Bytes, Bombs, and Spies
eBook - ePub

Bytes, Bombs, and Spies

The Strategic Dimensions of Offensive Cyber Operations

  1. 416 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Bytes, Bombs, and Spies

The Strategic Dimensions of Offensive Cyber Operations

About this book

"We are dropping cyber bombs. We have never done that before."—U.S. Defense Department official
A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:
A computer virus is unleashed that destroys centrifuges in Iran, slowing that country's attempt to build a nuclear weapon.
ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack.
A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign.
Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy.
This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called "digital combat power" and how the United States should incorporate that power into its national security strategy.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Bytes, Bombs, and Spies by Herbert Lin,Amy Zegart, Herbert Lin, Amy Zegart in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & Arms Control. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dedication
  5. Contents
  6. List of Figures and Tables
  7. Acknowledgments
  8. 1. Introduction
  9. 2. Illuminating a New Domain: The Role and Nature of Military Intelligence, Surveillance, and Reconnaissance in Cyberspace
  10. 3. How Effects, Saliencies, and Norms Should Influence U.S. Cyberwar Doctrine
  11. 4. A Strategic Assessment of the U.S. Cyber Command Vision
  12. 5. A Cyber SIOP? Operational Considerations for Strategic Offensive Cyber Planning
  13. 6. Second Acts in Cyberspace
  14. 7. Hacking a Nation’s Missile Development Program
  15. 8. The Cartwright Conjecture: The Deterrent Value and Escalatory Risk of Fearsome Cyber Capabilities
  16. 9. The Cyber Commitment Problem and the Destabilization of Nuclear Deterrence
  17. 10. Cyber Terrorism: Its Effects on Psychological Well-Being, Public Confidence, and Political Attitudes
  18. 11. Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications
  19. 12. Rules of Engagement for Cyberspace Operations: A View from the United States
  20. 13. U.S. Offensive Cyber Operations in a China-U.S. Military Confrontation
  21. 14. Disintermediation, Counterinsurgency, and Cyber Defense
  22. 15. Private Sector Cyber Weapons: An Adequate Response to the Sovereignty Gap?
  23. 16. Cyberwar Inc.: Examining the Role of Companies in Offensive Cyber Operations
  24. Index
  25. Contributors