Offensive Cyber Operations: Understanding Intangible Warfare

Offensive Cyber Operations: Understanding Intangible Warfare

  • Downloads:7656
  • Type:Epub+TxT+PDF+Mobi
  • Create Date:2022-09-04 06:53:26
  • Update Date:2025-09-06
  • Status:finish
  • Author:Daniel Moore
  • ISBN:0197657559
  • Environment:PC/Android/iPhone/iPad/Kindle

Summary

Cyber-warfare is often discussed, but rarely truly seen。 When does an intrusion turn into an attack, and what does that entail? How do nations fold offensive cyber operations into their strategies? Operations against networks mostly occur to collect intelligence, in peacetime。 Understanding the lifecycle and complexity of targeting adversary networks is key to doing so effectively in conflict。

Rather than discussing the spectre of cyber war, Daniel Moore seeks to observe the spectrum of cyber operations。 By piecing together operational case studies, military strategy and technical analysis, he shows that modern cyber operations are neither altogether unique, nor entirely novel。 Offensive cyber operations are the latest incarnation of intangible warfare--conflict waged through non-physical means, such as the information space or the electromagnetic spectrum。

Not all offensive operations are created equal。 Some are slow-paced, clandestine infiltrations requiring discipline and patience for a big payoff; others are short-lived attacks meant to create temporary tactical disruptions。 This book first seeks to understand the possibilities, before turning to look at some of the most prolific actors: the United States, Russia, China and Iran。 Each has their own unique take, advantages and challenges when attacking networks for effect。

Download

Reviews

lojislav

This book is divisible into roughly two parts:The first part lays out a new model for discussing and qualitatively understanding cyberwar and cyberwarefare。 The author talks at length about how cyberwar is likely impossible, since it is mostly a domain of warfare itself and unlikely to lead to an enemy’s capitulation。 However, the author lays out what delineates cyber warfare from intelligence operations, and roughly aligns his models with DoD’s Cyber Threat Framework。The second part is a capabi This book is divisible into roughly two parts:The first part lays out a new model for discussing and qualitatively understanding cyberwar and cyberwarefare。 The author talks at length about how cyberwar is likely impossible, since it is mostly a domain of warfare itself and unlikely to lead to an enemy’s capitulation。 However, the author lays out what delineates cyber warfare from intelligence operations, and roughly aligns his models with DoD’s Cyber Threat Framework。The second part is a capabilities discussion of major players in the cyber domain, and how they align their doctrine with their orders of battle。 The author profiles US, Russian, Chinese, and Iranian threat actors, and discusses their doctrines and ideologies vis-a-vis their efficacy and tactics in the cyber (and larger information) domain。I think the author’s models are interesting, if a little hair splitting, and I wish I had seen more on promotion of presence based operations to event based operations; what is an 0day today is tomorrow’s old day after all。 Also, the author switches from calling the tactical operation “an event operation” to an “event based attack” mid way thru。 Having said that, the author’s model for warfare determination is fascinating to me, and I’d love to see that in my Threat Intel tools, even if it’s only of utility to certain players。 All told, very interesting discussion of cyber (and by extension, intangible warfare), even if I didn’t agree with all of it and wished it had some more depth in places 。。。more