Listing 1 - 10 of 27 << page
of 3
>>
Sort by

Book
No shortcuts : why states struggle to develop a military cyber-force
Author:
ISBN: 0197674526 0197664539 Year: 2022 Publisher: New York, NY : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the past decade, numerous states have declared cyberspace as a new domain of warfare, sought to develop a military cyber strategy and establish a cyber command. These developments have led to much policy talk and concern about the future of warfare as well as the digital vulnerability of society. No Shortcuts provides a level-headed view of where we are in the militarization of cyberspace.In this book, Max Smeets bridges the divide between technology and policy to assess the necessary building blocks for states to develop a military cyber capacity. Smeets argues that for many states, the barriers to entry into conflict in cyberspace are currently too high. Accompanied by a wide range of empirical examples, Smeets shows why governments abilities to develop military cyber capabilities might change over time and explains the limits of capability transfer by states and private actors.


Book
Offensive cyber operations : understanding intangible warfare
Author:
ISBN: 0197667384 0197664490 Year: 2021 Publisher: New York, NY : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber-warfare is often discussed, but rarely truly seen. When does an intrusion turn into an attack, and what does that entail? How do nations fold offensive cyber operations into their strategies? Operations against networks mostly occur to collect intelligence, in peacetime. Understanding the lifecycle and complexity of targeting adversary networks is key to doing so effectively in conflict.Rather than discussing the spectre of cyber war, Daniel Moore seeks to observe the spectrum of cyber operations. By piecing together operational case studies, military strategy and technical analysis, he shows that modern cyber operations are neither altogether unique, nor entirely novel. Offensive cyber operations are the latest incarnation of intangible warfare--conflict waged through non-physical means, such as the information space or the electromagnetic spectrum.Not all offensive operations are created equal. Some are slow-paced, clandestine infiltrations requiring discipline and patience for a big payoff; others are short-lived attacks meant to create temporary tactical disruptions. This book first seeks to understand the possibilities, before turning to look at some of the most prolific actors: the United States, Russia, China and Iran. Each has their own unique take, advantages and challenges when attacking networks for effect.


Book
Artificial Intelligence and International Conflict in Cyberspace.
Authors: --- --- --- ---
ISBN: 1003284094 1000895955 1000895890 103225579X Year: 2023 Publisher: Milton : Taylor & Francis Group,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This edited volume explores how artificial intelligence (AI) is transforming international conflict in cyberspace. Over the past three decades, cyberspace developed into a crucial frontier and issue of international conflict. However, scholarly work on the relationship between AI and conflict in cyberspace has been produced along somewhat rigid disciplinary boundaries and an even more rigid sociotechnical divide - wherein technical and social scholarship are seldomly brought into a conversation. This is the first volume to address these themes through a comprehensive and cross-disciplinary approach. With the intent of exploring the question 'what is at stake with the use of automation in international conflict in cyberspace through AI?', the chapters in the volume focus on three broad themes, namely: (1) technical and operational, (2) strategic and geopolitical, and (3) normative and legal. These also constitute the three parts in which the chapters of this volume are organised, although these thematic sections should not be considered as an analytical or a disciplinary demarcation. This book will be of much interest to students of cyber-conflict, artificial intelligence, security studies and International Relations"--


Book
Cyber operations and international law
Author:
ISBN: 110880117X 1108780601 1108807704 1108490271 110874835X Year: 2020 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim State of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a State, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of State responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim.


Book
An introduction to cyber analysis and targeting
Author:
ISBN: 3030885593 3030885585 Year: 2022 Publisher: Cham, Switzerland : Springer,


Book
Cyber persistence theory : redefining national security in cyberspace
Authors: --- ---
ISBN: 0197638295 0197638279 0197638287 Year: 2022 Publisher: New York, NY : Oxford University Press.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In 'Cyber Persistence Theory', Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that this current theory only works well in the cyber strategic space of armed conflict but it is completely misaligned for conflict outside of war - where most state-sponsored adversarial cyber activity occurs. As they show, the reigning paradigm of deterrence theory cannot fully explain what is taking place with respect to cyber conflict. Therefore, the authors develop a novel approach to national cyber security strategy and policy that realigns theory and practice.


Book
Escalation dynamics in cyberspace
Author:
ISBN: 0197550916 0197550908 0197550924 Year: 2023 Publisher: New York, NY : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

To what extent do cyberspace operations increase the risks of escalation between nation-state rivals? In Escalation Dynamics in Cyberspace, Erica D. Lonergan and Shawn W. Lonergan tackle this question head-on, presenting a comprehensive theory that explains the conditions under which cyber operations may lead to escalation. In doing so, they challenge long-held assumptions about strategic interactions in cyberspace, arguing that cyberspace is not as dangerous as the conventional wisdom might suggest. In some cases, cyber operations could even facilitate the de-escalation of international crises. Through extensive case studies that explore the role of cyber operations in routine competition, crises, and warfighting, Escalation Dynamics in Cyberspace presents nuanced insights about how cyberspace affects international politics.


Book
Tallinn manual on the international law applicable to cyber warfare
Authors: ---
ISBN: 9781107024434 9781107613775 9781139169288 110730153X 1107236126 1107305721 1139169289 1107314372 1107308828 1107306620 1107613779 1299257291 9781107314375 1107024439 1107312175 9781107236127 9781107305724 9781107308824 9781107306622 9781299257290 Year: 2013 Publisher: New York Cambridge University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

The product of a three-year project by twenty renowned international law scholars and practitioners, the Tallinn Manual identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter rules' governing such conflicts. It addresses topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality. An extensive commentary accompanies each rule, which sets forth the rule's basis in treaty and customary law, explains how the group of experts interpreted applicable norms in the cyber context, and outlines any disagreements within the group as to each rule's application.


Book
Binary bullets : the ethics of cyberwarfare
Authors: --- --- ---
ISBN: 0190221089 0190221097 9780190221096 9780190221089 9780190221072 0190464178 Year: 2016 Publisher: New York. N.Y. Oxford University Press


Book
The evolution of cyber war
Author:
ISBN: 1612347762 1612347746 9781612347769 9781612347745 9781612347639 1612347630 9781612347752 Year: 2015 Publisher: Lincoln

Loading...
Export citation

Choose an application

Bookmark

Abstract

"In January 2014 Pope Francis called the Internet a "gift from God." Months later former Secretary of Defense, Leon Panetta, described cyber warfare as "the most serious threat in the 21st century," capable of destroying our entire infrastructure and crippling the nation. Already, cyber warfare has impacted countries around the world: Estonia in 2007, Georgia in 2008, and Iran in 2010; and, as with other methods of war, cyber technology has the ability to be used not only on military forces and facilities, but on civilian targets.Our computers have become spies and tools for terrorism, and a have allowed for a new, unchecked method of war .And yet, cyber warfare is still in its infancy, with inumerable possibilities and contingencies for how such a war may play out in the coming decades. Cyber War Taboo?: The Evolution of Norms for Emerging-Technology Weapons, from Chemical Weapons to Cyber Warfare examines the international development of constraining norms for cyber warfare and predicts how those norms will unfold in the future. Using case studies for other emerging-technology weapons--chemical and biological weapons, strategic bombing, and nuclear weapons--author Brian Mazanec expands previous definitions of norm evolution theory and offers recommendations for citizens and U.S. policymakers and as they grapple with the impending reality of cyber war"--

Listing 1 - 10 of 27 << page
of 3
>>
Sort by