Preface | p. vii |
1 Defining Cyberspace | p. 1 |
A World at War with Itself | p. 1 |
What, Then, Is Cyber? | p. 3 |
The History of the Internet | p. 5 |
Unfettered Growth and Challenges | p. 10 |
Information Technology versus Operational Technology | p. 12 |
Vulnerabilities | p. 14 |
The Internet of Things (IoT) | p. 16 |
Cloud Computing | p. 17 |
A Two-Edged Sword | p. 18 |
The Next-Generation Internet (IPv6) | p. 20 |
Cybersecurity | p. 22 |
Overview of the Attack Matrix | p. 24 |
2 The Mutable Domain | p. 33 |
What Is Cryptology? | p. 33 |
Exploiting the System | p. 36 |
The Onion Router (TOR) | p. 38 |
Attackers, Facilitators, Defenders, and Targets | p. 43 |
Malware | p. 44 |
Cryptocurrencies | p. 47 |
Advanced Persistent Threat (APT) | p. 49 |
The Deep and Dark Webs | p. 54 |
The Lexicon of Cyber Conflict | p. 58 |
3 Global Cyber Risk and Access Vectors | p. 65 |
The Globalization Process | p. 65 |
Motives and Sources of Attack | p. 70 |
Policy Lagging Technology | p. 72 |
The "Sordid Boon" of Social Media | p. 75 |
Algorithms, Software, Audience Mapping, and Targeted Messaging | p. 79 |
"Swarmcasting"-Terrorists, Protesters, and Hired Guns | p. 83 |
"Psyber Warfare" | p. 85 |
Broadband Mobility | p. 87 |
4 China | p. 93 |
Market Ownership: Controlling the Rules and Physics of the Domain | p. 94 |
Nation-State Economic Espionage | p. 96 |
Ancient Traditions and Modern Realities | p. 99 |
"Win Victory before the First Battle" Abroad and at Home | p. 100 |
Organization and Missions | p. 102 |
Espionage for National Security and Economic Advantage-"Know Yourself, Know Your Enemy" | p. 105 |
Espionage for National Security and Military Advantage-"Kill with a Borrowed Sword" | p. 108 |
Information Control for Regime Stability | p. 111 |
The "Great Firewall" and the "Great Cannon"-the Cyber Janus | p. 111 |
PLA Reform and the Strategic Support Force | p. 113 |
Mutually Assured Deterrence | p. 115 |
U.S.-Chinese Positive Engagement: Dialogue for Cyber Stability | p. 116 |
Building toward a Cooperative Spirit | p. 116 |
Beyond the Rhetoric | p. 117 |
Conclusion | p. 119 |
5 Russia | p. 123 |
Estonia, 2007 | p. 123 |
"There Are No Absolute Rules of Conduct, Either in Peace or War" - Leon Trotsky | p. 127 |
Georgia, 2008 | p. 130 |
Net Warriors | p. 133 |
Ukraine | p. 137 |
The United States | p. 142 |
"What Is to Be Done?" | p. 148 |
6 Violent Extremist Organizations and Terrorism in the Cyber Domain | p. 155 |
Definitions | p. 156 |
A Spectrum of Cyber-Enabled Terrorist Operations | p. 156 |
Cyber-Enabled Recruitment and Radicalization | p. 159 |
Phases of Internet Radicalization | p. 159 |
Planning, Command, Control, and Communications | p. 164 |
Armed Attack | p. 166 |
Cyber Target: Industrial Control Systems | p. 168 |
"Psyber Operations" | p. 169 |
A Hypothetical Case of Strategic Cyberterrorism | p. 170 |
Conclusion | p. 172 |
7 Public-Private Partnerships | p. 175 |
The Information Society: An Emerging Societal Construct | p. 176 |
A Global Culture of Cyber Security for the Information Society | p. 177 |
World Summit on the Information Society and Internet Governance Forum | p. 182 |
The Perils of Private Ordering: Network Effects, Trust, and Community Harm | p. 185 |
Conclusion | p. 187 |
8 Cyber Horizons | p. 191 |
Big Data | p. 191 |
Artificial Intelligence | p. 195 |
Robotics and Al | p. 196 |
Machine Learning | p. 199 |
Third Offset Strategy | p. 202 |
Distributed Ledger Technology | p. 205 |
Conclusion | p. 211 |
Appendix: Strategic Military Cyber Concepts | p. 215 |
Cyber Law and Policy | p. 216 |
Col. Gary Brown and Maj. Israel KingNorth Korean Cyber | p. 238 |
Adam AlbaradoNormalizing Cyber Disruption as an Element of National Power | p. 247 |
Sam Kidd and Pano YannakogeorgosISR and Cyberspace | p. 251 |
Maj. Robert Johnson and Capt. Daniel Votipka and TSgt. Danielle Dye and Maj. Trevor Stutting and Capt. Jamie Blummer and Ms. Tiffany Harbour and Capt. Laura LeFevre and Capt. Thomas ShewAbbreviations | p. 259 |
Index | p. 261 |
About the Authors | p. 267 |