Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Recommended Books & Ebooks
Cyberwarfare : Information Operations in a Connected World by Chapple, Mike, 1975-
This book puts students on the real-world battlefield of cyberspace. It covers the role of cyberwarfare in modern military operations, where it has become almost impossible to separate cyberwarfare from traditional warfare. Part 1 discusses the history of cyberwarfare and the variety of new concerns its emergence has fostered - from tactical considerations to the law of armed conflict and protection of civilians. Part 2 discusses how offensive cyberwarfare has become an important part of the modern military arsenal. The rise of the advanced persistent threat has changed the face of cyberwarfare, and military planners must now be conscious of a series of cyberwarfare actions. In response, the defensive strategies that militaries use have evolved to protect themselves against cyber attacks. The concept of defense-in-depth is critical to building a well-rounded defense that will stand up to cyberwarfare events. Part 3 explores the future of cyberwarfare, its interaction with military doctrine, and Pandora's box opened by recent events, which have set the stage for future cyber attacks.
ISBN: 9781284225440
Publication Date: 2021
The Politics of Cybersecurity in the Middle East by Shires, James
This book is a pioneering examination of the politics of cybersecurity in the Middle East. Drawing on new interviews and original fieldwork, the author shows how the label of cybersecurity is repurposed by states, companies and other organisations to encompass a variety of issues, including state conflict, targeted spyware, domestic information controls, and foreign interference through leaks and disinformation. These shifting meanings shape key technological systems as well as as the social relations underpinning digital development. But however the term is interpreted, it is clear that cybersecurity in an integral aspect of the region's contemporary politics.
Call Number: 681 /00844
ISBN: 9781787384736
Publication Date: 2021
Cyber Capabilities and National Power : A Net Assessment
International Institute for Strategic Studies (GB)
In February 2019 the International Institute for Strategic Studies (IISS) announced its intention to develop a methodology for assessing the cyber capabilities of states and how they contribute to national power. Here, the authors set out that methodology, use it to assess 15 countries, and draw out the overarching themes and conclusions. This report is intended to assist national decision-making, for example by indicating the cyber capabilities that make the greatest difference to national power. Such information can help governments and major corporations when calculating strategic risk and deciding on strategic investment.
Publication Date: 2021
Shadow Warfare : Cyberwar Policy in the United States, Russia, and China by Davis, Elizabeth Van Wie
Cyberwarfare, like the seismic shift of policy with nuclear warfare, is modifying warfare into non-war warfare. A few distinctive characteristics of cyberwar emerge. Cyberwarfare has blurred the distinction between adversary and ally. Cyber probes continuously occur between allies and enemies alike, causing cyberespionage to merge with warfare. Espionage, as old as war itself, has technologically merged with acts of cyberwar as states threaten each other with prepositioned malware in each other's cyberespionage probed infrastructure. These two cyber shifts to warfare are agreed upon and followed by the US, Russia and China. What is not agreed upon in this shifting era of warfare are the policies upon which cyberwarfare is based. This book charts the policies in three key actors and navigates the futures of policy on an international stage.
ISBN: 9781538149683
Publication Date: 2021
Information Warfare in the Age of Cyber Conflict by Whyte, Christopher, 1988- , ed.
This book examines the shape, sources and dangers of information warfare (IW) as it pertains to military, diplomatic and civilian stakeholders. Cyber warfare and information warfare are different beasts. Both concern information, but where the former does so exclusively in its digitized and operationalized form, the latter does so in a much broader sense : with IW, information itself is the weapon. The present work aims to help scholars, analysts, and policymakers understand information warfare within the context of cyber conflict. Specifically, the chapters in the volume address the shape of influence campaigns waged across digital infrastructure and in the psychology of democratic populations in recent years by belligerent state actors, from the Russian Federation to the Islamic Republic of Iran. In marshalling evidence on the shape and evolution of information warfare as a broad-scoped phenomenon aimed at societies writ large, the authors in this book present timely empirical investigations into the global landscape of influence operations, legal and strategic analyses of their role in international politics, and insightful examinations of the potential for democratic process to overcome pervasive foreign manipulation.
ISBN: 9781138600935
Publication Date: 2021
Cyber Threats and NATO 2030 : Horizon Scanning and Analysis
NATO Cooperative Cyber Defence Centre of Excellence (EE)
The book includes 13 chapters that look ahead to how NATO can best address the cyber threats, as well as opportunities and challenges from emerging and disruptive technologies in the cyber domain over the next decade.
ISBN: 9789916956519
Publication Date: 2020
The Cyber Deterrence Problem by Brantly, Aaron Franklin, ed.
The national security of the United Sates depends on a secure, reliable and resilient cyberspace. There is an increasing need to develop a robust deterrence framework within which the United States and its allies can dissuade would-be adversaries from engaging in various cyber activities. Yet despite a desire to deter adversaries, the problems associated with dissuasion remain complex, multifaceted, poorly understood and imprecisely specified. Challenges, including credibility, attribution, escalation and conflict management, remain ever-present and challenge the United States in its efforts to foster security in cyberspace. These challenges need to be addressed in a deliberate and multidisciplinary approach that combines political and technical realities to provide a robust set of policy options to decision makers. This book brings together a multidisciplinary team of scholars with expertise in computer science, deterrence theory, cognitive psychology, intelligence studies and conflict management to analyze and develop a robust assessment of the necessary requirements and attributes for achieving deterrence in cyberspace. Beyond simply addressing the base challenges associated with deterrence, many of the chapters also propose strategies and tactics to enhance deterrence in cyberspace and emphasize conceptualizing how the United States deters adversaries.
ISBN: 9781786615664
Publication Date: 2020
Russian Cyber Operations : Coding the Boundaries of Conflict by Jasper, Scott
Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond ? The author seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. The author proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks.
Call Number: 355.4 /02053
ISBN: 9781626167971
Publication Date: 2020
The Hacker and the State : Cyber Attacks and the New Normal of Geopolitics by Buchanan, Ben
Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, this book sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, the author reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference. The author brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph.
Call Number: 355.4 /02052
ISBN: 9780674987555
Publication Date: 2020
Cyber Warfare : A Documentary and Reference Guide by Springer, Paul J.
This book is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare. Nearly a hundred documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the United States is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents.
ISBN: 9781440872792
Publication Date: 2020
Cyber Operations and International Law by Delerue, Francois, 1987-
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim state of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a state, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of state responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim.
ISBN: 9781108780605
Publication Date: 2020
Cybersecurity Law by Kosseff, Jeff, 1978-
This book offers an authoritative guide to key statutes, regulations, and court rulings that pertain to cybersecurity. This second edition includes new and expanded information that reflects the latest changes in laws and regulations. It includes material on recent FTC data security consent decrees and data breach litigation. Topics covered reflect new laws, regulations, and court decisions that address financial sector cybersecurity, the law of war as applied to cyberspace, and recently updated guidance for public companies' disclosure of cybersecurity risks.
ISBN: 9781119517320
Publication Date: 2020
Cyber Security : The Lifeline of Information and Communication Technology by Prasad, Ramjee
This book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues.
ISBN: 9783030317034
Publication Date: 2020
Cyber Attacks and International Law on the Use of Force : The Turn to Information Ethics by Haataja, Samuli
Examining the thematic intersection of law, technology and violence, this book explores cyber attacks against states and current international law on the use of force. The theory of information ethics is used to critique the law's conception of violence and to develop an informational approach as an alternative way to think about cyber attacks. Cyber attacks against states constitute a new form of violence in the information age, and international law on the use of force is limited in its capacity to regulate them. This book draws on Luciano Floridi's theory of information ethics to critique the narrow conception of violence embodied in the law and to develop an alternative way to think about cyber attacks, violence, and the state. The author uses three case studies - the 2007 cyber attacks against Estonia, the Stuxnet incident involving Iran that was discovered in 2010, and the cyber attacks used as part of the Russian interference in the 2016 US presidential election - to demonstrate that an informational approach offers a means to reimagine the state as an entity and cyber attacks as a form of violence against it.
ISBN: 9781351057004
Publication Date: 2019
Waging Cyber War : Technical Challenges and Operational Constraints by Oakley, Jacob G.
This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the difficulty and complexity of executing warfare within the cyber domain. Included is a detailed illustration of cyber warfare against the backdrop of national and international policy, laws, and conventions relating to war.
ISBN: 9781484249505
Publication Date: 2019
Guardian of the Galaxy : EU Cyber Sanctions and Norms in Cyberspace by Pawlak, Patryk
European Union Institute for Security Studies (FR)
This paper - which uses space exploration as a metaphor to demystify some of the concepts and challenges linked to cyber-related policymaking - focuses on the EU's cyber sanctions regime. The newly-established regime represents a significant achievement in the EU's ambition to defend the rules-based international order, and ensure broader global adherence to agreed norms of responsible behavior in cyberspace. However, this growing complexity of cyber threats and the proliferation of malicious actors in the cyber domain indicate that the scale of the challenges ahead should not be underestimated. The EU's autonomous cyber sanctions regime constitutes a unique solution to the challenge of compliance with international law and norms of state behavior. Taking account of the lessons derived from other sanctions regimes adopted by the EU in the past, the volume addresses a number of key issues relevant for ensuring the maximum effectiveness of the new regime. These include the problematic nature of attribution, state responsibility in cyberspace, listing and de-listing criteria, the principle of due diligence or the potential impact of cyber sanctions on the physical world.
ISBN: 9789291988501
Publication Date: 2019
Cybersecurity : Politics, Governance and Conflict in Cyberspace by Puyvelde, Damien Van
In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. But should we believe the prophets of cyber war or worry about online government surveillance ? Are such security concerns real, exaggerated or just poorly understood ? The authors provide here a cutting-edge introduction to the key concepts, controversies and policy debates in cybersecurity. Exploring the interactions of individuals, groups and states in cyberspace, and the integrated security risks to which these give rise, they examine cyberspace as a complex socio-technical-economic domain that fosters both great potential and peril. Structured around ten chapters, the book explores the complexities and challenges of cybersecurity using case studies - from the Morris Worm and Titan Rain to BlackEnergy and the Cyber Caliphate - to highlight the evolution of attacks that can exploit and damage individual systems and critical infrastructures.
Call Number: 355.4 /02040
ISBN: 9781509528097
Publication Date: 2019
Cyberdiplomacy : Managing Security and Governance Online by Riordan, Shaun
The world has been sleep-walking into cyber chaos. The spread of misinformation via social media and the theft of data and intellectual property, along with regular cyberattacks, threaten the fabric of modern societies. All the while, the Internet of Things increases the vulnerability of computer systems, including those controlling critical infrastructure. What can be done to tackle these problems ? Does diplomacy offer ways of managing security and containing conflict online ? The author shows here how traditional diplomatic skills and mindsets can be combined with new technologies to bring order and enhance international cooperation. He explains what cyberdiplomacy means for diplomats, foreign services and corporations and explores how it can be applied to issues such as internet governance, cybersecurity, cybercrime and information warfare. Cyberspace, he argues, is too important to leave to technicians. Using the vital tools offered by cyberdiplomacy, we can reduce the escalation and proliferation of cyberconflicts by proactively promoting negotiation and collaboration online.
Call Number: 355.4 /02036
ISBN: 9781509534074
Publication Date: 2019
Operationalizing Cyberspace as a Military Domain : Lessons for NATO
Rand Corporation (US)
Defense of the North Atlantic Treaty Organization (NATO) in cyberspace requires an understanding of the threats the alliance must face, knowing where it must act, and ensuring that the alliance has the capabilities and capacity available to successfully defend itself. The authors review the new security challenges NATO faces and discuss current efforts by NATO to consider and adapt its structure, forces, systems, and processes to prepare itself for integrating cyberspace as an operational domain. The authors discuss many challenges with successfully operating in cyberspace and provide particular focus on indications and warning (I&W) as an emerging need that all states should address to maintain and ensure an effective military presence within cyberspace. Cyber I&W is a relatively new capability for all modern states and military alliances, and the authors explore some of the existing scholarship and adapt a leading framework for the NATO context.
Publication Date: 2019
The UK Cyber Strategy : Challenges for the Next Phase by Prince, Conrad
Rand Corporation (US)
The UK's 2016 Cyber Security Strategy reaches its conclusion in 2021. At the midway point of the current strategy, and with an upcoming Spending Review, the focus should now be on building the next strategy. This paper poses a series of questions to help frame this debate.
Publication Date: 2019
Les nouvelles guerres : sur la piste des hackers russes by Razon, Boris, 1975-
Les hackers russes qui ont pirate les mails du parti democrate americain en 2016, qui sont-ils ? Des artistes patriotes, comme le pretend Vladimir Poutine ou des mercenaires du clavier ? Pour repondre a ces questions, les auteurs ont rencontre des hackers francais, ils sont alles sur la ligne de front de la cyberguerre, en Ukraine et en Russie, ils ont debusque d'anciens dirigeants americains en charge de la cybersecurite et ecume les conferences de l'OTAN. Et ils ont infiltre l'un des principaux forums de hacking russes, la ou se vend la matiere premiere des pirates : des donnees ou des failles de securite. Au fil des mois, ces hommes sont devenus le symbole et la figure de proue d'une Russie aggressive et sans vergogne. Dans un univers souvent fantasme, ou les preuves n'existent pas et ou espions, paranoiaques et geeks discrets se disputent le territoire, tout autre chose se joue : une guerre nouvellle dans laquelle les virus sont des armes terrifiantes et l'information un enjeu primordial.
Call Number: 355.4 /02027
ISBN: 9782234085718
Publication Date: 2019
Unmasking Maskirovka : Russia's Cyber Influence Operations by Bagge, Daniel P.
In sharp contrast to its utopian heyday, cyberspace is now a hotly contested domain in which nations, corporations, and individuals leverage information for strategic gain. Recent revelations about Russia's cyber disinformation campaigns underscore today's great challenges. The author provides here an in-depth and up-to-date examination of the importance of cyberspace operations, why such activities are so often successful, and how influence operations span the spectrum of conventional and digital statecraft.
Call Number: 355.4/2026
ISBN: 9780578451428
Publication Date: 2019
Digital War by Merrin, William
This book offers a comprehensive overview of the impact of digital technologies upon the military, the media, the global public and the concept of 'warfare' itself. This introductory textbook explores the range of uses of digital technology in contemporary warfare and conflict. The book begins with the 1991 Gulf War, which showcased post-Vietnam technological developments and established a new model of close military and media management. It explores how this model was reapplied in Kosovo (1999), Afghanistan (2001) and Iraq (2003), and how, with the Web 2.0 revolution, this informational control broke down. New digital technologies allowed anyone to be an informational producer leading to the emergence of a new mode of 'participative war', as seen Gaza, Iraq and Syria. The book examines major political events of recent times, such as 9/11 and the War on Terror and its aftermath. It also considers how technological developments such as unmanned drones and cyberwar have impacted upon global conflict and explores emerging technologies such as soldier-systems, exo-skeletons, robotics and artificial intelligence and their possible future impact.
Call Number: 355 /00698
ISBN: 9781138899865
Publication Date: 2019
Understanding Cyber Warfare : Politics, Policy and Strategy by Whyte, Christopher
This textbook offers an accessible introduction to the historical, technical, and strategic context of cyber conflict. Specifically, it provides a comprehensive overview of these key issue areas : the historical emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation, and defense; a theoretical set of perspectives on conflict in the digital age from the point of view of international relations (IR) and the security studies field; the current national perspectives, policies, doctrines, and strategies relevant to cyber warfare; and an examination of key challenges in international law, norm development, and the potential impact of cyber warfare on future international conflicts.
Call Number: 355.4/ 02019
ISBN: 9781138640603
Publication Date: 2019
The Dawn of the Code War : America's Battle against Russia, China, and the Rising Global Cyber Threat by Carlin, John P.
Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties - smart appliances, artificial intelligence, self-driving cars - with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying : our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed. The Internet of Broken Things is not merely a cautionary tale, though. It makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them.
Call Number: 623 /01292
ISBN: 9781541773837
Publication Date: 2018
Bytes, Bombs, and Spies : The Strategic Dimensions of Offensive Cyber Operations by Lin, Herbert, ed.
Offensive cyber operations have become increasingly important elements of U.S. national security policy. From the deployment of Stuxnet to disrupt Iranian centrifuges to the possible use of cyber methods against North Korean ballistic missile launches, the prominence of offensive cyber capabilities as instruments of national power continues to grow. Yet conceptual thinking lags behind the technical development of these new weapons. How might offensive cyber operations be used in coercion or conflict ? What strategic considerations should guide their development and use ? What intelligence capabilities are required for cyber weapons to be effective ? How do escalation dynamics and deterrence work in cyberspace ? What role does the private sector play ? In this volume, leading scholars and practitioners explore these and other vital questions about the strategic uses of offensive cyber operations. The contributions to this groundbreaking volume address the key technical, political, psychological, and legal dimensions of the fast-changing strategic landscape.
Call Number: 355.4 /02037
ISBN: 9780815735472
Publication Date: 2018
Cyber : la guerre permanente by Gergorin, Jean-Louis
Fake news, scandale Facebook-Cambridge Analytica, virus WannaCry : de la propagande djihadiste a l'ingerence electorale et de la manipulation ciblee a la cyber-attaque tous azimuts, le nouveau conflit mondial a commence. Il a pour champ de bataille virtuel Internet. Il change la donne politique, bouleverse l'ordre geopolitique, multiplie les capacites et les formes d'agression. Il abolit la distinction entre la guerre et la paix, la securite et la liberte, les oligarchies et la democratie. De Moscou a Washington, en passant par Tel Aviv, Teheran, Londres ou Paris, mais aussi des laboratoires secrets de la Silicon Valley aux agences de renseignement du Vieux-Continent, voici, enfin revelee, la vraie face cachee de la globalisation numerique. Devoilant les acteurs, les episodes et les dessous des cartes de cette lutte planetaire, decryptant l'etat des forces et des enjeux, des risques et des menaces, dessinant les scenarios de demain, ce livre nous place face a l'urgence de rompre avec l'ignorance ou la passivite.
Call Number: 355.4 /02029
ISBN: 9782204110853
Publication Date: 2018
La cyberdefense : politique de l'espace numerique by Taillat, Stephane, ed.
Rapports de forces, cyberattaques sur les infrastructures, hacking, espionnage, fake news, le cyberspace est devenu en quelques decennies un champ privilegie des relations internationales ou cooperent et s'affrontent anciens et nouveaux acteurs de la conflictualite, etatiques et non-etatiques, publics et prives, civils et militaires. Les enjeux sont considerables car la plupart des activites humaines dependent aujourd'hui de l'interconnexion des systemes de traitement de l'information permise par les reseaux numeriques. Or, les menaces associees a la digitalisation de la societe ont profondement transforme la maniere de concevoir les conflits contemporains. Elles ont conduit les Etats et les principaux acteurs de la securite a repenser leurs politiques, leurs architectures et leurs strategies de defense sur la scene internationale. Ce domaine doit etre apprehende de maniere globale, au croisement des approches politiques et geopolitiques, strategiques et juridiques, economiques, techniques et sociotechniques. Cet ouvrage presente de maniere concise et accessible l'ensemble des connaissances disponibles aujourd'hui sur le sujet de la cyberdefense et de la gestion de crise dans l'espace numerique.
Call Number: 355.4 /02028
ISBN: 9782200621292
Publication Date: 2018
Countering Terrorist Activities in Cyberspace by Minchev, Zlatogor, ed.
Proceedings of the NATO Advanced Training Course on Countering ISIS Radicalization Activities through Cyberspace in the Region of South-East Europe (CIRACRESEE) Ohrid, Republic of Macedonia, 3-7 April 2017.
No single nation, culture or religion can achieve peace and security at home while ignoring the terrorist threats posed to others globally. This book presents lectures and a keynote speech delivered as part of the NATO Advanced Training Course (ATC) Countering ISIS Radicalisation in the Region of South-East Europe (CIRACRESEE), held in Ohrid, Republic of Macedonia, in April 2017. The main objective of the five-day ATC was to provide participants from the integrated security sector with information and knowledge about global trends with regard to the uses of cyberspace by ISIS, as well as accentuating the importance of the resulting social and technological challenges. An in-depth analysis of how these trends are influencing the region was also performed. The course topic was addressed from strategic/political, legal and technical perspectives, and participants were engaged in creating future regional policy proposals to counter ISIS use of cyberspace by engaging political, strategic, legal and technical components. The 12 selected lectures presented here provide readers with a comprehensive analysis from a socio-cultural, organizational and technological perspective.
ISBN: 9781614998471
Publication Date: 2018
Cyber Security : Power and Technology by Lehto, Martti, ed.
This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.
ISBN: 9783319753072
Publication Date: 2018
Hacking the Bomb : Cyber Threats and Nuclear Weapons by Futter, Andrew
Are nuclear arsenals safe from cyber attack ? We may be standing at the edge of a major technological challenge to global nuclear order. The increasing sophistication of hacking and cyber weapons, information warfare capabilities, and other dynamics of the cyber age are challenging the management, safeguards, and warning systems for nuclear weapons. Every nuclear power is currently modernizing its nuclear command, control, and communications (NC3) capabilities, but there is a danger that in upgrading computer systems and making NC3 more networked, states may inadvertently also make their nuclear arsenals more vulnerable to breaches, interference, or even unintended use. In addition to implications for NC3, this new age also affects nuclear strategy, escalation dynamics in crisis management, and the ability to safeguard nuclear secrets. The author cuts through the hype surrounding these challenges and provides a framework through which to understand and proactively address the implications of this emerging cyber-nuclear nexus.
Call Number: 623/1285
ISBN: 9781626165649
Publication Date: 2018
Cyber Mercenaries by Maurer, Tim
This book explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.
Call Number: 343 /00110
ISBN: 9781107127609
Publication Date: 2018
Encyclopedia of Cyber Warfare by Springer, Paul J., ed.
This volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States.
Call Number: 355.4 /01997 REF
ISBN: 9781440844249
Publication Date: 2017
New Solutions for Cybersecurity by Shrobe, Howard E., ed.
Ongoing cyberattacks, hacks, data breaches, and privacy concerns demonstrate vividly the inadequacy of existing methods of cybersecurity and the need to develop new and better ones. This book brings together experts from across MIT to explore recent advances in cybersecurity from management, technical, and sociological perspectives. Leading researchers discuss such varied topics as a systems perspective on managing risk, the development of inherently secure hardware, and the Dark Web. The contributors suggest approaches that range from the market-driven to the theoretical, describe problems that arise in a decentralized, IoT world, and reimagine what optimal systems architecture and effective management might look like.
Call Number: 681 /00838
ISBN: 9780262535373
Publication Date: 2017
The Darkening Web : The War for Cyberspace by Klimburg, Alexander
No single invention of the last half century has changed the way we live now as much as the Internet. The author was a member of the generation for whom it was a utopian ideal turned reality : a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn't so bright any more : increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity in order to further their national interests. The author explains why we underestimate the consequences of states' ambitions to project power in cyberspace at our peril : Not only have hacking and cyber operations fundamentally changed the nature of political conflict - ensnaring states in a struggle to maintain a precarious peace that could rapidly collapse into all-out war - but the rise of covert influencing and information warfare has enabled these same global powers to create and disseminate their own distorted versions of reality in which anything is possible. At stake are not only our personal data or the electrical grid, but the Internet as we know it today - and with it the very existence of open and democratic societies. Blending anecdote with argument, the author brings us face-to-face with the range of threats the struggle for cyberspace presents, from an apocalyptic scenario of debilitated civilian infrastructure to a 1984-like erosion of privacy and freedom of expression. Focusing on different approaches to cyber-conflict in the US, Russia and China, he reveals the extent to which the battle for control of the Internet is as complex and perilous as the one surrounding nuclear weapons during the Cold War - and quite possibly as dangerous for humanity as a whole.
Call Number: 681 /00837
ISBN: 9781594206665
Publication Date: 2017
NATO Joint Air Power and Offensive Cyber Operations by MacKenzie, Paul J.
Joint Air Power Competence Centre (DE)
In this White Paper, JAPCC looks back at the evolution of Cyberspace within NATO, from the initial use of IT/CIS for basic digital communications needs, through to the declaration of Cyberspace as a Domain of operations. Lessons learned from key events as well as research papers are cited in an assessment that asserts offensive Cyberspace operations and effects are required to have the most effective Cyberspace posture, suggests how they might be applied in Joint Air Power scenarios, and offers that structural models already exist for how this capability might be incorporated into the NATO organization and processes.
Publication Date: 2017
Cybersecurity of Nuclear Weapons Systems : Threats, Vulnerabilities and Consequences by Lewis, Patricia
Royal Institute of International Affairs (GB)
The reliance on digital technologies in modern weapons systems - particularly in nuclear weapons systems - has led to growing concerns that cyberattacks may pose additional risks at a time of escalating conflict, which could undermine the confidence needed to make reliable decisions. These risks raise significant doubts as to the reliability and integrity of nuclear weapons systems in a time of crisis, regarding the ability to: a) launch a weapon; b) prevent an inadvertent launch; c) maintain command and control of all military systems; d) transmit information and other communications; and e) the maintenance and reliability of such systems. This paper focuses on cybersecurity and cyber vulnerabilities and argues that the digitization of systems and the use of emerging technologies - while providing several benefits - increase the vulnerabilities to cyberattacks in nuclear weapons systems.
ISBN: 9781784132552
Publication Date: 2017
Optimizing Cyberdeterrence : A Comprehensive Strategy for Preventing Foreign Cyberattacks by Mandel, Robert
Cyberattacks are among the greatest fears for both governments and the private sector. The attacks come without warning and can be extremely costly and embarrassing. The author offers a unique and comprehensive strategic vision for how governments, in partnership with the private sector, can deter cyberattacks from both nonstate and state actors. Cyberdeterrence must be different from conventional military or nuclear deterrence, which are mainly based on dissuading an attack by forcing the aggressor to face unacceptable costs. In the cyber realm, where attributing a specific attack to a specific actor is extremely difficult, conventional deterrence principles are not enough. The author says that cyberdeterrence must alter a potential attacker's decision calculus by not only raising costs for the attacker but also by limiting the prospects for gain. Cyberdeterrence must also involve public-private partnerships, cross-domain responses must be considered, not just retaliation in kind. The book includes twelve twenty-first century cyberattack case studies in order to draw insights into cyberdeterrence and determine the conditions under which it works most effectively. The author concludes by making recommendations for implementing cyberdeterrence and integrating it into broader national security policy.
Call Number: 355.4 /01998
ISBN: 9781626164123
Publication Date: 2017
Understanding Cyber Conflict : Fourteen Analogies by Perkovich, George, ed.
Analogies help us think, learn, and communicate. The fourteen case studies in this volume help readers make sense of contemporary cyber conflict through historical analogies to past military-technological problems. The chapters are divided into three groups. The first - What Are Cyber Weapons Like ? - examines the characteristics of cyber capabilities and how their use for intelligence gathering, signaling, and precision strike compares with earlier technologies for such missions. The second section - What Might Cyber Wars Be Like ? - explores how lessons from several wars since the early 19th century, including the World Wars, could apply or not apply to cyber conflict in the 21st century. The final section - What Is Preventing and/or Managing Cyber Conflict Like ? - offers lessons from 19th and 20th century cases of managing threatening actors and technologies.
Call Number: 355.4 /01991
ISBN: 9781626164970
Publication Date: 2017
Ethics and Policies for Cyber Operations : A NATO Cooperative Cyber Defence Centre of Excellence Initiative by Taddeo, Mariarosaria, ed.
NATO Cooperative Cyber Defence Centre of Excellence (EE)
This book presents 12 essays that focus on the analysis of the problems prompted by cyber operations. It clarifies and discusses the ethical and regulatory problems raised by the deployment of cyber capabilities by a state’s army to inflict disruption or damage to an adversary’s targets in or through cyberspace. The essays cover such topics as the conceptual novelty of cyber operations and the ethical problems that this engenders; the applicability of existing conceptual and regulatory frameworks to cyber operations deployed in case of conflicts; the definition of deterrence strategies involving cyber operations; and the analysis of models to foster cooperation in managing cyber crises. The volume endorses a multi-disciplinary approach, as such it offers a comprehensive overview of the ethical, legal, and policy problems posed by cyber operations and of the different approaches and methods that can be used to solve them.
ISBN: 9783319453002
Publication Date: 2017
Cybernetics, Warfare and Discourse : The Cybernetisation of Warfare in Britain by Tsirigotis, Anthimos Alexandros
This book critiques mainstream beliefs about cyberwarfare and forges a new path in the way of defining this largely misunderstood concept. Rather than outlining cyberspace as a new technology applied in military operations, here, the author rallies against this technocentric account and establishes how cyberspace, first and foremost, should be categorized as a new way to understand war and military power in the Information Age. Using genre analysis and Corpus Linguistics, the author scrutinizes how cyberspace has changed the way the UK comprehends war and military power, and how the cybernetisation of war has manifested itself in Britain's approach to national defense and security.
ISBN: 9783319508474
Publication Date: 2017
Cyber Dragon : Inside China's Information Warfare and Cyber Operations by Cheng, Dean
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the 'what' but also addressing the 'why' behind China's focus on establishing information dominance as a key component of its military efforts.
ISBN: 9781440835650
Publication Date: 2017
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations by Schmitt, Michael N., ed.
Prepared by the International Groups of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence.
transparent This book expands on the highly influential first edition by extending its coverage of the international law governing cyber warfare to peacetime legal regimes. The product of a four-year follow-on project by a new group of 19 renowned international law experts, it addresses such topics as sovereignty, state responsibility, human rights, and the law of air, space, and the sea. The book identifies 154 'black letter' rules governing cyber operations and provides extensive commentary on each rule. Although the book represents the views of the experts in their personal capacity, the project benefitted from the unofficial input of many states and over 50 peer reviewers.
Call Number: 341.3 /00232
ISBN: 9781316630372
Publication Date: 2017
NATO Cyberspace Capability : A Strategic and Operational Evolution by Caton, Jeffrey L., 1960-
US Army War College. Strategic Studies Institute (US)
The development of cyberspace defense capabilities for the North Atlantic Treaty Organization (NATO) has been making steady progress since its formal introduction at the North Atlantic Council Prague Summit in 2002. Bolstered by numerous cyber attacks, such as those in Estonia (2007), Alliance priorities were formalized in subsequent NATO cyber defense policies adopted in 2008, 2011, and 2014. This monograph examines the past and current state of cyberspace defense efforts in NATO to assess the appropriateness and sufficiency to address anticipated threats to member countries, including the United States. The analysis focuses on the recent history of cyberspace defense efforts in NATO and how changes in strategy and policy of NATO writ large embrace the emerging nature of cyberspace for military forces as well as other elements of power. It first examines the recent evolution of strategic foundations of NATO cyber activities, policies, and governance as they evolved over the past 13 years. Next, it outlines the major NATO cyber defense mission areas, which include NATO network protection, shared situational awareness in cyberspace, critical infrastructure protection, counter-terrorism, support to member country cyber capability development, and response to crises related to cyberspace. Finally, it discusses several key issues for the new Enhanced Cyber Defence Policy that affirms the role that NATO cyber defense contributes to the mission of collective defense and embraces the notion that a cyber attack may lead to the invocation of Article 5 actions for the Alliance. This monograph concludes with a summary of the main findings from the discussion of NATO cyberspace capabilities and a brief examination of the implications for Department of Defense and Army forces in Europe. Topics include the roles and evolution of doctrine, deterrence, training, and exercise programs, cooperation with industry, and legal standards.
ISBN: 1584877286
Publication Date: 2016
Binary Bullets : The Ethics of Cyberwarfare by Allhoff, Fritz, ed.
Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war - the realization of conflict in the cyber-realm, the so-called 'fifth domain' of warfare. Does an aggressive act in the cyber-realm constitute an act of war ? If so, what rules should govern such warfare? Are the standard theories of just war capable of analyzing and assessing this mode of conflict ? These changing circumstances present us with a series of questions demanding serious attention. Is there such a thing as cyberwarfare ? How do the existing rules of engagement and theories from the just war tradition apply to cyberwarfare ? How should we assess a cyber-attack conducted by a state agency against private enterprise and vice versa ? Furthermore, how should actors behave in the cyber-realm ? Are there ethical norms that can be applied to the cyber-realm ? Are the classic just war constraints of non-combatant immunity and proportionality possible in this realm ? Especially given the idea that events that are constrained within the cyber-realm do not directly physically harm anyone, what do traditional ethics of war conventions say about this new space ? These questions strike at the very center of contemporary intellectual discussion over the ethics of war.
ISBN: 9780190221096
Publication Date: 2016
Conflict in Cyber Space : Theoretical, Strategic and Legal Perspectives by Friis, Karsten, 1968- , ed.
Adopting a multidisciplinary perspective, this book explores the key challenges associated with the proliferation of cyber capabilities. Over the past two decades, a new man-made domain of conflict has materialized. Alongside armed conflict in the domains of land, sea, air, and space, hostilities between different types of political actors are now taking place in cyberspace. This volume addresses the challenges posed by cyberspace hostility from theoretical, political, strategic and legal perspectives. In doing so, and in contrast to current literature, cyber-security is analysed through a multidimensional lens, as opposed to being treated solely as a military or criminal issues, for example. The individual chapters map out the different scholarly and political positions associated with various key aspects of cyber conflict and seek to answer the following questions : do existing theories provide sufficient answers to the current challenges posed by conflict in cyberspace, and, if not, could alternative approaches be developed ?; how do states and non-state actors make use of cyber-weapons when pursuing strategic and political aims ?; and, how does the advent of conflict in cyberspace challenge our established legal framework ? By asking important strategic questions on the theoretical, strategic, ethical and legal implications and challenges of the proliferation of cyber warfare capabilities, the book seeks to stimulate research into an area that has hitherto been neglected.
ISBN: 9781317365426
Publication Date: 2016
Information Warfare by Ventre, Daniel
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of 'information war', covering its development over the last two decades and seeks to answer the following questions : is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits ?
ISBN: 9781848216600
Publication Date: 2016
International Cyber Norms : Legal, Policy & Industry Perspectives by Osula, Anna-Maria, ed.
NATO Cooperative Cyber Defence Centre of Excellence (EE)
Recent cyber security related discussions in international forums indicate ‘cyber norms’ or cyber ‘norms of behaviour’ as the most suitable vehicles for guiding states’ behaviour in cyberspace. However, despite being frequently addressed by policy-makers, academia, non-profit organisations and the private sector, it is often unclear what is meant by the very concept of a ‘norm’. Indeed, a closer look at different actors and venues reveals that various platforms promote different types of norms – for instance, of a legal, political, technical or moral nature – but it is often not evident (sometimes, it seems, even to the discussing parties) which types of norms are the focus of the debate. Inevitably, this lack of a common conceptualisation of a ‘cyber norm’ results in difficulties in reaching a consensus within the accompanying policy discourse. This book is a result of a series of workshops organised by the NATO CCD COE during 2014-2015. The aim of this collection of articles is to shed light on the different approaches to ‘cyber norms’ in various research domains. The articles outline how different disciplines define, prioritise and promote norms, and suggest approaches for developing cyber norms.
ISBN: 9789949954476
Publication Date: 2016
Cyberspace in Peace and War by Libicki, Martin C.
This book presents a comprehensive understanding of cybersecurity, cyberwar, and cyber terrorism. From basic concepts to advanced principles, the author examines the sources and consequences of system compromises, addresses how cybersecurity policies can strengthen countries defenses - leaving them less susceptible to cyberattack, and explores cybersecurity in the context of military operations, highlighting unique aspects of the digital battleground and strategic uses of cyberwar. He provides the technical and geopolitical foundations of cyberwar necessary to understand the policies, operations, and strategies required for safeguarding an increasingly online infrastructure.
Call Number: 355.4 /01994
ISBN: 9781682470329
Publication Date: 2016
Dark Territory : The Secret History of Cyber War by Kaplan, Fred M.
The author probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the 'information warfare squads of the military services, and the national security debates in the White House, to tell this never-before-told story of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning - and (more often than people know) fighting - these wars for decades. From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, the book chronicles, in fascinating detail, a little-known past that shines an unsettling light on our future.
Call Number: 355.4 /01987
ISBN: 9781501140839
Publication Date: 2016
The Cybersecurity Dilemma : Hacking, Trust, and Fear between Nations by Buchanan, Ben
Why do nations break into one another's most important computer networks ? There is an obvious answer : to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential component of cyber operations.
Call Number: 681 /00835
ISBN: 9781849047135
Publication Date: 2016
The Decision to Attack : Military and Intelligence Cyber Decision-Making by Brantly, Aaron Franklin
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. The author investigates here how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, he contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level.
Call Number: 355.4 /01961
ISBN: 9780820349206
Publication Date: 2016
China's Cyber Power by Inkster, Nigel
China's emergence as a major global power is reshaping the cyber domain. The country has the world's largest internet-user community, a growing economic footprint and increasingly capable military and intelligence services. Harnessing these assets, it is pursuing a patient, assertive foreign policy that seeks to determine how information and communications technologies are governed and deployed. This policy is likely to have significant normative impact, with potentially adverse implications for a global order that has been shaped by Western liberal democracies. And, even as China goes out into the world, there are signs that new technologies are becoming powerful tools for domestic social control and the suppression of dissent abroad. Western policymakers are struggling to meet this challenge. While there is much potential for good in a self-confident China that is willing to invest in the global commons, there is no guarantee that the country's growth and modernisation will lead inexorably to democratic political reform. This book examines the political, historical and cultural development of China's cyber power, in light of its evolving internet, intelligence structures, military capabilities and approach to global governance. As China attempts to gain the economic benefits that come with global connectivity while excluding information seen as a threat to stability, the West will be forced to adjust to a world in which its technological edge is fast eroding and can no longer be taken for granted.
Call Number: 355.5 /01960
ISBN: 9781138211162
Publication Date: 2016
Cybersecurity in the European Union : Resilience and Adaptability in Governance Policy by Christou, George
Securing cyberspace has become one of the most pressing security challenges of the twenty-first century, impacting as it does on the everyday activity of governments, businesses and citizens alike. The cyber world and its associated technologies have, on the one hand, created social, cultural, economic and political opportunities for all. On the other hand, its borderless nature has fostered threats in the form of cyber attacks and cybercrime. The European Union is not immune to such threats, and produced its first Cybersecurity Strategy in 2013 to address more comprehensively the challenges that it faces. Drawing on the concepts of resilience and security governance, this book offers a novel framework for understanding and assessing how far the EU has progressed in embedding the necessary conditions for a resilient and secure ecosystem to emerge in Europe and beyond. It asks how far the EU has facilitated movement to an effective culture of cybersecurity that will allow it to fulfil its own ambitions, promote its values, and exert its influence in a dynamic global order that is increasingly reliant on digital interoperability and connectivity.
Call Number: 623 /01249
ISBN: 9781137400512
Publication Date: 2016