Ben Buchanan

Ben Buchanan’s Followers (4)

member photo
member photo
member photo
member photo

Ben Buchanan



Average rating: 4.09 · 174 ratings · 19 reviews · 17 distinct worksSimilar authors
The New Fire: War, Peace, a...

by
4.13 avg rating — 135 ratings7 editions
Rate this book
Clear rating
Journey to Gameland: How to...

by
really liked it 4.00 avg rating — 10 ratings — published 2001 — 5 editions
Rate this book
Clear rating
My Year With Harry Potter: ...

2.75 avg rating — 4 ratings — published 2001 — 4 editions
Rate this book
Clear rating
Il nuovo fuoco: Guerra, pac...

by
4.50 avg rating — 2 ratings
Rate this book
Clear rating
Machine Learning for Policy...

by
really liked it 4.00 avg rating — 1 rating — published 2017
Rate this book
Clear rating
Another Flow

by
0.00 avg rating — 0 ratings2 editions
Rate this book
Clear rating
Babylon Effect: 2nd Edition

0.00 avg rating — 0 ratings3 editions
Rate this book
Clear rating
Babylon Effect

0.00 avg rating — 0 ratings
Rate this book
Clear rating
Drift Illogical

0.00 avg rating — 0 ratings
Rate this book
Clear rating
Journey to Gameland: How to...

0.00 avg rating — 0 ratings
Rate this book
Clear rating
More books by Ben Buchanan…
Quotes by Ben Buchanan  (?)
Quotes are added by the Goodreads community and are not verified by Goodreads. (Learn more)

“hacking was a fundamental, though mostly secret, tool of American statecraft, one deployed clandestinely against foe and friend alike”
Ben Buchanan

“But states have difficulty evaluating cybersecurity threats. If a state does detect an intrusion in one of its vital networks and if that intrusion looks to be from another state, what should the state suffering the intrusion conclude? On the one hand, it might be a defensive-minded intrusion, only checking out the intruded-upon state’s capabilities and providing reassuring intelligence to the intruding state. This might seem unsettling but not necessarily threatening, presuming the state suffering the intrusion was not developing capabilities for attack or seeking conflict. On the other hand, the intrusion might be more nefarious. It could be a sign of some coming harm, such as a cyber attack or an expanding espionage operation. The state suffering the intrusion will have to decide which of these two possibilities is correct, interpreting limited and almost certainly insufficient amounts of data to divine the intentions of another state. Thus Chapter Four’s argument is vitally important: intrusions into a state’s strategically important networks pose serious risks and are therefore inherently threatening. Intrusions launched by one state into the networks of another can cause a great deal of harm at inopportune times, even if the intrusion at the moment of discovery appears to be reasonably benign. The intrusion can also perform reconnaissance that enables a powerful and well-targeted cyber attack. Even operations launched with fully defensive intent can serve as beachheads for future attack operations, so long as a command and control mechanism is set up. Depending on its target, the intrusion can collect information that provides great insight into the communications and strategies of policy-makers. Network intrusions can also pose serious counterintelligence risks, revealing what secrets a state has learned about other states and provoking a damaging sense of paranoia. Given these very real threats, states are likely to view any serious intrusion with some degree of fear. They therefore have significant incentive to respond strongly, further animating the cybersecurity dilemma.”
Ben Buchanan, The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

“The first objection is that states are not capable of attributing the source of a network intrusion, short-circuiting any security dilemma. The second objection is that the danger posed by network intrusions does not pose an existential risk and so the cybersecurity dilemma is not a major concern. The third and final objection is that cyber capabilities are unevenly distributed; strong states are more likely to possess cyber capabilities than weak ones, but, the objection argues, this is true of all military weapons and so cyber capabilities are not significant. In responding to these objections, this chapter establishes the boundaries of the cybersecurity dilemma argument.”
Ben Buchanan, The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Topics Mentioning This Author

topics posts views last activity  
The Seasonal Read...: This topic has been closed to new comments. * Completed Tasks: PLEASE DO NOT DELETE ANY POST IN THIS THREAD 3131 307 Aug 31, 2022 09:00PM  


Is this you? Let us know. If not, help out and invite Ben to Goodreads.