NEW

Cyber Warfare: A Documentary and Reference Guide, 1st Edition

  • Paul J. Springer
  • Published By:
  • ISBN-10: 1440872791
  • ISBN-13: 9781440872792
  • DDC: 355.4
  • 357 Pages | eBook
  • Original Copyright 2020 | Published/Released July 2020
  • This publication's content originally published in print form: 2020

  • Price:  Sign in for price

About

Overview

This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare. The title's nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the United States is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare.

Table of Contents

Front Cover.
Half Title Page.
Recent Titles in Documentary and Reference Guides.
Title Page.
Copyright Page.
Contents.
Reader's Guide to Related Documents.
Introduction.
U.S. Cyber Strategy Documents.
1: National Security Strategy of the United States.
2: National Military Strategy of the United States of America: A Strategy of Flexible and Selective Engagement.
3: National Military Strategy of the United States of America: Shape, Respond, and Prepare Now: A Military Strategy for a New Era.
4: Quadrennial Defense Review.
5: A National Security Strategy for a New Century.
6: Quadrennial Defense Review Report.
7: The National Strategy to Secure Cyberspace.
8: The National Military Strategy of the United States of America: A Strategy for Today; a Vision for Tomorrow.
9: The National Defense Strategy of the United States of America.
10: Quadrennial Defense Review Report.
11: National Defense Strategy.
12: National Security Strategy.
13: Quadrennial Defense Review Report.
14: The National Military Strategy of the United States of America: Redefining America's Military Leadership.
15: International Strategy for Cyberspace.
16: Quadrennial Defense Review.
17: National Security Strategy.
18: The National Military Strategy of the United States of America: The United States Military's Contribution to National Security.
19: The Department of Defense Cyber Strategy.
20: National Security Strategy of the United States of America.
21: Summary of the 2018 National Defense Strategy of the United States of America.
22: National Cyber Strategy of the United States.
23: Summary, Department of Defense Cyber Strategy.
U.S. Assessments of Cyber Adversaries.
24: Military Power of the People's Republic of China.
25: Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation.
26: Mandiant APT1 Report: Exposing One of China's Cyber Espionage Units.
27: Military and Security Developments Involving the Democratic People's Republic of Korea.
28: China and International Law in Cyberspace.
29: Military and Security Developments Involving the People's Republic of China.
30: Cybersecurity Law of the People's Republic of China.
31: Grizzly Steppe—Russian Malicious Cyber Activity.
32: Assessing Russian Activities and Intentions in Recent U.S. Elections.
33: Russia Military Power.
34: Military and Security Developments Involving the Democratic People's Republic of Korea.
35: China Military Power.
U.S. Policies, Doctrine, and Reports.
36: Presidential Decision Directive/NSC-63.
37: Cyber Threat Source Descriptions.
38: The Comprehensive National Cybersecurity Initiative.
39: Resilient Military Systems and the Advanced Cyber Threat.
40: Executive Order 13636—Improving Critical Infrastructure Cybersecurity.
41: Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented.
42: National Infrastructure Protection Plan: Partnering for Critical Infrastructure Security and Resilience.
43: Presidential Policy Directive 21—Critical Infrastructure Security and Resilience.
44: Deterrence in the Age of Surprise.
45: U.S. Charges Five Chinese Military Hackers for Cyber Espionage against U.S. Corporations and a Labor Organization for Commercial Advantage.
46: Joint Publication 3-13: Information Operations.
47: Executive Order 13687—Imposing Additional Sanctions with Respect to North Korea.
48: Executive Order 13691—Promoting Private Sector Cybersecurity Information Sharing.
49: Cyberwarfare and Cyberterrorism: In Brief.
50: Department of Defense Law of War Manual.
51: Presidential Policy Directive 41: United States Cyber Incident Coordination.
52: Executive Order 13800—Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.
53: Information Warfare: Issues for Congress.
54: Cybersecurity: Selected Issues for the 115th Congress.
55: Joint Publication 3-12: Cyberspace Operations.
56: Developments in the Field of Information and Communications Technology in the Context of International Security.
Non-U.S. Strategy and Documents.
57: North Atlantic Treaty.
58: Unrestricted Warfare.
59: Tallinn Manual on the International Law Applicable to Cyber Warfare.
60: A Strong Britain in an Age of Uncertainty: The National Security Strategy.
61: Cyber Warfare.
62: National Cyber Security Strategies: Setting the Course for National Efforts to Strengthen Security in Cyberspace.
63: Cyberwarfare and International Humanitarian Law: The ICRC's Position.
64: Initial Set of OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies.
65: Wales Summit Declaration.
66: National Security Strategy and Strategic Defence and Security Review 2015: A Secure and Prosperous United Kingdom.
67: National Cyber Security Strategy 2016–2021.
68: People's Republic of China National Cyberspace Security Strategy.
69: Developments in the Field of Information and Communications Technology in the Context of International Security.
Speeches, Testimony, and Transcripts.
70: President Barack Obama, “Remarks on Securing the Nation's Cyber Infrastructure”.
71: William J. Lynn, III, “Remarks at the Defense Information Technology Acquisition Summit”.
72: Hillary Clinton, “Remarks on Internet Freedom”.
73: Statement for the Record of Seán P. McGurk before the U.S. Senate Homeland Security and Governmental Affairs Committee.
74: Leon Panetta, “Remarks on Cybersecurity”.
75: Robert S. Mueller, III, “Remarks before the RSA Cyber Security Conference”.
76: Statement of General Keith B. Alexander before the Senate Committee on Armed Services.
77: Keith Alexander, “Remarks at AFCEA International Cyber Symposium”.
78: Michael Rogers, “Testimony before the U.S. House Intelligence Committee”.
79: Barack Obama, “Remarks at the National Cybersecurity Communications Integration Center”.
80: Advance Policy Questions for the Honorable Ashton Carter.
81: Lisa O. Monaco, “Strengthening Our Nation's Cyber Defenses”.
82: James Clapper, Testimony before the U.S. Senate Committee on Armed Services.
83: Glenn S. Gerstell, “Confronting the Cybersecurity Challenge”.
84: Glenn S. Gerstell, “How We Need to Prepare for a Global Cyber Pandemic”.
85: Glenn S. Gerstell, “Failing to Keep Pace with the Cyber Threat and Its Implications for Our Privacy Laws”.
Chronology.
Bibliography.
Index.
About the Author.