WorldCat Identities

Libicki, Martin C.

Works: 108 works in 387 publications in 2 languages and 26,547 library holdings
Genres: Case studies 
Roles: Author, Editor
Publication Timeline
Most widely held works by Martin C Libicki
Conquest in cyberspace : national security and information warfare by Martin C Libicki( Book )

13 editions published in 2007 in English and held by 411 WorldCat member libraries worldwide

With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence
Dominant battlespace knowledge : the winning edge( Book )

14 editions published between 1995 and 1996 in English and held by 402 WorldCat member libraries worldwide

Partial contents include: DBK: Opportunity and Challenges; DBK and its Consequences; Significance of Dominant Battlefield Awareness; The Future of Command and Control with DBK; Dominant Battlefield Awareness and Future Warfare; DBK with Autonomous Weapons; Just In Time Warfare
The mesh and the net : speculations on armed conflict in a time of free silicon by Martin C Libicki( Book )

18 editions published between 1994 and 2004 in English and held by 346 WorldCat member libraries worldwide

This report contains information concerning the impact of computer technology on future military conflicts
What makes industries strategic : a perspective on technology, economic development, and defense by Martin C Libicki( Book )

10 editions published between 1989 and 1990 in English and Undetermined and held by 326 WorldCat member libraries worldwide

Partial contents: Technology Development as strategy, Technological dependence, Networks of Development, The Strategic content of Key Industries, Perspectives on Defense Policy, Perspectives on Commercial policy, National Stakes in the Globalization of Industry
Mind the gap : promoting a transatlantic revolution in military affairs by David C Gompert( Book )

7 editions published in 1999 in English and held by 307 WorldCat member libraries worldwide

When American defense officials meet informally with their allies and friends from other North Atlantic Treaty Organization countries, the conversation often turns to the growing disparity in combat capability between European and U.S. forces. The problem is bemoaned, but the participants are not stirred to action. This is unfortunate. We need a cross-Atlantic debate that seeks feasible solutions to this problem. Mind the Gap responds directly to that need. It not only dissects the problem of a growing disparity but also rejects its inevitability. Instead, it lays out a multitiered strategy for its solution which is specific and practical, including processes and procedures for implementation. The proposed strategy is complicated and would be difficult to execute; it would raise questions and even objections. That is as it should be. The alliance, nevertheless, has solved larger, more complex problems. We urgently need to find a way to close the gap because the problem is getting worse. The United States continues to implement its vision of a globally mobile military force equipped with the latest technology. The European members of NATO are not investing in similar capabilities. As a result, the gap will widen and be increasingly difficult to close
Standards, the rough road to the common byte by Martin C Libicki( Book )

8 editions published between 1994 and 1995 in English and held by 297 WorldCat member libraries worldwide

The proliferation of digital devices - each with its own way of representing and communicating information-has heightened the importance of getting these devices to talk to one another, to their applications, and to their users in mutually comprehensible tongues. Success speaking the common byte-is prerequisite to building organizational and national and, ultimately, global information infrastructures. Failure leaves islands of connectivity, keeps systems expensive, difficult to use, and inflexible, and retards the flow of useful technology into society. Information technology standards have been touted as a means to interoperability and software portability, but they are more easily lauded than built or followed. Users say they want low-cost, easily maintained, plug-and-play, interoperable systems, yet each user community has specific needs and few of them want to discard their existing systems. Every vendor wants to sell its own architecture and turbo-charged features, and each architecture assumes different views of a particular domain (e.g., business forms, images, databases). International standards founder on variations in culture and assumptions in North America, Europe, and Asia for example, whether telephone companies are monopolies. Protests to the contrary, the U.S. government is a major, indeed increasingly involved, player in virtually every major standards controversy. This paper looks at the growing but confusing body of information technology standards by concentrating on seven areas: The UNIX operating system, Open Systems Interconnection (OSI, for data communication), the Department of Defense's Continuous Acquisition and Life-cycle Support program (CALS), the Ada programming language, Integrated Services Digital Networks (ISDN, narrowband and broadband), multimedia standards (text, database, and image compression)
Exploring terrorist targeting preferences by Martin C Libicki( Book )

13 editions published in 2007 in English and held by 223 WorldCat member libraries worldwide

Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book examines various hypotheses of terrorist targeting: is it (1) to coerce, (2) to damage economies, (3) to rally the faithful, or (4) a decision left to affiliates? This book analyzes past attacks, post hoc justifications, and expert opinion to weigh each hypothesis
How insurgencies end by Ben Connable( Book )

11 editions published in 2010 in English and held by 207 WorldCat member libraries worldwide

"This study tested conventional wisdom about how insurgencies end against the evidence from 89 insurgencies. It compares a quantitative and qualitative analysis of 89 insurgency case studies with lessons from insurgency and counterinsurgency (COIN) literature. While no two insurgencies are the same, the authors find that modern insurgencies last about ten years and that a government's chances of winning may increase slightly over time. Insurgencies are suited to hierarchical organization and rural terrain, and sanctuary is vital to insurgents. Insurgent use of terrorism often backfires, and withdrawal of state sponsorship can cripple an insurgency, typically leading to its defeat. Inconsistent support to either side generally presages defeat for that side, although weak insurgencies can still win. Anocracies (pseudodemocracies) rarely succeed against insurgencies. Historically derived force ratios are neither accurate nor predictive, and civil defense forces are very useful for both sides. Key indicators of possible trends and tipping points in an insurgency include changes in desertions, defections, and the flow of information to the COIN effort. The more parties in an insurgency, the more likely it is to have a complex and protracted ending. There are no COIN shortcuts."--Rand web site
Byting back : regaining information superiority against 21st-century insurgents( Book )

11 editions published in 2007 in English and held by 174 WorldCat member libraries worldwide

Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus implies for counterinsurgency requirements, collection, networking, and systems design
Global demographic change and its implications for military power by Martin C Libicki( Book )

6 editions published in 2011 in English and held by 122 WorldCat member libraries worldwide

"What is the impact of demographics on the prospective production of military power and the causes of war? This monograph analyzes this issue by projecting working-age populations through 2050; assessing the influence of demographics on manpower, national income and expenditures, and human capital; and examining how changes in these factors may affect the ability of states to carry out military missions. It also looks at some implications of these changes for other aspects of international security. The authors find that the United States, alone of all the large affluent nations, will continue to see (modest) increases in its working-age population thanks to replacement-level fertility rates and a likely return to vigorous levels of immigration. Meanwhile, the working-age populations of Europe and Japan are slated to fall by as much as 10 to 15 percent by 2030 and as much as 30 to 40 percent by 2050. The United States will thus account for a larger percentage of the population of its Atlantic and Pacific alliances; in other words, the capacity of traditional alliances to multiply U.S. demographic power is likely to decline, perhaps sharply, through 2050. India's working-age population is likely to overtake China's by 2030. The United States, which has 4.7 percent of the world's working-age population, will still have 4.3 percent by 2050, and the current share of global gross domestic product accounted for by the U.S. economy is likely to stay quite high."--Page 4 of cover
Crisis and escalation in cyberspace by Martin C Libicki( Book )

10 editions published in 2012 in English and held by 97 WorldCat member libraries worldwide

"The chances are growing that the United States will find itself in a crisis in cyberspace, with the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. The genesis for this work was the broader issue of how the Air Force should integrate kinetic and nonkinetic operations. Central to this process was careful consideration of how escalation options and risks should be treated, which, in turn, demanded a broader consideration across the entire crisis-management spectrum. Such crises can be managed by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise from crises."--Page 4 of cover
The defender's dilemma : charting a course toward cybersecurity by Martin C Libicki( Book )

8 editions published in 2015 in English and held by 94 WorldCat member libraries worldwide

Cybersecurity is a constant, and, by all accounts growing, challenge. Although software products are gradually becoming more secure and novel approaches to cybersecurity are being developed, hackers are becoming more adept, their tools are better, and their markets are flourishing. The rising tide of network intrusions has focused organizations' attention on how to protect themselves better. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures, and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. A heuristic model was developed to demonstrate the various cybersecurity levers that organizations can control, as well as exogenous factors that organizations cannot control. Among the report's findings were that cybersecurity experts are at least as focused on preserving their organizations' reputations as protecting actual property. Researchers also found that organizational size and software quality play significant roles in the strategies that defenders may adopt. Finally, those who secure networks will have to pay increasing attention to the role that smart devices might otherwise play in allowing hackers in. Organizations could benefit from better understanding their risk posture from various actors (threats), protection needs (vulnerabilities), and assets (impact). Policy recommendations include better defining the role of government, and exploring information sharing responsibilities
Markets for cybercrime tools and stolen data : hackers' bazaar by Lillian Ablon( Book )

8 editions published in 2014 in English and held by 84 WorldCat member libraries worldwide

"Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass 'smash-and-grab' attacks)."
Brandishing cyberattack capabilities by Martin C Libicki( Book )

5 editions published between 2013 and 2014 in English and Arabic and held by 4 WorldCat member libraries worldwide

Deterrence is possible only when others know or at least have good indications of what the U.S. military can do, something that underlies U.S. nuclear deterrence strategy. Cyberattack capabilities resist such demonstration. No one knows quite what would happen if a country suffered a full-fledged cyberattack, despite the plethora of skirmishes. While cyberattack capabilities cannot easily be used to shape the behavior of others, this does not mean they cannot be used at all. This report explores ways that cyberattack capabilities can be brandished and under what circumstances, both in general terms and in the nuclear context. It then goes on to examine the obstacles and sketches out some realistic limits on the expectations. There is both promise and risk in cyber brandishing, but it would not hurt to give serious thought to ways to enhance the U.S. ability to leverage what others believe about its capabilities. Recent events have certainly convinced many others that the United States can do many sophisticated things in cyberspace (regardless of what, if anything, it has actually done). Applying brandishing as a strategy would take considerable analysis and imagination, inasmuch as none of the various options presented here are obvious winners. But brandishing is no panacea and also may not work; it could even backfire if misinterpreted as, say, a bluff. It is unlikely to make a deterrence posture succeed if the other elements of deterrence are weak
moreShow More Titles
fewerShow Fewer Titles
Audience Level
Audience Level
  Kids General Special  
Audience level: 0.34 (from 0.05 for Byting bac ... to 0.49 for Mind the g ...)

Conquest in cyberspace : national security and information warfare
Alternative Names
Libicki, Martin

مارتن سي. ليبيكي، 1952-

English (140)

Arabic (1)

The mesh and the net : speculations on armed conflict in a time of free siliconMind the gap : promoting a transatlantic revolution in military affairsExploring terrorist targeting preferencesHow insurgencies endByting back : regaining information superiority against 21st-century insurgentsGlobal demographic change and its implications for military power