Michael Sulmeyer, “Much Ado About Nothing? Cyber Command and the NSA,” WarontheRocks, (2017, July 19).Michael Hayden, Playing the Edge: American Intelligence in the Age of Terror.But if you’re better at googling, have a look at his slides. Can’t find a link to Healey’s DEFCON presentation.Smeets, Max A Matter of Time: On the Transitory Nature of Cyber Weapons, Journal of Strategic Studies, (2017)1-28, (ignore framework).Ablon, Lillian and Timothy Bogart, “Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits,” RAND Corporation, (2017), retrieved from:.Florian Egloff, “Public Attribution of Cyber Incidents,” (2019, May), CSS Analyses in Security Policy,.Rid, Thomas & Ben Buchanan, ‘Attributing Cyber Attacks’, Journal of Strategic Studies, 38:1-2 2015,.Thomas Rid, Cyber War Will Not Take Place, Journal of Strategic Studies, 35:1 (2012).Zetter, Kim, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon (2014).Bruce Schneier, Secrets and Lies: Digital Security in a Networked World,Wiley, 2000.APT Groups and Operations, (avoid using maps & lists confusing operation, actor & malware, etc.).Types of Threat Actors and forms of Activity Giles, Keir & William Hagestad II, “Divided by a Common Language: Cyber Definitions in Chinese, Russian and English,” in Proceedings of the 5th International Conference on Cyber Conflict, K.Dunn Cavelty, Myriam “From cyber‐bombs to political fallout: Threat representations with an impact in the cyber‐security discourse,” International Studies Review, 15:1, 2013/3, 105-122.Joint Publication 3-12, Cyberspace Operations, 8 June 2018 (for US students).Acquisition and Use of Cyberattack Capabilities.Washington, DC: National Academies Press, 2009, available from: Technology, Policy, Law, and Ethics Regarding U.S. Committee on Offensive Information Warfare, National Research Council.Stevens, T., Analogical reasoning and cyber security, Security Dialogue, 2013, Vol.44(2), pp.147-16 Monte, Matthew, Network Attacks and Network Exploitation: A Framework, (2015).Conceptualizing Cyberspace and Cyber Conflict.It’s based on my teaching at Stanford University for the Master in International Policy (MIP), analysis of 25+ cyber conflict syllabi, and review of cyber conflict articles in top 50 Poli Sci journals. So where to get started if you’re a political science student (or diplomat, congressional staffer, etc.) new to the field of cyber conflict? Below you can find a very, very short reading list. New interpretations of old ‘data points’, like the re-study on the 1990s Moonlight Maze campaign, have equally altered our understanding of the field. New ‘data points’, like the cyber-enabled information operations during the US Presidential Elections, have (re)shifted the focus of the field and changed our understanding of what cyber conflict entails.
![kaspersky new virus map kaspersky new virus map](https://www.kaspersky.com/content/en-global/images/b2c/product-screenshot/screen-KISMAC-02.png)
Researchers have tried to answer these questions whilst the conceptual and empirical underpinnings of the field are fluid. There is still much uncertainty about a broad set of related issues, such as the potential normative restraints on cyber conflict, fourth party intelligence collection, the strategic value of offensive cyber operations, and how state and non-state actors (can) work together in cyberspace – both from offensive and defensive perspective. Keith Alexander was still heading the NSA and US Cyber Command, he stated that there is “much uncharted territory in the world of cyber-policy, law and doctrine”. Yet, the dynamics of cyber conflict are complex, understudied, and constantly changing. Non-state actors also continue to rely on cyber means whilst pursuing a diverse set of motives. A diverse group of governments across the world state that they are exploring options to (further) develop a capacity to conduct offensive cyber operations. Nearly every day cyber attacks occupy the headlines of mainstream media. Cyber conflict seems to have become necessary and normal.