User Review - Flag as inappropriate
Cyberwar is undefined, yet a form of cyber watch has positioned itself in the gap between conventional armed domains and what the author calls a parallel universe out of scifi. The book is based on politically motivated Russian conflicts monitored by Project Gray Goose and extends to China, Middle East and US. Excerpts by others cover analysis methodologies, information weapons, and attack prediction and responses. It is more about cases and policies than tools. Cyber espionage is shown by Titan rain, and cyber crime by conficker worm, Heartland Payment systems and botnets. Links between crime, intelligence and government are investigated such as RBN. The different cultural approaches of recruiting hackers on open forums are detailed.
Nations currently have right of self-defense in case of armed attack. Cybersec czars have been difficult to find, e.g. in US, since they report to so many bosses. Existing laws are jus ad bellum for transition to war, and jus in bello for conduct during war. Cross-border attacks need to be prevented by host states or victims will respond. This can incite popular war with civilian networks participating in ground control of hubs and links. Fake news sites may post on real-time feeds. Malware-as-a-service turns a quick profit. In 5-8 years, digital natives will be military officers or trained for expert individual or group operations. Effects-analysis predicts denial of access, physical destruction, EM spectrum dominance, and psych manipulation. Broadband which has expanded in new regions such as Africa will increase the scale of the reach of botnets. Various threat scenarios are developed some which “shoot the hostage” and radically change types of operating systems and ISPs. Use of force in active defense is discussed, as well as need for rules of engagement and DEFCON model of readiness. Thanks.