Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010343220 | U163 C66 2014 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world. Maintaining a focus on policy-relevant solutions, it offers a well-reasoned study of how to prepare for war, while attempting to keep the peace in the cyberspace domain.
The discussion begins with thoughtful contributions concerning the attributes and importance of cyberspace to the American way of life and global prosperity. Examining the truths and myths behind recent headline-grabbing malicious cyber activity, the book spells out the challenges involved with establishing a robust system of monitoring, controls, and sanctions to ensure cooperation amongst all stakeholders. The desire is to create a domain that functions as a trusted and resilient environment that fosters cooperation, collaboration, and commerce. Additionally, the book:
General Michael V. Hayden, former director of the National Security Agency and the Central Intelligence Agency, begins by explaining why the policymakers, particularly those working on cyber issues, must come to understand the policy implications of a dynamic domain. Expert contributors from the Air Force Research Institute, MIT, the Rand Corporation, Naval Postgraduate School, NSA, USAF, USMC, and others examine the challenges involved with ensuring improved cyber security.
Outlining the larger ethical, legal, and policy challenges facing government, the private sector, civil society, and individual users, the book offers plausible solutions on how to create an environment where there is confidence in the ability to assure national security, conduct military operations, and ensure a vibrant and stable global economy.
Author Notes
Panayotis "Pano" A. Yannakogeorgos is a research professor of Cyber Policy and Global Affairs at the Air Force Research Institute. His expertise includes the intersection of cyberspace, national security, and military operations; cyber international relations; cyber arms control; violent non-state actors; and Eastern Mediterranean studies. He has recently authored articles and chapters including "Internet Governance and National Security" (Strategic Studies Quarterly), "Challenges in Monitoring Cyber Arms Control (Journal of Information Warfare and Terrorism), "Pitfalls of the Private-Public Partnership Model" in Crime and Terrorism Risk: Studies in Criminology and Criminal Justice (Routledge, New York), and "Cyberspace: The New Frontier and the Same Old Multilateralism" in Global Norms: American Sponsorship and the Emerging Pattern of World Politics (Palgrave Macmillan, New York). He has also published in The Atlantic , The National Interest , and The Diplomat .
Prior to his current position, Yannakogeorgos taught graduate-level courses on globalization, security, and intelligence at Rutgers University's Division of Global Affairs (Newark, New Jersey), where he also served as senior program coordinator, and led the Center for the Study of Emergent Threats in the 21st Century. He has participated in the work of global cybersecurity bodies including the High Level Experts Group of the Global Cybersecurity Agenda of the International Telecommunications Union. In 2006 he served as an advisor within the United Nations Security Council on issues related to nuclear nonproliferation, the Middle East (including Iran), Al-Qaida, and Internet misuse. He holds a PhD and MS in global affairs from Rutgers University, and an ALB in philosophy from Harvard University (Cambridge, Massachusetts).
Adam Lowther (BA, Arizona State University; MA, Arizona State University; PhD, University of Alabama) is a research professor at the Air Force Research Institute (AFRI), Maxwell Air Force Base (Montgomery, Alabama). His principal research interests include deterrence, nuclear weapons policy, airpower diplomacy, and terrorism.
Lowther is the editor of Deterrence: Rising Powers, Rogue Regimes, and Terrorism in the Twenty-First Century (Palgrave Macmillan, New York), co-editor of Terrorism's Unanswered Questions (Praeger Security International, Westport, Connecticut), and the author of Americans and Asymmetric Conflict: Lebanon, Somalia, and Afghanistan. He has published in the New York Times, Boston Globe, Joint Forces Quarterly, Strategic Studies Quarterly , and elsewhere.
Prior to joining AFRI, Lowther was an assistant professor of Political Science at Arkansas Tech University and Columbus State University. Early in his career Lowther served in the US Navy aboard the USS Ramage (DDG-61). He also spent time at CINCUSNAVEUR-London and with NMCB-17.
Table of Contents
Foreword | p. ix |
Acknowledgments | p. xiii |
Introduction | p. xv |
Editors | p. xxv |
Contributors | p. xxvii |
Part I Key Considerations | |
Chapter 1 The Future of Things Cyber | p. 3 |
Chapter 2 Taming the "21st Century's Wild Westö of Cyberspace? | p. 9 |
Chapter 3 Cyberspace Superiority Considerations | p. 13 |
Chapter 4 Two, Maybe Three Cheers for Ambiguity | p. 27 |
Chapter 5 The Essential Features of an Ontology for Cyberwarfare | p. 35 |
Chapter 6 The Prospects for Cyber Deterrence: American Sponsorship of Global Norms | p. 49 |
Part II Technology | |
Chapter 7 Challenges in Monitoring Cyberarms Compliance | p. 81 |
Chapter 8 Digital Policy Management: A Foundation for Tomorrow: National Security Agency (NSA), Enterprise Services Division, Identity and Access Management Branch | p. 101 |
Chapter 9 On Mission Assurance | p. 107 |
Chapter 10 Stuxnet: A Case Study in Cyber Warfare | p. 127 |
Chapter 11 The Internet and Dissent in Authoritarian States | p. 161 |
Part III Ethics, Law, and Policy | |
Chapter 12 Can there be an Ethical Cyber War? | p. 195 |
Chapter 13 Perspectives for Cyberstrategists on Cyberlaw for Cyberwar | p. 211 |
Chapter 14 A New Normal? The Cultivation of Global Norms as Part of a Cybersecurity Strategy | p. 233 |
Chapter 15 Cyberdefense as Environmental Protection-The Broader Potential Impact of Failed Defensive Counter Cyber Operations | p. 265 |
Chapter 16 Cyber Sovereignty | p. 277 |
Chapter 17 American Cybersecurity Triad: Governmentwide Integration, Technological Counterintelligence, and Educational Mobilization | p. 291 |
Index | p. 311 |