2nd Edition

Understanding Cyber-Warfare Politics, Policy and Strategy

By Christopher Whyte, Brian Mazanec Copyright 2023
    364 Pages 20 B/W Illustrations
    by Routledge

    364 Pages 20 B/W Illustrations
    by Routledge

    This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The second edition has been revised and updated throughout, with three new chapters.

    Cyber warfare involves issues of doctrine, strategy, policy, international relations (IR) and operational practice associated with computer network attack, computer network exploitation and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introduction to key state and non-state actors.

    Specifically, the book provides a comprehensive overview of several key issue areas:

    • The historical context of the emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation and defense
    • An interdisciplinary set of theoretical perspectives on conflict in the digital age from the point of view of the fields of IR, security studies, psychology and science, technology and society (STS) studies
    • Current national perspectives, policies, doctrines and strategies relevant to cyber warfare
    • An examination of key challenges in international law, norm development and deterrence; and
    • The role of emerging information technologies like artificial intelligence and quantum computing in shaping the dynamics of global cyber conflict

    This textbook will be essential reading for students of cybersecurity/cyber conflict and information warfare, and highly recommended for students of intelligence studies, security and strategic studies, defense policy, and IR in general.

    1. Introduction

    2. The Technological Foundations of Insecurity in the Digital Age

    3. Cyberspace and International Relations

    4. Exploit: From Signals Intelligence to Cyber Warriors

    5. Attack: From Exploitation to Offensive Cyber Operations

    6. Shape: Subvert, Deceive, Poison

    7. The Topology and History of Major Cyber Conflict Episodes

    8. National Experiences with Cyber-Security: Realization and Institutional Development

    9. States at Cyberwar: The Dynamics and National Strategies of Cyber Conflict

    10. Cyber Conflict as ‘Grey Zone’ Conflict

    11. Non-State Actors: Terrorism, Subversion and Activism Online

    12. Norms, Ethics and International Law for Offensive Cyber Operations

    13. Evolution: How the Logics of Cyber Conflict Might Change

    14. Revolution: How the Nature of Cyber Conflict Might Change

    Biography

    Christopher Whyte is an assistant professor in the program on Homeland Security & Emergency Preparedness at the L. Douglas Wilder School of Government & Public Affairs, Virginia Commonwealth University. He is co-editor of Information Warfare in the Age of Cyber Conflict (2020) and co-author of Information at War (2022).

    Brian M. Mazanec is an adjunct professor in the Defense and Strategic Studies program at Missouri State University and a senior executive with the U.S. government. He is author of The Evolution of Cyber War (2015), co-author of Deterring Cyber Warfare (2014) and co-editor of Information Warfare in the Age of Cyber Conflict (2020).

    'This book is a great contribution to the cyber canon and offers a comprehensive reference for both students and policymakers. The authors cover down on the many dynamic facets of cyber conflict, providing a strong foundation for anyone interested in this critical aspect of international relations.'

    General Michael V. Hayden, Former Director of the Central Intelligence Agency and National Security Agency

    'This second edition is an absolute must-read for anyone looking to learn more about the critically important threat of cyber warfare. This updated and enhanced text helps prepare readers for how to think about the historical, technical, and strategic context of conflict in this critically important domain.'

    Samantha F. Ravich, Former Commissioner, US Cyberspace Solarium Commission and Chair, Center on Cyber and Technology Innovation

    'An authoritative tutorial on the arcane complexities of cyber warfare. This edition updates a previous version and makes the book more contemporary. It is a must-read for those who are serious about mastering this unique medium of combat, in all its dimensions.'

    James R. Clapper, former Director of National Intelligence

    Praise for the first edition:

    'This book is an important summary and tour-de-force of historical and contemporary Cyber issues. It is a go-to comprehensive reference for both students and policymakers interested in perhaps the most transcendent strategic topic of our time. The authors of this book have captured the core essence and components of this story.'

    Admiral William O. Studeman USN (Ret.), Former Director NSA and Deputy Director CIA

    'This book is an absolute must-read for anyone looking to learn more about the critically important threat of cyber warfare. This text helps prepare readers for how to think about the historical, technical, and strategic context of conflict in this emerging new domain.'

    Samantha F. Ravich, Chair, Transformative Cyber Innovation Lab, and Principal Investigator, Cyber-Enabled Economic Warfare Project 

    'This remarkable effort represents the true first textbook of cyber conflict. The volume avoids the hype and bluster of the typical comprehensive accounts to accurately survey the issues, facts, and problems inherent in the cyber domain. A sure must-adopt for anyone teaching a cyber-security course.'

    Brandon Valeriano, Donald Bren Chair of Armed Politics, Marine Corps University, USA 

    'All cyber operators and planners should consider this volume as an extremely useful desk reference and those new to the field should consider themselves well served when taking a class requiring this text.'

    Mark T. Peters II, USAF (Ret.), Journal of Strategic Security, Vol. 12 (3)