ebook img

Shadow Warfare: Cyberwar Policy in the United States, Russia and China PDF

200 Pages·2021·2.29 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Shadow Warfare: Cyberwar Policy in the United States, Russia and China

Shadow Warfare Security and Professional Intelligence Education Series (SPIES) Series Editor: Jan Goldman In this post–September 11, 2001 era there has been rapid growth in the number of profes- sional intelligence training and educational programs across the United States and abroad. Colleges and universities, as well as high schools, are developing programs and courses in homeland security, intelligence analysis, and law enforcement, in support of national security. The Security and Professional Intelligence Education Series (SPIES) was first designed for individuals studying for careers in intelligence and to help improve the skills of those already in the profession; however, it was also developed to educate the public on how intelligence work is conducted and should be conducted in this important and vital profession. 1. Communicating with Intelligence: Writing and Briefing in the Intelligence and National Security Communities, by James S. Major. 2008. 2. A Spy’s Résumé: Confessions of a Maverick Intelligence Professional and Misadventure Capitalist, by Marc Anthony Viola. 2008. 3. An Introduction to Intelligence Research and Analysis, by Jerome Clauser, revised and edited by Jan Goldman. 2008. 4. Writing Classified and Unclassified Papers for National Security, by James S. Major. 2009. 5. Strategic Intelligence: A Handbook for Practitioners, Managers, and Users, revised edition by Don McDowell. 2009. 6. Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation, by David L. Perry. 2009. 7. Tokyo Rose / An American Patriot: A Dual Biography, by Frederick P. Close. 2010. 8. Ethics of Spying: A Reader for the Intelligence Professional, edited by Jan Goldman. 2006. 9. Ethics of Spying: A Reader for the Intelligence Professional, Volume 2, edited by Jan Goldman. 2010. 10. A Woman’s War: The Professional and Personal Journey of the Navy’s First African American Female Intelligence Officer, by Gail Harris. 2010. 11. Handbook of Scientific Methods of Inquiry for Intelligence Analysis, by Hank Prunckun. 2010. 12. Handbook of Warning Intelligence: Assessing the Threat to National Security, by Cynthia Grabo. 2010. 13. Keeping U.S. Intelligence Effective: The Need for a Revolution in Intelligence Affairs, by William J. Lahneman. 2011. 14. Words of Intelligence: An Intelligence Professional’s Lexicon for Domestic and Foreign Threats, Second Edition, by Jan Goldman. 2011. 15. Counterintelligence Theory and Practice, by Hank Prunckun. 2012. 16. Balancing Liberty and Security: An Ethical Study of U.S. Foreign Intelligence Surveillance, 2001–2009, by Michelle Louise Atkin. 2013. 17. The Art of Intelligence: Simulations, Exercises, and Games, edited by William J. Lahneman and Rubén Arcos. 2014. 18. Communicating with Intelligence: Writing and Briefing in National Security, by James S. Major. 2014. 19. Scientific Methods of Inquiry for Intelligence Analysis, Second Edition, by Hank Prunckun. 2014. 20. Quantitative Intelligence Analysis: Applied Analytic Models, Simulations and Games, by Edward Waltz. 2014. 21. The Handbook of Warning Intelligence: Assessing the Threat to National Security– The Complete Declassified Edition, by Cynthia Grabo. 2015. 22. Intelligence and Information Policy for National Security: Key Terms and Concepts, by Jan Goldman and Susan Maret. 2016. 23. Handbook of European Intelligence Cultures, edited by Bob de Graaff and James M. Nyce—with Chelsea Locke. 2016. 24. Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation, Second Edition, by David L. Perry. 2016. 25. Humanitarian Intelligence: A Practitioner’s Guide to Crisis Analysis and Project Design, by Andrej Zwitter. 2016. 26. Shattered Illusions: KGB Cold War Espionage in Canada, by Donald G. Mahar, 2016. 27. Intelligence Engineering: Operating Beyond the Conventional, by Adam D. M. Svendsen. 2017. 28. Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets, by Noel Hendrickson. 2018. 29. Counterintelligence Theory and Practice, Second edition, by Hank Prunckun. 2019. 30. Methods of Inquiry for Intelligence Analysis, Third Edition, by Hank Prunckun. 2019. 31. The Art of Intelligence: More Simulations, Exercises, and Games, edited by William J. Lahneman and Rubén Arcos. 2019. 32. Whistleblowers, Leakers, and Their Networks: From Snowden to Samizdat, by Jason Ross Arnold. 2019. 33. Weaponized Marketing, by Lisa Merriam and Milton Kotler. 2020. 34. Shadow Warfare: Cyberwar Policy in the United States, Russia, and China, by Elizabeth Van Wie Davis. 2021. Shadow Warfare Cyberwar Policy in the United States, Russia, and China Elizabeth Van Wie Davis ROWMAN & LITTLEFIELD Lanham • Boulder • New York • London Published by Rowman & Littlefield An imprint of The Rowman & Littlefield Publishing Group, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 www .rowman .com 6 Tinworth Street, London, SE11 5AL, United Kingdom Copyright © 2021 by Elizabeth Van Wie Davis All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without written permission from the publisher, except by a reviewer who may quote passages in a review. British Library Cataloguing in Publication Information Available Library of Congress Cataloging-in-Publication Data Available Names: Davis, Elizabeth Van Wie, author. Title: Shadow warfare : cyberwar policy in the United States, Russia, and China / Elizabeth Van Wie Davis. Description: Lanham : Rowman & Littlefield, [2021] | Series: Security and Professional Intelligence Education Series (SPIES) ; 34 | Includes bibliographical references and index. | Summary: “Examines cyberwarfare policy across three main geopolitical actors and develops an application and deterrence of cyberespionage”—Provided by publisher. Identifiers: LCCN 2020041366 (print) | LCCN 2020041367 (ebook) | ISBN 9781538149669 (cloth) | ISBN 9781538149676 (paperback) | ISBN 9781538149683 (epub) Subjects: LCSH: Cyberspace operations (Military science)—United States. | Computer security—Government policy—United States. | Cyberspace operations (Military science)—Russia (Federation) | Computer security—Government policy—Russia (Federation) | Cyberspace operations (Military science)—China. | Computer security—Government policy—China. Classification: LCC U167.5.C92 D38 2021 (print) | LCC U167.5.C92 (ebook) | DDC 355.4—dc23 LC record available at https://lccn.loc.gov/2020041366 LC ebook record available at https://lccn.loc.gov/2020041367 ∞ ™ The paper used in this publication meets the minimum requirements of American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials, ANSI/NISO Z39.48-1992. To Margaret Van Wie a talented chemist, an amazing scientist on the University of Chicago’s Manhattan Project, an officer in the US Navy, and a mother who worked with her generation of women to make the world more accessible for the next generations of women Contents Preface xi Acknowledgments xv 1 Shadow Warfare 1 A Permanent State of War 4 Not All Cyberattacks Are Cyberwarfare 9 Merging Warfare with Espionage and Allies with Adversaries 14 Policy Patterns 21 2 Cyber United States 25 Institutions and Individuals 27 Cyber Strategy 30 Cyberespionage 35 Cyberattacks 38 Controlling Cyberspace 43 Shadow Warfare Policy 47 3 Cyber Russia 51 Institutions and Individuals 53 Cyber Strategy 56 Cyberespionage 59 Cyberattacks 62 Controlling Cyberspace 71 Shadow Warfare Policy 75 4 Cyber China 79 Institutions and Individuals 81 Cyber Strategy 85 ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.