ebook img

Cyberwarfare: Information Operations in a Connected World PDF

778 Pages·2021·19.35 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Cyberwarfare: Information Operations in a Connected World

World Headquarters Jones & Bartlett Learning 25 Mall Road, Suite 600 Burlington, MA 01803 978-443-5000 [email protected] www.jblearning.com Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com. Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to [email protected]. Copyright © 2023 by Jones & Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. The content, statements, views, and opinions herein are the sole expression of the respective authors and not that of Jones & Bartlett Learning, LLC. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not constitute or imply its endorsement or recommendation by Jones & Bartlett Learning, LLC and such reference shall not be used for advertising or product endorsement purposes. All trademarks displayed are the trademarks of the parties noted herein. Cyberwarfare: Information Operations in a Connected World, Second Edition is an independent publication and has not been authorized, sponsored, or otherwise approved by the owners of the trademarks or service marks referenced in this product. There may be images in this book that feature models; these models do not necessarily endorse, represent, or participate in the activities represented in the images. Any screenshots in this product are for educational and instructive purposes only. Any individuals and scenarios featured in the case studies throughout this product may be real or fictitious but are used for instructional purposes only. 22831-1 Production Credits VP, Content Strategy and Implementation: Christine Emerton Director of Product Management: Laura Carney Product Manager: Ned Hinman Content Strategist: Melissa Duffy Content Coordinator: Mark Restuccia Project Manager: Kristen Rogers Senior Digital Project Specialist: Angela Dooley Director of Marketing: Andrea DeFronzo Marketing Manager: Suzy Balk Content Services Manager: Colleen Lamy VP, Manufacturing and Inventory Control: Therese Connell Product Fulfillment Manager: Wendy Kilborn Composition: Straive Project Management: Straive Cover Design: Briana Yates Media Development Editor: Faith Brosnan Rights & Permissions Manager: John Rusk Rights Specialist: James FortneyCover Image (Title Page, Part Opener, Chapter Opener): © Yurii Andreichyn/Shutterstock Printing and Binding: McNaughton & Gunn Library of Congress Cataloging-in-Publication Data Names: Chapple, Mike, 1975- author. | Seidl, David, author. Title: Cyberwarfare : information operations in a connected world / Mike Chapple, David Seidl. Description: Second edition. | Burlington, Massachusetts : Jones & Bartlett Learning, [2023] | Identifiers: LCCN 2021013019 | ISBN 9781284225440 (paperback) Subjects: LCSH: Cyberspace operations (Military science) | Information warfare. | Computer security. Classification: LCC U167.5.C92 C43 2023 | DDC 355.4/1–dc23 LC record available at https://lccn.loc.gov/2021013019 6048 Printed in the United States of America 25 24 23 22 21 10 9 8 7 6 5 4 3 2 1 Contents © Yurii Andreichyn/Shutterstock. Preface Acknowledgments About the Authors PART ONE The Cyberwarfare Landscape Chapter 1 Information as a Military Asset What Is Cyberwarfare? Likelihood of Cyberwar The Evolving Nature of War The Role of Information in Armed Conflict Ancient Warfare World Wars Cold War Iraq War and Weapons of Mass Destruction Domains of Warfare Exploring the Cyber Domain Offensive Information Operations Defensive Information Operations Information Operations Techniques Computer Network Attack Computer Network Defense Intelligence Gathering Electronic Warfare Psychological Operations Military Deception Operations Security Identification of Critical Information Threat Analysis Vulnerability Analysis Risk Assessment Countermeasure Implementation CHAPTER SUMMARY KEY CONCEPTS AND TERMS CHAPTER 1 ASSESSMENT Chapter 2 Targets and Combatants Traditional Military Targets Military Targets in Conventional Warfare Acceptable Targets, Treaties, and International Law Cyber Targets in Unconventional Warfare Targets in Asymmetric Cyberwarfare Total Cyberwarfare Cyberwarfare Targets Cyberwarfare Against Traditional Military Targets Iran Versus U.S. Drones Flame: Replacing Spies with Software The First U.S. Cyberwar Strike: Serbia and Kosovo Nontraditional Cyberwarfare Targets Political Activism and Hacktivism Industrial Espionage Military Cyberattacks on Nontraditional Targets Targets of Information Operations Combatants in Cyberwarfare Military Forces U.S. Cyber Command Guerrilla Cyberwarriors and Insurrectionists Individuals and Small Groups The Jester Comparing Traditional Warfare, Guerrilla Warfare, and Cyberwarfare How Cyberattack Differs from Traditional War The Element of Surprise Deniability CHAPTER SUMMARY KEY CONCEPTS AND TERMS CHAPTER 2 ASSESSMENT Chapter 3 Cyberwarfare, Law, and Ethics Kinetic Warfare International Law and Kinetic Warfare Legal Review and Legality of Actions Cyberwarfare Law Cyberwarfare in a Kinetic Warfare Context Kinetic Warfare Law in a Cyber Context The Tallinn Manual Sovereignty, Jurisdiction, and Control Sovereignty Jurisdiction Control Responsibility Mercenaries The Use of Force Measuring Force Threats of Force Self-Defense International Governmental Organizations Civilians and Infrastructure Civilians and Military Use of the Internet Prohibited Targets: Children, Journalists, Medical and Religious Personnel, and Nature The Conduct of Attacks and Indiscriminate Means Espionage, Treachery, and Ruses Neutrality Ethics and Cyberwarfare CHAPTER SUMMARY KEY CONCEPTS AND TERMS CHAPTER 3 ASSESSMENT Chapter 4 Intelligence Operations in a Connected World Intelligence Operations The Intelligence Cycle Planning and Direction Collection Processing and Exploitation Analysis and Production Dissemination Intelligence Disciplines Human Intelligence (HUMINT) Signals Intelligence (SIGINT) Open Source Intelligence (OSINT) Geospatial Intelligence (GEOINT) Measurement and Signature Intelligence (MASINT) Intelligence Support to Cyberwarfare Supporting Offensive Cyberwarfare Supporting Defensive Cyberwarfare Case Studies: Media Reporting on Intelligence Activities Echelon Telephone Metadata Data Center Eavesdropping Follow the Money Quantum CHAPTER SUMMARY KEY CONCEPTS AND TERMS CHAPTER 4 ASSESSMENT PART TWO Offensive and Defensive Cyberwarfare Chapter 5 The Evolving Threat: From Script Kiddies to Advanced Attackers The Changing Threat Model Historical Hacking Modern Hacking Opportunistic Attacks Semi-Targeted Attacks Inside the Advanced Persistent Threat Characteristics of the APT APT Motivations Military/Political Cybercrime and Corporate Espionage Activism APT Tradecraft Zero-Day Attacks Malware Social Engineering and Phishing Strategic Web Compromises The Cyber Kill Chain® Reconnaissance Weaponize Deliver Exploit Install Command and Control Act on Objectives CHAPTER SUMMARY KEY CONCEPTS AND TERMS CHAPTER 5 ASSESSMENT Chapter 6 Social Engineering and Cyberwarfare Humans: The Weak Link Social Engineering Influence as a Weapon Reciprocity Commitment and Consistency Social Proof Authority Liking Scarcity Tools of the Social Engineer Pretexting

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.