1-13 of 13
Keywords: offensive cyber operations
Sort by
Journal Article
Public Secrets: The Dynamics of Publicity and Secrecy in Offensive Cyber Operations
Get access
Gil Baram
Journal of Global Security Studies, Volume 8, Issue 3, September 2023, ogad013, https://doi.org/10.1093/jogss/ogad013
Published: 14 June 2023
.... 2023 This article is published and distributed under the terms of the Oxford University Press, Standard Journals Publication Model ( https://dbpia.nl.go.kr/journals/pages/open_access/funder_policies/chorus/standard_publication_model ) Abstract Historically, offensive cyber operations (OCOs) have...
Journal Article
Cyber offense in NATO: challenges and opportunities
Get access
Jeppe T Jacobsen
International Affairs, Volume 97, Issue 3, May 2021, Pages 703–720, https://doi.org/10.1093/ia/iiab010
Published: 10 May 2021
...Jeppe T Jacobsen NATO adaptation offensive cyber operations CYOC SCEPVA deterrence At the 2016 Warsaw summit, NATO for the first time declared cyberspace to be a military domain. A year later, Secretary-General Jens Stoltenberg introduced the NATO Cyber Operations Centre (CYOC)—the entity...
Journal Article
The implications of persistent (and permanent) engagement in cyberspace
Jason Healey
Journal of Cybersecurity, Volume 5, Issue 1, 2019, tyz008, https://doi.org/10.1093/cybsec/tyz008
Published: 26 August 2019
..., forced to expend more resources on defense and rebuild capabilities and infrastructure. John Bolton, the national security advisor, has boasted of a new policy to use offensive cyber operations to impose costs on adversaries and create the frameworks of deterrence. Over time, proponents suggest...
Journal Article
Does the Internet Need a Hegemon?
Joshua Rovner and Tyler Moore
Journal of Global Security Studies, Volume 2, Issue 3, July 2017, Pages 184–203, https://doi.org/10.1093/jogss/ogx008
Published: 14 August 2017
... the technical and political fallout from revealed offensive cyberoperations to assess the relative fragility of the internet. Our findings suggest that it is relatively resilient. Cybersecurity hegemonic stability theory offensive cyber operations Stuxnet Snowden Cybersecurity is a US national interest...
Chapter
The Intruder’s View
Get access
Ben Buchanan
Published: 01 February 2017
...Figure 1 This chapter provides an overview of intrusion operations and applies them to the security dilemma. It works through how offensive cyber operations work and distils important principles. This is based off the well-known cyber kill chain models that explain cyber operations in an accessible...
Chapter
Introduction
Get access
Daniel Moore
Published: 01 August 2022
...This chapter surveys the need for a book on offensive cyber operations (OCOs). All too frequently they are misjudged and incorrectly applied, both by those who seek to employ them and those who observe from the sidelines. The introduction then provides an overview of the book's structure...
Chapter
Published: 01 August 2022
...Cyber security is neither an offensive panacea nor the Pearl-Harbor-like vulnerability it is imagined to be. The conclusions review how it is uniquely difficult to create effects successfully, continuously and meaningfully through offensive cyber operations (OCOs) in a military context...
Chapter
Four Attributes of Cyber Operations
Get access
Erica D. Lonergan and Shawn W. Lonergan
Published: 23 March 2023
.... This is not an absolute requirement to ensure operational effectiveness but, rather, a strategic decision. Next, it evaluates the range of requirements associated with planning and conducting offensive cyber operations. While cyberspace is often described as having low barriers to entry, many operations are in fact...
Chapter
Cyberspace Is Unsuitable for the Strategy of War
Get access
Erik Gartzke and Jon R. Lindsay
Published: 21 March 2024
... Schelling Thomas China Schwartau Winn World War II aircraft carriers Europe Yamamoto Isoroku drones Pakistan assassinations cyberterrorism terrorism Hamas Georgia gray zone conflict GZC cyber domain cyberwar cybersecurity cyberspace offensive cyber operations strategy war deterrence...
Chapter
Cyber Deception versus Nuclear Deterrence
Get access
Erik Gartzke and Jon R. Lindsay
Published: 21 March 2024
... nuclear domain deterrence nuclear weapons nuclear command control and communications (NC3) offensive cyber operations (OCO) strategic stability information cross-domain deterrence Throughout this book we have stressed the importance of strategic specialization. Sometimes specialized capabilities...
Book
Escalation Dynamics in Cyberspace
Get access
Erica D. Lonergan and Shawn W. Lonergan
Published online: 23 March 2023
Published in print: 24 May 2023
... with intent; and deliberately and coherently communicate intent with external parties, including friendly and adversarial states. The absence of escalation thus far should not be perceived as granting a broad license for states to conduct any and all types of offensive cyber operations to satisfy a diversity...
Book
Published online: 22 September 2022
Published in print: 01 August 2022
... and ends. The spectre of cyberwar can and should be turned into a spectrum of offensive cyber operations, or OCOs. There is so much to learn by piecing together operational history, public analysis of capabilities, and existing military thought. By exploring the idea of intangible warfare conflict waged...
Chapter
Patterns of Escalation in Cyberspace
Get access
Erica D. Lonergan and Shawn W. Lonergan
Published: 23 March 2023
.... Interactions between the U.S. and Iran, in particular, illuminate the challenges associated with planning and conducting strategic offensive cyber operations. A review of patterns of behavior between rivals provides scant evidence of escalation dynamics in cyberspace. Moreover, the case studies...
Advertisement
Advertisement