Preface |
|
vii | |
|
|
1 | (32) |
|
A World at War with Itself |
|
|
1 | (2) |
|
|
3 | (2) |
|
The History of the Internet |
|
|
5 | (5) |
|
Unfettered Growth and Challenges |
|
|
10 | (2) |
|
Information Technology versus Operational Technology |
|
|
12 | (2) |
|
|
14 | (2) |
|
The Internet of Things (loT) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (2) |
|
The Next-Generation Internet (IPv6) |
|
|
20 | (2) |
|
|
22 | (2) |
|
Overview of the Attack Matrix |
|
|
24 | (9) |
|
|
33 | (32) |
|
|
33 | (3) |
|
|
36 | (2) |
|
|
38 | (5) |
|
Attackers, Facilitators, Defenders, and Targets |
|
|
43 | (1) |
|
|
44 | (3) |
|
|
47 | (2) |
|
Advanced Persistent Threat (APT) |
|
|
49 | (5) |
|
|
54 | (4) |
|
The Lexicon of Cyber Conflict |
|
|
58 | (7) |
|
3 Global Cyber Risk and Access Vectors |
|
|
65 | (28) |
|
The Globalization Process |
|
|
65 | (5) |
|
Motives and Sources of Attack |
|
|
70 | (2) |
|
Policy Lagging Technology |
|
|
72 | (3) |
|
The "Sordid Boon" of Social Media |
|
|
75 | (4) |
|
Algorithms, Software, Audience Mapping, and Targeted Messaging |
|
|
79 | (4) |
|
"Swarmcasting"---Terrorists, Protesters, and Hired Guns |
|
|
83 | (2) |
|
|
85 | (2) |
|
|
87 | (6) |
|
|
93 | (30) |
|
Market Ownership: Controlling the Rules and Physics of the Domain |
|
|
94 | (2) |
|
Nation-State Economic Espionage |
|
|
96 | (3) |
|
Ancient Traditions and Modern Realities |
|
|
99 | (1) |
|
"Win Victory before the First Battle" Abroad and at Home |
|
|
100 | (2) |
|
Organization and Missions |
|
|
102 | (3) |
|
Espionage for National Security and Economic Advantage---"Know Yourself, Know Your Enemy" |
|
|
105 | (3) |
|
Espionage for National Security and Military Advantage---"Kill with a Borrowed Sword" |
|
|
108 | (3) |
|
Information Control for Regime Stability |
|
|
111 | (1) |
|
The "Great Firewall" and the "Great Cannon"---the Cyber Janus |
|
|
111 | (2) |
|
PLA Reform and the Strategic Support Force |
|
|
113 | (2) |
|
Mutually Assured Deterrence |
|
|
115 | (1) |
|
U.S.-Chinese Positive Engagement: Dialogue for Cyber Stability |
|
|
116 | (1) |
|
Building toward a Cooperative Spirit |
|
|
116 | (1) |
|
|
117 | (2) |
|
|
119 | (4) |
|
|
123 | (32) |
|
|
123 | (4) |
|
"There Are No Absolute Rules of Conduct, Either in Peace or War"---Leon Trotsky |
|
|
127 | (3) |
|
|
130 | (3) |
|
|
133 | (4) |
|
|
137 | (5) |
|
|
142 | (6) |
|
|
148 | (7) |
|
6 Violent Extremist Organizations and Terrorism in the Cyber Domain |
|
|
155 | (20) |
|
|
156 | (1) |
|
A Spectrum of Cyber-Enabled Terrorist Operations |
|
|
156 | (3) |
|
Cyber-Enabled Recruitment and Radicalization |
|
|
159 | (1) |
|
Phases of Internet Radicalization |
|
|
159 | (5) |
|
Planning, Command, Control, and Communications |
|
|
164 | (2) |
|
|
166 | (2) |
|
Cyber Target: Industrial Control Systems |
|
|
168 | (1) |
|
|
169 | (1) |
|
A Hypothetical Case of Strategic Cyberterrorism |
|
|
170 | (2) |
|
|
172 | (3) |
|
7 Public-Private Partnerships |
|
|
175 | (16) |
|
The Information Society: An Emerging Societal Construct |
|
|
176 | (1) |
|
A Global Culture of Cyber Security for the Information Society |
|
|
177 | (5) |
|
World Summit on the Information Society and Internet Governance Forum |
|
|
182 | (3) |
|
The Perils of Private Ordering: Network Effects, Trust, and Community Harm |
|
|
185 | (2) |
|
|
187 | (4) |
|
|
191 | (24) |
|
|
191 | (4) |
|
|
195 | (1) |
|
|
196 | (3) |
|
|
199 | (3) |
|
|
202 | (3) |
|
Distributed Ledger Technology |
|
|
205 | (6) |
|
|
211 | (4) |
|
Appendix: Strategic Military Cyber Concepts |
|
|
215 | (44) |
|
Cyber Law and Policy, by Col. Gary Brown and Maj. Israel King |
|
|
216 | (22) |
|
North Korean Cyber, by Adam Albarado |
|
|
238 | (9) |
|
Normalizing Cyber Disruption as an Element of National Power, by Sam Kidd and Pano Yannakogeorgos |
|
|
247 | (4) |
|
ISR and Cyberspace, by Maj. Robert Johnson, Capt. Daniel Votipka, TSgt. Danielle Dye, Maj. Trevor Stutting, Capt. Jamie Blummer, Ms. Tiffany Harbour, Capt. Laura LeFevre, and Capt. Thomas Shew |
|
|
251 | (8) |
Abbreviations |
|
259 | (2) |
Index |
|
261 | (6) |
About the Authors |
|
267 | |