Russian Cyber Operations

cover art
 
232 pp., 6 x 9
Hardcover
ISBN: 9781626167971 (1626167974)

eBook
ISBN: 9781626167995

E-Inspection
Request E-Inspection


June 2020
LC: 2019038780

EXPLORE THIS TITLE

Description
Table of Contents
Reviews


Russian Cyber Operations
Coding the Boundaries of Conflict
Scott Jasper
Foreword by Gen. Keith Alexander, US Army (ret.), former commander of Cyber Command and former director of the National Security Agency

Russia has deployed cyber operations to interfere in foreign elections, launch disinformation campaigns, and cripple neighboring states—all while maintaining a thin veneer of deniability and avoiding strikes that cross the line into acts of war. How should a targeted nation respond? In Russian Cyber Operations, Scott Jasper dives into the legal and technical maneuvers of Russian cyber strategies, proposing that nations develop solutions for resilience to withstand future attacks.

Jasper examines the place of cyber operations within Russia's asymmetric arsenal and its use of hybrid and information warfare, considering examples from recent French and US presidential elections and the 2017 NotPetya mock ransomware attack, among others. Jasper shows the international effort to counter these operations through sanctions and indictments has done little to alter Moscow's behavior and instead proposes that nations use data correlation technologies in an integrated security platform to establish a more resilient defense.

Russian Cyber Operations provides a critical framework for determining whether Russian cyber campaigns and incidents rise to the level of armed conflict or operate at a lower level as a component of competition. Jasper's work offers the national security community a robust plan of action critical to effectively mounting a durable defense against Russian cyber campaigns.


Capt. Scott Jasper, US Navy (Ret.), is a lecturer in the National Security Affairs Department at the US Naval Postgraduate School. He is the author of Strategic Cyber Deterrence: The Active Cyber Defense Option and the editor of Conflict and Cooperation in the Global Commons (Georgetown University Press, 2012), Securing Freedom in the Global Commons, and Transforming Defense Capabilities: New Approaches for International Security. He earned his PhD in 2018 from the University of Reading, UK.


Reviews
"In the battle to protect the global order and empower democracies throughout the world, Russia is our most dangerous adversary. Russian Cyber Operations makes an impressive contribution to the discourse and helps us better understand our digital enemies. A thorough evaluation of cyber, hybrid, and informational aspects of Russia's strategies provides us with a fresh look at the evolution of conflict and the future challenges we will face."—Brandon Valeriano, Donald Bren Chair of Military Innovation,Marine Corps University



"How Russia understands, uses, and adapts its cyber operations is an important topic for scholars and decision-makers around the world. Scott Jasper provides a detailed analysis of past cyber incidents, combining it with an assessment of how [it is] aligned with international law and emerging norms for cyberspace. Equally important is the third part of Russian Cyber Operations providing food for thought on how to effectively protect and defend against cyber operations."—Tim Maurer, codirector of the Cyber Policy Initiative at the Carnegie Endowment for International Peace and author of Cyber Mercenaries: The State, Hackers, and Power

Table of Contents
Foreword by Gen. Keith Alexander, USA (Ret.)



Acknowledgments



List of Abbreviations



Introduction



Chapter 1. Analytical Framework




PART I. Cyber Operations


Chapter 2. Asymmetric Arsenal Tool


Chapter 3. Hybrid Warfare Element


Chapter 4. Information Warfare Component



PART II. Security Dynamics


Chapter 5. Rational State Behavior


Chapter 6. Unconvincing Responses



PART III. Defensive Solutions


Chapter 7. Current Security Measures


Chapter 8. Automated Cyber Defense


Chapter 9. Technical Offset Strategy



Conclusion




Index



About the Author