No Shortcuts by Smeets Max;
Author:Smeets, Max;
Language: eng
Format: epub
Publisher: Hurst Publishers
Published: 2022-05-18T00:00:00+00:00
CONCLUSION
Most scholarship on the dynamics of cyber conflict seeks to explain what states can and cannot do with cyber operations. Yet implicit in this debate is the assumption that states can participate in cyber conflict, that they have crossed the barriers to entry. This book challenged this assumption and explained that, for many states, the barriers of entry are much higher than often perceived to be. The argument developed in this book has multiple components.
First, I noted that cyberspace is not a level playing field. What I meant by this is that states do not follow the same playbook and rulebook. Or more formally, state actors face different strategic, organizational, and legal/normative constraints when it comes to conducting cyber operations. A constrained actor tends to embed cyber operations within a well-defined legal and ethical framework (that, for example, requires minimizing collateral damage) and is aware of the impact organizational trade-offs (such as the potential intelligence losses following an effect operation) and is behaving strategicallyâultimately connecting these cyber means to a political end.
Second, these constraints have a major influence on the operational requirements to conduct cyber effect operations. Constrained actors generally need to conduct targeted operations, with long intelligence collection lead-up times, much deliberation to ensure organizational alignment, deploying well-tested exploits and tools, with payloads triggered at a specific point in time. Meeting all these requirements is often challengingâespecially when there are time pressures to execute.
Third, I add the dimension of available resources to introduce a new typology distinguishing between four types of actors. A âType I actorâ refers to an actor that is loosely constrained in conducting cyber effect operations, with a high degree of financial and organizational resources. A âType II actorâ refers to a loosely constrained actor, with few financial and organizational resources. A âType III actorâ is highly constrained in terms of executing cyber effect operations, but also highly resourceful. A âType IV actorâ is highly constrained when it comes to conducting cyber effect operations and has limited financial and organizational resources. I argue that most of the states that have launched a cyber command are Type IV actors.
Fourth, offensive cyber capability development by constrained actorsâincluding Type IV actorsâis often misunderstood. Some reporting makes us believe that cyber commands are like factories âproducingâ or âbuilding upâ âcyber weaponsâ. I developed the PETIO framework to provide a better understanding of what it means to develop an offensive cyber capability under constraints. The frameworkâdistinguishing between five dimensions: People, Exploits, Tools, Infrastructure, and Organizationâshows that military cyber organizations are more like âservice providersâ tasked with a set of activities. When we seek to analyse how organizations are building up âoffensive cyber capabilitiesâ, what we are really talking about is how they have trained up developers, operators, or system administrators, and allowed lawyers to familiarize themselves with the field. Cyber capability development is also about how processes are put in place to effectively conduct cyber operations with the aim to degrade certain networks, without compromising intelligence sources or causing other negative consequences.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(25499)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(18218)
Shot Through the Heart by Mercy Celeste(18160)
The Fifty Shades Trilogy & Grey by E L James(17774)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(13189)
The Subtle Art of Not Giving a F*ck by Mark Manson(12908)
Scorched Earth by Nick Kyme(11831)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(11037)
Drei Generationen auf dem Jakobsweg by Stein Pia(10216)
Suna by Ziefle Pia(10185)
Scythe by Neal Shusterman(9259)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(8608)
Successful Proposal Strategies for Small Businesses: Using Knowledge Management ot Win Govenment, Private Sector, and International Contracts 3rd Edition by Robert Frey(8418)
This is Going to Hurt by Adam Kay(7693)
Dirty Filthy Fix: A Fixed Trilogy Novella by Laurelin Paige(6450)
He Loves Me...KNOT by RC Boldt(5804)
How to Make Love to a Negro Without Getting Tired by Dany LaFerrière(5378)
Interdimensional Brothel by F4U(5303)
Thankful For Her by Alexa Riley(5159)