Preface |
|
xiii | |
|
|
3 | (48) |
|
Information as a Tool of War |
|
|
3 | (3) |
|
The Role of Communications in Modern Warfare |
|
|
6 | (3) |
|
Early Attempts at Encryption |
|
|
9 | (1) |
|
Direct Observation Techniques |
|
|
10 | (3) |
|
The Creation of Cyberspace |
|
|
13 | (6) |
|
|
19 | (7) |
|
Cyber Enabling in the Nuclear Middle East |
|
|
26 | (6) |
|
Preparations for Infrastructure Cyber Attacks |
|
|
32 | (2) |
|
Russian Hacktivists and National Pride |
|
|
34 | (4) |
|
The Chinese Approach to Irregular Warfare |
|
|
38 | (7) |
|
The Current State of Cyber War |
|
|
45 | (1) |
|
|
46 | (5) |
|
2 Problems, Controversies, and Solutions |
|
|
51 | (58) |
|
|
51 | (4) |
|
Cyber as a Military Domain |
|
|
55 | (7) |
|
|
62 | (9) |
|
Instruments of National Power |
|
|
71 | (8) |
|
Cyber Crime, Cyber Espionage, Cyberterrorism |
|
|
79 | (13) |
|
The Problem of Attribution |
|
|
92 | (6) |
|
|
98 | (3) |
|
|
101 | (3) |
|
|
104 | (5) |
|
|
109 | (34) |
|
Escalation in Cyberspace: Martin Libicki |
|
|
110 | (6) |
|
Training Tomorrow's Cyber Warriors: Nicholas Michael Sambaluk |
|
|
116 | (4) |
|
Cyber Warfare in the Professional Military Education System: S. Michael Pavelec |
|
|
120 | (5) |
|
Waging e-Jihad: Heidi L. Dexter |
|
|
125 | (6) |
|
The Relationship between Space and Cyber Assets: Brian Tannehill |
|
|
131 | (6) |
|
|
137 | (6) |
|
|
143 | (68) |
|
|
143 | (2) |
|
|
145 | (1) |
|
|
146 | (2) |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
151 | (2) |
|
Defense Advanced Research Projects Agency (DARPA) |
|
|
153 | (2) |
|
Defense Information Systems Agency (U.S.) |
|
|
155 | (2) |
|
|
157 | (1) |
|
|
158 | (3) |
|
|
161 | (2) |
|
Kaspersky, Yevgeniy "Eugene" Valentinovich |
|
|
163 | (2) |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
168 | (2) |
|
|
170 | (2) |
|
|
172 | (3) |
|
|
175 | (3) |
|
NATO Cooperative Cyber Defence Centre of Excellence |
|
|
178 | (1) |
|
People's Liberation Army Unit 61398 (China) |
|
|
179 | (2) |
|
Qiao Liang and Wang Xiangsui |
|
|
181 | (3) |
|
|
184 | (1) |
|
|
185 | (2) |
|
Russian Business Network (RBN) |
|
|
187 | (1) |
|
|
188 | (4) |
|
|
192 | (2) |
|
|
194 | (2) |
|
|
196 | (1) |
|
|
197 | (2) |
|
|
199 | (3) |
|
|
202 | (9) |
|
|
211 | (42) |
|
Excerpts from the North Atlantic Treaty (1949) |
|
|
211 | (2) |
|
Remarks of President Barack Obama on Securing the Nation's Cyber Infrastructure, Washington, D.C., May 29, 2009 |
|
|
213 | (5) |
|
Excerpts of Secretary of State Hillary Clinton on Internet Freedom, Washington, D.C., January 21, 2010 |
|
|
218 | (5) |
|
Excerpts from the Tallinn Manual on the International Law Applicable to Cyber Warfare, Draft, NATO Cooperative Cyber Defence Centre of Excellence, 2010 |
|
|
223 | (3) |
|
Excerpts of "International Strategy for Cyberspace," May 2011 |
|
|
226 | (10) |
|
Excerpts of Secretary of Defense Leon Panetta on Cybersecurity, October 11, 2012 |
|
|
236 | (6) |
|
Excerpts from U.S. Department of Defense, Defense Science Board, Task Force Report: "Resilient Military Systems and the Advanced Cyber Threat," January 2013 |
|
|
242 | (6) |
|
Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the Senate Committee on Armed Services, March 12, 2013 |
|
|
248 | (5) |
|
|
253 | (42) |
|
|
253 | (34) |
|
|
287 | (8) |
|
|
295 | (18) |
Glossary |
|
313 | (10) |
Index |
|
323 | (18) |
About the Author |
|
341 | |