Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
128 result(s) for "Cyberspace operations (Military science)"
Sort by:
Understanding cyber conflict : 14 analogies
Analogies help us think, learn, and communicate. The fourteen case studies in this volume help readers make sense of contemporary cyber conflict through historical analogies to past military-technological problems. The chapters are divided into three groups. The first--What Are Cyber Weapons Like?--examines the characteristics of cyber capabilities and how their use for intelligence gathering, signaling, and precision strike compares with earlier technologies for such missions. The second section--What Might Cyber Wars Be Like?--explores how lessons from several wars since the early 19th century, including the World Wars, could apply or not apply to cyber conflict in the 21st century. The final section--What Is Preventing and/or Managing Cyber Conflict Like?--offers lessons from 19th and 20th century cases of managing threatening actors and technologies.
Cyber Warfare
Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation. This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare. The title's nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the U.S. is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare.
Strategic A2/AD in cyberspace
\"The Information Age of the twenty-first century is distinguished by the proliferation of networks of power that transmit information in a variety of forms and have the effect of defining and decentralizing power relationships. The instantaneous transmission of information through vast geographic space has made possible our current global economic system, as well as the operations of modern governments, militaries, and social organizations. Their capabilities hinge on the accessibility of cyberspace to all participants. To be absent from these networks of information is to be absent from power.\"--Provided by publisher.
Cyber strategy : the evolving character of power and coercion
This book examines how states integrate cyber capabilities with other instruments of power to achieve foreign policy outcomes. Given North Korea’s use of cyber intrusions to threaten the international community and extort funds for its elites, Chinese espionage and the theft of government records through the Office of Personal Management (OPM) hack, and the Russian hack on the 2016 US election, this book is a timely contribution to debates about power and influence in the 21st century. Its goal is to understand how states apply cyber means to achieve political ends, a topic speculated and imagined, but investigated with very little analytical rigor. Following on Valeriano and Maness’s (2015) book, Cyber War versus Cyber Realities: Cyber Conflict in the International System, this new study explores how states apply cyber strategies, using empirical evidence and key theoretical insights largely missed by the academic and strategy community. It investigates cyber strategies in their integrated and isolated contexts, demonstrating that they are useful to managing escalation and sending ambiguous signals, but generally they fail to achieve coercive effect.
Cyberspace in peace and war
\"Cyberspace in Peace and War presents a comprehensive understanding of cybersecurity, cyberwar, and cyber terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses how cybersecurity policies can strengthen countries defenses--leaving them less susceptible to cyberattack, and explores cybersecurity in the context of military operations, highlighting unique aspects of the digital battleground and strategic uses of cyberwar. He provides the technical and geopolitical foundations of cyberwar necessary to understand the policies, operations, and strategies required for safeguarding an increasingly online infrastructure.\"--Provided by publisher.
False Mirrors: The Weaponization of Social Media in Russia’s Operation to Annex Crimea
In his timely study, Andrii Demartino investigates the multitude of techniques how social media can be used to advance an aggressive foreign policy, as exemplified by the Russian Federation’s operation to annex Crimea in 2014. Drawing on a wide range of sources, Demartino traces the implementation of a series of Russian measures to create channels and organisations manipulating public opinion in the Ukrainian segment of the internet and on platforms such as Facebook, VKontakte, Odnoklassniki, LiveJournal, and Twitter. Addressing the pertinent question of how much the operation to annex Crimea was either improvised or planned, he draws attention to Russia’s ad-hoc actions in the sphere of social media in 2014. Based on an in-depth analysis of the methods of Russia’s influence operations, the book proposes a number of counterstrategies to prevent such “active measures.” These propositions can serve to improve Ukraine’s national information policy as well as help to develop adequate security concepts of other states.
False Mirrors
In his timely study, Andrii Demartino investigates the multitude of techniques how social media can be used to advance an aggressive foreign policy, as exemplified by the Russian Federations operation to annex Crimea in 2014.
Deterring cyber warfare : bolstering strategic stability in cyberspace
Deterrence theory was well developed during the Cold War for the deterrence of kinetic attacks. While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study offers an introduction to cyber warfare and a review of the challenges associated with deterring cyber attacks. Mazanec and Thayer recommend efforts in three specific areas to aid the deterrence of major cyber attacks: by cultivating beneficial norms for strategic stability; by continuing efforts in the area of improving cyber forensics and defences; and, finally, by developing and communicating a clear declaratory policy and credible options for deterrence-in-kind so as to make escalation unavoidable and costly. This timely study reflects increased international interest in cyber warfare, and is based on the recognition that information networks in cyberspace are becoming operational centres of gravity in armed conflict.