Shadow warfare: cyberwar policy in the United States, Russia, and China
"Examines cyberwarfare policy across three main geopolitical actors and develops an application and deterrence of cyberespionage"--
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Lanham ; Boulder ; New York ; London
Rowman & Littlefield
[2021]
|
Schriftenreihe: | Security and professional intelligence education series (SPIES)
34 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Register // Gemischte Register |
Zusammenfassung: | "Examines cyberwarfare policy across three main geopolitical actors and develops an application and deterrence of cyberespionage"-- |
Beschreibung: | xvi, 183 Seiten 24 cm |
ISBN: | 9781538149676 9781538149669 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV047194413 | ||
003 | DE-604 | ||
005 | 20220411 | ||
007 | t | ||
008 | 210315s2021 b||| 00||| eng d | ||
020 | |a 9781538149676 |c (pbk.) |9 978-1-5381-4967-6 | ||
020 | |a 9781538149669 |c (cloth) |9 978-1-5381-4966-9 | ||
035 | |a (OCoLC)1249680619 | ||
035 | |a (DE-599)BVBBV047194413 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-706 |a DE-188 |a DE-Re13 | ||
082 | 0 | |a 355.4 |2 23 | |
084 | |a OST |q DE-12 |2 fid | ||
100 | 1 | |a Davis, Elizabeth Van Wie |d 1958- |e Verfasser |0 (DE-588)171509730 |4 aut | |
245 | 1 | 0 | |a Shadow warfare |b cyberwar policy in the United States, Russia, and China |c Elizabeth Van Wie Davis |
264 | 1 | |a Lanham ; Boulder ; New York ; London |b Rowman & Littlefield |c [2021] | |
264 | 4 | |c 2021 | |
300 | |a xvi, 183 Seiten |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Security and professional intelligence education series (SPIES) |v 34 | |
505 | 8 | |a Shadow warfare -- Cyber United States -- Cyber Russia -- Cyber China -- Cyberwar policy | |
520 | 3 | |a "Examines cyberwarfare policy across three main geopolitical actors and develops an application and deterrence of cyberespionage"-- | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
651 | 7 | |a Russland |0 (DE-588)4076899-5 |2 gnd |9 rswk-swf | |
651 | 7 | |a China |0 (DE-588)4009937-4 |2 gnd |9 rswk-swf | |
653 | 0 | |a Cyberspace operations (Military science) / United States | |
653 | 0 | |a Computer security / Government policy / United States | |
653 | 0 | |a Cyberspace operations (Military science) / Russia (Federation) | |
653 | 0 | |a Computer security / Government policy / Russia (Federation) | |
653 | 0 | |a Cyberspace operations (Military science) / China | |
653 | 0 | |a Computer security / Government policy / China | |
653 | 0 | |a Computer security / Government policy | |
653 | 0 | |a Cyberspace operations (Military science) | |
653 | 2 | |a China | |
653 | 2 | |a Russia (Federation) | |
653 | 2 | |a United States | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Russland |0 (DE-588)4076899-5 |D g |
689 | 0 | 2 | |a China |0 (DE-588)4009937-4 |D g |
689 | 0 | 3 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-5381-4968-3 |
830 | 0 | |a Security and professional intelligence education series (SPIES) |v 34 |w (DE-604)BV041297803 |9 34 | |
856 | 4 | 2 | |m Digitalisierung BSB München - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032599544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung BSB München - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032599544&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Register // Gemischte Register |
940 | 1 | |n oe | |
940 | 1 | |q BSB_NED_20210623 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032599544 | ||
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 0905 |g 51 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 0905 |g 471 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 0905 |g 73 |
Datensatz im Suchindex
_version_ | 1804182295540662272 |
---|---|
adam_text | Contents Preface xi Acknowledgments xv 1 Shadow Warfare A Permanent State of War Not All Cyberattacks Are Cyberwarfare Merging Warfare with Espionage and Allies with Adversaries Policy Patterns 1 4 9 14 21 2 Cyber United States Institutions and Individuals Cyber Strategy Cyberespionage Cyberattacks Controlling Cyberspace Shadow Warfare Policy 25 27 30 35 38 43 47 3 Cyber Russia Institutions and Individuals Cyber Strategy Cyberespionage Cyberattacks Controlling Cyberspace Shadow Warfare Policy 51 53 56 59 62 71 75 4 Cyber China Institutions and Individuals Cyber Strategy 79 81 85 ix
x Contents 5 Cyberespionage Cyberattacks Controlling Cyberspace Shadow Warfare Policy 90 95 100 102 Cyberwar Policy Cyberattacks and Attackers The United States’ Policy Russia’s Policy China’s Policy Uncertain Circumstances and Divergent Policies 105 107 108 110 112 113 Notes 119 Bibliography 153 Index 177
Index 5G wireless systems, 81, 113 adversaries, xi, xii, 2, 4, 14-15, 21, 26, 28, 31-33, 38, 42-43, 51-52, 58-59, 96, 104, 108, 110, 112-13, 117 Afghanistan, country of, 4, 33, 108 Africa, 12, 34 Aggregated IQ, 20 air gap, 8 Alcoa Inc, 88 Alibaba, xiii, 94, 103 allies, xii, 2-4, 14-15, 21-22, 28, 32, 37, 51-52, 60, 68,107-8, 113, 117 America. See United States, country of American Samoa Election Office, 67 anonymous, 11,12; Africa, 12; Iran, 11 Ant Financial Services Group (AFSG), 94 Arab Spring, 11 Arab Youth Group, 12 An of War, xii-xiv, 2, 5, 103 Ashcroft, John, 36-37 asymmetric warfare, 57, 79, 87 Atoms for Peace, 107 Australia, country of, 22, 39, 96-97 Baidu, xiii, 103 Balkans, 34 Bangladesh, country of, 82 Baram, Gil, 29 Barclays, 10 Bay of Pigs, 35 Beijing Olympics, 83 Bērziņš, Jānis, 51 Bitcoin, 11 BlackEnergy, 43 Bluetooth, 67 bots, 20, 44, 56, 59-64, 69-70 Brazil, country of, 82 Brexit, 20-21, 56 Bronze Soldier of Tallinn, 4, 62. See also Estonia, country of; Tallinn Manual Budapest University of Technology and Economics, 18 Burchik, Mikhail, 56 Bush, George W. administration, 8-9, 30-31, 36,43,109 Cambridge Analytica, 20 Canada, country of, 39, 97, 112; 2012 cyberattack, 97 Castro, Fidel, 36 centrifuges, 4, 8-9, 22, 107 China, country of, 70-104; Academy of Military Sciences (AMS), 84; APTl/Unit 61398, 81, 89, 91-92, 97-99; APT3, 83; APT10, 83; 177
178 Central Internet Security and Information Leading Group, 81; Central Military Commission, 84-85, 87; China Telecom, 37, 92, 112; Commission for Science, Technology and Industry for National Defense, 82; Computer Network Emergency Response Technical Team/Coordination Centre, 82; Cybersecurity Law, 83, 100; Great Firewall of China, 82-83, 99; Ministry of Industry and Information Technology (МПТ), 81-82; Ministry of Public Security, 81-83; Ministry of State Security, 81, 83; National Defense University, 84; National Development and Reform Commission, 93; National People s Congress, 104; South China Sea, 22, 91; State Administration for Science, Technology and Industry for National Defense, 82; State Council, 81, 86, 93, 100; Strategic Support Force, 83-84, 89-90. See also GhostNet; Tibet Citibank, 19 Clapper, James, 35, 37 Clarke, Richard, 3 Clausewitz, Carl von, xii, xiv, 2, 6, 34, 48-49 Clinton, Bill, administration, 31, 36, 44, 101, 109 Clinton, Hillary, 39, 41, 65-66 closed-circuit television (CCTV) cameras, 94, 117 Cold War, xii, 2, 40-41, 51, 73, 86, 114 Comey, James, 36 Computer Emergency Response Team (CERT), 6, 29. See also United States, country of Confucianism, xii, 2 Cook, James, 48 covert implants, 38 COVID-19 pandemic, 93, 99, 109-11 CrashOverride, 65 Index Creemers, Rogier, 100 Crimea, 55, 64, 69, 71 criminal, 9-10, 12-13, 19, 29-30, 47, 54, 63, 75, 94-95, 100 cryptography, 18; Cryptofiler, 61 Cuban Missile Crisis, 36 Cutting Sword of Justice, 12 CyberBerkut, 12, 64-65, 68 Cyber Caliphate, 12 Cyber Conflict Studies Association, 5 cybercrime, 10, 13-14, 47,
49, 53, 73, 82-83, 106, 116 cyber defense, 6-7, 33-34, 49, 55, 68, 80-81, 103, 106 cyber offense, 7 cyber retaliation, 35, 39, 41 cyberterrorism, 9-10, 13-14, 42, 47 cyberweapons, 3, 5, 7, 14-16, 18, 21-24, 28-33, 35, 41, 44-45, 52, 57, 61, 65, 68, 73, 92, 98, 106, 108-10, 113, 115-18 “cyborgs”, 20 Czech Republic, country of, 41; 2017 cyberattack, 68 dams, 13-14, 107 Daoism, xii, 2 decryption, 39 defensive capabilities, 5 Dell, 10 Democratic National Committee (DNC), 34-35, 66, 68 Dempsey, Martin, 28, 34 deniability, 2-3, 7 Dipert, Randall, 48 disinformation, xii-xiv, 19-22, 33-34, 39, 47, 52-53, 55-59, 62, 65-66, 68-70, 72, 84, 99, 101, 106-7, 110, 112; military information support operations, 34; psychological operations (PSYOPs), 33 distributed denial of service (DDoD), 7, 84 doctrine, xii, 5-6, 25, 31, 34, 45, 51-52, 56-58, 71, 76, 79, 87-88
Index domestic laws, 3. See also China, country of; Russia, country of; United States, country of Dugin, Aleksander, xiii-xiv, 76 Duqu, 3, 16-19 Duterte, Rodrigo, 42 e-commerce, 9, 44, 71-72, 82, 87, 100 Egypt, 11 Eisenhower, Dwight, 107 electronic warfare, 6, 56, 87-88 Electrum, 65 email, 13-14, 20, 34-36, 56, 59, 62, 66-70, 89, 92, 96, 110 encryption, 16, 39, 61 energy, 3, 13, 39, 43, 53, 67-68, 98, 103, 114 Estonia, country of, 4, 22, 62, 113, 116; 2007 cyberattack, 4, 10, 54, 62. See also Bronze Soldier of Tallinn ethnic minorities, 90, 94-95. See also China, country of; Tibet; Uyghur European Union, 15, 56, 68 Facebook, xi, 1, 19-20, 37, 40, 60, 99 Federal Bureau of Investigation (FBI), 27, 55, 86. See also United States, country of FireEye, 86, 89, 91; iSight, 91; Mandiant, 89, 91 Five Eyes, 39 Flame, 3, 16-19, 61 footprint of cyberwar, 1, 7 Foreign Intelligence Surveillance Act (FISA), 36-37 France, country of; 2017 cyberattack, 62, 70 Freedom House, 83 FusionX, 16 Gauss (the malware), 18-19 Gauss, Johann Carl Friedrich, 18 Genie, 38 Georgia, country of, 22, 54, 71; 2008 cyberattack, 3, 54-55, 57, 62-63; 179 Ministry of Defense, 61; South Ossetia conflict, 3 Germany, country of, 3, 15, 62, 105; 2015 cyberattack, 15, 69; 2017 cyberattack, 62, 69-70; BfV, 69; BND, 15; Bundestag, 52, 69 GhostNet, 4, 90. See also China, country of Girard, René, xi-xii, 1, 48 Göde, Kurt, 18 Goldsmith, Jack, 37 Golos, 40 Gonzales, Alberto, 36 Google, xi, 1, 11, 37, 100 great powers, xiv, 2, 21-22, 35, 51, 90, 105, 108, 112-15, 117-18 grids, electric, 6, 13, 48, 59, 72, 96, 98-99, 107
Guccifer2.0, 12, 66 Gulf of Oman, 42 hackers, 9, 67 hacktivism, 9, 11-14, 21, 47, 106 HAVEX, 43 Hayden, Michael V., 16 Hewlett Packard, 68 Hezbollah, 4 “honeypot”, 17 Hong Kong, 92, 102 human rights, 40, 46 Hussein, Saddam, 8. See also Iraq, country of hybrid warfare, 3, 33, 43, 48, 55, 57, 63-64, 84, 89, 99, 117 India, country of, 22, 90, 107; 2017 cyberattack, 98 industrial controller, 5, 8 informationalization, 87 information operations, 6, 28, 33-34, 56-57, 88 information technology, 5, 52, 74, 81, 85 infrastructures, 5, 59, 74 Instagram, 19
180 International Atomic Energy Agency (IAEA), 114 Internet Corporation for Assigned Names and Numbers (ICANN), 23, 111, 115 Internet Expiorer, 15 internet of tilings, 81 Internet Research Agency (IRA), 55-56 Iran, country of, 1, 3, 11-12; Anonymous Iran, 11; Natanz nuclear enrichment facility, 4, 8-9 Iraq, country of, 8, 33 Islamic State (ISIS), 42-43 Israel, 4, 8-9, 16-17, 33, 43, 64, 108, 114, 117; 2006 Hezbollah war, 3; 2007 airstrike on Al Kibar reactor in Syria, 3; 2012 assaults on Iranian Ministry of Petroleum, 12, 17; Tel Aviv, 3; Unit 8200, Israeli cyber team, 8 Japan, country of, 42, 94 just war theory, xii, xiv, 48-49 Karber, Phillip, 58 Kaspersky Lab, 17-18, 61 Kazakhstan, country of, 63-64, 73, 82 Kennan, George, 34 Kim Jong-un, 10 kinetic conflict, 3-4, 7, 33, 41, 46-48, 57-58, 64, 71, 75, 87, 101-2, 104, 110, 113, 116 Kislyak, Sergey, 43 kompromat, xii-xiii, 76 Kyrgyzstan, country of, 62-64, 73 Lagrange, Joseph-Louis, 18 Latvia, country of, 51 Lavrov, Sergey, 43, 108 Lebanese banks, 19 Lewis, James A., 14 liberal democracies, 7, 21-22, 107,110, 112-14, 116-17 Lithuania, country of, 62-63 low-intensity conflict, 1-2, 107 Index Lulz Security (LulzSec), 11 Macron, Emmanuel, 54,70 Magharebia, 34 Malware Bytes, 10 Merkel, Angela, 15, 69-70 metadata, 36, 59-60 Microsoft, 16 Mills, Richard, 33 missile launches, 42 Mitrofanov, Alexei, 74 mobile networks, 6, 61, 87 mobile phones, 61, 98 Moonlight Maze, 61 Mueller, Robert: Report on Russian Interference in 2016 Presidential Election, 42, 66 Mugabe, Robert, 12. See also Zimbabwe Navalny, Aleksey, 60 Nazarbayev,
Nursultan, 64 Netherlands, the country of, 5; 2015 cyberattack, 62, 64; 2017 cyberattack, 70; Dutch General Intelligence and Security Service (AIVD), 54; Flight MH17, 64 NetTraveler, 96 New Zealand, country of, 39 North Atlantic Treaty Organization (NATO), 54, 61, 68-70, 105-6, 110, 115-16 North Korea (DPRK), 6, 10, 22, 29, 38, 42, 107, 114, 117; 2013 cyberattack on South Korean television station, 11; 2014 cyberattack on Sony Pictures regarding movie, The Interview, 10; 2014 cyberattack on British television network; 2017 WannaCiy ransomware attack, 11, 29. See also WannaCry ransomware attack; Reconnaissance General Bureau, 42 Norway, country of, 42; 2017 cyberattack, 70 Norwegian Helsinki Committee, 40
Index Novaya Gazeta, 60 nuclear, xi-xii, xiv, 2-3, 7, 10, 12, 15, 17, 26, 35, 41, 46^18, 50, 58, 73, 75,86, 89, 96, 107, 109, 111, 114-15; centrifuges, 4, 8-9, 22, 42; deterrence, 5; dirty bombs, 13; power plants, 6, 8, 13 Nuclear Non-Proliferation Treaty (NPT), 114 Obama, Barack, administration, 9, 30֊ 31,36, 38, 41—44, 96, 98, 109 Odnoklassniki, 59 offensive capabilities, 3, 28 Offensive Cyber Effects Operations (OCEO), 38 operating systems, 7, 44 Operation CHAOS, 36 Operation Olympic Games, 8-9, 15-16, 18,42 Pakistan, country of, 4, 8,107, 113; drone attacks, 4; Miram Shah, 4 Patriot Act, 36, 110 PayPal, 19 Peace of Westphalia, 106 People’s Republic of China. See China, country of permanent state of war, 4-9 PDF, 15 phishing, 7, 14, 55, 66-67, 70, 98 Podesta, John, 66 Poland, country of, 62, 68; 2017 cyberattack, 68 Portugal, countiy of, 11 Priestap, Bill, 86 Prigozhin, Evgeny, 55-56 privateers, xi, 12-13, 21, 25, 53, 55-56, 59, 63, 67, 84-85, 117 propaganda, 13, 19, 34, 43, 54-58, 60, 107 Project SHAMROCK, 36 public diplomacy, 39—40 Putin, Vladimir, xii-xiv, 2, 39, 41, 5253, 56, 59-60, 65-66, 69, 75-76, 105 181 Pyongyang, 10. See also North Korea (DPRK) reconnaissance, 6, 37, 40, 42, 55, 83, 87-88 RedHack, 11 Red October, 61 Resource 207, 17-18 Rubio, Marco, 66 rule-of-law, 13 Runet, 60 Russia, country of, 51-78; APT28/ Fancy Bear, 54, 64, 66, 68-70; APT29/Cozy Bear, 54, 68, 70; Bolotnaya Square, 39; Cyber Command, 55; Cyber Defense Center, 55; Defense Ministry, 77, 96; Federal Agency of Government Communications and Information, 52; Federal Security Service (FSB),
xiii, 54, 59, 72, 76, 83; KGB, xiii, 54, 59, 76; Main Intelligence Agency of General Staff of the Russian Armed Forces (GRU), 42, 54—55, 64-69; New Generation Warfare, 56-58; organized cybercrime, 19, 53-54; Roskomnadzor, 60, 72 Russian Business Network (RBN), 63 Russian Orthodox Church, xii-xiv, 2, 76-77 Sandworm, 65 Sanger, David, 8-9, 46 Saudi Arabia, country of, 12. See also Shamoon Saudi Aramco, 12 September 11, 2001, 36, 63, 110 Sesame Credit, 94 Shadow Brokers, 28, 61, 80 Shamoon, 2, 12 Shanghai Cooperation Organization (SCO), 73-74, 114 Sholokhov, Mikhail, 59 Singapore, country of, 94 Skype, 15, 110
182 Skywiper, 16. See also Flame Snowden, Edward, 15, 22, 28, 37, 61-62, 80, 109 SolarWorld AG, 86 Sony Pictures Entertainment, 10 South Africa’s Independent Media, 12 Southeast European Times, 34 South Korea (Republic of Korea), country of, 6, 11, 91, 96, 113 sovereignty-based cyberspace governance, 79, 82 Soviet Union (USSR), xii, 22-23, 53, 106. See also Russia, country of Sputnik media, 59, 66, 69-70, 110 Stellar Wind, 36-37 Strategic Arms Limitation Talks (SALT I), 106 Stuxnet, xii, 3^1, 7-9, 15, 17-19, 33, 49, 64 Sudan, country of, 82 Symantec, 12, 17 Syria, country of, 3-4, 7, 19, 43, 46, 57, 108; Syrian Civil War, 57 System of Operative-Investigative Measures (SORM), 59-60, 110 Taiwan, 22, 88-89, 102; Democratic Progressive Party s (DPP), 89 Tajikistan, country of, 73 Tallinn Manual, 116 Telegram, 71-72 Tencent, xiii, 93, 103 Terminal High-Altitude Air Defense (THAAD), 96 terrorism, 3, 9, 13-14, 28, 42, 47, 73, 83,91, 95, 110, 115. See also cyberterrorism theory, war, xii-xiv, 2, 48-49, 76, 87, 107, 114, 117 Thibeault, Joshua, 58 Tibet, 4, 90. See also GhostNet Tinder, 60 Trans-Siberian pipeline, 39 Travelex, 10 Index Tmmp, Donald, administration, 31-32, 37, 41-44, 46, 65-66, 98, 105, 109 Turkey, country of, 11, 61 Tumer, Stansfield, 37 Twitter, 11, 19, 21,40, 60, 99; Speak2Tweet, 11 Uber, xi, 1 Uganda, country of, 61 Ukraine, country of, 22, 58, 62, 64, 68-71; 2008 cyberattack, 54-55, 62; 2014 cyberattack, 55; 2015 cyberattack, 64-65; 2016 cyberattack, 65; Central Election Commission, 64; Kyiv, 46, 64-65 Umbrage, 38 Unit 8200, Israeli cyber team, 8. See also Israel
United Arab Emirates (UAE), country of, 94 United Kingdom, country of, 39, 70; Government Communications Headquarters (GCHQ), 39; House of Commons, 20; National Health Service (NHS) attacked, 11; Swansea University, 21; University of Edinburgh, 21. See also Brexit United Nations (UN), 73-74, 107, 115; Convention on the Law of the Sea, 105 United States, country of, 25-50; Air Force, 11, 28, 33, 48, 67; Central Intelligence Agency (CIA), 11, 16, 28-29, 35, 37-39, 66, 83; Command Vision, 30-31; Comprehensive National Cybersecurity Initiative (CNCI), 30; Computer Emergency Response Team (CERT), 29; Congress, 3, 8, 32, 36, 43, 110; Congressional Research Service, 40; Cyber Command, 6, 27-31, 42; Cyber Threat Intelligence Integration Center (СТПС), 27; Defense Advanced Research
Index Project Agency (DARPA), 27, 31, 33, 44; Defense Science Board Task Force on Cyber Deterrence, 32-33, 38; Department of Defense (DoD), 6-7, 27, 29, 31-32, 35, 37-39; Department of Energy, 98; Department of Homeland Security (DHS), 27, 29, 98; Department of Justice, 27, 36; Federal Bureau of Investigation (FBI), 27, 55, 86; Federal Communications Commission (FCC), 44-45; Federal Deposit Insurance Corporation, 92; Information Operations Center (IOC), 28; Joint Chiefs of Staff, 28; National Counterintelligence Executive, 15; National Science Foundation (NSF), 31; National Security Agency (NSA), 15-16, 22, 27-29, 36-37, 39, 61, 67, 79; National Security Strategy, 26, 3132; Office of National Intelligence, 27; Office of Personnel Management, 92; Office of Tailored Access Operations (TAO), 28; Pentagon, 27, 33; Plan X, 33, 44; Senate, 11, 35, 66, 86; State Department, 39-^10, 100; Supreme Court, 36; Task Force on Cyber Deterrence, 32-33, 35, 38 United States Steel Corporation, 86 Universal Declaration of Human Rights, 46 US. See United States, country of 183 USB, 8, 18 US 2016 presidential election, 41, 55-56 Uyghur, 90, 94-95, 102 Uzbekistan, country of, 73 Verizon, 10, 37 VKontakte, 59-60 WannaCry ransomware attack, 11, 29, 54, 80 Washington, George, 109 WeChat, 92-93, 99 Westinghouse Electric Company, 86 WiFi. See wireless WikiLeaks, 15, 61, 66 “wild”, 7, 9, 18, 29, 36 Winner, Reality Leigh, 67 wireless, 6, 16, 67, 81, 98 Woolsey, James, 37 World War I, 58 World War II, 36, 62, 65, 107 World Wide Web (www), 72 Xi Jinping, 81, 91, 96 Xinjiang, 95, 99. See also Uyghur
Yahoo, xi, 1 Yandex, 60 You Ji, 88 Zimbabwe, 12, 82. See also Mugabe, Robert Ґ------------------ v Bayerische Staatsbibliothek Mönchen J
|
adam_txt |
Contents Preface xi Acknowledgments xv 1 Shadow Warfare A Permanent State of War Not All Cyberattacks Are Cyberwarfare Merging Warfare with Espionage and Allies with Adversaries Policy Patterns 1 4 9 14 21 2 Cyber United States Institutions and Individuals Cyber Strategy Cyberespionage Cyberattacks Controlling Cyberspace Shadow Warfare Policy 25 27 30 35 38 43 47 3 Cyber Russia Institutions and Individuals Cyber Strategy Cyberespionage Cyberattacks Controlling Cyberspace Shadow Warfare Policy 51 53 56 59 62 71 75 4 Cyber China Institutions and Individuals Cyber Strategy 79 81 85 ix
x Contents 5 Cyberespionage Cyberattacks Controlling Cyberspace Shadow Warfare Policy 90 95 100 102 Cyberwar Policy Cyberattacks and Attackers The United States’ Policy Russia’s Policy China’s Policy Uncertain Circumstances and Divergent Policies 105 107 108 110 112 113 Notes 119 Bibliography 153 Index 177
Index 5G wireless systems, 81, 113 adversaries, xi, xii, 2, 4, 14-15, 21, 26, 28, 31-33, 38, 42-43, 51-52, 58-59, 96, 104, 108, 110, 112-13, 117 Afghanistan, country of, 4, 33, 108 Africa, 12, 34 Aggregated IQ, 20 air gap, 8 Alcoa Inc, 88 Alibaba, xiii, 94, 103 allies, xii, 2-4, 14-15, 21-22, 28, 32, 37, 51-52, 60, 68,107-8, 113, 117 America. See United States, country of American Samoa Election Office, 67 anonymous, 11,12; Africa, 12; Iran, 11 Ant Financial Services Group (AFSG), 94 Arab Spring, 11 Arab Youth Group, 12 An of War, xii-xiv, 2, 5, 103 Ashcroft, John, 36-37 asymmetric warfare, 57, 79, 87 Atoms for Peace, 107 Australia, country of, 22, 39, 96-97 Baidu, xiii, 103 Balkans, 34 Bangladesh, country of, 82 Baram, Gil, 29 Barclays, 10 Bay of Pigs, 35 Beijing Olympics, 83 Bērziņš, Jānis, 51 Bitcoin, 11 BlackEnergy, 43 Bluetooth, 67 bots, 20, 44, 56, 59-64, 69-70 Brazil, country of, 82 Brexit, 20-21, 56 Bronze Soldier of Tallinn, 4, 62. See also Estonia, country of; Tallinn Manual Budapest University of Technology and Economics, 18 Burchik, Mikhail, 56 Bush, George W. administration, 8-9, 30-31, 36,43,109 Cambridge Analytica, 20 Canada, country of, 39, 97, 112; 2012 cyberattack, 97 Castro, Fidel, 36 centrifuges, 4, 8-9, 22, 107 China, country of, 70-104; Academy of Military Sciences (AMS), 84; APTl/Unit 61398, 81, 89, 91-92, 97-99; APT3, 83; APT10, 83; 177
178 Central Internet Security and Information Leading Group, 81; Central Military Commission, 84-85, 87; China Telecom, 37, 92, 112; Commission for Science, Technology and Industry for National Defense, 82; Computer Network Emergency Response Technical Team/Coordination Centre, 82; Cybersecurity Law, 83, 100; Great Firewall of China, 82-83, 99; Ministry of Industry and Information Technology (МПТ), 81-82; Ministry of Public Security, 81-83; Ministry of State Security, 81, 83; National Defense University, 84; National Development and Reform Commission, 93; National People's Congress, 104; South China Sea, 22, 91; State Administration for Science, Technology and Industry for National Defense, 82; State Council, 81, 86, 93, 100; Strategic Support Force, 83-84, 89-90. See also GhostNet; Tibet Citibank, 19 Clapper, James, 35, 37 Clarke, Richard, 3 Clausewitz, Carl von, xii, xiv, 2, 6, 34, 48-49 Clinton, Bill, administration, 31, 36, 44, 101, 109 Clinton, Hillary, 39, 41, 65-66 closed-circuit television (CCTV) cameras, 94, 117 Cold War, xii, 2, 40-41, 51, 73, 86, 114 Comey, James, 36 Computer Emergency Response Team (CERT), 6, 29. See also United States, country of Confucianism, xii, 2 Cook, James, 48 covert implants, 38 COVID-19 pandemic, 93, 99, 109-11 CrashOverride, 65 Index Creemers, Rogier, 100 Crimea, 55, 64, 69, 71 criminal, 9-10, 12-13, 19, 29-30, 47, 54, 63, 75, 94-95, 100 cryptography, 18; Cryptofiler, 61 Cuban Missile Crisis, 36 Cutting Sword of Justice, 12 CyberBerkut, 12, 64-65, 68 Cyber Caliphate, 12 Cyber Conflict Studies Association, 5 cybercrime, 10, 13-14, 47,
49, 53, 73, 82-83, 106, 116 cyber defense, 6-7, 33-34, 49, 55, 68, 80-81, 103, 106 cyber offense, 7 cyber retaliation, 35, 39, 41 cyberterrorism, 9-10, 13-14, 42, 47 cyberweapons, 3, 5, 7, 14-16, 18, 21-24, 28-33, 35, 41, 44-45, 52, 57, 61, 65, 68, 73, 92, 98, 106, 108-10, 113, 115-18 “cyborgs”, 20 Czech Republic, country of, 41; 2017 cyberattack, 68 dams, 13-14, 107 Daoism, xii, 2 decryption, 39 defensive capabilities, 5 Dell, 10 Democratic National Committee (DNC), 34-35, 66, 68 Dempsey, Martin, 28, 34 deniability, 2-3, 7 Dipert, Randall, 48 disinformation, xii-xiv, 19-22, 33-34, 39, 47, 52-53, 55-59, 62, 65-66, 68-70, 72, 84, 99, 101, 106-7, 110, 112; military information support operations, 34; psychological operations (PSYOPs), 33 distributed denial of service (DDoD), 7, 84 doctrine, xii, 5-6, 25, 31, 34, 45, 51-52, 56-58, 71, 76, 79, 87-88
Index domestic laws, 3. See also China, country of; Russia, country of; United States, country of Dugin, Aleksander, xiii-xiv, 76 Duqu, 3, 16-19 Duterte, Rodrigo, 42 e-commerce, 9, 44, 71-72, 82, 87, 100 Egypt, 11 Eisenhower, Dwight, 107 electronic warfare, 6, 56, 87-88 Electrum, 65 email, 13-14, 20, 34-36, 56, 59, 62, 66-70, 89, 92, 96, 110 encryption, 16, 39, 61 energy, 3, 13, 39, 43, 53, 67-68, 98, 103, 114 Estonia, country of, 4, 22, 62, 113, 116; 2007 cyberattack, 4, 10, 54, 62. See also Bronze Soldier of Tallinn ethnic minorities, 90, 94-95. See also China, country of; Tibet; Uyghur European Union, 15, 56, 68 Facebook, xi, 1, 19-20, 37, 40, 60, 99 Federal Bureau of Investigation (FBI), 27, 55, 86. See also United States, country of FireEye, 86, 89, 91; iSight, 91; Mandiant, 89, 91 Five Eyes, 39 Flame, 3, 16-19, 61 footprint of cyberwar, 1, 7 Foreign Intelligence Surveillance Act (FISA), 36-37 France, country of; 2017 cyberattack, 62, 70 Freedom House, 83 FusionX, 16 Gauss (the malware), 18-19 Gauss, Johann Carl Friedrich, 18 Genie, 38 Georgia, country of, 22, 54, 71; 2008 cyberattack, 3, 54-55, 57, 62-63; 179 Ministry of Defense, 61; South Ossetia conflict, 3 Germany, country of, 3, 15, 62, 105; 2015 cyberattack, 15, 69; 2017 cyberattack, 62, 69-70; BfV, 69; BND, 15; Bundestag, 52, 69 GhostNet, 4, 90. See also China, country of Girard, René, xi-xii, 1, 48 Göde, Kurt, 18 Goldsmith, Jack, 37 Golos, 40 Gonzales, Alberto, 36 Google, xi, 1, 11, 37, 100 great powers, xiv, 2, 21-22, 35, 51, 90, 105, 108, 112-15, 117-18 grids, electric, 6, 13, 48, 59, 72, 96, 98-99, 107
Guccifer2.0, 12, 66 Gulf of Oman, 42 hackers, 9, 67 hacktivism, 9, 11-14, 21, 47, 106 HAVEX, 43 Hayden, Michael V., 16 Hewlett Packard, 68 Hezbollah, 4 “honeypot”, 17 Hong Kong, 92, 102 human rights, 40, 46 Hussein, Saddam, 8. See also Iraq, country of hybrid warfare, 3, 33, 43, 48, 55, 57, 63-64, 84, 89, 99, 117 India, country of, 22, 90, 107; 2017 cyberattack, 98 industrial controller, 5, 8 informationalization, 87 information operations, 6, 28, 33-34, 56-57, 88 information technology, 5, 52, 74, 81, 85 infrastructures, 5, 59, 74 Instagram, 19
180 International Atomic Energy Agency (IAEA), 114 Internet Corporation for Assigned Names and Numbers (ICANN), 23, 111, 115 Internet Expiorer, 15 internet of tilings, 81 Internet Research Agency (IRA), 55-56 Iran, country of, 1, 3, 11-12; Anonymous Iran, 11; Natanz nuclear enrichment facility, 4, 8-9 Iraq, country of, 8, 33 Islamic State (ISIS), 42-43 Israel, 4, 8-9, 16-17, 33, 43, 64, 108, 114, 117; 2006 Hezbollah war, 3; 2007 airstrike on Al Kibar reactor in Syria, 3; 2012 assaults on Iranian Ministry of Petroleum, 12, 17; Tel Aviv, 3; Unit 8200, Israeli cyber team, 8 Japan, country of, 42, 94 just war theory, xii, xiv, 48-49 Karber, Phillip, 58 Kaspersky Lab, 17-18, 61 Kazakhstan, country of, 63-64, 73, 82 Kennan, George, 34 Kim Jong-un, 10 kinetic conflict, 3-4, 7, 33, 41, 46-48, 57-58, 64, 71, 75, 87, 101-2, 104, 110, 113, 116 Kislyak, Sergey, 43 kompromat, xii-xiii, 76 Kyrgyzstan, country of, 62-64, 73 Lagrange, Joseph-Louis, 18 Latvia, country of, 51 Lavrov, Sergey, 43, 108 Lebanese banks, 19 Lewis, James A., 14 liberal democracies, 7, 21-22, 107,110, 112-14, 116-17 Lithuania, country of, 62-63 low-intensity conflict, 1-2, 107 Index Lulz Security (LulzSec), 11 Macron, Emmanuel, 54,70 Magharebia, 34 Malware Bytes, 10 Merkel, Angela, 15, 69-70 metadata, 36, 59-60 Microsoft, 16 Mills, Richard, 33 missile launches, 42 Mitrofanov, Alexei, 74 mobile networks, 6, 61, 87 mobile phones, 61, 98 Moonlight Maze, 61 Mueller, Robert: Report on Russian Interference in 2016 Presidential Election, 42, 66 Mugabe, Robert, 12. See also Zimbabwe Navalny, Aleksey, 60 Nazarbayev,
Nursultan, 64 Netherlands, the country of, 5; 2015 cyberattack, 62, 64; 2017 cyberattack, 70; Dutch General Intelligence and Security Service (AIVD), 54; Flight MH17, 64 NetTraveler, 96 New Zealand, country of, 39 North Atlantic Treaty Organization (NATO), 54, 61, 68-70, 105-6, 110, 115-16 North Korea (DPRK), 6, 10, 22, 29, 38, 42, 107, 114, 117; 2013 cyberattack on South Korean television station, 11; 2014 cyberattack on Sony Pictures regarding movie, The Interview, 10; 2014 cyberattack on British television network; 2017 WannaCiy ransomware attack, 11, 29. See also WannaCry ransomware attack; Reconnaissance General Bureau, 42 Norway, country of, 42; 2017 cyberattack, 70 Norwegian Helsinki Committee, 40
Index Novaya Gazeta, 60 nuclear, xi-xii, xiv, 2-3, 7, 10, 12, 15, 17, 26, 35, 41, 46^18, 50, 58, 73, 75,86, 89, 96, 107, 109, 111, 114-15; centrifuges, 4, 8-9, 22, 42; deterrence, 5; dirty bombs, 13; power plants, 6, 8, 13 Nuclear Non-Proliferation Treaty (NPT), 114 Obama, Barack, administration, 9, 30֊ 31,36, 38, 41—44, 96, 98, 109 Odnoklassniki, 59 offensive capabilities, 3, 28 Offensive Cyber Effects Operations (OCEO), 38 operating systems, 7, 44 Operation CHAOS, 36 Operation Olympic Games, 8-9, 15-16, 18,42 Pakistan, country of, 4, 8,107, 113; drone attacks, 4; Miram Shah, 4 Patriot Act, 36, 110 PayPal, 19 Peace of Westphalia, 106 People’s Republic of China. See China, country of permanent state of war, 4-9 PDF, 15 phishing, 7, 14, 55, 66-67, 70, 98 Podesta, John, 66 Poland, country of, 62, 68; 2017 cyberattack, 68 Portugal, countiy of, 11 Priestap, Bill, 86 Prigozhin, Evgeny, 55-56 privateers, xi, 12-13, 21, 25, 53, 55-56, 59, 63, 67, 84-85, 117 propaganda, 13, 19, 34, 43, 54-58, 60, 107 Project SHAMROCK, 36 public diplomacy, 39—40 Putin, Vladimir, xii-xiv, 2, 39, 41, 5253, 56, 59-60, 65-66, 69, 75-76, 105 181 Pyongyang, 10. See also North Korea (DPRK) reconnaissance, 6, 37, 40, 42, 55, 83, 87-88 RedHack, 11 Red October, 61 Resource 207, 17-18 Rubio, Marco, 66 rule-of-law, 13 Runet, 60 Russia, country of, 51-78; APT28/ Fancy Bear, 54, 64, 66, 68-70; APT29/Cozy Bear, 54, 68, 70; Bolotnaya Square, 39; Cyber Command, 55; Cyber Defense Center, 55; Defense Ministry, 77, 96; Federal Agency of Government Communications and Information, 52; Federal Security Service (FSB),
xiii, 54, 59, 72, 76, 83; KGB, xiii, 54, 59, 76; Main Intelligence Agency of General Staff of the Russian Armed Forces (GRU), 42, 54—55, 64-69; New Generation Warfare, 56-58; organized cybercrime, 19, 53-54; Roskomnadzor, 60, 72 Russian Business Network (RBN), 63 Russian Orthodox Church, xii-xiv, 2, 76-77 Sandworm, 65 Sanger, David, 8-9, 46 Saudi Arabia, country of, 12. See also Shamoon Saudi Aramco, 12 September 11, 2001, 36, 63, 110 Sesame Credit, 94 Shadow Brokers, 28, 61, 80 Shamoon, 2, 12 Shanghai Cooperation Organization (SCO), 73-74, 114 Sholokhov, Mikhail, 59 Singapore, country of, 94 Skype, 15, 110
182 Skywiper, 16. See also Flame Snowden, Edward, 15, 22, 28, 37, 61-62, 80, 109 SolarWorld AG, 86 Sony Pictures Entertainment, 10 South Africa’s Independent Media, 12 Southeast European Times, 34 South Korea (Republic of Korea), country of, 6, 11, 91, 96, 113 sovereignty-based cyberspace governance, 79, 82 Soviet Union (USSR), xii, 22-23, 53, 106. See also Russia, country of Sputnik media, 59, 66, 69-70, 110 Stellar Wind, 36-37 Strategic Arms Limitation Talks (SALT I), 106 Stuxnet, xii, 3^1, 7-9, 15, 17-19, 33, 49, 64 Sudan, country of, 82 Symantec, 12, 17 Syria, country of, 3-4, 7, 19, 43, 46, 57, 108; Syrian Civil War, 57 System of Operative-Investigative Measures (SORM), 59-60, 110 Taiwan, 22, 88-89, 102; Democratic Progressive Party's (DPP), 89 Tajikistan, country of, 73 Tallinn Manual, 116 Telegram, 71-72 Tencent, xiii, 93, 103 Terminal High-Altitude Air Defense (THAAD), 96 terrorism, 3, 9, 13-14, 28, 42, 47, 73, 83,91, 95, 110, 115. See also cyberterrorism theory, war, xii-xiv, 2, 48-49, 76, 87, 107, 114, 117 Thibeault, Joshua, 58 Tibet, 4, 90. See also GhostNet Tinder, 60 Trans-Siberian pipeline, 39 Travelex, 10 Index Tmmp, Donald, administration, 31-32, 37, 41-44, 46, 65-66, 98, 105, 109 Turkey, country of, 11, 61 Tumer, Stansfield, 37 Twitter, 11, 19, 21,40, 60, 99; Speak2Tweet, 11 Uber, xi, 1 Uganda, country of, 61 Ukraine, country of, 22, 58, 62, 64, 68-71; 2008 cyberattack, 54-55, 62; 2014 cyberattack, 55; 2015 cyberattack, 64-65; 2016 cyberattack, 65; Central Election Commission, 64; Kyiv, 46, 64-65 Umbrage, 38 Unit 8200, Israeli cyber team, 8. See also Israel
United Arab Emirates (UAE), country of, 94 United Kingdom, country of, 39, 70; Government Communications Headquarters (GCHQ), 39; House of Commons, 20; National Health Service (NHS) attacked, 11; Swansea University, 21; University of Edinburgh, 21. See also Brexit United Nations (UN), 73-74, 107, 115; Convention on the Law of the Sea, 105 United States, country of, 25-50; Air Force, 11, 28, 33, 48, 67; Central Intelligence Agency (CIA), 11, 16, 28-29, 35, 37-39, 66, 83; Command Vision, 30-31; Comprehensive National Cybersecurity Initiative (CNCI), 30; Computer Emergency Response Team (CERT), 29; Congress, 3, 8, 32, 36, 43, 110; Congressional Research Service, 40; Cyber Command, 6, 27-31, 42; Cyber Threat Intelligence Integration Center (СТПС), 27; Defense Advanced Research
Index Project Agency (DARPA), 27, 31, 33, 44; Defense Science Board Task Force on Cyber Deterrence, 32-33, 38; Department of Defense (DoD), 6-7, 27, 29, 31-32, 35, 37-39; Department of Energy, 98; Department of Homeland Security (DHS), 27, 29, 98; Department of Justice, 27, 36; Federal Bureau of Investigation (FBI), 27, 55, 86; Federal Communications Commission (FCC), 44-45; Federal Deposit Insurance Corporation, 92; Information Operations Center (IOC), 28; Joint Chiefs of Staff, 28; National Counterintelligence Executive, 15; National Science Foundation (NSF), 31; National Security Agency (NSA), 15-16, 22, 27-29, 36-37, 39, 61, 67, 79; National Security Strategy, 26, 3132; Office of National Intelligence, 27; Office of Personnel Management, 92; Office of Tailored Access Operations (TAO), 28; Pentagon, 27, 33; Plan X, 33, 44; Senate, 11, 35, 66, 86; State Department, 39-^10, 100; Supreme Court, 36; Task Force on Cyber Deterrence, 32-33, 35, 38 United States Steel Corporation, 86 Universal Declaration of Human Rights, 46 US. See United States, country of 183 USB, 8, 18 US 2016 presidential election, 41, 55-56 Uyghur, 90, 94-95, 102 Uzbekistan, country of, 73 Verizon, 10, 37 VKontakte, 59-60 WannaCry ransomware attack, 11, 29, 54, 80 Washington, George, 109 WeChat, 92-93, 99 Westinghouse Electric Company, 86 WiFi. See wireless WikiLeaks, 15, 61, 66 “wild”, 7, 9, 18, 29, 36 Winner, Reality Leigh, 67 wireless, 6, 16, 67, 81, 98 Woolsey, James, 37 World War I, 58 World War II, 36, 62, 65, 107 World Wide Web (www), 72 Xi Jinping, 81, 91, 96 Xinjiang, 95, 99. See also Uyghur
Yahoo, xi, 1 Yandex, 60 You Ji, 88 Zimbabwe, 12, 82. See also Mugabe, Robert Ґ------------------ \ v Bayerische Staatsbibliothek Mönchen J |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Davis, Elizabeth Van Wie 1958- |
author_GND | (DE-588)171509730 |
author_facet | Davis, Elizabeth Van Wie 1958- |
author_role | aut |
author_sort | Davis, Elizabeth Van Wie 1958- |
author_variant | e v w d evw evwd |
building | Verbundindex |
bvnumber | BV047194413 |
contents | Shadow warfare -- Cyber United States -- Cyber Russia -- Cyber China -- Cyberwar policy |
ctrlnum | (OCoLC)1249680619 (DE-599)BVBBV047194413 |
dewey-full | 355.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4 |
dewey-search | 355.4 |
dewey-sort | 3355.4 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
discipline_str_mv | Militärwissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03469nam a2200709 cb4500</leader><controlfield tag="001">BV047194413</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220411 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210315s2021 b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781538149676</subfield><subfield code="c">(pbk.)</subfield><subfield code="9">978-1-5381-4967-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781538149669</subfield><subfield code="c">(cloth)</subfield><subfield code="9">978-1-5381-4966-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1249680619</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047194413</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-Re13</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">OST</subfield><subfield code="q">DE-12</subfield><subfield code="2">fid</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Davis, Elizabeth Van Wie</subfield><subfield code="d">1958-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)171509730</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Shadow warfare</subfield><subfield code="b">cyberwar policy in the United States, Russia, and China</subfield><subfield code="c">Elizabeth Van Wie Davis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Lanham ; Boulder ; New York ; London</subfield><subfield code="b">Rowman & Littlefield</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 183 Seiten</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Security and professional intelligence education series (SPIES)</subfield><subfield code="v">34</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Shadow warfare -- Cyber United States -- Cyber Russia -- Cyber China -- Cyberwar policy</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Examines cyberwarfare policy across three main geopolitical actors and develops an application and deterrence of cyberespionage"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Russland</subfield><subfield code="0">(DE-588)4076899-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science) / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Government policy / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science) / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Government policy / Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science) / China</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Government policy / China</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Government policy</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">China</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">Russia (Federation)</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">United States</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Russland</subfield><subfield code="0">(DE-588)4076899-5</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-5381-4968-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Security and professional intelligence education series (SPIES)</subfield><subfield code="v">34</subfield><subfield code="w">(DE-604)BV041297803</subfield><subfield code="9">34</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB München - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032599544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB München - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032599544&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Register // Gemischte Register</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="n">oe</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">BSB_NED_20210623</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032599544</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield><subfield code="g">51</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield><subfield code="g">471</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield><subfield code="g">73</subfield></datafield></record></collection> |
geographic | USA (DE-588)4078704-7 gnd Russland (DE-588)4076899-5 gnd China (DE-588)4009937-4 gnd |
geographic_facet | USA Russland China |
id | DE-604.BV047194413 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:49:15Z |
indexdate | 2024-07-10T09:05:17Z |
institution | BVB |
isbn | 9781538149676 9781538149669 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032599544 |
oclc_num | 1249680619 |
open_access_boolean | |
owner | DE-12 DE-706 DE-188 DE-Re13 DE-BY-UBR |
owner_facet | DE-12 DE-706 DE-188 DE-Re13 DE-BY-UBR |
physical | xvi, 183 Seiten 24 cm |
psigel | BSB_NED_20210623 |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Rowman & Littlefield |
record_format | marc |
series | Security and professional intelligence education series (SPIES) |
series2 | Security and professional intelligence education series (SPIES) |
spelling | Davis, Elizabeth Van Wie 1958- Verfasser (DE-588)171509730 aut Shadow warfare cyberwar policy in the United States, Russia, and China Elizabeth Van Wie Davis Lanham ; Boulder ; New York ; London Rowman & Littlefield [2021] 2021 xvi, 183 Seiten 24 cm txt rdacontent n rdamedia nc rdacarrier Security and professional intelligence education series (SPIES) 34 Shadow warfare -- Cyber United States -- Cyber Russia -- Cyber China -- Cyberwar policy "Examines cyberwarfare policy across three main geopolitical actors and develops an application and deterrence of cyberespionage"-- Information warfare (DE-588)4461975-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf Russland (DE-588)4076899-5 gnd rswk-swf China (DE-588)4009937-4 gnd rswk-swf Cyberspace operations (Military science) / United States Computer security / Government policy / United States Cyberspace operations (Military science) / Russia (Federation) Computer security / Government policy / Russia (Federation) Cyberspace operations (Military science) / China Computer security / Government policy / China Computer security / Government policy Cyberspace operations (Military science) China Russia (Federation) United States USA (DE-588)4078704-7 g Russland (DE-588)4076899-5 g China (DE-588)4009937-4 g Information warfare (DE-588)4461975-3 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Online-Ausgabe 978-1-5381-4968-3 Security and professional intelligence education series (SPIES) 34 (DE-604)BV041297803 34 Digitalisierung BSB München - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032599544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung BSB München - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032599544&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Register // Gemischte Register |
spellingShingle | Davis, Elizabeth Van Wie 1958- Shadow warfare cyberwar policy in the United States, Russia, and China Security and professional intelligence education series (SPIES) Shadow warfare -- Cyber United States -- Cyber Russia -- Cyber China -- Cyberwar policy Information warfare (DE-588)4461975-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4274324-2 (DE-588)4078704-7 (DE-588)4076899-5 (DE-588)4009937-4 |
title | Shadow warfare cyberwar policy in the United States, Russia, and China |
title_auth | Shadow warfare cyberwar policy in the United States, Russia, and China |
title_exact_search | Shadow warfare cyberwar policy in the United States, Russia, and China |
title_exact_search_txtP | Shadow warfare cyberwar policy in the United States, Russia, and China |
title_full | Shadow warfare cyberwar policy in the United States, Russia, and China Elizabeth Van Wie Davis |
title_fullStr | Shadow warfare cyberwar policy in the United States, Russia, and China Elizabeth Van Wie Davis |
title_full_unstemmed | Shadow warfare cyberwar policy in the United States, Russia, and China Elizabeth Van Wie Davis |
title_short | Shadow warfare |
title_sort | shadow warfare cyberwar policy in the united states russia and china |
title_sub | cyberwar policy in the United States, Russia, and China |
topic | Information warfare (DE-588)4461975-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Information warfare Computersicherheit USA Russland China |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032599544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032599544&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041297803 |
work_keys_str_mv | AT daviselizabethvanwie shadowwarfarecyberwarpolicyintheunitedstatesrussiaandchina |