Für diesen Artikel ist leider kein Bild verfügbar.

Cyber Mercenaries

The State, Hackers, and Power

(Autor)

Buch | Softcover
266 Seiten
2018
Cambridge University Press (Verlag)
978-1-107-56686-6 (ISBN)
31,15 inkl. MwSt
Cybersecurity has become a front-page issue. This book is written for anybody interested in how states use the internet and hackers to project power. Illustrations and examples make this systematic analysis accessible to the broader public, policy- and decision-makers in government and industry, as well as professors and students.
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.

Tim Maurer co-directs the Cyber Policy Initiative at the Carnegie Endowment for International Peace. He is a member of several US track 1.5 cyber dialogues and the Freedom Online Coalition's cybersecurity working group. He co-chaired the Advisory Board of the 2015 Global Conference on CyberSpace, participated in the Global Commission on Internet Governance, and supported the confidence-building work of the OSCE. His work has been published by Foreign Policy, The Washington Post, TIME, Jane's Intelligence Review, CNN, Slate, Lawfare, and other academic and media venues. He holds a Master's in Public Policy from the Harvard Kennedy School.

Part I. Of Brokers and Proxies: 1. Cyber proxies: an introduction; 2. Proxies: an instrument of power since ancient times; 3. Cyber power: geopolitics and human rights; Part II. Cyber Proxies Up Close: 4. Cyber proxies on a tight leash: the United States; 5. Cyber proxies on a loose leash: Iran and Syria; 6. Cyber proxies on the loose: the former Soviet Union; 7. Change over time: China's evolving relationships with cyber proxies; Part III. Implications: 8. The theory: state responsibility and cyber proxies; 9. The practice: shaping cyber proxy relationships; 10. Conclusion: cyber proxies, the future, and suggestions for further research; Future research; Notes.

Erscheinungsdatum
Zusatzinfo 4 Tables, black and white; 2 Halftones, black and white; 8 Line drawings, black and white
Verlagsort Cambridge
Sprache englisch
Maße 152 x 228 mm
Gewicht 400 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Recht / Steuern EU / Internationales Recht
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
Recht / Steuern Strafrecht
Sozialwissenschaften Politik / Verwaltung Europäische / Internationale Politik
ISBN-10 1-107-56686-X / 110756686X
ISBN-13 978-1-107-56686-6 / 9781107566866
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95