhttps://www.theguardian.com/world/2017/jun/01/putin-says-russian-role-in-election- hacking-theoretically-possible.\nHarold, Scott W. "The U.S.-China Cyber Agreement: A Good First Step." The Rand Blog (blog), August 1, 2016. Accessed March 26, 2018.\nhttps://www.rand.org/blog/2016/08/the-us-china-cyber-agreement-a-good-first- step.html.\nHathaway, Oona A. “The Drawbacks and Dangers of Active Defense.” Presented at the 6th International Conference on Cyber Conflict, Tallinn, Estonia, 2014.\nHeickerö, Roland. (2018). FOI Emerging Cyber Threats and Russian Views on Information Warfare and Information Operations.\nHoldsworth, Nick, Russia claims media bias, Variety, August, 2008\nhttp://variety.com/2008/scene/news/russia-claims-media-bias-1117990468/\n"Iraq War Illegal, Says Annan." BBC News. September 16, 2004.\nhttp://news.bbc.co.uk/2/hi/middle_east/3661134.stm.\nJunio, Timothy J. “How Probable is Cyber War? Bringing IR Theory Back in to the Cyber Conflict Debate.” Journal of Strategic Studies, (2013).\nKramer, Mark. "Policy Memos: The Soviet Roots of Meddling in U.S. Politics." PONARS Eurasia. January 2017.\nhttp://www.ponarseurasia.org/memo/soviet-roots-meddling- us-politics.\nKristensen, Hans M., Norris, Robert S., and Ivan Oelrich. “From Counterforce to Minimal Deterrence: A New Nuclear Policy on the Path Toward Eliminating Nuclear Weapons.” Federation of American Scientists and The Natural Resources Defense Council. Occasional Paper No. 7. April 2009.\nhttps://fas.org/pubs/_docs/occasionalpaper7.pdf\nKuzio, Taras. (2005). Russian Policy toward Ukraine during Elections. Demokratizatsiya: The Journal of Post-soviet Democratization. 13. 491-517. 10.3200/Demo.13.4.491-518\nhttp://www.taraskuzio.com/International%20Relations_files/russia_elections_ukraine.pdf\nLambert, Nicholas. "Brits-Krieg: The Strategy of Economic Warfare." In Understanding Cyber Conflict: Fourteen Analogies. Georgetown University Press.\nLibicki, Martin C., Lillian Ablon, Timm Webb. “The Defender’s Dilemma: Charting a Course Toward Cybersecurity.” RAND Corporation. 2016.\nLindsay, Jon R. “Stuxnet and the Limits of Cyber Warfare.” Security Studies Vol. 22, Issue 3 (2013): 365-404.\nLotrionte, Catherine. “A Better Defense: Examining the United States’ New Norms-Based Approach to Cyber Deterrence.” Georgetown Journal of International Affairs Special\nCyber Issue, 3rd ed. (January 2014): 71-84.\nhttp://journal.georgetown.edu/wp-content/uploads/2015/07/gjia13007_Lotrionte- CYBER-III.pdf\nMandel, Robert. Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks. Washington, DC: Georgetown University Press, 2017.\nMarkoff, John, Before the Gunfire, Cyberattacks, The New York Times, August, 2008 http://www.nytimes.com/2008/08/13/technology/13cyber.html\nMatsakis, Louise. "HACK BRIEF: RUSSIAN HACKERS RELEASE APPARENT IOC EMAILS IN WAKE OF OLYMPICS BAN." Wired. October 1, 2018.\nhttps://www.wired.com/story/russian-fancy-bears-hackers-release-apparent-ioc-emails/.\nMedvedev, Sergei A. “Offense-Defense Theory Analysis of Russian Cyber Capability.” Master’s Thesis, Naval Postgraduate School, 2015.\nhttp://calhoun.nps.edu/bitstream/handle/10945/45225/15Mar_Medvedev_Sergei.pdf? sequence=1\nMyers, Steven Lee. “E-Stonia” Accuses Russia of Computer Attacks, The New York Times, May, 2007\nhttp://www.nytimes.com/2007/05/18/world/europe/18cnd-russia.html\nNakashima, Ellen, and Craig Timberg. "NSA Officials Worried about the Day Its Potent Hacking Tool Would Get Loose. Then It Did." Washington Post, May 16, 2017. Accessed March 24, 2018.\nhttps://www.washingtonpost.com/business/technology/nsa-officials-worried-about-the- day-its-potent- hacking-tool-would-get-loose-then-it-did/2017/05/16/50670b16-3978- 11e7-a058-ddbb23c75d82_story.html?utm_term=.4ec69cfa3812.\nNakashima, Ellen, and Steven Mufson. "U.S., China Vow Not to Engage in Economic Cyberespionage." The Washington Post. September 25, 2015.\nhttps://www.washingtonpost.com/national/us-china-vow-not-to-engage-in-economic- cyberespionage/2015/09/25/90e74b6a-63b9-11e5-8e9e-dce8a2a2a679_story.html? noredirect=on&utm_term=.87b9f0d10a53.\nNye, Joseph S. “Deterrence and Dissuasion in Cyberspace.” International Security Vol. 41 Issue 3 (Winter 2016/17): 44-71.\nOrrin Hatch United States Senator for Utah. "Hatch Introduces Legislation to Combat Cybercrime." News release, June 29, 2017. United States Senator Orrin Hatch. https://www.hatch.senate.gov/public/index.cfm/2017/6/hatch-introduces-legislation-to- combat-cybercrime.\nPatterson, Dan. "Cyberweapons Are Now in Play: From US Sabotage of a North Korean Missile Test to Hacked Emergency Sirens in Dallas." TechRepublic.\nhttps://www.techrepublic.com/article/cyberweapons-are-now-in-play-from-us-sabotage- of-a-north-korean-missile-test-to-hacked-emergency/.\n“Paul Baran and the Origins of the Internet.” Rand Corporation. https://www.rand.org/about/history/baran.list.html\nPerper, Rosie. "Russian Hacking Group Fancy Bear May Have Spied on Germany`s Government." BusinessInsider. February 28, 2018.\nhttp://www.businessinsider.com/russian-hackers-fancy-bear-germany-cyber-attack-2018- 3\nPersio, Sofia Lotto. "North Korea Executes Official In Charge of Nuclear Test Site: Report.” Newsweek. December 19, 2017. http://www.newsweek.com/north-korea-purges-and- executes-official-charge-nuclear-test-site-report-752196.\nPeters, Benjamin. "The Soviet InterNyet." Aeon. October 17, 2016.\nhttps://aeon.co/essays/how-the-soviets-invented-the-internet-and-why-it-didn-t-work.\nPeterson, Nolan. "Long at War With Each Other, Ukraine and Russia Trade On.." Newsweek. January 28, 2018.\nhttp://www.newsweek.com/long-war-each-other-ukraine-and-russia-trade-793142.\nRivera, Jason, and Forrest Hare. “The Deployment of Attribution Agnostic Cyberdefense Constructs and Internally Based Cyberthreat Countermeasures.” Presented at the 6th International Conference on Cyber Conflict, Tallinn, Estonia\nRochlin, Gene I. & Chris C. Demchak (2008) The Gulf war: technological and organizational implications, Survival, 33:3, 260-273, DOI: 10.1080/00396339108442594\nhttps://www.tandfonline.com/doi/abs/10.1080/00396339108442594? %20journalCode=tsur20\nRoigas, Henry “The Ukraine Crisis as a Test for Proposed Cyber Norms.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 135-144. Tallinn: NATO CCD COE Publication, 2015.\nhttps://ccdcoe.org/sites/default/files/multimedia/pdf/CyberWarinPerspective_Roigas_15.p df\n“Russia to provide $200 mln in urgent aid for S. Ossetia,” Sputnik International. August, 2008 https://sputniknews.com/russia/20080811115961365/\nSanger, David E., and William J. Broad. "Trump Inherits a Secret Cyberwar Against North Korean Missiles." The New York Times. March 4, 2017.\nhttps://www.nytimes.com/2017/03/04/world/asia/north-korea-missile-program- sabotage.html.\nSchelling, Thomas C. Arms and Influence. Yale University Press, 1966. http://www.jstor.org/stable/j.ctt5vm52s.\nSchmitt, Michael N. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013. doi:10.1017/CBO9781139169288.\nSchmitt, Michael N. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press, 2017. doi:10.1017/9781316822524.\nSlayton, Rebecca. “What is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment.” International Security Vol. 41 Issue 3 (Winter 2016/17): 72-109.\nStubbs, Jack. "Exclusive: Wannacry Hits Russian Postal Service, Exposes Wider Security Shortcomings." Reuters. May 24, 2017.\nhttps://www.reuters.com/article/us-cyber-attack-russia-idUSKBN18K26O.\nUnited Nations. Security Council. "Security Council Rejects Demand For Cessation of Use of Force Against Federal Republic of Yugoslavia." News release, March 26, 1999.\nhttps://www.un.org/press/en/1999/19990326.sc6659.html.\nUnited States. The White House. Office of Management and Budget. By Mick Mulvaney. https://www.politico.com/f/?id=0000015f-931e-ded9-a15f-9bdf94370000.\n“Up In Flames: Humanitarian Law Violations and Civilian Victims in the Conflict over South Ossetia” Human Rights Watch, January, 2009\nhttps://www.hrw.org/report/2009/01/23/flames/humanitarian-law-violations-and-civilian- victims-conflict-over-south.\n"U.S. Cyber Command (USCYBERCOM)." United States Strategic Command. September 30, 2016. Accessed March 27, 2018.\nhttp://www.stratcom.mil/Media/Factsheets/Factsheet-View/Article/960492/us-cyber %20command-uscybercom/.\n\nU.S Department of State. Office of the Coordinator for Cyber Issues. "Explanation of Position at the Conclusion of the 2016-2017 UN Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security." News release, June 23, 2017. https://www.state.gov/s/cyberissues/releasesandremarks/272175.htm.\nVäljataga, Ann. "Back to Square One? The Fifth UN GGE Fails to Submit a Conclusive Report at the UN General Assembly." NATO Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia. September 1, 2017.\nhttps://ccdcoe.org/back-square-one-fifth-un-gge-fails-submit-conclusive-report-un- general-assembly.html.\nVirilio, Paulo. "The Kosovo War Took Place in Orbital Space." Interview by John Armitage. CTheory. October 18, 2000 Accessed March 26, 2018. http://www.ctheory.net/articles.aspx?id=132.\nWaterman, Shaun. Analysis: Who cyber smacked Estonia?, United Press International, June, 2007\nhttp://www.upi.com/Analysis-Who-cyber-smacked-Estonia/26831181580439/\nWayne, Shawn. "Russia–Georgia Trade Corridor Agreement Moving Forward." Georgia Today. May 25, 2018.\nhttp://georgiatoday.ge/news/10455/Russia–Georgia-Trade-Corridor-Agreement-Moving- Forward.\nWeedon, Jen. “Beyond ‘Cyber War’” Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 67-78. Tallinn: NATO CCD COE Publication, 2015.\nWirtz, James J. “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 29-38. Tallinn: NATO CCD COE Publication, 2015.\nhttps://ccdcoe.org/sites/default/files/multimedia/pdf/CyberWarinPerspective_Wirtz_03.pdf Zetter, Kim. "An Unprecedented Look at Stuxnet, The World`s First Digital Weapon." Wired. November 3, 2014.\nhttps://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/.\nZetter, Kim. "How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History." Wired. July 11, 2011.\nhttps://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/.\nZunes, Stephen. "U.S. Role in Georgia Crisis." Foreign Policy in Focus. August 14, 2008. https://fpif.org/us_role_in_georgia_crisis/.
描述: 碩士
國立政治大學
國際研究英語碩士學位學程(IMPIS)
105862022
資料來源: http://thesis.lib.nccu.edu.tw/record/#G0105862022
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File Description SizeFormat
202201.pdf569.7 kBAdobe PDF2View/Open
Show full item record

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.