Current and Emerging Trends in Cyber Operations



Similar documents
Mediatized Worlds. Copyright material from - licensed to npg - PalgraveConnect

Rethinking Peacekeeping, Gender Equality and Collective Security

The History of Human Resource Development

Gendering the International Asylum and Refugee Debate

Marketing in Context

Copyright material from - licensed to npg - PalgraveConnect

This page intentionally left blank

Palgrave Macmillan Studies in Banking and Financial Institutions

Young Shakespeare s Young Hamlet

NEXT GENERATION TALENT MANAGEMENT

Net Work. Palgrave. macmillan. Ethics and Values in Web Design. Helen Kennedy Senior Lecturer, University of Leeds

Praise for Changing Employee Behavior

The Social Life of Connectivity in Africa

Comparative Early Childhood Education Services

The Palgrave Macmillan The Welfare State as Crisis Manager

Computer Security Within Organizations

Muslim Moroccan Migrants in Europe

Philosophical Issues in Nursing

The Clinical Nurse Specialist: Issues in Practice

This page has been left blank intentionally

Developing Courses in English for Specific Purposes

Assessing the Quality of Doctoral Programs in Criminology in the United States*

NEXT GENERATION TALENT MANAGEMENT

Property Investment Appraisal UNCORRECTED PROOF

S. ll IN THE SENATE OF THE UNITED STATES

Copyright material from - licensed to npg - PalgraveConnect

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Cyber Security Awareness Workshop

The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Survey of Cyber Security Frameworks

Literary Criticism from Plato to Postmodernism

Automated Firewall Analytics

ARI 26/2013 (Translated from Spanish) 17 September Cyber cells: a tool for national cyber security and cyber defence

Cybercrimes: A Multidisciplinary Analysis

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Secure Data Centers For America A SOLUTION TO

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

a new anthropology of islam

Symbolism and Regime Change in Russia

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

Cyber Security and the Politics of Time

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Peace and Justice in Cyberspace

An Overview of Large US Military Cybersecurity Organizations

MASTER OF PROFESSIONAL STUDIES

Indiana State Government, K-12 Cyber Safety

Ukulele In A Day. by Alistair Wood FOR. A John Wiley and Sons, Ltd, Publication

Family Law. Blackstone s Statutes on. Mika Oldham. 23rd edition. edited by. MA, PhD. Fellow of Jesus College, Cambridge

Cyber Security Strategy of Georgia

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Equality in Education Law and Policy,

Art Direction for Film and Video

Approaches and Methods in Language Teaching

Psychology for Language Learning

A Detailed Strategy for Managing Corporation Cyber War Security

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

International Marketing Research

The War on Terror in Classrooms and Clinics: An Inventory

Technology, Security, and Conflict in the Cyber Age IGA-236M, Harvard Kennedy School January 2015 Faculty: Professor James Waldo

SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS

RODNEY SCHMIDT. The Currency Transaction Tax

A PRIMER ON CYBER SECURITY IN TURKEY

Confrontation or Collaboration?

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October Author note

Thank you for your very kind introduction.

National Cyber Threat Information Sharing. System Strengthening Study

Cyber Security in the University of Oxford: Collaborating without Conforming?

Abortion & Unborn Human Life

22 ND ANNUAL REVIEW OF THE FIELD

National Cyber Security Strategies

in Counseling A Guide to the Use of Psychological Assessment Procedures Danica G. Hays

CYBER SECURITY FOUNDATION - OUTLINE

Breathe Well and Live Well with COPD. preview

A 6-Step How-To Guide to Contracting for Cloud Services Includes a 137-Element Contracting Checklist

Wartime Memories from the Civil War Through the Gulf War. Wartime Memories from the American Revolution Through the Iraq War

THE STRATEGIC POLICING REQUIREMENT. July 2012

Women in an Age of Cyber Wars: Risks, Management and Opportunity

The main object of my research is :

BSA GLOBAL CYBERSECURITY FRAMEWORK

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

How To Create A Virtual World From A Computer World

MEDIA, TECHNOLOGY, AND INFORMATION LAW. Yale Law School

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

IT Security Management 100 Success Secrets

UN Emergency Summit on Cyber Security Topic Abstract

Promoting a cyber security culture and demand compliance with minimum security standards;

Cyber Diplomacy A New Component of Foreign Policy 6

SpringerBriefs in Criminology

Cyber-Intelligence and Cyber-Espionage

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

HOMELAND SECURITY INTERNET SOURCES

S. 21 IN THE SENATE OF THE UNITED STATES

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

The UK cyber security strategy: Landscape review. Cross-government

the Council of Councils initiative

Transcription:

Current and Emerging Trends in Cyber Operations

Palgrave Macmillan s Studies in Cybercrime and Cybersecurity This book series addresses the urgent need to advance knowledge in the fields of cybercrime and cybersecurity. Because the exponential expansion of computer technologies and use of the Internet have greatly increased the access by criminals to people, institutions, and businesses around the globe, the series will be international in scope. It provides a home for cutting-edge long-form research. Further, the series seeks to spur conversation about how traditional criminological theories apply to the online environment. The series welcomes contributions from early career researchers as well as established scholars on a range of topics in the cybercrime and cybersecurity fields. Series Editors: MARIE-HELEN MARAS is Associate Professor and Deputy Chair for Security at the Department of Security, Fire, and Emergency Management at John Jay College of Criminal Justice, USA. THOMAS J. HOLT is Associate Professor in the School of Criminal Justice at Michigan State University, USA. Titles include: Amitai Etzioni PRIVACY IN CYBER AGE Policy and Practice Frederic Lemiux (editor) CURRENT AND EMERGING TRENDS IN CYBER OPERATIONS Policy, Strategy and Practice

Current and Emerging Trends in Cyber Operations Policy, Strategy, and Practice Edited by Frederic Lemieux George Washington University, USA

Introduction, selection and editorial matter Frederic Lemieux 2015 Individual chapters Respective authors 2015 All rights reserved. No reproduction, copy or transmission of this publication may be made without written permission. No portion of this publication may be reproduced, copied or transmitted save with written permission or in accordance with the provisions of the Copyright, Designs and Patents Act 1988, or under the terms of any licence permitting limited copying issued by the Copyright Licensing Agency, Saffron House, 6-10 Kirby Street, London EC1N 8TS. Any person who does any unauthorized act in relation to this publication may be liable to criminal prosecution and civil claims for damages. The authors have asserted their rights to be identified as the authors of this work in accordance with the Copyright, Designs and Patents Act 1988. First published 2015 by PALGRAVE MACMILLAN Palgrave Macmillan in the UK is an imprint of Macmillan Publishers Limited, registered in England, company number 785998, of Houndmills, Basingstoke, Hampshire RG21 6XS. Palgrave Macmillan in the US is a division of St Martin s Press LLC, 175 Fifth Avenue, New York, NY 10010. Palgrave is the global academic imprint of the above companies and has companies and representatives throughout the world. Palgrave and Macmillan are registered trademarks in the United States, the United Kingdom, Europe and other countries. ISBN: 978 1 137 45554 3 This book is printed on paper suitable for recycling and made from fully managed and sustained forest sources. Logging, pulping and manufacturing processes are expected to conform to the environmental regulations of the country of origin. A catalogue record for this book is available from the British Library. A catalog record for this book is available from the Library of Congress. Library of Congress Cataloging-in-Publication Data Current and emerging trends in cyber operations : policy, strategy and practice / [edited by] Frederic Lemieux, George Washington University, USA. pages cm Includes bibliographical references and index. ISBN 978 1 137 45554 3 (hardback) 1. Cyberterrorism. 2. National security. I. Lemieux, Frédéric. HV6773.15.C97C87 2015 355.4 dc23 2015013078

The Chinese use two brush strokes to write the word crisis. One brush stroke stands for danger; the other for opportunity. In a crisis, be aware of the danger but recognize the opportunity. John F. Kennedy, Speech in Indianapolis, Indiana, 12 April 1959

This page intentionally left blank

Contents Acknowledgments Notes on Contributors ix x 1 Trends in Cyber Operations: An Introduction 1 Frederic Lemieux Section I Conflicts in Cyberspace 17 2 Cyber Conflict: Disruption and Exploitation in the Digital Age 19 Scott Applegate 3 Establishing Cyber Warfare Doctrine 37 Andrew Colarik and Lech Janczewski 4 How Cyber Changes the Laws of War 51 Jack Goldsmith Section II Geopolitics of Conflicts in Cyberspace 63 5 Russia s Information Warfare Capabilities 65 Roland Heickero 6 The Sino-US Digital Relationship and International Cyber Security 84 Jyh-An Lee 7 Cyber Operations in the Middle East 97 Jeffrey Bardin Section III Defense Strategies and Practices 111 8 A National Strategy for the United States Cyberspace 113 Harold Punch Moulton, James Stavridis, and Constance Uthoff 9 Defending Critical Infrastructures Against Cyber Attacks: Cooperation through Data-Exchange Infrastructure and Advanced Data Analytics 130 Frederic Lemieux

viii Contents 10 Cyber Resilience: A Review of Critical National Infrastructure and Cyber-Security Protection Measures Applied in the UK and USA 149 Wayne Harrop and Ashley Matteson Section IV Cyber Intelligence and Information Security 167 11 Typologies of Attacks and Vulnerabilities Related to the National Critical Infrastructure 169 Charles Pak 12 Opportunities and Security Challenges of Big Data 181 Zal Azmi 13 Strategic Cyber Intelligence: An Examination of Practices across Industry, Government, and Military 198 Constance Uthoff References 221 Index 243