Cyber mercenaries : the state, hackers, and power
Enregistré dans:
Auteur principal: | |
---|---|
Support: | E-Book |
Langue: | Anglais |
Publié: |
Cambridge ; New York :
Cambridge University Press.
|
Sujets: | |
Autres localisations: | Voir dans le Sudoc |
Résumé: | Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics |
Accès en ligne: | Accès à l'E-book Accès sur la plateforme ISTEX (corpus CUP) |
LEADER | 06190cmm a2200541 i 4500 | ||
---|---|---|---|
001 | ebook-248432451 | ||
005 | 20240422172601.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 200727t20182018uk |||| |||| ||||||eng d | ||
020 | |a 9781316422724 | ||
024 | 7 | |a 10.1017/9781316422724 |2 DOI | |
035 | |a (OCoLC)1193319498 | ||
035 | |a CUP_LN20_EB_9781316422724 | ||
040 | |a ABES |b fre |e AFNOR | ||
041 | 0 | |a eng |2 639-2 | |
044 | |a uk |a us | ||
050 | 4 | |a HV6773.15.C97 |b M383 2018 | |
050 | 4 | |a HV6773 |b .M38 2018 | |
082 | 0 | |a 364.16/8 |2 23 | |
100 | 1 | |0 (IdRef)226937259 |1 http://www.idref.fr/226937259/id |a Maurer, Tim. |4 aut. |e Auteur | |
245 | 1 | 0 | |a Cyber mercenaries : |b the state, hackers, and power |c Tim Maurer. |
264 | 1 | |a Cambridge ; |a New York : |b Cambridge University Press. | |
264 | 2 | |a Cambridge : |b Cambridge University Press, |c 2018. | |
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
337 | |b b |2 isbdmedia | ||
338 | |b ceb |2 RDAfrCarrier | ||
504 | |a Bibliographie. Index. | ||
505 | 0 | |a Part I. Of Brokers and Proxies. Cyber Proxies: An Introduction Proxies and Cyber Power ; What Cyber Proxies Are (Theoretically) Capable Of ; What Cyber Proxies Are Likely to Be Used For ; The Pool of Potential Cyber Proxies ; Proxy Relationships and Selected Cases ; Proxies and the Attribution Problem ; A Few Words on Methodology ; Conclusion: Cyber Proxies and the Bigger Picture -- Proxies: An Instrument of Power Since Ancient Times ; Framework for Thinking About Proxies ; Why Proxy Relationships Exist ; Three Main Types of Proxy Relationships: Delegation, Orchestration, and Sanctioning ; Conclusion: It's the Relationship That Matters -- Cyber Power: Geopolitics and Human Rights ; The Bigger Picture: Sovereignty and Information ; The US Government's Perspective ; The Russian Government's Perspective ; The Chinese Government's Perspective ; The Iranian Government's Perspective ; Conclusion: Cybersecurity Is in the Eye of the Beholder -- Part II. Cyber Proxies Up Close. Cyber Proxies on a Tight Leash: The United States ; Private Cybersecurity Contractors Delegation Under the Spotlight: US Cyber Command and Cybersecurity Contractors ; Private Cybersecurity Contractors and Internal Security ; Conclusion: Predictable Proliferation of Capabilities -- Cyber Proxies on a Loose Leash: Iran and Syria ; Orchestration Under the Spotlight: The US Indictment of Iranian Hackers ; Orchestration in Wartime: The Syrian Electronic Army ; Conclusion: Unexpected Escalation and Limited Options for Response -- Cyber Proxies on the Loose: The Former Soviet Union -- Sanctioning in Peacetime: The 2007 DDoS Attack on Estonia -- Sanctioning in Wartime: The Conflict in Ukraine (2014-Today) ; Blitz Orchestration: The War Against Georgia in 2008 ; Sanctioning and Mobilizing: The March 2017 US Indictment of Russian Hackers ; Conclusion: Sanctioning and Statehood -- Change Over Time: China's Evolving Relationships with Cyber Proxies -- The Rise of Hacktivists in China and the Government's Passive Support (1994-2003) -- The Creation of Militia Units and the Move Towards Orchestration (2003-13) ; Tightening Control and Aspirational Delegation (2013-Today) ; Conclusion: From Broker State to (Aspirational) Monopolist -- Part III. Implications. The Theory: State Responsibility and Cyber Proxies ; A Framework for Cyber Proxy Relationships Based on International Law ; Due Diligence ; Third Countries and Extraterritoriality ; Conclusion: International Cooperation Under Pressure -- The Practice: Shaping Cyber Proxy Relationships ; Keeping One's Own House in Order: Determining Inherently Governmental Functions ; Keeping One's Own House in Order: Determining the Role of the Private Sector ; Keeping One's Own House in Order: Nationalism and Hacktivism ; Conclusion: Nudging and Managing Instead of Dictating and Prohibiting 10Conclusion: Cyber Proxies, the Future, and Suggestions for Further Research | |
506 | |a Accès en ligne pour les établissements français bénéficiaires des licences nationales | ||
506 | |a Accès soumis à abonnement pour tout autre établissement | ||
520 | |a Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics | ||
540 | |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales |c https://www.licencesnationales.fr/wp-content/uploads/2024/03/2023-14_Collex_Cambridge_CCTP.pdf | ||
650 | 7 | |0 (IdRef)061614408 |1 http://www.idref.fr/061614408/id |a Pirates informatiques. |2 ram | |
650 | 7 | |0 (IdRef)10373578X |1 http://www.idref.fr/10373578X/id |a Cyberterrorisme. |2 ram | |
650 | 7 | |0 (IdRef)032258372 |1 http://www.idref.fr/032258372/id |a Technologie et relations internationales. |2 ram | |
650 | 0 | |a Hackers. |2 lc | |
650 | 0 | |a Hacking |x Political aspects. |2 lc | |
650 | 0 | |a Cyberterrorism. |2 lc | |
650 | 0 | |a Cyberspace |x Political aspects. |2 lc | |
650 | 0 | |a Internet and international relations. |2 lc | |
650 | 0 | |a Technology and international relations. |2 lc | |
856 | |u https://doi-org.srvext.uco.fr/10.1017/9781316422724 |z Accès à l'E-book | ||
856 | |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-9H7LRGX1-7 |z Accès sur la plateforme ISTEX (corpus CUP) | ||
886 | 2 | |2 unimarc |a 181 |a i# |b xxxe## | |
993 | |a E-Book | ||
994 | |a BNUM | ||
995 | |a 248432451 |