Front Cover.
Half Title Page.
Recent Titles in Documentary and Reference Guides.
Title Page.
Copyright Page.
Contents.
Reader's Guide to Related Documents.
Introduction.
U.S. Cyber Strategy Documents.
1: National Security Strategy of the United States.
2: National Military Strategy of the United States of America: A Strategy of Flexible and Selective Engagement.
3: National Military Strategy of the United States of America: Shape, Respond, and Prepare Now: A Military Strategy for a New Era.
4: Quadrennial Defense Review.
5: A National Security Strategy for a New Century.
6: Quadrennial Defense Review Report.
7: The National Strategy to Secure Cyberspace.
8: The National Military Strategy of the United States of America: A Strategy for Today; a Vision for Tomorrow.
9: The National Defense Strategy of the United States of America.
10: Quadrennial Defense Review Report.
11: National Defense Strategy.
12: National Security Strategy.
13: Quadrennial Defense Review Report.
14: The National Military Strategy of the United States of America: Redefining America's Military Leadership.
15: International Strategy for Cyberspace.
16: Quadrennial Defense Review.
17: National Security Strategy.
18: The National Military Strategy of the United States of America: The United States Military's Contribution to National Security.
19: The Department of Defense Cyber Strategy.
20: National Security Strategy of the United States of America.
21: Summary of the 2018 National Defense Strategy of the United States of America.
22: National Cyber Strategy of the United States.
23: Summary, Department of Defense Cyber Strategy.
U.S. Assessments of Cyber Adversaries.
24: Military Power of the People's Republic of China.
25: Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation.
26: Mandiant APT1 Report: Exposing One of China's Cyber Espionage Units.
27: Military and Security Developments Involving the Democratic People's Republic of Korea.
28: China and International Law in Cyberspace.
29: Military and Security Developments Involving the People's Republic of China.
30: Cybersecurity Law of the People's Republic of China.
31: Grizzly Steppe—Russian Malicious Cyber Activity.
32: Assessing Russian Activities and Intentions in Recent U.S. Elections.
33: Russia Military Power.
34: Military and Security Developments Involving the Democratic People's Republic of Korea.
35: China Military Power.
U.S. Policies, Doctrine, and Reports.
36: Presidential Decision Directive/NSC-63.
37: Cyber Threat Source Descriptions.
38: The Comprehensive National Cybersecurity Initiative.
39: Resilient Military Systems and the Advanced Cyber Threat.
40: Executive Order 13636—Improving Critical Infrastructure Cybersecurity.
41: Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented.
42: National Infrastructure Protection Plan: Partnering for Critical Infrastructure Security and Resilience.
43: Presidential Policy Directive 21—Critical Infrastructure Security and Resilience.
44: Deterrence in the Age of Surprise.
45: U.S. Charges Five Chinese Military Hackers for Cyber Espionage against U.S. Corporations and a Labor Organization for Commercial Advantage.
46: Joint Publication 3-13: Information Operations.
47: Executive Order 13687—Imposing Additional Sanctions with Respect to North Korea.
48: Executive Order 13691—Promoting Private Sector Cybersecurity Information Sharing.
49: Cyberwarfare and Cyberterrorism: In Brief.
50: Department of Defense Law of War Manual.
51: Presidential Policy Directive 41: United States Cyber Incident Coordination.
52: Executive Order 13800—Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.
53: Information Warfare: Issues for Congress.
54: Cybersecurity: Selected Issues for the 115th Congress.
55: Joint Publication 3-12: Cyberspace Operations.
56: Developments in the Field of Information and Communications Technology in the Context of International Security.
Non-U.S. Strategy and Documents.
57: North Atlantic Treaty.
58: Unrestricted Warfare.
59: Tallinn Manual on the International Law Applicable to Cyber Warfare.
60: A Strong Britain in an Age of Uncertainty: The National Security Strategy.
61: Cyber Warfare.
62: National Cyber Security Strategies: Setting the Course for National Efforts to Strengthen Security in Cyberspace.
63: Cyberwarfare and International Humanitarian Law: The ICRC's Position.
64: Initial Set of OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies.
65: Wales Summit Declaration.
66: National Security Strategy and Strategic Defence and Security Review 2015: A Secure and Prosperous United Kingdom.
67: National Cyber Security Strategy 2016–2021.
68: People's Republic of China National Cyberspace Security Strategy.
69: Developments in the Field of Information and Communications Technology in the Context of International Security.
Speeches, Testimony, and Transcripts.
70: President Barack Obama, “Remarks on Securing the Nation's Cyber Infrastructure”.
71: William J. Lynn, III, “Remarks at the Defense Information Technology Acquisition Summit”.
72: Hillary Clinton, “Remarks on Internet Freedom”.
73: Statement for the Record of Seán P. McGurk before the U.S. Senate Homeland Security and Governmental Affairs Committee.
74: Leon Panetta, “Remarks on Cybersecurity”.
75: Robert S. Mueller, III, “Remarks before the RSA Cyber Security Conference”.
76: Statement of General Keith B. Alexander before the Senate Committee on Armed Services.
77: Keith Alexander, “Remarks at AFCEA International Cyber Symposium”.
78: Michael Rogers, “Testimony before the U.S. House Intelligence Committee”.
79: Barack Obama, “Remarks at the National Cybersecurity Communications Integration Center”.
80: Advance Policy Questions for the Honorable Ashton Carter.
81: Lisa O. Monaco, “Strengthening Our Nation's Cyber Defenses”.
82: James Clapper, Testimony before the U.S. Senate Committee on Armed Services.
83: Glenn S. Gerstell, “Confronting the Cybersecurity Challenge”.
84: Glenn S. Gerstell, “How We Need to Prepare for a Global Cyber Pandemic”.
85: Glenn S. Gerstell, “Failing to Keep Pace with the Cyber Threat and Its Implications for Our Privacy Laws”.
Chronology.
Bibliography.
Index.
About the Author.