Accession Number : AD1014198


Title :   Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition


Descriptive Note : Technical Report


Corporate Author : Army War College -Strategic Studies Institute Carlisle United States


Personal Author(s) : Williams,Phil ; Fiddner,Dighton


Full Text : https://apps.dtic.mil/dtic/tr/fulltext/u2/1014198.pdf


Report Date : 01 Aug 2016


Pagination or Media Count : 699


Abstract : The emergence and evolution of cyberspace has contributed to globalization, the creation of a new global commons, the rapid spread of knowledge and ideas, the development of global markets for local products, and the empowerment of individuals and small groups. Yet, cyberspace creates new opportunities for criminality, provides new avenues for terrorist recruitment, and adds a new playing field within which geopolitical rivalry among great and not so great powers plays itself out. Dependence by societies on cyberspace also creates new vulnerabilities. Cyberspace has brought new potential and promiseyet simultaneously it has also become a domain in which malevolent actors pursue selfish interests, spy, steal, extort, bully, and stalk. The problems are intensified by the fact that although cyberspace has become a ubiquitous feature of modern life, it is poorly understood. One approach often adopted by many members of the national security community is to treat it as a fifth strategic domain, joining land, sea, air, and space. Yet, cyberspace also permeates these other domains, and indeed, has permeated society as a whole. Perhaps one of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, non-governmental and transnational organizations, commercial enterprises, and individuals. Yet it is also a space of opportunitiesfor benevolent, neutral, and malevolent actors.


Descriptors :   computer network security , national security , threats , geopolitics , policies , internet , terrorism , COMMUNICATIONS NETWORKS , information systems , vulnerability , information exchange , united states government


Distribution Statement : APPROVED FOR PUBLIC RELEASE