Description
Book SynopsisAre cyber operations as revolutionary as the headlines suggest? Do they compel rival states and alter international politics? By examining cyber strategy as a contemporary form of political warfare and covert action, this book demonstrates that the digital domain complements rather than replaces traditional instruments of power.
Trade ReviewThis hugely important work needs to be an inspiration for future works across the cyber field. Nuanced, subtle, and extremely well written, the work aims to explain what cyber strategy may actually be, how it comes in diverse forms not only across issue areas but across state interests, and whether or not cyber really does signal an entirely new and different era in warfare. Summing up: Essential. * M. D. Crosston, CHOICE *
Cyber Strategy makes a compelling case that our new age of connectivity is also one of vulnerability. Not only due to the potential for disruption of democratic processes and theft or ransoming of valuable information. But also because many nations believe, perhaps mistakenly, that they can commit predatory acts in cyberspace — to spy, extort, or simply inflict costs upon others — with little fear of escalation to wider warfare. Valeriano, Jensen, and Maness examine these and other issues in cyber strategy, rigorously and unflinchingly. * John Arquilla, Distinguished Professor of Defense Analysis, United States Naval Postgraduate School *
The United States is dangerously insecure in cyberspace and we are at great risk from both nation state adversaries and non-state actors alike. This book provides a comprehensive analysis of the utility and efficacy of cyber coercion and great insight into how we can reevaluate cyber strategy. We hope to push the United States into a position where we can defend our nation and, if required, impose costs on our adversaries, serious work like Cyber Strategy provides a solid foundation for these efforts. * Mike Gallagher, , U.S. Representative for Wisconsin's 8th Congressional District *
In a new era of cyber coercion, we have more to fear from state-backed botnets manipulating our social media feed than from cyber bombs destroying our electric grid. "Avoiding both hype and complacency, this important book uses empirical evidence to illuminate the strategies of disruption, espionage, and degradation that threaten us, and to outline what we can do about it."-Joseph S. Nye, Jr., author of The Future of Power
Cyber Strategy brings together a tremendous amount of emerging research in the field of cyber conflict, tying theory to observed campaigns and data sets to tackle the big questions. Valeriano, Jensen, and Maness clearly lay out their hypotheses and evidence on the behavior of the main cyber powers (Russia, China, and the United States) and the dynamics of the conflict between them."-Jason Healey, Senior Research Scholar, School of International and Public Affairs, Columbia University
Table of ContentsPreface Acknowledgements Chapter 1 - Introduction: Are Cyber Strategies Coercive? Chapter 2 - How Rival States Employ Cyber Strategy: Disruption, Espionage, and Degradation Chapter 3 - The Correlates of Cyber Strategy Chapter 4 - Cyber Coercion as a Combined Strategy Chapter 5 - Commissars and Crooks: Russian Cyber Coercion Chapter 6 - China and the Technology Gap: Chinese Strategic Behavior in Cyberspace Chapter 7 - The United States: The Cyber Reconnaissance-Strike Complex Chapter 8 - Conclusion: Cyber Political Warfare with Limited Effects Appendix 1: The Dyadic Cyber Incident and Dispute Dataset Version 1.1 Appendix 2: Cyber Strategy Summary Appendix 3: The Dyadic Cyber Incident and Dispute Dataset (DCID), version 1.1, summarized version Notes Bibliography Index