Russian cyber operations: coding the boundaries of conflict
"Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines th...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Washington, DC
Georgetown University Press
[2020]
|
Schlagworte: | |
Zusammenfassung: | "Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"-- |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xvi, 214 Seiten Karten, Diagramme 24 cm |
ISBN: | 9781626167971 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046787357 | ||
003 | DE-604 | ||
005 | 20210118 | ||
007 | t | ||
008 | 200701s2020 |||| |||| 00||| eng d | ||
020 | |a 9781626167971 |9 978-1-62616-797-1 | ||
035 | |a (OCoLC)1220914866 | ||
035 | |a (DE-599)BVBBV046787357 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-706 |a DE-188 | ||
082 | 0 | |a 355.41 | |
084 | |a OST |q DE-12 |2 fid | ||
100 | 1 | |a Jasper, Scott |e Verfasser |0 (DE-588)138215022 |4 aut | |
245 | 1 | 0 | |a Russian cyber operations |b coding the boundaries of conflict |c Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.) |
264 | 1 | |a Washington, DC |b Georgetown University Press |c [2020] | |
300 | |a xvi, 214 Seiten |b Karten, Diagramme |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
505 | 8 | |a Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion | |
520 | 3 | |a "Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"-- | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
651 | 7 | |a Russland |0 (DE-588)4076899-5 |2 gnd |9 rswk-swf | |
653 | 0 | |a Cyberspace operations (Military science) / Russia (Federation) | |
653 | 0 | |a Information warfare / Russia (Federation) | |
653 | 0 | |a Hybrid warfare / Russia (Federation) | |
653 | 0 | |a Asymmetric warfare / Russia (Federation) | |
653 | 0 | |a Cyber intelligence (Computer security) / United States | |
653 | 0 | |a Computer security / United States | |
653 | 0 | |a Asymmetric warfare | |
653 | 0 | |a Computer security | |
653 | 0 | |a Cyber intelligence (Computer security) | |
653 | 0 | |a Cyberspace operations (Military science) | |
653 | 0 | |a Hybrid warfare | |
653 | 0 | |a Information warfare | |
653 | 2 | |a Russia (Federation) | |
653 | 2 | |a United States | |
689 | 0 | 0 | |a Russland |0 (DE-588)4076899-5 |D g |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Alexander, Keith |d 1951- |0 (DE-588)1221539418 |4 wpr | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-62616-799-5 |
940 | 1 | |n oe | |
940 | 1 | |q BSB_NED_20201012 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032196379 |
Datensatz im Suchindex
_version_ | 1804181574032293888 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Jasper, Scott |
author_GND | (DE-588)138215022 (DE-588)1221539418 |
author_facet | Jasper, Scott |
author_role | aut |
author_sort | Jasper, Scott |
author_variant | s j sj |
building | Verbundindex |
bvnumber | BV046787357 |
contents | Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion |
ctrlnum | (OCoLC)1220914866 (DE-599)BVBBV046787357 |
dewey-full | 355.41 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.41 |
dewey-search | 355.41 |
dewey-sort | 3355.41 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
discipline_str_mv | Militärwissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03651nam a2200589 c 4500</leader><controlfield tag="001">BV046787357</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210118 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200701s2020 |||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781626167971</subfield><subfield code="9">978-1-62616-797-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1220914866</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046787357</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.41</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">OST</subfield><subfield code="q">DE-12</subfield><subfield code="2">fid</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jasper, Scott</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)138215022</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Russian cyber operations</subfield><subfield code="b">coding the boundaries of conflict</subfield><subfield code="c">Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, DC</subfield><subfield code="b">Georgetown University Press</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 214 Seiten</subfield><subfield code="b">Karten, Diagramme</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Russland</subfield><subfield code="0">(DE-588)4076899-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science) / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information warfare / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hybrid warfare / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Asymmetric warfare / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security) / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Asymmetric warfare</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hybrid warfare</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">United States</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Russland</subfield><subfield code="0">(DE-588)4076899-5</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alexander, Keith</subfield><subfield code="d">1951-</subfield><subfield code="0">(DE-588)1221539418</subfield><subfield code="4">wpr</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-62616-799-5</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="n">oe</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">BSB_NED_20201012</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032196379</subfield></datafield></record></collection> |
geographic | Russland (DE-588)4076899-5 gnd |
geographic_facet | Russland |
id | DE-604.BV046787357 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:51:59Z |
indexdate | 2024-07-10T08:53:49Z |
institution | BVB |
isbn | 9781626167971 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032196379 |
oclc_num | 1220914866 |
open_access_boolean | |
owner | DE-12 DE-706 DE-188 |
owner_facet | DE-12 DE-706 DE-188 |
physical | xvi, 214 Seiten Karten, Diagramme 24 cm |
psigel | BSB_NED_20201012 |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Georgetown University Press |
record_format | marc |
spelling | Jasper, Scott Verfasser (DE-588)138215022 aut Russian cyber operations coding the boundaries of conflict Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.) Washington, DC Georgetown University Press [2020] xvi, 214 Seiten Karten, Diagramme 24 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion "Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"-- Information warfare (DE-588)4461975-3 gnd rswk-swf Russland (DE-588)4076899-5 gnd rswk-swf Cyberspace operations (Military science) / Russia (Federation) Information warfare / Russia (Federation) Hybrid warfare / Russia (Federation) Asymmetric warfare / Russia (Federation) Cyber intelligence (Computer security) / United States Computer security / United States Asymmetric warfare Computer security Cyber intelligence (Computer security) Cyberspace operations (Military science) Hybrid warfare Information warfare Russia (Federation) United States Russland (DE-588)4076899-5 g Information warfare (DE-588)4461975-3 s DE-604 Alexander, Keith 1951- (DE-588)1221539418 wpr Erscheint auch als Online-Ausgabe 978-1-62616-799-5 |
spellingShingle | Jasper, Scott Russian cyber operations coding the boundaries of conflict Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4076899-5 |
title | Russian cyber operations coding the boundaries of conflict |
title_auth | Russian cyber operations coding the boundaries of conflict |
title_exact_search | Russian cyber operations coding the boundaries of conflict |
title_exact_search_txtP | Russian cyber operations coding the boundaries of conflict |
title_full | Russian cyber operations coding the boundaries of conflict Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.) |
title_fullStr | Russian cyber operations coding the boundaries of conflict Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.) |
title_full_unstemmed | Russian cyber operations coding the boundaries of conflict Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.) |
title_short | Russian cyber operations |
title_sort | russian cyber operations coding the boundaries of conflict |
title_sub | coding the boundaries of conflict |
topic | Information warfare (DE-588)4461975-3 gnd |
topic_facet | Information warfare Russland |
work_keys_str_mv | AT jasperscott russiancyberoperationscodingtheboundariesofconflict AT alexanderkeith russiancyberoperationscodingtheboundariesofconflict |