Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation. This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare. The title’s nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the U.S. is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare. Features:
• Covers in detail one of the defining forms of conflict of the 21st century—cyber warfare will significantly impact virtually every American citizen over the next two decades
• Provides more than 90 primary source documents and matching analysis, allowing readers to investigate the underpinnings of cyber warfare
• Enables readers to see the development of different concepts of cyber warfare through its chronological organization
• Reflects the deep knowledge of an editor who is a noted expert in cyber warfare and has taught for the United States Air Force for more than a decade
Author(s): Paul J. Springer
Series: Documentary And Reference Guides
Edition: 1
Publisher: Greenwood | ABC-CLIO
Year: 2020
Language: English
Commentary: TruePDF
Pages: 376
Tags: Cyberspace Operations (Military Science): United States; Cyberspace: Government Policy: United States: Sources; Information Warfare: United States
Cover
Title Page
Copyright
Contents
Reader’s Guide to Related Documents
Introduction
Chapter 1. U.S. Cyber Strategy Documents
Document 1: National Security Strategy of the United States (1987)
Document 2: National Military Strategy of the United States of America: A Strategy of Flexible and Selective Engagement (1995)
Document 3: National Military Strategy of the United States of America: Shape, Respond, and Prepare Now: A Military Strategy for a New Era (1997)
Document 4: Quadrennial Defense Review (1997)
Document 5: A National Security Strategy for a New Century (1999)
Document 6: Quadrennial Defense Review Report (2001)
Document 7: The National Strategy to Secure Cyberspace (2003)
Document 8: The National Military Strategy of the United States of America: A Strategy for Today; a Vision for Tomorrow (2004)
Document 9: The National Defense Strategy of the United States of America (2005)
Document 10: Quadrennial Defense Review Report (2006)
Document 11: National Defense Strategy (2008)
Document 12: National Security Strategy (2010)
Document 13: Quadrennial Defense Review Report (2010)
Document 14: The National Military Strategy of the United States of America: Redefining America’s Military Leadership (2011)
Document 15: International Strategy for Cyberspace (2011)
Document 16: Quadrennial Defense Review (2014)
Document 17: National Security Strategy (2015)
Document 18: The National Military Strategy of the United States of America: The United States Military’s Contribution to National Security (2015)
Document 19: The Department of Defense Cyber Strategy (2015)
Document 20: National Security Strategy of the United Statesof America (2017)
Document 21: Summary of the 2018 National Defense Strategy of the United States of America (2018)
Document 22: National Cyber Strategy of the United States (2018)
Document 23: Summary, Department of Defense Cyber Strategy (2018)
Chapter 2. U.S. Assessments of Cyber Adversaries
Document 24: Military Power of the People’s Republic of China (2009)
Document 25: Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation (2009)
Document 26: Mandiant APT1 Report: Exposing One of China’s Cyber Espionage Units (2013)
Document 27: Military and Security Developments Involving the Democratic People’s Republic of Korea (2013)
Document 28: China and International Law in Cyberspace (2014)
Document 29: Military and Security Developments Involving the People’s Republic of China (2014)
Document 30: Cybersecurity Law of the People’s Republic of China (2016)
Document 31: Grizzly Steppe—Russian Malicious Cyber Activity (2016)
Document 32: Assessing Russian Activities and Intentions in Recent U.S. Elections (2017)
Document 33: Russia Military Power (2017)
Document 34: Military and Security Developments Involving the Democratic People’s Republic of Korea (2017)
Document 35: China Military Power (2019)
Chapter 3. U.S. Policies, Doctrine, and Reports
Document 36: Presidential Decision Directive/NSC-63 (1998)
Document 37: Cyber Threat Source Descriptions (2005)
Document 38: The Comprehensive National Cybersecurity Initiative (2009)
Document 39: Resilient Military Systems and the Advanced Cyber Threat (2013)
Document 40: Executive Order 13636—Improving Critical Infrastructure Cybersecurity (2013)
Document 41: Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented (2013)
Document 42: National Infrastructure Protection Plan: Partnering for Critical Infrastructure Security and Resilience (2013)
Document 43: Presidential Policy Directive 21—Critical Infrastructure Security and Resilience (2013)
Document 44: Deterrence in the Age of Surprise (2014)
Document 45: U.S. Charges Five Chinese Military Hackers for Cyber Espionage against U.S. Corporations and a Labor Organization for Commercial Advantage (2014)
Document 46: Joint Publication 3-13: Information Operations (2014)
Document 47: Executive Order 13687—Imposing Additional Sanctions with Respect to North Korea (2015)
Document 48: Executive Order 13691—Promoting Private Sector Cybersecurity Information Sharing (2015)
Document 49: Cyberwarfare and Cyberterrorism: In Brief (2015)
Document 50: Department of Defense Law of War Manual (2015)
Document 51: Presidential Policy Directive 41: United States Cyber Incident Coordination (2016)
Document 52: Executive Order 13800—Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (2017)
Document 53: Information Warfare: Issues for Congress (2018)
Document 54: Cybersecurity: Selected Issues for the 115th Congress (2018)
Document 55: Joint Publication 3-12: Cyberspace Operations (2018)
Document 56: Developments in the Field of Information and Communications Technology in the Context of International Security (2018)
Chapter 4. Non-U.S. Strategy and Documents
Document 57: North Atlantic Treaty (1949)
Document 58: Unrestricted Warfare (1999)
Document 59: Tallinn Manual on the International Law Applicable to Cyber Warfare (2010)
Document 60: A Strong Britain in an Age of Uncertainty: The National Security Strategy (2010)
Document 61: Cyber Warfare (2010)
Document 62: National Cyber Security Strategies: Setting the Course for National Efforts to Strengthen Security in Cyberspace (2012)
Document 63: Cyberwarfare and International Humanitarian Law: The ICRC’s Position (2013)
Document 64: Initial Set of OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies (2013)
Document 65: Wales Summit Declaration (2014)
Document 66: National Security Strategy and Strategic Defence and Security Review 2015: A Secure and Prosperous United Kingdom (2015)
Document 67: National Cyber Security Strategy 2016–2021 (2016)
Document 68: People’s Republic of China National Cyberspace Security Strategy (2016)
Document 69: Developments in the Field of Information and Communications Technology in the Context of International Security (2018)
Chapter 5. Speeches, Testimony, and Transcripts
Document 70: President Barack Obama, “Remarks on Securing the Nation’s Cyber Infrastructure” (2009)
Document 71: William J. Lynn, III, “Remarks at the Defense Information Technology Acquisition Summit” (2009)
Document 72: Hillary Clinton, “Remarks on Internet Freedom” (2010)
Document 73: Statement for the Record of Seán P. McGurk before the U.S. Senate Homeland Security and Governmental Affairs Committee (2010)
Document 74: Leon Panetta, “Remarks on Cybersecurity” (2012)
Document 75: Robert S. Mueller, III, “Remarks before the RSA Cyber Security Conference” (2013)
Document 76: Statement of General Keith B. Alexander before the Senate Committee on Armed Services (2013)
Document 77: Keith Alexander, “Remarks at AFCEA International Cyber Symposium” (2013)
Document 78: Michael Rogers, “Testimony before the U.S. House Intelligence Committee” (2014)
Document 79: Barack Obama, “Remarks at the National Cybersecurity Communications Integration Center” (2015)
Document 80: Advance Policy Questions for the Honorable Ashton Carter (2015)
Document 81: Lisa O. Monaco, “Strengthening Our Nation’s Cyber Defenses” (2015)
Document 82: James Clapper, Testimony before the U.S. Senate Committee on Armed Services (2015)
Document 83: Glenn S. Gerstell, “Confronting the Cybersecurity Challenge” (2017)
Document 84: Glenn S. Gerstell, “How We Need to Prepare for a Global Cyber Pandemic” (2018)
Document 85: Glenn S. Gerstell, “Failing to Keep Pace with the Cyber Threat and Its Implications for Our Privacy Laws” (2018)
Chronology
Bibliography
Index
About the Author