Current and Emerging Trends in Cyber Operations
Palgrave Macmillan s Studies in Cybercrime and Cybersecurity This book series addresses the urgent need to advance knowledge in the fields of cybercrime and cybersecurity. Because the exponential expansion of computer technologies and use of the Internet have greatly increased the access by criminals to people, institutions, and businesses around the globe, the series will be international in scope. It provides a home for cutting-edge long-form research. Further, the series seeks to spur conversation about how traditional criminological theories apply to the online environment. The series welcomes contributions from early career researchers as well as established scholars on a range of topics in the cybercrime and cybersecurity fields. Series Editors: MARIE-HELEN MARAS is Associate Professor and Deputy Chair for Security at the Department of Security, Fire, and Emergency Management at John Jay College of Criminal Justice, USA. THOMAS J. HOLT is Associate Professor in the School of Criminal Justice at Michigan State University, USA. Titles include: Amitai Etzioni PRIVACY IN CYBER AGE Policy and Practice Frederic Lemiux (editor) CURRENT AND EMERGING TRENDS IN CYBER OPERATIONS Policy, Strategy and Practice
Current and Emerging Trends in Cyber Operations Policy, Strategy, and Practice Edited by Frederic Lemieux George Washington University, USA
Introduction, selection and editorial matter Frederic Lemieux 2015 Individual chapters Respective authors 2015 All rights reserved. No reproduction, copy or transmission of this publication may be made without written permission. No portion of this publication may be reproduced, copied or transmitted save with written permission or in accordance with the provisions of the Copyright, Designs and Patents Act 1988, or under the terms of any licence permitting limited copying issued by the Copyright Licensing Agency, Saffron House, 6-10 Kirby Street, London EC1N 8TS. Any person who does any unauthorized act in relation to this publication may be liable to criminal prosecution and civil claims for damages. The authors have asserted their rights to be identified as the authors of this work in accordance with the Copyright, Designs and Patents Act 1988. First published 2015 by PALGRAVE MACMILLAN Palgrave Macmillan in the UK is an imprint of Macmillan Publishers Limited, registered in England, company number 785998, of Houndmills, Basingstoke, Hampshire RG21 6XS. Palgrave Macmillan in the US is a division of St Martin s Press LLC, 175 Fifth Avenue, New York, NY 10010. Palgrave is the global academic imprint of the above companies and has companies and representatives throughout the world. Palgrave and Macmillan are registered trademarks in the United States, the United Kingdom, Europe and other countries. ISBN: 978 1 137 45554 3 This book is printed on paper suitable for recycling and made from fully managed and sustained forest sources. Logging, pulping and manufacturing processes are expected to conform to the environmental regulations of the country of origin. A catalogue record for this book is available from the British Library. A catalog record for this book is available from the Library of Congress. Library of Congress Cataloging-in-Publication Data Current and emerging trends in cyber operations : policy, strategy and practice / [edited by] Frederic Lemieux, George Washington University, USA. pages cm Includes bibliographical references and index. ISBN 978 1 137 45554 3 (hardback) 1. Cyberterrorism. 2. National security. I. Lemieux, Frédéric. HV6773.15.C97C87 2015 355.4 dc23 2015013078
The Chinese use two brush strokes to write the word crisis. One brush stroke stands for danger; the other for opportunity. In a crisis, be aware of the danger but recognize the opportunity. John F. Kennedy, Speech in Indianapolis, Indiana, 12 April 1959
This page intentionally left blank
Contents Acknowledgments Notes on Contributors ix x 1 Trends in Cyber Operations: An Introduction 1 Frederic Lemieux Section I Conflicts in Cyberspace 17 2 Cyber Conflict: Disruption and Exploitation in the Digital Age 19 Scott Applegate 3 Establishing Cyber Warfare Doctrine 37 Andrew Colarik and Lech Janczewski 4 How Cyber Changes the Laws of War 51 Jack Goldsmith Section II Geopolitics of Conflicts in Cyberspace 63 5 Russia s Information Warfare Capabilities 65 Roland Heickero 6 The Sino-US Digital Relationship and International Cyber Security 84 Jyh-An Lee 7 Cyber Operations in the Middle East 97 Jeffrey Bardin Section III Defense Strategies and Practices 111 8 A National Strategy for the United States Cyberspace 113 Harold Punch Moulton, James Stavridis, and Constance Uthoff 9 Defending Critical Infrastructures Against Cyber Attacks: Cooperation through Data-Exchange Infrastructure and Advanced Data Analytics 130 Frederic Lemieux
viii Contents 10 Cyber Resilience: A Review of Critical National Infrastructure and Cyber-Security Protection Measures Applied in the UK and USA 149 Wayne Harrop and Ashley Matteson Section IV Cyber Intelligence and Information Security 167 11 Typologies of Attacks and Vulnerabilities Related to the National Critical Infrastructure 169 Charles Pak 12 Opportunities and Security Challenges of Big Data 181 Zal Azmi 13 Strategic Cyber Intelligence: An Examination of Practices across Industry, Government, and Military 198 Constance Uthoff References 221 Index 243