Striking Back: The End of Peace in Cyberspace - And How to Restore ItYale University Press, 18 okt 2022 - 256 pagina's Faced with relentless technological aggression that imperils democracy, how can Western nations fight back? Before the cyber age, foreign interference in democratic politics played out in a comparatively narrow arena. The rapid expansion of cyberspace has radically altered this situation. The hacking activities of Russian military agents in the 2016 US presidential election and other major incidents demonstrate the sophisticated offensive strategies pursued by geopolitical adversaries. The West is winning the technology race—yet losing the larger contest over cybersecurity. Lucas Kello reveals the failures of present policy to prevent cyberattacks and other forms of technological aggression. Drawing upon case studies and interviews with decision-makers, he develops a bold new approach: a concentrated and coordinated response strategy that targets adversaries’ interests and so recaptures the initiative. Striking Back provides an original solution to national security challenges in our era of intense technological rivalry. |
Inhoudsopgave
The Limits of Law and Norms | |
Revisionism in the International System | |
Russia and New Technological Threats to Democracy | |
The Rising Technological Hegemon | |
To Deter or Not | |
How to Strike Back | |
What Kind of NATO? Punctuated Deterrence in Practice | |
The Return of Denial? | |
A Partial Restoration of Peace | |
Notes | |
Overige edities - Alles bekijken
Striking Back: The End of Peace in Cyberspace - and How to Restore It Lucas Kello Gedeeltelijke weergave - 2022 |
Veelvoorkomende woorden en zinsdelen
achieve action activity acts adversaries Affairs alliance allies apply approach armed attack authorities campaign central challenge Chapter China Chinese cloud concept concerns continuity conventional costs cyber cyber activity cyberattacks cyberspace data embassies defense democratic Department deterrence disruption doctrine economic effects election emerged Estonian European example existing February force foreign policy functions German global hackers hacking important industrial infrastructure institutions integrity Intelligence interests international law international order Internet involves Journal June leaders liberal limits March means military national security nature norms nuclear offensive officials operations Party peace physical political prevent principles problem protect punishment Putin question relations requires response risk rules Russian sanctions seeks servers social sovereignty Soviet strategic technological territorial threats Ukraine United University Press values virtual warfare weapons Western York