<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">

     <title>RAND Research Topic: Cyber Warfare</title>
     <link rel="self" href="https://www.rand.org/topics/cyber-warfare.xml"/>
     <updated>2017-07-18T18:12:28Z</updated>
     <link rel="alternate" type="text/html" hreflang="en" href="https://www.rand.org/topics/cyber-warfare.html" />
     <rights>Copyright (c) 2017, The RAND Corporation</rights>
     <author>
       <name>RAND Corporation</name>
     </author>
     <id>https://www.rand.org/topics/cyber-warfare.html</id>
 
 <entry>
   <title type="html">Why It&apos;s So Hard to Stop a Cyberattack &#8212; and Even Harder to Fight Back</title>
   <author>
   	<name>Christopher S. Chivvis; Cynthia Dion-Schwarz</name>
   	</author>  
   <id>https://www.rand.org/blog/2017/03/why-its-so-hard-to-stop-a-cyberattack-and-even-harder.html</id>
   <published>Mar 30, 2017</published>
   <updated>Mar 30, 2017</updated>
   <summary type="html">Cyber weapons attack the underlying network or computer systems. The possibility of unexpected effects in the cyber world is therefore greater than in conventional warfare. Not knowing if the effects were intentional complicates the response. </summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/blog/2017/03/why-its-so-hard-to-stop-a-cyberattack-and-even-harder.html" />
   
 </entry>
 
 <entry>
   <title type="html">Zero Days, Thousands of Nights</title>
   <author>
   	<name>Lillian Ablon; Timothy Bogart</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1751.html</id>
   <published>Mar 9, 2017</published>
   <updated>Mar 9, 2017</updated>
   <summary type="html">This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1751.html" />
   
 </entry>
 
 <entry>
   <title type="html">Cyber Power Potential of the Army&apos;s Reserve Component</title>
   <author>
   	<name>Isaac R. Porche III; Caolionn O&apos;Connell; John S. Davis II; Bradley Wilson; Chad C. Serena; Tracy C. McCausland; Erin-Elizabeth Johnson; Brian D. Wisniewski; Michael Vasseur</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1490.html</id>
   <published>Jun 15, 2017</published>
   <updated>Jun 15, 2017</updated>
   <summary type="html">Describes the availability of personnel with cyber skills in the private sector and the number of Army reserve component soldiers available to support the Army&apos;s cyber mission needs.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1490.html" />
   
 </entry>
 
 <entry>
   <title type="html">Stateless Attribution</title>
   <author>
   	<name>John S. Davis II; Benjamin Adam Boudreaux; Jonathan William Welburn; Jair Aguirre; Cordaye Ogletree; Geoffrey McGovern; Michael Chase</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR2081.html</id>
   <published>Jun 2, 2017</published>
   <updated>Jun 2, 2017</updated>
   <summary type="html">This report reviews the state of cyber attribution and examines alternative options for producing standardized and transparent attribution that may overcome concerns about credibility.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR2081.html" />
   
 </entry>
 
 <entry>
   <title type="html">Tactical Cyber</title>
   <author>
   	<name>Isaac R. Porche III; Christopher Paul; Chad C. Serena; Colin P. Clarke; Erin-Elizabeth Johnson; Drew Herrick</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1600.html</id>
   <published>Mar 28, 2017</published>
   <updated>Mar 28, 2017</updated>
   <summary type="html">This report proposes a strategy for tactical Army cyber operations, enumerating overarching goals, objectives, and associated activities. Instructive case studies are provided that support implementation of the strategy.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1600.html" />
   
 </entry>
 
 <entry>
   <title type="html">Effective Cyberdeterrence Takes More Than Offensive Capability</title>
   <author>
   	<name>Martin C. Libicki</name>
   	</author>  
   <id>https://www.rand.org/pubs/testimonies/CT465.html</id>
   <published>Mar 1, 2017</published>
   <updated>Mar 1, 2017</updated>
   <summary type="html">A successful cyberdeterrence posture has many prerequisites. These include attributing attacks to the correct party, thresholds for what merits retaliation, credibility, and offensive capability. For the United States, capability is the least in doubt.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/testimonies/CT465.html" />
   
 </entry>
 
 <entry>
   <title type="html">RAND Expert to Discuss Cyber Deterrents the U.S. Should Consider</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/news/advisories/2017/02/28/index1.html</id>
   <published>Feb 28, 2017</published>
   <updated>Feb 28, 2017</updated>
   <summary type="html">Martin C. Libicki will testify before the House Armed Services Committee on Cyber Warfare in the 21st Century: Threats, Challenges, and Opportunities. Libicki is an adjunct senior management scientist at the RAND Corporation, a professor at the Pardee RAND Graduate School and a Distinguished Visiting Professor at the U.S. Naval Academy.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/news/advisories/2017/02/28/index1.html" />
   
 </entry>
 
 <entry>
   <title type="html">National Security Primers for the Trump Administration</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/research/primers.html</id>
   <published>Nov 9, 2016</published>
   <updated>Nov 9, 2016</updated>
   <summary type="html">The Trump administration will face security threats from China, Russia, ISIL, North Korea, and cyberspace. How can officials turn these challenges into opportunities?</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/research/primers.html" />
   
 </entry>
 
 <entry>
   <title type="html">The moral component of cross-domain conflict</title>
   <author>
   	<name>Lucia Retter; Alexandra Hall; James Black; Nathan Ryan</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1505.html</id>
   <published>Oct 20, 2016</published>
   <updated>Oct 20, 2016</updated>
   <summary type="html">The study considers the body of work on morality and armed conflict in the future operating environment and provides insights on the ways in which new ways of fighting may challenge traditional moral principles.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1505.html" />
   
 </entry>
 
 <entry>
   <title type="html">Thought Leadership programme 2016</title>
   <author>
   	<name>Catriona Manville; Claire Alexander; Brian Parry</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1771.html</id>
   <published>Oct 13, 2016</published>
   <updated>Oct 13, 2016</updated>
   <summary type="html">Key findings from the 2016 Thought Leadership Programme, convened by Corsham Institute in conjunction with RAND Europe and St George&apos;s House exploring opportunities and challenges created by digital technologies in society.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1771.html" />
   
 </entry>
 
 <entry>
   <title type="html">Examining the Costs and Causes of Cyber Incidents</title>
   <author>
   	<name>Sasha Romanosky</name>
   	</author>  
   <id>https://www.rand.org/pubs/external_publications/EP66656.html</id>
   <published>Oct 10, 2016</published>
   <updated>Oct 10, 2016</updated>
   <summary type="html">This research seeks to examine the composition and costs of cyber events, and attempts to address whether or not there exist incentives for firms to improve their security practices and reduce the risk of attack.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/external_publications/EP66656.html" />
   
 </entry>
 
 <entry>
   <title type="html">Security Sector Reform in Ukraine</title>
   <author>
   	<name>Olga Oliker; Lynn E. Davis; Keith Crane; Andrew Radin; Celeste Gventer; Susanne Sondergaard; James T. Quinlivan; Stephan B. Seabrook; Jacopo Bellasio; Bryan Frederick; Andriy Bega; Jakub Hlavka</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1475-1.html</id>
   <published>Oct 5, 2016</published>
   <updated>Oct 5, 2016</updated>
   <summary type="html">The 2014 Maidan revolution created an opportunity for change in a system that had resisted it for 25 years. The Ukrainian security establishment has progressed since then, but its efforts have been insufficient to address the threats now facing the nation. </summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1475-1.html" />
   
 </entry>
 
 <entry>
   <title type="html">Challenges and Opportunities in Cyberspace</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/research/primers/cyber.html</id>
   <published>Sep 30, 2016</published>
   <updated>Sep 30, 2016</updated>
   <summary type="html">Cyberspace provides opportunities for innovation, commerce, and societal advancement but also raises issues for policymakers in securing cyber vulnerabilities, ensuring privacy and protection of personal data, and considering the use of cyber weapons as a national security asset.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/research/primers/cyber.html" />
   
 </entry>
 
 <entry>
   <title type="html">U.S.-Japan Alliance Conference</title>
   <author>
   	<name>Scott Warren Harold; Martin C. Libicki; Motohiro Tsuchiya; Yurie Ito; Roger Cliff; Ken Jimbo; Yuki Tatsumi</name>
   	</author>  
   <id>https://www.rand.org/pubs/conf_proceedings/CF351.html</id>
   <published>Sep 2, 2016</published>
   <updated>Sep 2, 2016</updated>
   <summary type="html">To better understand the deepening cooperation between the United States and Japan and future prospects for their partnership, RAND commissioned papers by leading experts and hosted a two-day conference in Santa Monica, California, in March 2016.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/conf_proceedings/CF351.html" />
   
 </entry>
 
 <entry>
   <title type="html">The Online Fight Against ISIS</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/congress/alerts/2016/rand-experts-on-cybersecurity.html</id>
   <published>May 10, 2016</published>
   <updated>May 10, 2016</updated>
   <summary type="html">The battle against ISIS is taking place both on the ground and in cyberspace: To prevail, the United States and its allies will have to be capable of reacting quickly, while following an overarching strategy.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/congress/alerts/2016/rand-experts-on-cybersecurity.html" />
   
 </entry>
 
 <entry>
   <title type="html">Getting to Yes with China in Cyberspace: Is It Possible?</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/multimedia/video/2016/05/02/getting-to-yes-with-china-in-cyberspace.html</id>
   <published>May 2, 2016</published>
   <updated>May 2, 2016</updated>
   <summary type="html">In this May 2016 congressional briefing, RAND experts Scott W. Harold and Martin Libicki discuss the differing perspectives and interests of the United States and China in cyberspace.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/multimedia/video/2016/05/02/getting-to-yes-with-china-in-cyberspace.html" />
   
 </entry>
 
 <entry>
   <title type="html">Getting to Yes with China in Cyberspace: Is it Possible?</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/congress/activities/2016/05/02.html</id>
   <published>May 2, 2016</published>
   <updated>May 2, 2016</updated>
   <summary type="html">Scott Warren Harold and Martin Libicki will discuss the contentious relationship between the United States and China with regard to establishing norms and rules in cyberspace. Are there any feasible paths to getting to a meaningful and lasting agreement?</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/congress/activities/2016/05/02.html" />
   
 </entry>
 
 <entry>
   <title type="html">China&apos;s Evolving Approach to Strategic Deterrence May Prove Challenging to the U.S. and Its Allies</title>
   <author>
   	<name>Michael Chase; Arthur Chan</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1366.html</id>
   <published>Apr 7, 2016</published>
   <updated>Apr 7, 2016</updated>
   <summary type="html">China is rapidly closing what was once a substantial gap between the PLA&apos;s strategic weapons capabilities and its strategic deterrence concepts. The United States will likely need to assure its allies that it will continue to maintain the capability and the resolve to support them in a crisis.
</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1366.html" />
   
 </entry>
 
 <entry>
   <title type="html">Getting to Yes with China in Cyberspace</title>
   <author>
   	<name>Scott Warren Harold; Martin C. Libicki; Astrid Cevallos</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1335.html</id>
   <published>Mar 22, 2016</published>
   <updated>Mar 22, 2016</updated>
   <summary type="html">The tensions that divide the United States and China apply just as much to cyberspace as to relations in the physical world. Can the two countries achieve meaningful outcomes through formal negotiations over cyber norms and rules?</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1335.html" />
   
 </entry>
 
 <entry>
   <title type="html">The Power to Coerce</title>
   <author>
   	<name>David C. Gompert; Hans Binnendijk</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1000.html</id>
   <published>Mar 3, 2016</published>
   <updated>Mar 3, 2016</updated>
   <summary type="html">Mounting costs, risks, and public misgivings of waging war are raising the importance of U.S. power to coerce (P2C). The best P2C options are financial sanctions, support for political opposition to hostile regimes, and offensive cyber operations.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1000.html" />
   
 </entry>
 
 </feed>
