front cover of China’s Evolving Approach to “Integrated Strategic Deterrence”
China’s Evolving Approach to “Integrated Strategic Deterrence”
Michael S. Chase
RAND Corporation, 2016
Drawing on Chinese military writings, this report finds that China’s strategic-deterrence concepts are evolving in response to Beijing’s changing assessment of its external security environment and a growing emphasis on protecting its emerging interests in space and cyberspace. China also is rapidly closing what was once a substantial gap between the People’s Liberation Army’s strategic weapons capabilities and its strategic-deterrence concepts.
[more]

front cover of Cyberwar and Revolution
Cyberwar and Revolution
Digital Subterfuge in Global Capitalism
Nick Dyer-Witheford
University of Minnesota Press, 2019

Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet


Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences. 

Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks.

Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.

[more]

front cover of Cyberwars in the Middle East
Cyberwars in the Middle East
Ahmed Al-Rawi
Rutgers University Press, 2021
Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz’s structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other.

On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists’ political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.
 
[more]

front cover of Electronic Warfare Pocket Guide
Electronic Warfare Pocket Guide
David L. Adamy
The Institution of Engineering and Technology, 2011
The Electronic Warfare Pocket Guide is the perfect companion for any user that needs to access key definitions, concepts, and equations for their work in the field, lab, or even in military theater of operations. While this concise guide fits in almost any pocket, it packs a real punch by providing users the answers to real world electronic warfare problems that come up every day in concept development, technique development, system design, system testing, operational testing, mission planning and operations. It is especially useful (if combined with training) for members of the military who are in combat and need to use EW techniques to counter missile-strikes, improvised explosive devices, and other threats. This booklet could usefully go into the pocket of every pilot, sailor, soldier and marine.
[more]

logo for Georgetown University Press
Hacking the Bomb
Cyber Threats and Nuclear Weapons
Andrew Futter
Georgetown University Press

Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? These are among the many pressing security questions addressed in Andrew Futter’s ground-breaking study of the cyber threat to nuclear weapons.

Hacking the Bomb provides the first ever comprehensive assessment of this worrying and little-understood strategic development, and it explains how myriad new cyber challenges will impact the way that the world thinks about and manages the ultimate weapon. The book cuts through the hype surrounding the cyber phenomenon and provides a framework through which to understand and proactively address the implications of the emerging cyber-nuclear nexus. It does this by tracing the cyber challenge right across the nuclear weapons enterprise, explains the important differences between types of cyber threats, and unpacks how cyber capabilities will impact strategic thinking, nuclear balances, deterrence thinking, and crisis management. The book makes the case for restraint in the cyber realm when it comes to nuclear weapons given the considerable risks of commingling weapons of mass disruption with weapons of mass destruction, and argues against establishing a dangerous norm of “hacking the bomb.”

This timely book provides a starting point for an essential discussion about the challenges associated with the cyber-nuclear nexus, and will be of great interest to scholars and students of security studies as well as defense practitioners and policy makers.

[more]

front cover of The Other Quiet Professionals
The Other Quiet Professionals
Lessons for Future Cyber Forces from the Evolution of Special Forces
Christopher Paul
RAND Corporation, 2014
With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.
[more]

logo for Georgetown University Press
Russian Cyber Operations
Coding the Boundaries of Conflict
Scott Jasper
Georgetown University Press, 2023

Russia has deployed cyber operations to interfere in foreign elections, launch disinformation campaigns, and cripple neighboring states—all while maintaining a thin veneer of deniability and avoiding strikes that cross the line into acts of war. How should a targeted nation respond? In Russian Cyber Operations, Scott Jasper dives into the legal and technical maneuvers of Russian cyber strategies, proposing that nations develop solutions for resilience to withstand future attacks.

Jasper examines the place of cyber operations within Russia’s asymmetric arsenal and its use of hybrid and information warfare, considering examples from French and US presidential elections and the 2017 NotPetya mock ransomware attack, among others. A new preface to the paperback edition puts events since 2020 into context. Jasper shows that the international effort to counter these operations through sanctions and indictments has done little to alter Moscow’s behavior. Jasper instead proposes that nations use data correlation technologies in an integrated security platform to establish a more resilient defense.

Russian Cyber Operations provides a critical framework for determining whether Russian cyber campaigns and incidents rise to the level of armed conflict or operate at a lower level as a component of competition. Jasper’s work offers the national security community a robust plan of action critical to effectively mounting a durable defense against Russian cyber campaigns.

[more]

front cover of Russian Social Media Influence
Russian Social Media Influence
Understanding Russian Propaganda in Eastern Europe
Todd C. Helmus
RAND Corporation, 2018
Russia employs a sophisticated social media campaign against former Soviet states that includes news tweets, nonattributed comments on web pages, troll and bot social media accounts, and fake hashtag and Twitter campaigns. Nowhere is this threat more tangible than in Ukraine. Researchers analyzed social media data and conducted interviews with regional and security experts to understand the critical ingredients to countering this campaign.
[more]

logo for Georgetown University Press
The Russian Understanding of War
Blurring the Lines between War and Peace
Oscar Jonsson
Georgetown University Press, 2019

This book analyzes the evolution of Russian military thought and how Russia's current thinking about war is reflected in recent crises. While other books describe current Russian practice, Oscar Jonsson provides the long view to show how Russian military strategic thinking has developed from the Bolshevik Revolution to the present. He closely examines Russian primary sources including security doctrines and the writings and statements of Russian military theorists and political elites. What Jonsson reveals is that Russia's conception of the very nature of war is now changing, as Russian elites see information warfare and political subversion as the most important ways to conduct contemporary war. Since information warfare and political subversion are below the traditional threshold of armed violence, this has blurred the boundaries between war and peace. Jonsson also finds that Russian leaders have, particularly since 2011/12, considered themselves to be at war with the United States and its allies, albeit with non-violent means. This book provides much needed context and analysis to be able to understand recent Russian interventions in Crimea and eastern Ukraine, how to deter Russia on the eastern borders of NATO, and how the West must also learn to avoid inadvertent escalation.

[more]


Send via email Share on Facebook Share on Twitter