Amazon Price: $158.00 $158.00 (as of January 21, 2018 02:53 –
This book examines cyberspace superiority in nation-state conflict from both a theoretical and a practical perspective.
This volume analyses superiority concepts from the domains of land, maritime, and air to build a model that can be applied to cyberspace. Eight different cyberspace conflicts between nation states are examined and the resulting analysis is combined with theoretical concepts to present the reader with a conclusion. Case studies include the conflict between Russia and Estonia (2007), North Korea and the US and South Korea (2009) and Saudi Arabia and Iran in the Aramco attack (2012). The book uses these case studies to examine cyberspace superiority as an analytical framework to understand conflict in this domain between nation-states. Furthermore, the book makes the important distinction between local and universal domain superiority, and presents a unique model to relate this superiority in all domains, as well as a more detailed model of local superiority in cyberspace. Through examining the eight case studies, the book develops a rigorous system to measure the amount of cyberspace superiority achieved by a combatant in a conflict, and seeks to reveal if cyberspace superiority proves to be a significant advantage for military operations at the tactical, operational, and strategic levels.
This book will be of much interest to students of cyber-conflict, strategic studies, national security, foreign policy and IR in general.
Amazon Price: N/A (as of January 21, 2018 12:42 –
The old world of spying-dead-letter boxes, microfilm cameras, an enemy reporting to the Moscow Center, and a hint of sexual blackmail-is history. The spymaster's technique has changed and the enemy has, too. He or she now frequently comes from a culture far removed from Western understanding and is part of a less well-organized group. The new enemy is constantly evolving and prepared to kill the innocent. In the face of this new threat, the spymasters of the world shunned human intelligence as the primary way to glean clandestine information and replaced it with an obsession that focuses on the technical methods of spying ranging from the use of high-definition satellite photography to the global interception of communications. However, this obsession with technology has failed, most spectacularly, with the devastation of the 9/11 attacks. In this searing modern history of espionage, Stephen Grey takes us from the CIA's Cold War legends, to the agents who betrayed the IRA, through to the spooks inside Al-Qaeda and ISIS. Techniques and technologies have evolved, but the old motivations for betrayal-patriotism, greed, revenge, compromise-endure. Based on years of research and interviews with hundreds of secret sources, Stephen Grey's The New Spymasters is an up-to-date exposé that shows how spycraft's human factor is once again being used to combat the world's deadliest enemies.
Amazon Price: N/A (as of January 21, 2018 06:31 –
'Cyber security' is a recent addition to the global security agenda, concerned with protecting states and citizens from the misuse of computer networks for war, terrorism, economic espionage and criminal gain. Many argue that the ubiquity of computer networks calls for robust and pervasive countermeasures, not least governments concerned at their potential effects on national and economic security. Drawing on critical literature in international relations, security studies, political theory and social theory, this is the first book that describes how these visions of future cyber security are sustained in the communities that articulate them. Specifically, it shows that conceptions of time and temporality are foundational to the politics of cyber security. It explores how cyber security communities understand the past, present and future, thereby shaping cyber security as a political practice. Integrating a wide range of conceptual and empirical resources, this innovative book provides insight for scholars, practitioners and policymakers.
Amazon Price: $18.99 $12.78 You save: $6.21 (33%). (as of January 21, 2018 16:29 –
In this updated edition of The Hacked World Order, cybersecurity expert Adam Segal offers unmatched insight into the new, opaque global conflict that is transforming geopolitics.
For more than three hundred years, the world wrestled with conflicts between nation-states, which wielded military force, financial pressure, and diplomatic persuasion to create “world order.” But in 2012, the involvement of the US and Israeli governments in Operation “Olympic Games,” a mission aimed at disrupting the Iranian nuclear program through cyberattacks, was revealed; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield.
Continue reading “The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age”
Amazon Price: $32.95 $23.04 You save: $9.91 (30%). (as of January 21, 2018 12:04 –
Despite its impressive size and population, economic vitality, and drive to upgrade its military capabilities, China remains a vulnerable nation surrounded by powerful rivals and potential foes. The key to understanding China's foreign policy is to grasp these geostrategic challenges, which persist even as the country comes to dominate its neighbors. Andrew J. Nathan and Andrew Scobell analyze China's security concerns on four fronts: at home, with its immediate neighbors, in surrounding regional systems, and in the world beyond Asia. By illuminating the issues driving Chinese policy, they offer new perspective on China's rise and a strategy for balancing Chinese and American interests in Asia.
Though rooted in the present, Nathan and Scobell's study makes ample use of the past, reaching back into history to contextualize the people and institutions shaping Chinese strategy. They examine Chinese views of the United States; explain why China is so concerned about Japan; and uncover China's interests in such trouble spots as North Korea, Iran, and the Sudan. The authors probe recent troubles in Tibet and Xinjiang and establish links to forces beyond China's borders. They consider the tactics deployed by both sides of mainland China and Taiwan's complicated relationship, as Taiwan seeks to maintain autonomy while China tries to move toward unification, and they evaluate the strengths and weaknesses of China's three main power resources — economic power, military power, and soft power. The book concludes with recommendations for the United States as it seeks to manage China's rise. Chinese policymakers understand that the nation's prosperity, stability, and security depend on cooperation with the U.S, and if handled wisely, relations between the two countries could produce mutually beneficial outcomes in Asia and throughout the world.