Cyber Mercenaries
Cambridge University Press (Verlag)
978-1-107-12760-9 (ISBN)
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.
Tim Maurer co-directs the Cyber Policy Initiative at the Carnegie Endowment for International Peace. He is a member of several US track 1.5 cyber dialogues and the Freedom Online Coalition's cybersecurity working group. He co-chaired the Advisory Board of the 2015 Global Conference on CyberSpace, participated in the Global Commission on Internet Governance, and supported the confidence-building work of the OSCE. His work has been published by Foreign Policy, The Washington Post, TIME, Jane's Intelligence Review, CNN, Slate, Lawfare, and other academic and media venues. He holds a Master's in Public Policy from the Harvard Kennedy School.
Part I. Of Brokers and Proxies: 1. Cyber proxies: an introduction; 2. Proxies: an instrument of power since ancient times; 3. Cyber power: geopolitics and human rights; Part II. Cyber Proxies Up Close: 4. Cyber proxies on a tight leash: the United States; 5. Cyber proxies on a loose leash: Iran and Syria; 6. Cyber proxies on the loose: the former Soviet Union; 7. Change over time: China's evolving relationships with cyber proxies; Part III. Implications: 8. The theory: state responsibility and cyber proxies; 9. The practice: shaping cyber proxy relationships; 10. Conclusion: cyber proxies, the future, and suggestions for further research; Future research; Notes.
Erscheinungsdatum | 23.03.2018 |
---|---|
Zusatzinfo | 4 Tables, black and white; 2 Halftones, black and white; 8 Line drawings, black and white |
Verlagsort | Cambridge |
Sprache | englisch |
Maße | 157 x 235 mm |
Gewicht | 490 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Recht / Steuern ► EU / Internationales Recht | |
Recht / Steuern ► Privatrecht / Bürgerliches Recht ► IT-Recht | |
Recht / Steuern ► Strafrecht | |
Sozialwissenschaften ► Politik / Verwaltung ► Europäische / Internationale Politik | |
ISBN-10 | 1-107-12760-2 / 1107127602 |
ISBN-13 | 978-1-107-12760-9 / 9781107127609 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich