Cyber Persistence Theory
Title | Cyber Persistence Theory PDF eBook |
Author | Michael P. Fischerkeller |
Publisher | Oxford University Press |
Pages | 273 |
Release | 2022-05-20 |
Genre | Cyberspace |
ISBN | 0197638252 |
"In 'Cyber Persistence Theory', Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that this current theory only works well in the cyber strategic space of armed conflict but it is completely misaligned for conflict outside of war - where most state-sponsored adversarial cyber activity occurs. As they show, the reigning paradigm of deterrence theory cannot fully explain what is taking place with respect to cyber conflict. Therefore, the authors develop a novel approach to national cyber security strategy and policy that realigns theory and practice."--
Semi-State Actors in Cybersecurity
Title | Semi-State Actors in Cybersecurity PDF eBook |
Author | Florian J. Egloff |
Publisher | Oxford University Press |
Pages | 305 |
Release | 2022 |
Genre | History |
ISBN | 0197579272 |
Using a historical analogy as a research strategy: histories of the sea and cyberspace, comparison, and locating the analogy in time -- History of the loosely governed sea between the 16th-19th century: from the age of privateering to its abolition -- Brief history of cyberspace: origins and development of (in-)security in cyberspace -- The sea and cyberspace: comparison and analytical lines of inquiry applying the analogy to cybersecurity -- Cyber pirates and privateers: state proxies, criminals, and independent patriotic hackers -- Cyber mercantile companies conflict and cooperation.
Bytes, Bombs, and Spies
Title | Bytes, Bombs, and Spies PDF eBook |
Author | Herbert Lin |
Publisher | Brookings Institution Press |
Pages | 440 |
Release | 2019-01-15 |
Genre | Political Science |
ISBN | 0815735480 |
“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country’s attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called “digital combat power” and how the United States should incorporate that power into its national security strategy.
The Cyber Deterrence Problem
Title | The Cyber Deterrence Problem PDF eBook |
Author | Aaron F. Brantly |
Publisher | Rowman & Littlefield |
Pages | 203 |
Release | 2020-06-15 |
Genre | Political Science |
ISBN | 1786615665 |
The national security of the United States depends on a secure, reliable and resilient cyberspace. The inclusion of digital systems into every aspect of US national security has been underway since World War II and has increased with the proliferation of Internet-enabled devices. There is an increasing need to develop a robust deterrence framework within which the United States and its allies can dissuade would-be adversaries from engaging in various cyber activities. Yet despite a desire to deter adversaries, the problems associated with dissuasion remain complex, multifaceted, poorly understood and imprecisely specified. Challenges, including credibility, attribution, escalation and conflict management, remain ever-present and challenge the United States in its efforts to foster security in cyberspace. These challenges need to be addressed in a deliberate and multidisciplinary approach that combines political and technical realities to provide a robust set of policy options to decision makers. The Cyber Deterrence Problem brings together a multidisciplinary team of scholars with expertise in computer science, deterrence theory, cognitive psychology, intelligence studies and conflict management to analyze and develop a robust assessment of the necessary requirements and attributes for achieving deterrence in cyberspace. Beyond simply addressing the base challenges associated with deterrence, many of the chapters also propose strategies and tactics to enhance deterrence in cyberspace and emphasize conceptualizing how the United States deters adversaries.
The Cybersecurity Dilemma
Title | The Cybersecurity Dilemma PDF eBook |
Author | Ben Buchanan |
Publisher | Oxford University Press |
Pages | 300 |
Release | 2017-02-01 |
Genre | Political Science |
ISBN | 0190694807 |
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.
Strategic Intelligence for American World Policy
Title | Strategic Intelligence for American World Policy PDF eBook |
Author | Sherman Kent |
Publisher | Princeton University Press |
Pages | 258 |
Release | 2025-04-08 |
Genre | Political Science |
ISBN | 069127374X |
The classic book that established the principles and methods of modern intelligence analysis With the outbreak of the Second World War, historian Sherman Kent left his classroom at Yale to join the Office of Strategic Services—the forerunner of the Central Intelligence Agency—where he adapted scholarly methods to the rigors and unique challenges of producing actionable intelligence in support of the war effort. In this remarkable book, Kent draws on the lessons he learned in wartime to lay the foundations for postwar security. He presents the doctrine and practices of intelligence analysis and explains why they are vital to national survival. Strategic Intelligence for American World Policy shows how intelligence activities and their consequences extend far beyond military considerations and are as essential to keeping the peace as they are to winning the war.
Cyber War Versus Cyber Realities
Title | Cyber War Versus Cyber Realities PDF eBook |
Author | Brandon Valeriano |
Publisher | Oxford University Press, USA |
Pages | 289 |
Release | 2015 |
Genre | Business & Economics |
ISBN | 0190204796 |
Cyber conflict is real, but is not changing the dynamics of international politics. In this study, the authors provide a realistic evaluation of the tactic in modern international interactions using a detailed examination of several famous cyber incidents and disputes in the last decade.