Cyber mercenaries : the state, hackers, and power

Enregistré dans:
Détails bibliographiques
Auteur principal: Maurer, Tim. (Auteur)
Support: E-Book
Langue: Anglais
Publié: Cambridge ; New York : Cambridge University Press.
Sujets:
Autres localisations: Voir dans le Sudoc
Résumé: Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics
Accès en ligne: Accès à l'E-book
Accès sur la plateforme ISTEX (corpus CUP)
LEADER 06190cmm a2200541 i 4500
001 ebook-248432451
005 20240422172601.0
007 cr|uuu---uuuuu
008 200727t20182018uk |||| |||| ||||||eng d
020 |a 9781316422724 
024 7 |a 10.1017/9781316422724  |2 DOI 
035 |a (OCoLC)1193319498 
035 |a CUP_LN20_EB_9781316422724 
040 |a ABES  |b fre  |e AFNOR 
041 0 |a eng  |2 639-2 
044 |a uk  |a us 
050 4 |a HV6773.15.C97  |b M383 2018 
050 4 |a HV6773  |b .M38 2018 
082 0 |a 364.16/8  |2 23 
100 1 |0 (IdRef)226937259  |1 http://www.idref.fr/226937259/id  |a Maurer, Tim.  |4 aut.  |e Auteur 
245 1 0 |a Cyber mercenaries :  |b the state, hackers, and power   |c Tim Maurer. 
264 1 |a Cambridge ;  |a New York :  |b Cambridge University Press. 
264 2 |a Cambridge :  |b Cambridge University Press,  |c 2018. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
337 |b b  |2 isbdmedia 
338 |b ceb  |2 RDAfrCarrier 
504 |a Bibliographie. Index. 
505 0 |a Part I. Of Brokers and Proxies. Cyber Proxies: An Introduction Proxies and Cyber Power ; What Cyber Proxies Are (Theoretically) Capable Of ; What Cyber Proxies Are Likely to Be Used For ; The Pool of Potential Cyber Proxies ; Proxy Relationships and Selected Cases ; Proxies and the Attribution Problem ; A Few Words on Methodology ; Conclusion: Cyber Proxies and the Bigger Picture -- Proxies: An Instrument of Power Since Ancient Times ; Framework for Thinking About Proxies ; Why Proxy Relationships Exist ; Three Main Types of Proxy Relationships: Delegation, Orchestration, and Sanctioning ; Conclusion: It's the Relationship That Matters -- Cyber Power: Geopolitics and Human Rights ; The Bigger Picture: Sovereignty and Information ; The US Government's Perspective ; The Russian Government's Perspective ; The Chinese Government's Perspective ; The Iranian Government's Perspective ; Conclusion: Cybersecurity Is in the Eye of the Beholder -- Part II. Cyber Proxies Up Close. Cyber Proxies on a Tight Leash: The United States ; Private Cybersecurity Contractors Delegation Under the Spotlight: US Cyber Command and Cybersecurity Contractors ; Private Cybersecurity Contractors and Internal Security ; Conclusion: Predictable Proliferation of Capabilities -- Cyber Proxies on a Loose Leash: Iran and Syria ; Orchestration Under the Spotlight: The US Indictment of Iranian Hackers ; Orchestration in Wartime: The Syrian Electronic Army ; Conclusion: Unexpected Escalation and Limited Options for Response -- Cyber Proxies on the Loose: The Former Soviet Union -- Sanctioning in Peacetime: The 2007 DDoS Attack on Estonia -- Sanctioning in Wartime: The Conflict in Ukraine (2014-Today) ; Blitz Orchestration: The War Against Georgia in 2008 ; Sanctioning and Mobilizing: The March 2017 US Indictment of Russian Hackers ; Conclusion: Sanctioning and Statehood -- Change Over Time: China's Evolving Relationships with Cyber Proxies -- The Rise of Hacktivists in China and the Government's Passive Support (1994-2003) -- The Creation of Militia Units and the Move Towards Orchestration (2003-13) ; Tightening Control and Aspirational Delegation (2013-Today) ; Conclusion: From Broker State to (Aspirational) Monopolist -- Part III. Implications. The Theory: State Responsibility and Cyber Proxies ; A Framework for Cyber Proxy Relationships Based on International Law ; Due Diligence ; Third Countries and Extraterritoriality ; Conclusion: International Cooperation Under Pressure -- The Practice: Shaping Cyber Proxy Relationships ; Keeping One's Own House in Order: Determining Inherently Governmental Functions ; Keeping One's Own House in Order: Determining the Role of the Private Sector ; Keeping One's Own House in Order: Nationalism and Hacktivism ; Conclusion: Nudging and Managing Instead of Dictating and Prohibiting 10Conclusion: Cyber Proxies, the Future, and Suggestions for Further Research 
506 |a Accès en ligne pour les établissements français bénéficiaires des licences nationales 
506 |a Accès soumis à abonnement pour tout autre établissement 
520 |a Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics 
540 |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales  |c https://www.licencesnationales.fr/wp-content/uploads/2024/03/2023-14_Collex_Cambridge_CCTP.pdf 
650 7 |0 (IdRef)061614408  |1 http://www.idref.fr/061614408/id  |a Pirates informatiques.  |2 ram 
650 7 |0 (IdRef)10373578X  |1 http://www.idref.fr/10373578X/id  |a Cyberterrorisme.  |2 ram 
650 7 |0 (IdRef)032258372  |1 http://www.idref.fr/032258372/id  |a Technologie et relations internationales.  |2 ram 
650 0 |a Hackers.  |2 lc 
650 0 |a Hacking  |x Political aspects.  |2 lc 
650 0 |a Cyberterrorism.  |2 lc 
650 0 |a Cyberspace  |x Political aspects.  |2 lc 
650 0 |a Internet and international relations.  |2 lc 
650 0 |a Technology and international relations.  |2 lc 
856 |u https://doi-org.srvext.uco.fr/10.1017/9781316422724  |z Accès à l'E-book 
856 |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-9H7LRGX1-7  |z Accès sur la plateforme ISTEX (corpus CUP) 
886 2 |2 unimarc  |a 181  |a i#  |b xxxe## 
993 |a E-Book  
994 |a BNUM 
995 |a 248432451