Cover image for Conflict and cooperation in cyberspace : the challenge to national security
Title:
Conflict and cooperation in cyberspace : the challenge to national security
Physical Description:
xxviii, 332 pages: illustrations; 24 cm.
ISBN:
9781466592018

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010343220 U163 C66 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world. Maintaining a focus on policy-relevant solutions, it offers a well-reasoned study of how to prepare for war, while attempting to keep the peace in the cyberspace domain.

The discussion begins with thoughtful contributions concerning the attributes and importance of cyberspace to the American way of life and global prosperity. Examining the truths and myths behind recent headline-grabbing malicious cyber activity, the book spells out the challenges involved with establishing a robust system of monitoring, controls, and sanctions to ensure cooperation amongst all stakeholders. The desire is to create a domain that functions as a trusted and resilient environment that fosters cooperation, collaboration, and commerce. Additionally, the book:

Delves into the intricacies and considerations cyber strategists must contemplate before engaging in cyber war Offers a framework for determining the best ways to engage other nations in promoting global norms of behavior Illustrates technologies that can enable cyber arms control agreements Dispels myths surrounding Stuxnet and industrial control systems

General Michael V. Hayden, former director of the National Security Agency and the Central Intelligence Agency, begins by explaining why the policymakers, particularly those working on cyber issues, must come to understand the policy implications of a dynamic domain. Expert contributors from the Air Force Research Institute, MIT, the Rand Corporation, Naval Postgraduate School, NSA, USAF, USMC, and others examine the challenges involved with ensuring improved cyber security.

Outlining the larger ethical, legal, and policy challenges facing government, the private sector, civil society, and individual users, the book offers plausible solutions on how to create an environment where there is confidence in the ability to assure national security, conduct military operations, and ensure a vibrant and stable global economy.


Author Notes

Panayotis "Pano" A. Yannakogeorgos is a research professor of Cyber Policy and Global Affairs at the Air Force Research Institute. His expertise includes the intersection of cyberspace, national security, and military operations; cyber international relations; cyber arms control; violent non-state actors; and Eastern Mediterranean studies. He has recently authored articles and chapters including "Internet Governance and National Security" (Strategic Studies Quarterly), "Challenges in Monitoring Cyber Arms Control (Journal of Information Warfare and Terrorism), "Pitfalls of the Private-Public Partnership Model" in Crime and Terrorism Risk: Studies in Criminology and Criminal Justice (Routledge, New York), and "Cyberspace: The New Frontier and the Same Old Multilateralism" in Global Norms: American Sponsorship and the Emerging Pattern of World Politics (Palgrave Macmillan, New York). He has also published in The Atlantic , The National Interest , and The Diplomat .

Prior to his current position, Yannakogeorgos taught graduate-level courses on globalization, security, and intelligence at Rutgers University's Division of Global Affairs (Newark, New Jersey), where he also served as senior program coordinator, and led the Center for the Study of Emergent Threats in the 21st Century. He has participated in the work of global cybersecurity bodies including the High Level Experts Group of the Global Cybersecurity Agenda of the International Telecommunications Union. In 2006 he served as an advisor within the United Nations Security Council on issues related to nuclear nonproliferation, the Middle East (including Iran), Al-Qaida, and Internet misuse. He holds a PhD and MS in global affairs from Rutgers University, and an ALB in philosophy from Harvard University (Cambridge, Massachusetts).

Adam Lowther (BA, Arizona State University; MA, Arizona State University; PhD, University of Alabama) is a research professor at the Air Force Research Institute (AFRI), Maxwell Air Force Base (Montgomery, Alabama). His principal research interests include deterrence, nuclear weapons policy, airpower diplomacy, and terrorism.

Lowther is the editor of Deterrence: Rising Powers, Rogue Regimes, and Terrorism in the Twenty-First Century (Palgrave Macmillan, New York), co-editor of Terrorism's Unanswered Questions (Praeger Security International, Westport, Connecticut), and the author of Americans and Asymmetric Conflict: Lebanon, Somalia, and Afghanistan. He has published in the New York Times, Boston Globe, Joint Forces Quarterly, Strategic Studies Quarterly , and elsewhere.

Prior to joining AFRI, Lowther was an assistant professor of Political Science at Arkansas Tech University and Columbus State University. Early in his career Lowther served in the US Navy aboard the USS Ramage (DDG-61). He also spent time at CINCUSNAVEUR-London and with NMCB-17.


Table of Contents

Michael V. HaydenLynn MatticeFred Taylor, Jr. and Jerry CarterMartin C. LibickiRandall R. DipertPanayotis A. Yannakogeorgos and Adam B. LowtherNeil C. Rowe and Simson L. Garfinkel and Robert Beverly and Panayotis A. YannakogeorgosKamal Jabbour and Sarah MuccioEric P. OliverJames D. FielderGeorge R. Lucas, Jr.Charles J. Dunlap, Jr.Roger HurwitzJan Kallberg and Rosemary A. BurkStephen K. GourleySunghyun Kim
Forewordp. ix
Acknowledgmentsp. xiii
Introductionp. xv
Editorsp. xxv
Contributorsp. xxvii
Part I Key Considerations
Chapter 1 The Future of Things Cyberp. 3
Chapter 2 Taming the "21st Century's Wild Westö of Cyberspace?p. 9
Chapter 3 Cyberspace Superiority Considerationsp. 13
Chapter 4 Two, Maybe Three Cheers for Ambiguityp. 27
Chapter 5 The Essential Features of an Ontology for Cyberwarfarep. 35
Chapter 6 The Prospects for Cyber Deterrence: American Sponsorship of Global Normsp. 49
Part II Technology
Chapter 7 Challenges in Monitoring Cyberarms Compliancep. 81
Chapter 8 Digital Policy Management: A Foundation for Tomorrow: National Security Agency (NSA), Enterprise Services Division, Identity and Access Management Branchp. 101
Chapter 9 On Mission Assurancep. 107
Chapter 10 Stuxnet: A Case Study in Cyber Warfarep. 127
Chapter 11 The Internet and Dissent in Authoritarian Statesp. 161
Part III Ethics, Law, and Policy
Chapter 12 Can there be an Ethical Cyber War?p. 195
Chapter 13 Perspectives for Cyberstrategists on Cyberlaw for Cyberwarp. 211
Chapter 14 A New Normal? The Cultivation of Global Norms as Part of a Cybersecurity Strategyp. 233
Chapter 15 Cyberdefense as Environmental Protection-The Broader Potential Impact of Failed Defensive Counter Cyber Operationsp. 265
Chapter 16 Cyber Sovereigntyp. 277
Chapter 17 American Cybersecurity Triad: Governmentwide Integration, Technological Counterintelligence, and Educational Mobilizationp. 291
Indexp. 311