Rethinking Cyber Warfare


Book Description

Rethinking Cyber Warfare provides a fresh understanding of the role that digital disruption plays in contemporary international security and proposes a new approach to more effectively restrain and manage cyberattacks.




New Media Politics


Book Description

New Media Politics: Rethinking Activism and National Security in Cyberspace explores many of the questions surrounding the new challenges that have arisen as a result of the emergence of cyberspace, including cyber-activism, cyberterrorism, and cyber-security. The chapters in this volume provide case studies that span an array of geographies as they debate questions regarding conceptual issues in cyberspace and the relationship between politics, cyberterrorism and cyber-activism, as well as state and international regulations concerning cyberspace, resistance movements in cyberspace, and media frameworks concerning terrorism, civil liberties, and government restrictions. This collection will provide a venue for discussions on the diverse issues surrounding the theme of new media politics from international and interdisciplinary perspectives. The volume is divided into two parts, the first of which focuses on how cyberspace has been used in activism, acts of resistance and protests. The second part investigates issues related to how online media is used in terrorism and how governments have sometimes perceived cyberspace as a threat, leading at times to regulations which threaten to curtail liberties in the name of protecting the “security” of the state against enemies that may be seen as “internal” or “external.”




Rethinking Sovereignty in the Context of Cyberspace


Book Description

Recent successful "hacks," allegedly carried out by professionals acting on behalf of, or in concert with nation-states have heightened concerns about cyber warfare and sovereignty in the context of cyberspace. To maintain the integrity of U.S. and allied sovereign borders, it is imperative that security measures and defenses are coordinated and choreographed at the policy, strategy, and operational levels in the cyber domain, as well as in the physical world. The determination of what constitutes cyber sovereignty will greatly influence identification and understanding of threats, Department of Defense (DoD) preparation of the battlefield, the development of capabilities, the identification of participants, and planning for cyberspace operations. Considering the stakes, U.S. leaders cannot afford the consequences of allowing the enemy to define the boundaries of cyber sovereignty and the rules of cyberspace engagement.




Rethinking Cybersecurity


Book Description

Despite all the attention, cyberspace is far from secure. Why this is so reflects conceptual weaknesses more than imperfect technologies. Two questions highlight shortcomings in the discussion of cybersecurity. The first is why, after more than two decades, we have not seen anything like a cyber Pearl Harbor, cyber 9/11, or cyber catastrophe. The second is why, despite the increasing quantity of recommendations, there has been so little progress. This report explores these questions and assesses the accuracy of our perceptions of cybersecurity.




Cyberinsurance Policy


Book Description

Why cyberinsurance has not improved cybersecurity and what governments can do to make it a more effective tool for cyber risk management. As cybersecurity incidents—ranging from data breaches and denial-of-service attacks to computer fraud and ransomware—become more common, a cyberinsurance industry has emerged to provide coverage for any resulting liability, business interruption, extortion payments, regulatory fines, or repairs. In this book, Josephine Wolff offers the first comprehensive history of cyberinsurance, from the early “Internet Security Liability” policies in the late 1990s to the expansive coverage offered today. Drawing on legal records, government reports, cyberinsurance policies, and interviews with regulators and insurers, Wolff finds that cyberinsurance has not improved cybersecurity or reduced cyber risks. Wolff examines the development of cyberinsurance, comparing it to other insurance sectors, including car and flood insurance; explores legal disputes between insurers and policyholders about whether cyber-related losses were covered under policies designed for liability, crime, or property and casualty losses; and traces the trend toward standalone cyberinsurance policies and government efforts to regulate and promote the industry. Cyberinsurance, she argues, is ineffective at curbing cybersecurity losses because it normalizes the payment of online ransoms, whereas the goal of cybersecurity is the opposite—to disincentivize such payments to make ransomware less profitable. An industry built on modeling risk has found itself confronted by new technologies before the risks posed by those technologies can be fully understood.




Cyber Persistence Theory


Book Description

"In 'Cyber Persistence Theory', Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that this current theory only works well in the cyber strategic space of armed conflict but it is completely misaligned for conflict outside of war - where most state-sponsored adversarial cyber activity occurs. As they show, the reigning paradigm of deterrence theory cannot fully explain what is taking place with respect to cyber conflict. Therefore, the authors develop a novel approach to national cyber security strategy and policy that realigns theory and practice."--




Understanding Cyber Conflict


Book Description

Cyber weapons and the possibility of cyber conflict—including interference in foreign political campaigns, industrial sabotage, attacks on infrastructure, and combined military campaigns—require policymakers, scholars, and citizens to rethink twenty-first-century warfare. Yet because cyber capabilities are so new and continually developing, there is little agreement about how they will be deployed, how effective they can be, and how they can be managed. Written by leading scholars, the fourteen case studies in this volume will help policymakers, scholars, and students make sense of contemporary cyber conflict through historical analogies to past military-technological problems. The chapters are divided into three groups. The first—What Are Cyber Weapons Like?—examines the characteristics of cyber capabilities and how their use for intelligence gathering, signaling, and precision striking compares with earlier technologies for such missions. The second section—What Might Cyber Wars Be Like?—explores how lessons from several wars since the early nineteenth century, including the World Wars, could apply—or not—to cyber conflict in the twenty-first century. The final section—What Is Preventing and/or Managing Cyber Conflict Like?—offers lessons from past cases of managing threatening actors and technologies.




Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare: Towards a Broader Scope of Article 2(4) of the Un Charter


Book Description

Cyber-attacks that cause physical consequences are considered to be in violation of the use of force prohibition should the effects reach a certain severity threshold. That premise does not extend to cyber-attacks that cause economic harm due to a dated distinction between kinetic and other effects. This article presents the argument that Article 2(4) of the UN Charter on the prohibition on the threat or use of force ought to apply to economic cyber-attacks. As a result, the right of self-defense could be triggered by the gravest of economic cyber-attacks, as well as the UN Security Council authority under Chapter VII in response to an economic cyber-attack. The underlying assumption is that the effects of economic cyber-attacks can be just as severe and threatening as the effects of kinetic cyber-attacks, and therefore, there is a need to reformulate the boundaries of the use of force paradigm to encompass the additional range of harmful cyber activities. This article proposes a framework consisting of a set of factors to assess economic cyber-attacks under the use of force paradigm.




Studies Combined: Cyber Warfare In Cyberspace - National Defense, Workforce And Legal Issues


Book Description

Just a sample of the contents ... contains over 2,800 total pages .... PROSPECTS FOR THE RULE OF LAW IN CYBERSPACE Cyberwarfare and Operational Art CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER Cyber Attacks and the Legal Justification for an Armed Response UNTYING OUR HANDS: RECONSIDERING CYBER AS A SEPARATE INSTRUMENT OF NATIONAL POWER Effects-Based Operations in the Cyber Domain Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense MILLENNIAL WARFARE IGNORING A REVOLUTION IN MILITARY AFFAIRS: THE NEED TO CREATE A SEPARATE BRANCH OF THE ARMED FORCES FOR CYBER WARFARE SPECIAL OPERATIONS AND CYBER WARFARE LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE ADAPTING UNCONVENTIONAL WARFARE DOCTRINE TO CYBERSPACE OPERATIONS: AN EXAMINATION OF HACKTIVIST BASED INSURGENCIES Addressing Human Factors Gaps in Cyber Defense Airpower History and the Cyber Force of the Future How Organization for the Cyber Domain Outpaced Strategic Thinking and Forgot the Lessons of the Past THE COMMAND OF THE TREND: SOCIAL MEDIA AS A WEAPON IN THE INFORMATION AGE SPYING FOR THE RIGHT REASONS: CONTESTED NORMS IN CYBERSPACE AIR FORCE CYBERWORX REPORT: REMODELING AIR FORCE CYBER COMMAND & CONTROL THE CYBER WAR: MAINTAINING AND CONTROLLING THE “KEY CYBER TERRAIN” OF THE CYBERSPACE DOMAIN WHEN NORMS FAIL: NORTH KOREA AND CYBER AS AN ELEMENT OF STATECRAFT AN ANTIFRAGILE APPROACH TO PREPARING FOR CYBER CONFLICT AIR FORCE CYBER MISSION ASSURANCE SOURCES OF MISSION UNCERTAINTY Concurrency Attacks and Defenses Cyber Workforce Retention Airpower Lessons for an Air Force Cyber-Power Targeting ¬Theory IS BRINGING BACK WARRANT OFFICERS THE ANSWER? A LOOK AT HOW THEY COULD WORK IN THE AIR FORCE CYBER OPERATIONS CAREER FIELD NEW TOOLS FOR A NEW TERRAIN AIR FORCE SUPPORT TO SPECIAL OPERATIONS IN THE CYBER ENVIRONMENT Learning to Mow Grass: IDF Adaptations to Hybrid Threats CHINA’S WAR BY OTHER MEANS: UNVEILING CHINA’S QUEST FOR INFORMATION DOMINANCE THE ISLAMIC STATE’S TACTICS IN SYRIA: ROLE OF SOCIAL MEDIA IN SHIFTING A PEACEFUL ARAB SPRING INTO TERRORISM NON-LETHAL WEAPONS: THE KEY TO A MORE AGGRESSIVE STRATEGY TO COMBAT TERRORISM THOUGHTS INVADE US: LEXICAL COGNITION AND CYBERSPACE The Cyber Threat to Military Just-In-Time Logistics: Risk Mitigation and the Return to Forward Basing PROSPECTS FOR THE RULE OF LAW IN CYBERSPACE Cyberwarfare and Operational Art CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER Cyber Attacks and the Legal Justification for an Armed Response UNTYING OUR HANDS: RECONSIDERING CYBER AS A SEPARATE INSTRUMENT OF NATIONAL POWER Effects-Based Operations in the Cyber Domain Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense MILLENNIAL WARFARE IGNORING A REVOLUTION IN MILITARY AFFAIRS: THE NEED TO CREATE A SEPARATE BRANCH OF THE ARMED FORCES FOR CYBER WARFARE SPECIAL OPERATIONS AND CYBER WARFARE LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE ADAPTING UNCONVENTIONAL WARFARE DOCTRINE TO CYBERSPACE OPERATIONS: AN EXAMINATION OF HACKTIVIST BASED INSURGENCIES Addressing Human Factors Gaps in Cyber Defense Airpower History and the Cyber Force of the Future How Organization for the Cyber Domain Outpaced Strategic Thinking and Forgot the Lessons of the Past THE COMMAND OF THE TREND: SOCIAL MEDIA AS A WEAPON IN THE INFORMATION AGE SPYING FOR THE RIGHT REASONS: CONTESTED NORMS IN CYBERSPACE AIR FORCE CYBERWORX REPORT: REMODELING AIR FORCE CYBER COMMAND & CONTROL THE CYBER WAR: MAINTAINING AND CONTROLLING THE “KEY CYBER TERRAIN” OF THE CYBERSPACE DOMAIN WHEN NORMS FAIL: NORTH KOREA AND CYBER AS AN ELEMENT OF STATECRAFT AN ANTIFRAGILE APPROACH TO PREPARING FOR CYBER CONFLICT AIR FORCE CYBER MISSION ASSURANCE SOURCES OF MISSION UNCERTAINTY Concurrency Attacks and Defenses Cyber Workforce Retention




Untying Our Hands


Book Description

"Current cyber thought reflects a heavy military influence in the prevailing discussion of cyber war and cyber warfare. While acknowledging the military roots of the development of cyber and recognizing that developing cyber capabilities via military mechanisms offered initial advantages, the continued global expansion of and reliance upon digitized societies calls for an objective, unconstrained analysis and consideration of cyber independent of the military lens to promote comprehensive understanding of cyber power and afford the widest possible range of options to strategic decision makers. This thesis seeks to reframe the strategic discussion of U.S. cyber power. Specifically, this thesis proposes a new strategic approach to cyber by considering it as an instrument of national power separate and independent from the military instrument. This new strategic approach to cyber has conceptual, legal, and organizational implications. Conceptually, the argument for cyber builds on similar previous arguments for expanding the instruments of national power to include such national capabilities as law enforcement, financial, and intelligence. Legally, this approach requires the U.S. to change its position equating cyber aggression with armed attacks. Organizationally, this approach calls for the creation of a single, civilian-led cyber agency that combines and consolidates the cyber functions of the Office of the Director of National Intelligence, Department of Homeland Security, Federal Bureau of Investigation, and some of the cyber capabilities resident within the Department of Defense. This thesis concludes that a new strategic approach to cyber would provide a wider range of strategic cyber options, including expanded cyber defense of civilian government infrastructure and more freedom of action for offensive cyber activity by avoiding limitations commensurate with the application of military force."--page i.