View the Executi" /> Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

Text Browser Navigation Bar: Main Site Navigation and Search | Current Page Navigation | Current Page Content

U.S. Army War College >> Strategic Studies Institute >> Publications >> Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

Login to "My SSI" Contact About SSI Cart: 0 items

U.S. Army War College >> Strategic Studies Institute >> Publications >> Details

Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

Authored by Dr. Mary Manjikian.

Deterring Cybertrespass and Se... Cover Image

Brief Synopsis

View the Executive Summary

Perhaps the best starting point for those looking to “borrow” a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence—due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy—among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America’s borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace.

You may also be interested in the following titles:

Survey: Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

1. How would you rate the writing and overall quality? (5 best - 1 Worst)

2. Is the content relevant for influencing present and future debates?

Also by the Author/Editor:

A Typology of Arguments about Drone Ethics
Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes
Do Fewer Resources Mean Less Influence? A Comparative Historical Case Study of Military Influence in a Time of Austerity

View other pubs in the following categories:

Homeland Security and Defense
Military Change and Transformation
21st Century Warfare
Future Technology

  • Download it Now!

    • Download Format: PDF
    • PDF File Size: 3.98MB
  • Hardcopies

    • Study is: Available via Download Only
    • View Cart
    • All hardcopies are free of charge, shipping inclusive.
    • For out of stock or digital only publications, refer to the new GPO on-demand site. For a small fee, recieve many prior publications. Click here to visit.
    • All materials on our website are available as a free download.

Subscribe using RSS Website Subscriptions