Russian Cyber Operations. Scott Jasper

Russian Cyber Operations - Scott Jasper


Скачать книгу
armed forces with an emphasis on asymmetric weapons, in particular subsonic cruise and hypersonic aeroballistic missiles, the latter part of a potentially invincible arsenal designed to penetrate and evade limited US antimissile defenses.8 Cyber operations serve in another asymmetric arsenal of nonmilitary methods but achieve the same aim of penetration and evasion of cyber defenses. Russia has employed new models of warfare, the most debatable called “hybrid.” Since the Russian incursion into Ukraine in 2014, the Western strategic community has been “trying to come to grips with the concept of hybridity,”9 although NATO does define hybrid threats as a “type of threat that combines conventional, irregular and asymmetric activities in time and space,” which invariably includes cyber operations.10 Finally, in the arena of competition of IW, Russia prevails primarily by social media exploitation and cyber-enabled information operations (IO) that influence populations and challenge democratic processes.

       Conceptual Foundations

       Book Overview

      This introduction has provided the context and basis for an evaluation of Russian cyber operations as a facet of conflict or a component of competition. Chapter 1 will describe the technical (means used for intrusion, evasion, and deception) and legal (regimes for classification as an armed attack, a use of force, or an internationally wrongful act) framework to analyze and evaluate Russian cyber operations, known henceforth as the analytical framework. It will then depict the application of the analytical framework in a case study of Russian cyber operations against critical infrastructure in Ukraine. Each chapter will then present one or two case studies of the full range of Russian cyber operations (for theft, espionage, denial, and destruction) for analysis and evaluation by the analytical framework. Each case study will examine Russian exploitation of evolving technical means and disparate legal regimes. The book is organized into three parts to describe the role of Russian cyber operations, their rationality to use them, and cost-imposition options or defensive-solution choices to counter them.

      Part I, “Cyber Operations,” explains the use of Russian cyber operations in the setting of strategic competition. Chapter


Скачать книгу