WorldCat Identities

Libicki, Martin C.

Overview
Works: 107 works in 373 publications in 2 languages and 23,059 library holdings
Roles: Author, Editor
Classifications: U163, 355.343
Publication Timeline
.
Most widely held works by Martin C Libicki
Conquest in cyberspace : national security and information warfare by Martin C Libicki( Book )

13 editions published in 2007 in English and held by 407 WorldCat member libraries worldwide

The global Internet has served primarily as an arena for peaceful commerce. Some analysts have become concerned that cyberspace could be used as a potential domain of warfare, however. Martin C. Libicki argues that the possibilities of hostile conquest are less threatening than these analysts suppose. It is in fact difficult to take control of other people's information systems, corrupt their data, and shut those systems down. Conversely, there is considerable untapped potential to influence other people's use of cyberspace, as computer systems are employed and linked in new ways over time. The author explores both the potential for and limitations to information warfare, including its use in weapons systems and in command-and-control operations as well as in the generation of "noise." He also investigates how far "friendly conquest" in cyberspace extends, such as the power to persuade users to adopt new points of view. Libicki observes that friendly conquests can in some instances make hostile conquests easier or at least prompt distrust among network partners. He discusses the role of public policy in managing the conquest and defense of cyberspace and shows how cyberspace is becoming more ubiquitous and complex
Dominant battlespace knowledge : the winning edge( Book )

13 editions published between 1995 and 1996 in English and held by 401 WorldCat member libraries worldwide

The Department of Defense has been successfully exploiting rapidly developing advances in information technology for military gain. On tomorrow's multidimensional battlefield-or 'battlespace'-the increased density, acuity, and connectivity of sensors and many other information devices may allow U.S. Armed Forces to see almost everything worth seeing in real or near-real time. Such enhanced vision of the battlespace is no doubt a significant military advantage, but a question remains: How do we achieve dominant battlefield knowledge, namely the ability to understand what we see and act on it decisively? The papers collected here address the most critical aspects of that problem-to wit: If the United States develops the means to acquire dominant battlespace knowledge (DBK), how might that affect the way it goes the war, the circumstances under which force can and will be used, the purposes for its employment, and the resulting alterations of the global geomilitary environment? Of particular interest is how the authors view the influence of DBK in light of the shift from global to regional stability issues that marks the post-Cold War world. While no definitive answer has yet emerged, it is clear that the implications of so profound a change in military technology are critical to the structure and function of the U.S. Armed Forces. In working toward a definitive answer, the authors of this volume make an important contribution to a debate whose resolution will shape the decades to come
What is information warfare? by Martin C Libicki( Book )

16 editions published between 1995 and 1996 in English and held by 377 WorldCat member libraries worldwide

This essay examines that line of thinking and indicates several fundamental flaws while arguing the following points: Information warfare, as a separate technique of waging war, does not exist. There are, instead, several distinct forms of information warfare, each laying claim to the larger concept. Seven forms of information warfare-conflicts that involve the protection, manipulation, degradation, and denial of information-can be distinguished: (1) command-and-control warfare (which strikes against the enemy's head and neck), (2) intelligence-based warfare (which consists of the design, protection, and denial of systems that seek sufficient knowledge to dominate the battlespace), (3) electronic warfare (radio-electronic or cryptographic techniques), (4) psychological warfare (in which information is used to change the minds of friends, neutrals, and foes), (5) "hacker" warfare (in which computer systems are attacked), (6) economic information warfare (blocking information or channeling it to pursue economic dominance), and (7) cyberwarfare (a grab bag of futuristic scenarios). All these forms are weakly related. The concept of information warfare has as much analytic coherence as the concept, for instance, of an information worker. The several forms range in maturity from the historic (that information technology influences but does not control) to the fantastic (which involves assumptions about societies and organizations that are not necessarily true). Although information systems are becoming important, it does not follow that attacks on information systems are therefore more worthwhile. On the contrary, as monolithic computer, communications, and media architectures give way to distributed systems, the returns from many forms of information warfare diminish. Information is not in and of itself a medium of warfare, except in certain narrow aspects (such as electronic jamming)
The mesh and the net : speculations on armed conflict in a time of free silicon by Martin C Libicki( Book )

18 editions published between 1994 and 2004 in English and held by 345 WorldCat member libraries worldwide

This report contains information concerning the impact of computer technology on future military conflicts
What makes industries strategic : a perspective on technology, economic development, and defense by Martin C Libicki( Book )

10 editions published between 1989 and 1990 in English and Undetermined and held by 324 WorldCat member libraries worldwide

Partial contents: Technology Development as strategy, Technological dependence, Networks of Development, The Strategic content of Key Industries, Perspectives on Defense Policy, Perspectives on Commercial policy, National Stakes in the Globalization of Industry
Mind the gap : promoting a transatlantic revolution in military affairs by David C Gompert( Book )

7 editions published in 1999 in English and held by 306 WorldCat member libraries worldwide

When American defense officials meet informally with their allies and friends from other North Atlantic Treaty Organization countries, the conversation often turns to the growing disparity in combat capability between European and U.S. forces. The problem is bemoaned, but the participants are not stirred to action. This is unfortunate. We need a cross-Atlantic debate that seeks feasible solutions to this problem. Mind the Gap responds directly to that need. It not only dissects the problem of a growing disparity but also rejects its inevitability. Instead, it lays out a multitiered strategy for its solution which is specific and practical, including processes and procedures for implementation. The proposed strategy is complicated and would be difficult to execute; it would raise questions and even objections. That is as it should be. The alliance, nevertheless, has solved larger, more complex problems. We urgently need to find a way to close the gap because the problem is getting worse. The United States continues to implement its vision of a globally mobile military force equipped with the latest technology. The European members of NATO are not investing in similar capabilities. As a result, the gap will widen and be increasingly difficult to close
Standards, the rough road to the common byte by Martin C Libicki( Book )

8 editions published between 1994 and 1995 in English and held by 295 WorldCat member libraries worldwide

The proliferation of digital devices - each with its own way of representing and communicating information-has heightened the importance of getting these devices to talk to one another, to their applications, and to their users in mutually comprehensible tongues. Success speaking the common byte-is prerequisite to building organizational and national and, ultimately, global information infrastructures. Failure leaves islands of connectivity, keeps systems expensive, difficult to use, and inflexible, and retards the flow of useful technology into society. Information technology standards have been touted as a means to interoperability and software portability, but they are more easily lauded than built or followed. Users say they want low-cost, easily maintained, plug-and-play, interoperable systems, yet each user community has specific needs and few of them want to discard their existing systems. Every vendor wants to sell its own architecture and turbo-charged features, and each architecture assumes different views of a particular domain (e.g., business forms, images, databases). International standards founder on variations in culture and assumptions in North America, Europe, and Asia for example, whether telephone companies are monopolies. Protests to the contrary, the U.S. government is a major, indeed increasingly involved, player in virtually every major standards controversy. This paper looks at the growing but confusing body of information technology standards by concentrating on seven areas: The UNIX operating system, Open Systems Interconnection (OSI, for data communication), the Department of Defense's Continuous Acquisition and Life-cycle Support program (CALS), the Ada programming language, Integrated Services Digital Networks (ISDN, narrowband and broadband), multimedia standards (text, database, and image compression)
Defending cyberspace, and other metaphors by Martin C Libicki( Book )

10 editions published between 1997 and 1998 in English and Chinese and held by 289 WorldCat member libraries worldwide

Information warfare, as any casual observer of the Pentagon can attest, remains a hot-button topic in the military community. Broader claims for it have been toned down, and few now argue that all aspects of warfare are now revealed as information warfare, but an ideology of information warfare has nevertheless wended its way into the heart of defense planning. The Air Force's Cornerstones of Information Waffare, for example, has approached the status of doctrine. The spring 1996 establishment of the 609th Squadron (at Shaw Air Force Base) dedicated to information warfare offers further evidence of the seriousness with which that ideology is maintained. In 1996 the National Defense University (NDU) ended its two-year experiment of offering a forty-four-week program on Information Warfare and Strategy after forty-eight students were graduated, but what has replaced it is a broader thmst in teaching the all four hundred students the rudiments of information warfare (and offering related electives). In 1995-96 large portions of the Defense budget were designated information operations (although only a small portion represents information warfare)
New challenges, new tools for defense decisionmaking by Stuart E Johnson( Book )

19 editions published between 2001 and 2013 in English and Chinese and held by 287 WorldCat member libraries worldwide

It is still easy to underestimate how much the collapse of the Soviet Union and the end of the Cold War?and then the terrorist attacks of September 11, 2001 -- transformed the task of American foreign and defense policymaking. In place of predictability (if a sometimes terrifying predictability), the world is now very unpredictable. In place of a single overriding threat and benchmark by which all else could be measured, a number of possible threats have arisen, not all of them states. In place of force-on-force engagements, U.S. defense planners have to assume "asymmetric" threats -- ways not to defeat U.S. power but to render it irrelevant. This book frames the challenges for defense policy that the transformed world engenders, and it sketches new tools for dealing with those challenges -- from new techniques in modeling and gaming, to planning based on capabilities rather than threats, to personnel planning and making use of "best practices" from the private sector
How terrorist groups end : lessons for countering Al Qa'ida by Seth G Jones( Book )

7 editions published in 2008 in English and held by 278 WorldCat member libraries worldwide

All terrorist groups eventually end. But how? Most modern groups have ended because they joined the political process or local police and intelligence agencies arrested or killed key members. This has significant implications for dealing with al Qa'ida and suggests fundamentally rethinking post-9/11 U.S. counterterrorism strategy: Policing and intelligence, not military force, should form the backbone of U.S. efforts against al Qa'ida
Cyberdeterrence and cyberwar by Martin C Libicki( Book )

8 editions published in 2009 in English and held by 271 WorldCat member libraries worldwide

The establishment of the 24th Air Force and U.S. Cyber Command marks the ascent of cyberspace as a military domain. As such, it joins the historic domains of land, sea, air, and space. All this might lead to a belief that the historic constructs of war-force, offense, defense, deterrence-can be applied to cyberspace with little modification. Not so. Instead, cyberspace must be understood in its own terms, and policy decisions being made for these and other new commands must reflect such understanding. Attempts to transfer policy constructs from other forms of warfare will not only fail but also hinder policy and planning. What follows focuses on the policy dimensions of cyberwar: what it means, what it entails, and whether threats can deter it or defense can mitigate its effects. The Air Force must consider these issues as it creates new capabilities
Exploring terrorist targeting preferences by Martin C Libicki( Book )

13 editions published in 2007 in English and held by 224 WorldCat member libraries worldwide

Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book examines various hypotheses of terrorist targeting: is it (1) to coerce, (2) to damage economies, (3) to rally the faithful, or (4) a decision left to affiliates? This book analyzes past attacks, post hoc justifications, and expert opinion to weigh each hypothesis
Byting back : regaining information superiority against 21st-century insurgents( Book )

12 editions published in 2007 in English and held by 174 WorldCat member libraries worldwide

Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus implies for counterinsurgency requirements, collection, networking, and systems design
H4cker5 wanted : an examination of the cybersecurity labor market by Martin C Libicki( Book )

4 editions published in 2014 in English and held by 109 WorldCat member libraries worldwide

The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years
Crisis and escalation in cyberspace by Martin C Libicki( Book )

10 editions published in 2012 in English and Undetermined and held by 96 WorldCat member libraries worldwide

"The chances are growing that the United States will find itself in a crisis in cyberspace, with the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. The genesis for this work was the broader issue of how the Air Force should integrate kinetic and nonkinetic operations. Central to this process was careful consideration of how escalation options and risks should be treated, which, in turn, demanded a broader consideration across the entire crisis-management spectrum. Such crises can be managed by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise from crises."--Page 4 of cover
The defender's dilemma : charting a course toward cybersecurity by Martin C Libicki( Book )

8 editions published in 2015 in English and Undetermined and held by 92 WorldCat member libraries worldwide

Cybersecurity is a constant, and, by all accounts growing, challenge. Although software products are gradually becoming more secure and novel approaches to cybersecurity are being developed, hackers are becoming more adept, their tools are better, and their markets are flourishing. The rising tide of network intrusions has focused organizations' attention on how to protect themselves better. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures, and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. A heuristic model was developed to demonstrate the various cybersecurity levers that organizations can control, as well as exogenous factors that organizations cannot control. Among the report's findings were that cybersecurity experts are at least as focused on preserving their organizations' reputations as protecting actual property. Researchers also found that organizational size and software quality play significant roles in the strategies that defenders may adopt. Finally, those who secure networks will have to pay increasing attention to the role that smart devices might otherwise play in allowing hackers in. Organizations could benefit from better understanding their risk posture from various actors (threats), protection needs (vulnerabilities), and assets (impact). Policy recommendations include better defining the role of government, and exploring information sharing responsibilities
Markets for cybercrime tools and stolen data : hackers' bazaar by Lillian Ablon( Book )

7 editions published in 2014 in English and held by 81 WorldCat member libraries worldwide

"Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass 'smash-and-grab' attacks)."
H4ckers5 wanted : an examination of the cybersecurity labor market by Martin C Libicki( )

3 editions published in 2014 in English and held by 0 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.31 (from 0.02 for How terror ... to 0.49 for Defending ...)

Conquest in cyberspace : national security and information warfare
Alternative Names
Libicki, Martin

مارتن سي. ليبيكي، 1952-

Languages
English (178)

Chinese (5)

Covers
The mesh and the net : speculations on armed conflict in a time of free siliconMind the gap : promoting a transatlantic revolution in military affairsNew challenges, new tools for defense decisionmakingHow terrorist groups end : lessons for countering Al Qa'idaCyberdeterrence and cyberwarExploring terrorist targeting preferencesByting back : regaining information superiority against 21st-century insurgents