WorldCat Identities

Libicki, Martin C.

Overview
Works: 104 works in 321 publications in 2 languages and 21,080 library holdings
Genres: Case studies 
Roles: Author, Editor
Classifications: U163, 355.343
Publication Timeline
.
Most widely held works by Martin C Libicki
Dominant battlespace knowledge the winning edge( Book )

12 editions published between 1995 and 1996 in English and Undetermined and held by 450 WorldCat member libraries worldwide

The Department of Defense has been successfully exploiting rapidly developing advances in information technology for military gain. On tomorrow's multidimensional battlefield-or 'battlespace'-the increased density, acuity, and connectivity of sensors and many other information devices may allow U.S. Armed Forces to see almost everything worth seeing in real or near-real time. Such enhanced vision of the battlespace is no doubt a significant military advantage, but a question remains: How do we achieve dominant battlefield knowledge, namely the ability to understand what we see and act on it decisively? The papers collected here address the most critical aspects of that problem-to wit: If the United States develops the means to acquire dominant battlespace knowledge (DBK), how might that affect the way it goes the war, the circumstances under which force can and will be used, the purposes for its employment, and the resulting alterations of the global geomilitary environment? Of particular interest is how the authors view the influence of DBK in light of the shift from global to regional stability issues that marks the post-Cold War world. While no definitive answer has yet emerged, it is clear that the implications of so profound a change in military technology are critical to the structure and function of the U.S. Armed Forces. In working toward a definitive answer, the authors of this volume make an important contribution to a debate whose resolution will shape the decades to come
What is information warfare? by Martin C Libicki( Book )

11 editions published between 1995 and 1996 in English and held by 412 WorldCat member libraries worldwide

This essay examines that line of thinking and indicates several fundamental flaws while arguing the following points: Information warfare, as a separate technique of waging war, does not exist. There are, instead, several distinct forms of information warfare, each laying claim to the larger concept. Seven forms of information warfare-conflicts that involve the protection, manipulation, degradation, and denial of information-can be distinguished: (1) command-and-control warfare (which strikes against the enemy's head and neck), (2) intelligence-based warfare (which consists of the design, protection, and denial of systems that seek sufficient knowledge to dominate the battlespace), (3) electronic warfare (radio-electronic or cryptographic techniques), (4) psychological warfare (in which information is used to change the minds of friends, neutrals, and foes), (5) "hacker" warfare (in which computer systems are attacked), (6) economic information warfare (blocking information or channeling it to pursue economic dominance), and (7) cyberwarfare (a grab bag of futuristic scenarios). All these forms are weakly related. The concept of information warfare has as much analytic coherence as the concept, for instance, of an information worker. The several forms range in maturity from the historic (that information technology influences but does not control) to the fantastic (which involves assumptions about societies and organizations that are not necessarily true). Although information systems are becoming important, it does not follow that attacks on information systems are therefore more worthwhile. On the contrary, as monolithic computer, communications, and media architectures give way to distributed systems, the returns from many forms of information warfare diminish. Information is not in and of itself a medium of warfare, except in certain narrow aspects (such as electronic jamming)
Conquest in cyberspace : national security and information warfare by Martin C Libicki( Book )

11 editions published in 2007 in English and held by 396 WorldCat member libraries worldwide

The global Internet has served primarily as an arena for peaceful commerce. Some analysts have become concerned that cyberspace could be used as a potential domain of warfare, however. Martin C. Libicki argues that the possibilities of hostile conquest are less threatening than these analysts suppose. It is in fact difficult to take control of other people's information systems, corrupt their data, and shut those systems down. Conversely, there is considerable untapped potential to influence other people's use of cyberspace, as computer systems are employed and linked in new ways over time. The author explores both the potential for and limitations to information warfare, including its use in weapons systems and in command-and-control operations as well as in the generation of "noise." He also investigates how far "friendly conquest" in cyberspace extends, such as the power to persuade users to adopt new points of view. Libicki observes that friendly conquests can in some instances make hostile conquests easier or at least prompt distrust among network partners. He discusses the role of public policy in managing the conquest and defense of cyberspace and shows how cyberspace is becoming more ubiquitous and complex
What makes industries strategic : a perspective on technology, economic development, and defense by Martin C Libicki( Book )

9 editions published between 1989 and 2005 in English and Undetermined and held by 361 WorldCat member libraries worldwide

Mind the gap promoting a transatlantic revolution in military affairs by David C Gompert( Book )

5 editions published in 1999 in English and held by 346 WorldCat member libraries worldwide

The mesh and the net speculations on armed conflict in a time of free silicon by Martin C Libicki( Book )

12 editions published between 1994 and 2004 in English and held by 344 WorldCat member libraries worldwide

Standards, the rough road to the common byte by Martin C Libicki( Book )

5 editions published between 1994 and 1995 in English and held by 336 WorldCat member libraries worldwide

The proliferation of digital devices - each with its own way of representing and communicating information-has heightened the importance of getting these devices to talk to one another, to their applications, and to their users in mutually comprehensible tongues. Success speaking the common byte-is prerequisite to building organizational and national and, ultimately, global information infrastructures. Failure leaves islands of connectivity, keeps systems expensive, difficult to use, and inflexible, and retards the flow of useful technology into society. Information technology standards have been touted as a means to interoperability and software portability, but they are more easily lauded than built or followed. Users say they want low-cost, easily maintained, plug-and-play, interoperable systems, yet each user community has specific needs and few of them want to discard their existing systems. Every vendor wants to sell its own architecture and turbo-charged features, and each architecture assumes different views of a particular domain (e.g., business forms, images, databases). International standards founder on variations in culture and assumptions in North America, Europe, and Asia for example, whether telephone companies are monopolies. Protests to the contrary, the U.S. government is a major, indeed increasingly involved, player in virtually every major standards controversy. This paper looks at the growing but confusing body of information technology standards by concentrating on seven areas: The UNIX operating system, Open Systems Interconnection (OSI, for data communication), the Department of Defense's Continuous Acquisition and Life-cycle Support program (CALS), the Ada programming language, Integrated Services Digital Networks (ISDN, narrowband and broadband), multimedia standards (text, database, and image compression)
Illuminating tomorrow's war by Martin C Libicki( Book )

8 editions published between 1999 and 2005 in English and held by 303 WorldCat member libraries worldwide

New challenges, new tools for defense decisionmaking by Stuart E Johnson( Book )

16 editions published between 2003 and 2005 in English and Chinese and held by 282 WorldCat member libraries worldwide

It is still easy to underestimate how much the collapse of the Soviet Union and the end of the Cold War and then the terrorist attacks of September 11, 2001 transformed the task of American foreign and defense policymaking. In place of predictability (if a sometimes terrifying predictability), the world is now very unpredictable. In place of a single overriding threat and benchmark by which all else could be measured, a number of possible threats have arisen, not all of them states. In place of force-on-force engagements, U.S. defense planners have to assume "asymmetric" threats ways not to defeat U.S. power but to render it irrelevant. This book frames the challenges for defense policy that the transformed world engenders, and it sketches new tools for dealing with those challenges from new techniques in modeling and gaming, to planning based on capabilities rather than threats, to personnel planning and making use of "best practices" from the private sector
How terrorist groups end : lessons for countering Al Qa'ida by Seth G Jones( Book )

7 editions published in 2008 in English and held by 279 WorldCat member libraries worldwide

All terrorist groups eventually end. But how do they end? The evidence since 1968 indicates that most groups have ended because (1) they joined the political process (43 percent) or (2) local police and intelligence agencies arrested or killed key members (40 percent). Military force has rarely been the primary reason for the end of terrorist groups, and few groups within this time frame have achieved victory. This has significant implications for dealing with al Qa'ida and suggests fundamentally rethinking post-9/11 U.S. counterterrorism strategy: Policymakers need to understand where to prioritize their efforts with limited resources and attention. The authors report that religious terrorist groups take longer to eliminate than other groups and rarely achieve their objectives. The largest groups achieve their goals more often and last longer than the smallest ones do. Finally, groups from upper-income countries are more likely to be left-wing or nationalist and less likely to have religion as their motivation. The authors conclude that policing and intelligence, rather than military force, should form the backbone of U.S. efforts against al Qa'ida. And U.S. policymakers should end the use of the phrase "war on terrorism" since there is no battlefield solution to defeating al Qa'ida
Cyberdeterrence and cyberwar by Martin C Libicki( Book )

7 editions published in 2009 in English and held by 270 WorldCat member libraries worldwide

Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack
Scaffolding the new Web : standards and standards policy for the digital economy( Book )

9 editions published in 2000 in English and held by 243 WorldCat member libraries worldwide

Publisher Provided Annotation
Exploring terrorist targeting preferences by Martin C Libicki( Book )

13 editions published in 2007 in English and held by 225 WorldCat member libraries worldwide

Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book examines various hypotheses of terrorist targeting: is it (1) to coerce, (2) to damage economies, (3) to rally the faithful, or (4) a decision left to affiliates? This book analyzes past attacks, post hoc justifications, and expert opinion to weigh each hypothesis
How insurgencies end by Ben Connable( Book )

10 editions published in 2010 in English and held by 204 WorldCat member libraries worldwide

"This study tested conventional wisdom about how insurgencies end against the evidence from 89 insurgencies. It compares a quantitative and qualitative analysis of 89 insurgency case studies with lessons from insurgency and counterinsurgency (COIN) literature. While no two insurgencies are the same, the authors find that modern insurgencies last about ten years and that a government's chances of winning may increase slightly over time. Insurgencies are suited to hierarchical organization and rural terrain, and sanctuary is vital to insurgents. Insurgent use of terrorism often backfires, and withdrawal of state sponsorship can cripple an insurgency, typically leading to its defeat. Inconsistent support to either side generally presages defeat for that side, although weak insurgencies can still win. Anocracies (pseudodemocracies) rarely succeed against insurgencies. Historically derived force ratios are neither accurate nor predictive, and civil defense forces are very useful for both sides. Key indicators of possible trends and tipping points in an insurgency include changes in desertions, defections, and the flow of information to the COIN effort. The more parties in an insurgency, the more likely it is to have a complex and protracted ending. There are no COIN shortcuts."--Rand web site
Byting back : regaining information superiority against 21st-century insurgents( Book )

6 editions published in 2007 in English and held by 170 WorldCat member libraries worldwide

Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus implies for counterinsurgency requirements, collection, networking, and systems design
Global demographic change and its implications for military power by Martin C Libicki( Book )

5 editions published in 2011 in English and Undetermined and held by 119 WorldCat member libraries worldwide

"What is the impact of demographics on the prospective production of military power and the causes of war? This monograph analyzes this issue by projecting working-age populations through 2050; assessing the influence of demographics on manpower, national income and expenditures, and human capital; and examining how changes in these factors may affect the ability of states to carry out military missions. It also looks at some implications of these changes for other aspects of international security. The authors find that the United States, alone of all the large affluent nations, will continue to see (modest) increases in its working-age population thanks to replacement-level fertility rates and a likely return to vigorous levels of immigration. Meanwhile, the working-age populations of Europe and Japan are slated to fall by as much as 10 to 15 percent by 2030 and as much as 30 to 40 percent by 2050. The United States will thus account for a larger percentage of the population of its Atlantic and Pacific alliances; in other words, the capacity of traditional alliances to multiply U.S. demographic power is likely to decline, perhaps sharply, through 2050. India's working-age population is likely to overtake China's by 2030. The United States, which has 4.7 percent of the world's working-age population, will still have 4.3 percent by 2050, and the current share of global gross domestic product accounted for by the U.S. economy is likely to stay quite high."--P. [4] of cover
H4cker5 wanted : an examination of the cybersecurity labor market by Martin C Libicki( Book )

6 editions published in 2014 in English and held by 106 WorldCat member libraries worldwide

The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years
Crisis and escalation in cyberspace by Martin C Libicki( Book )

6 editions published in 2012 in English and held by 90 WorldCat member libraries worldwide

"The chances are growing that the United States will find itself in a crisis in cyberspace, with the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. The genesis for this work was the broader issue of how the Air Force should integrate kinetic and nonkinetic operations. Central to this process was careful consideration of how escalation options and risks should be treated, which, in turn, demanded a broader consideration across the entire crisis-management spectrum. Such crises can be managed by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise from crises."--Page 4 of cover
Markets for cybercrime tools and stolen data : hackers' bazaar by Lillian Ablon( Book )

6 editions published in 2014 in English and held by 77 WorldCat member libraries worldwide

"Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass 'smash-and-grab' attacks)."
The defender's dilemma : charting a course toward cybersecurity by Martin C Libicki( Book )

4 editions published in 2015 in English and held by 76 WorldCat member libraries worldwide

Cybersecurity is a constant, and, by all accounts growing, challenge. Although software products are gradually becoming more secure and novel approaches to cybersecurity are being developed, hackers are becoming more adept, their tools are better, and their markets are flourishing. The rising tide of network intrusions has focused organizations' attention on how to protect themselves better. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures, and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. A heuristic model was developed to demonstrate the various cybersecurity levers that organizations can control, as well as exogenous factors that organizations cannot control. Among the report's findings were that cybersecurity experts are at least as focused on preserving their organizations' reputations as protecting actual property. Researchers also found that organizational size and software quality play significant roles in the strategies that defenders may adopt. Finally, those who secure networks will have to pay increasing attention to the role that smart devices might otherwise play in allowing hackers in. Organizations could benefit from better understanding their risk posture from various actors (threats), protection needs (vulnerabilities), and assets (impact). Policy recommendations include better defining the role of government, and exploring information sharing responsibilities
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.30 (from 0.03 for How terror ... to 0.49 for Illuminati ...)

Conquest in cyberspace : national security and information warfare
Alternative Names
Libicki, Martin

Languages
English (161)

Chinese (4)

Covers
What makes industries strategic : a perspective on technology, economic development, and defenseMind the gap promoting a transatlantic revolution in military affairsThe mesh and the net speculations on armed conflict in a time of free siliconIlluminating tomorrow's warNew challenges, new tools for defense decisionmakingHow terrorist groups end : lessons for countering Al Qa'idaCyberdeterrence and cyberwarScaffolding the new Web : standards and standards policy for the digital economy