Bytes, Bombs, and Spies
The Strategic Dimensions of Offensive Cyber Operations- Editors:
- |
- Publisher:
- 2019
Summary
We are dropping cyber bombs. We have never done that before.U.S. Defense Department official
A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:
A computer virus is unleashed that destroys centrifuges in Iran, slowing that country’s attempt to build a nuclear weapon.
ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack.
A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign.
Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy.
This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called digital combat power and how the United States should incorporate that power into its national security strategy.
Keywords
Search publication
Bibliographic data
- Copyright year
- 2019
- ISBN-Print
- 978-0-8157-3547-2
- ISBN-Online
- 978-0-8157-3548-9
- Publisher
- Rowman & Littlefield, Lanham
- Language
- English
- Pages
- backcover1
- Product type
- Edited Book
Table of contents
- Table of Contents No access
- Figures and Tables No access
- Acknowledgments No access
- Introduction No access Pages 1 - 18
- Illuminating a New Domain: The Role and Nature of Military Intelligence, Surveillance, and Reconnaissance in Cyberspace No access Pages 19 - 44
- How Effects, Saliences, and Norms Should Influence U.S. Cyberwar Doctrine No access Pages 45 - 80
- A Strategic Assessment of the U.S. Cyber Command Vision No access Pages 81 - 104
- A Cyber SIOP? Operational Considerations for Strategic Offensive Cyber Planning No access Pages 105 - 132
- Second Acts in Cyberspace No access Pages 133 - 150
- Hacking a Nation's Missile Development Program No access Pages 151 - 172
- The Cartwright Conjecture: The Deterrent Value and Escalatory Risk of Fearsome Cyber Capabilities No access Pages 173 - 194
- The Cyber Commitment Problem and the Destablization of Nuclear Deterrence No access Pages 195 - 234
- Cyber Terrorism: Its Effects on Psychological Well-Being, Public Confidence, and Political Attitudes No access Pages 235 - 264
- Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications No access Pages 265 - 288
- Rules of Engagement for Cyberspace Operations: A View from the United States No access Pages 289 - 318
- U.S. Offensive Cyber Operations in a China-U.S. Military Confrontation No access Pages 319 - 342
- Disintermediation, Counterinsurgency, and Cyber Defense No access Pages 343 - 356
- Private Sector Cyber Weapons: An Adequate Response to the Sovereignty Gap? No access Pages 357 - 378
- Cyberwar Inc.: Examining the Role of Companies in Offensvie Cyber Operations No access Pages 379 - 400
- Index No access Pages 401 - 416
- Contributors No access Pages 417 - backcover1





