scispace - formally typeset
Open AccessBook

Cyber War Will Not Take Place

TLDR
Cyber War will not take place: Cyber War Will Not Take Place as mentioned in this paper is a recent book by Thomas Rid, who argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways.
Abstract
"Cyber war is coming," announced a land-mark RAND report in 1993. In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the "fifth domain" of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain? Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways. The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure? How serious is the threat of "pure" cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A secure control framework for resource-limited adversaries

TL;DR: In this paper, an attack space defined by the adversary's model knowledge, disclosure, and disruption resources is introduced, and an attack policy for each scenario is described and the attack's impact is characterized using the concept of safe sets.
Journal ArticleDOI

Attributing Cyber Attacks

TL;DR: It is argued that attribution is what states make of it and to show how, the Q Model is introduced: designed to explain, guide, and improve the making of attribution.
Proceedings ArticleDOI

Revealing stealthy attacks in control systems

TL;DR: This paper characterize and analyze the stealthiness properties of zero-dynamics attacks for linear time-invariant systems, and proposes detection methods for such attacks by modifying the system's structure.
Journal ArticleDOI

Cyber situational awareness – A systematic review of the literature

TL;DR: A systematic and up-to-date review of the scientific literature on cyber situational awareness is presented, based on systematic queries in four leading scientific databases.
Journal ArticleDOI

Deterrence and Dissuasion in Cyberspace

TL;DR: The lesson for policymakers is to focus on the most important attacks and to understand the context in which such attacks may occur and the full range of mechanisms available to prevent them.
References
More filters
Book

Counterinsurgency Warfare: Theory and Practice

David Galula
TL;DR: The Prerequisites for a Successful Insurgency: Nature and Characteristics of a successful insurgency as discussed by the authors The Strategy to Tactics: The Operations and Operations of Successful Insurges.
Journal ArticleDOI

The Hunt For The Kill Switch

TL;DR: The Trust in Integrated Circuits (TIIC) program as discussed by the authors is a three-year initiative to verify the integrity of the military's integrated circuits, including the F-35.
Book

Cyberwar is coming

TL;DR: In this article, the authors introduce two concepts for thinking about cyberwar and netwar, namely cyber-war and cyber-netwar, in which neither mass nor mobility will decide outcomes; instead, the side that knows more, that can disperse the fog of war yet enshroud an adversary in it, will enjoy decisive advantages.
Book

Cyberdeterrence and Cyberwar

TL;DR: There are important differences in how states are involved in cyberspace and how the United States protects itself in the face of attack.
Journal ArticleDOI

Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political

TL;DR: In this article, it is shown that cyber-attacks are associated with social, political, economic, and cultural (SPEC) conflicts, and that SPEC factors have the potential to be early predictors for outbreaks of anomalous activities, hostile attacks, and other security breaches in cyberspace.