R&L Logo R&L Logo
  • GENERAL
    • Browse by Subjects
    • New Releases
    • Coming Soon
    • Chases's Calendar
  • ACADEMIC
    • Textbooks
    • Browse by Course
    • Instructor's Copies
    • Monographs & Research
    • Reference
  • PROFESSIONAL
    • Education
    • Intelligence & Security
    • Library Services
    • Business & Leadership
    • Museum Studies
    • Music
    • Pastoral Resources
    • Psychotherapy
  • FREUD SET
Cover Image
Paperback
eBook
share of facebook share on twitter
Add to GoodReads

Bytes, Bombs, and Spies

The Strategic Dimensions of Offensive Cyber Operations

Edited by Herbert Lin and Amy Zegart

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that destroys centrifuges in Iran, slowing that country's attempt to build a nuclear weapon.

ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack.

A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign.

Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy.

This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called “digital combat power” and how the United States should incorporate that power into its national security strategy.

  • Details
  • Details
  • Author
  • Author
  • TOC
  • TOC
Rowman & Littlefield Publishers / Brookings Institution Press
Pages: 440 • Trim: 6 x 9
978-0-8157-3547-2 • Paperback • January 2019 • $52.00 • (£40.00)
978-0-8157-3548-9 • eBook • January 2019 • $49.00 • (£38.00)
Subjects: Political Science / Security (National & International), Political Science / Intelligence & Espionage, Political Science / International Relations / Arms Control

Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University.

Amy Zegart is a senior fellow at the Freeman Spogli Institute of International Studies (FSI), professor of political science (by courtesy) at Stanford University, and a contributing editor to The Atlantic. She is also the Davies Family Senior Fellow at the Hoover Institution, where she directs the Robert and Marion Oster National Security Affairs Fellows program. She is founder and co-director of the Stanford Cyber Policy Program.

Contents:

List of Figures and Tables

Acknowledgments

1. Introduction

2. Illuminating a New Domain: The Role and Nature of Military Intelligence, Surveillance, and Reconnaissance in Cyberspace

3. How Effects, Saliencies, and Norms Should Influence U.S. Cyberwar Doctrine

4. A Strategic Assessment of the U.S. Cyber Command Vision

5. A Cyber SIOP? Operational Considerations for Strategic Offensive Cyber Planning

6. Second Acts in Cyberspace

7. Hacking a Nation's Missile Development Program

8. The Cartwright Conjecture: The Deterrent Value and Escalatory Risk of Fearsome Cyber Capabilities

9. The Cyber Commitment Problem and the Destabilization of Nuclear Deterrence

10. Cyber Terrorism: Its Effects on Psychological Well-Being, Public Confidence, and Political Attitudes

11. Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications

12. Rules of Engagement for Cyberspace Operations: A View from the United States

13. U.S. Offensive Cyber Operations in a China-U.S. Military Confrontation

14. Disintermediation, Counterinsurgency, and Cyber Defense

15. Private Sector Cyber Weapons: An Adequate Response to the Sovereignty Gap?

16. Cyberwar Inc.: Examining the Role of Companies in Offensive Cyber Operations

Index

Contributors

Bytes, Bombs, and Spies

The Strategic Dimensions of Offensive Cyber Operations

Cover Image
Paperback
eBook
Summary
Summary
  • “We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

    A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

    A computer virus is unleashed that destroys centrifuges in Iran, slowing that country's attempt to build a nuclear weapon.

    ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack.

    A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign.

    Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy.

    This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called “digital combat power” and how the United States should incorporate that power into its national security strategy.

Details
Details
  • Rowman & Littlefield Publishers / Brookings Institution Press
    Pages: 440 • Trim: 6 x 9
    978-0-8157-3547-2 • Paperback • January 2019 • $52.00 • (£40.00)
    978-0-8157-3548-9 • eBook • January 2019 • $49.00 • (£38.00)
    Subjects: Political Science / Security (National & International), Political Science / Intelligence & Espionage, Political Science / International Relations / Arms Control
Author
Author
  • Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University.

    Amy Zegart is a senior fellow at the Freeman Spogli Institute of International Studies (FSI), professor of political science (by courtesy) at Stanford University, and a contributing editor to The Atlantic. She is also the Davies Family Senior Fellow at the Hoover Institution, where she directs the Robert and Marion Oster National Security Affairs Fellows program. She is founder and co-director of the Stanford Cyber Policy Program.

Table of Contents
Table of Contents
  • Contents:

    List of Figures and Tables

    Acknowledgments

    1. Introduction

    2. Illuminating a New Domain: The Role and Nature of Military Intelligence, Surveillance, and Reconnaissance in Cyberspace

    3. How Effects, Saliencies, and Norms Should Influence U.S. Cyberwar Doctrine

    4. A Strategic Assessment of the U.S. Cyber Command Vision

    5. A Cyber SIOP? Operational Considerations for Strategic Offensive Cyber Planning

    6. Second Acts in Cyberspace

    7. Hacking a Nation's Missile Development Program

    8. The Cartwright Conjecture: The Deterrent Value and Escalatory Risk of Fearsome Cyber Capabilities

    9. The Cyber Commitment Problem and the Destabilization of Nuclear Deterrence

    10. Cyber Terrorism: Its Effects on Psychological Well-Being, Public Confidence, and Political Attitudes

    11. Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications

    12. Rules of Engagement for Cyberspace Operations: A View from the United States

    13. U.S. Offensive Cyber Operations in a China-U.S. Military Confrontation

    14. Disintermediation, Counterinsurgency, and Cyber Defense

    15. Private Sector Cyber Weapons: An Adequate Response to the Sovereignty Gap?

    16. Cyberwar Inc.: Examining the Role of Companies in Offensive Cyber Operations

    Index

    Contributors

ALSO AVAILABLE

  • Cover image for the book Communicating with Intelligence: Writing and Briefing for National Security, Third Edition
  • Cover image for the book Counterintelligence Theory and Practice, Second Edition
  • Cover image for the book Human Security: Theory and Action, Second Edition
  • Cover image for the book The Handbook of Cross-Border Ethnic and Religious Affinities
  • Cover image for the book Dr. Seuss and the Art of War: Secret Military Lessons
  • Cover image for the book Introduction to Conflict Resolution: Discourses and Dynamics
  • Cover image for the book Constructive Conflicts: From Emergence to Transformation, Sixth Edition
  • Cover image for the book What Do We Know about Civil Wars?, Second Edition
  • Cover image for the book North Korea, Nuclear Risk-Taking, and the United States: Kim Il Sung, Kim Jong Il, and Kim Jong Un
  • Cover image for the book Food Supply Protection and Homeland Security, Second Edition
  • Cover image for the book Terrorist Organizations and Weapons of Mass Destruction: U.S. Threats, Responses, and Policies
  • Cover image for the book The Handbook of African Intelligence Cultures
  • Cover image for the book The Indian Ocean Region: A Strategic Net Assessment
  • Cover image for the book Nuclear Weapons and American Grand Strategy
  • Cover image for the book The Centaur's Dilemma: National Security Law for the Coming AI Revolution
  • Cover image for the book Money for Mayhem: Mercenaries, Private Military Companies, Drones, and the Future of War
  • Cover image for the book Truth and Reconciliation Commission Processes: Learning from the Solomon Islands
  • Cover image for the book American National Security Policy: Authorities, Institutions, and Cases
  • Cover image for the book Understanding Cybersecurity: Emerging Governance and Strategy
  • Cover image for the book Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets
  • Cover image for the book Energy Infrastructure Protection and Homeland Security, Second Edition
  • Cover image for the book The Use of Force: Military Power and International Politics, Eighth Edition
  • Cover image for the book U.S. Department of Defense Contract Spending and the Industrial Base, 2000-2013
  • Cover image for the book Strategic Cyber Deterrence: The Active Cyber Defense Option
  • Cover image for the book Overcoming Intractable Conflicts: New Approaches to Constructive Transformations
  • Cover image for the book Hybridity, Conflict, and the Global Politics of Cybersecurity
  • Cover image for the book Asia’s Trouble Spots: The Leadership Question in Conflict Resolution
  • Cover image for the book Rebuilding the Arsenal of Democracy: The U.S. and Chinese Defense Industrial Bases in an Era of Great Power Competition, CSIS Report
  • Cover image for the book Conflict Intervention and Transformation: Theory and Practice
  • Cover image for the book U.S. National Security Law: An International Perspective
  • Cover image for the book Security Studies: Classic to Post-Modern Approaches
  • Cover image for the book The Handbook of Asian Intelligence Cultures
  • Cover image for the book The Future of National Intelligence: How Emerging Technologies Reshape Intelligence Communities
  • Cover image for the book National, International, and Human Security: Protection against Violence, Third Edition
  • Cover image for the book Dynamics of the Changing Global Security Order: Emerging Trends and Key Issues in Asia
  • Cover image for the book Drug Trafficking and International Security
  • Cover image for the book The Handbook of Latin American and Caribbean Intelligence Cultures
  • Cover image for the book Gender, Global Health, and Violence: Feminist Perspectives on Peace and Disease
  • Cover image for the book Communicating with Intelligence: Writing and Briefing for National Security, Third Edition
  • Cover image for the book Counterintelligence Theory and Practice, Second Edition
  • Cover image for the book Human Security: Theory and Action, Second Edition
  • Cover image for the book The Handbook of Cross-Border Ethnic and Religious Affinities
  • Cover image for the book Dr. Seuss and the Art of War: Secret Military Lessons
  • Cover image for the book Introduction to Conflict Resolution: Discourses and Dynamics
  • Cover image for the book Constructive Conflicts: From Emergence to Transformation, Sixth Edition
  • Cover image for the book What Do We Know about Civil Wars?, Second Edition
  • Cover image for the book North Korea, Nuclear Risk-Taking, and the United States: Kim Il Sung, Kim Jong Il, and Kim Jong Un
  • Cover image for the book Food Supply Protection and Homeland Security, Second Edition
  • Cover image for the book Terrorist Organizations and Weapons of Mass Destruction: U.S. Threats, Responses, and Policies
  • Cover image for the book The Handbook of African Intelligence Cultures
  • Cover image for the book The Indian Ocean Region: A Strategic Net Assessment
  • Cover image for the book Nuclear Weapons and American Grand Strategy
  • Cover image for the book The Centaur's Dilemma: National Security Law for the Coming AI Revolution
  • Cover image for the book Money for Mayhem: Mercenaries, Private Military Companies, Drones, and the Future of War
  • Cover image for the book Truth and Reconciliation Commission Processes: Learning from the Solomon Islands
  • Cover image for the book American National Security Policy: Authorities, Institutions, and Cases
  • Cover image for the book Understanding Cybersecurity: Emerging Governance and Strategy
  • Cover image for the book Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets
  • Cover image for the book Energy Infrastructure Protection and Homeland Security, Second Edition
  • Cover image for the book The Use of Force: Military Power and International Politics, Eighth Edition
  • Cover image for the book U.S. Department of Defense Contract Spending and the Industrial Base, 2000-2013
  • Cover image for the book Strategic Cyber Deterrence: The Active Cyber Defense Option
  • Cover image for the book Overcoming Intractable Conflicts: New Approaches to Constructive Transformations
  • Cover image for the book Hybridity, Conflict, and the Global Politics of Cybersecurity
  • Cover image for the book Asia’s Trouble Spots: The Leadership Question in Conflict Resolution
  • Cover image for the book Rebuilding the Arsenal of Democracy: The U.S. and Chinese Defense Industrial Bases in an Era of Great Power Competition, CSIS Report
  • Cover image for the book Conflict Intervention and Transformation: Theory and Practice
  • Cover image for the book U.S. National Security Law: An International Perspective
  • Cover image for the book Security Studies: Classic to Post-Modern Approaches
  • Cover image for the book The Handbook of Asian Intelligence Cultures
  • Cover image for the book The Future of National Intelligence: How Emerging Technologies Reshape Intelligence Communities
  • Cover image for the book National, International, and Human Security: Protection against Violence, Third Edition
  • Cover image for the book Dynamics of the Changing Global Security Order: Emerging Trends and Key Issues in Asia
  • Cover image for the book Drug Trafficking and International Security
  • Cover image for the book The Handbook of Latin American and Caribbean Intelligence Cultures
  • Cover image for the book Gender, Global Health, and Violence: Feminist Perspectives on Peace and Disease
facebook icon twitter icon instagram icon linked in icon NEWSLETTERS
ABOUT US
  • Mission Statement
  • Employment
  • Privacy
  • Accessibility Statement
CONTACT
  • Company Directory
  • Publicity and Media Queries
  • Rights and Permissions
  • Textbook Resource Center
AUTHOR RESOURCES
  • Royalty Contact
  • Production Guidelines
  • Manuscript Submissions
ORDERING INFORMATION
  • Rowman & Littlefield
  • National Book Network
  • Ingram Publisher Services UK
  • Special Sales
  • International Sales
  • eBook Partners
  • Digital Catalogs
IMPRINTS
  • Rowman & Littlefield
  • Lexington Books
  • Hamilton Books
  • Applause Books
  • Amadeus Press
  • Backbeat Books
  • Bernan
  • Hal Leonard Books
  • Limelight Editions
  • Co-Publishing Partners
  • Globe Pequot
  • Down East Books
  • Falcon Guides
  • Gooseberry Patch
  • Lyons Press
  • Muddy Boots
  • Pineapple Press
  • TwoDot Books
  • Stackpole Books
PARTNERS
  • American Alliance of Museums
  • American Association for State and Local History
  • Brookings Institution Press
  • Center for Strategic & International Studies
  • Council on Foreign Relations
  • Fairleigh Dickinson University Press
  • Fortress Press
  • The Foundation for Critical Thinking
  • Lehigh University Press
  • United States Holocaust Memorial Museum
  • Other Partners...