librsnet@mail.ru
Russian Cyber Operations. Scott Jasper
>
RUSSIAN CYBER OPERATIONS
Other Titles of Interest from Georgetown University Press
Conflict and Cooperation in the Global Commons: A Comprehensive Approach for International Security edited by Scott Jasper
Cyber Blockades by Alison Lawlor Russell
Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World edited by Derek S. Reveron
Hacking the Bomb: Cyber Threats and Nuclear Weapons by Andrew Futter
Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks by Robert Mandel
The Russian Understanding of War: Blurring the Lines between War and Peace by Oscar Jonsson
Strategy, Evolution, and War: From Apes to Artificial Intelligence by Kenneth Payne
Understanding Cyber Conflict: Fourteen Analogies edited by George Perkovich and Ariel E. Levite
RUSSIAN CYBER OPERATIONS
CODING THE BOUNDARIES OF CONFLICT
SCOTT JASPER
Foreword by Gen. Keith Alexander, USA (Ret.)
© 2020 Georgetown University Press. All rights reserved. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage and retrieval system, without permission in writing from the publisher.
The publisher is not responsible for third-party websites or their content. URL links were active at time of publication.
Library of Congress Cataloging-in-Publication Data
Names: Jasper, Scott, author.
Title: Russian Cyber Operations : Coding the Boundaries of Conflict / Scott Jasper.
Description: Washington, DC : Georgetown University Press, 2020. | Includes bibliographical references and index.
Identifiers: LCCN 2019038780 (print) | LCCN 2019038781 (ebook) | ISBN 9781626167971 (hardcover) | ISBN 9781626167995 (ebook)
Subjects: LCSH: Cyberspace operations (Military science)—Russia (Federation) | Information warfare—Russia (Federation) | Hybrid warfare—Russia (Federation) | Asymmetric warfare—Russia (Federation) | Cyber intelligence (Computer security)—United States. | Computer security—United States.
Classification: LCC U167.5.C92 J375 2020 (print) | LCC U167.5.C92 (ebook) | DDC 355.4/1—dc23
LC record available at https://lccn.loc.gov/2019038780
LC ebook record available at https://lccn.loc.gov/2019038781
This book is printed on acid-free paper meeting the requirements of the American National Standard for Permanence in Paper for Printed Library Materials.
21 20 9 8 7 6 5 4 3 2 First printing
Printed in the United States of America.
Jacket design by Martyn Schmoll.
Contents
Foreword by Gen. Keith Alexander, USA (Ret.)
Introduction. Below the Threshold
4Information Warfare Component
Conclusion. A Different Approach
Illustrations
Maps
Figures
3.1The Role of Nonmilitary Methods in Interstate Conflict Resolution
7.1Risk-Management Framework Steps
8.1Automated Cyber-Defense Demonstration
Foreword
Since World War II, we have faced Russia in the Cold War and now, after the “fall of the Wall,” in a new era of both conflict and competition. Scott Jasper, on the faculty at the Naval Postgraduate School, does an excellent job of laying out the facts and the issues that Russia poses to the United States