Title Cashing In on Cyberpower
Subtitle How Interdependent Actors Seek Economic Outcomes in a Digital World
Author Mark T. Peters
ISBN 9781640120136
List price USD 27.95
Price outside India Available on Request
Original price
Binding Hardbound
No of pages 240
Book size 153 x 229 mm
Publishing year 2018
Original publisher Potomac Books (Eurospan Publishers)
Published in India by .
Exclusive distributors Viva Books Private Limited
Sales territory India, Sri Lanka, Bangladesh, Pakistan, Nepal, .
Status New Arrival
About the book Send Enquiry
  
 

Reviews:

“Peters goes beyond the usual cyber paradigms of domain, technology, and products/services. He makes a compelling case for cyber as a means to generate economic outcomes–by nation-state and nonstate actors alike.”

—Maj. Gen. Dale Meyerrose, U.S. Air Force (Ret.)

 

Cashing In on Cyberpower is an important contribution to the debate in the cybersecurity field. Mark Peters offers an impressive investigation of the empirical dynamics of cyberactions in the Global Commons. Likely the most impressive contribution is the focus on the economic means of cyberconflict, demonstrating the utility of economic warfare in digital interactions. Scholars, practitioners, and the public should take note.”

—Brandon Valeriano, reader in International Relations and Digital Politics at Cardiff University and Donald Bren Chair of Armed Politics at Marine Corps University.


Description:

As the world has become increasingly digitally interconnected, military leaders and other actors are ditching symmetric power strategies in favour of cyberstrategies. Cyberpower enables actors to change actual economic outcomes without the massive resource investment required for military force deployments.

Cashing In on Cyberpower addresses the question, Why and to what end are state and nonstate actors using cybertools to influence economic outcomes? The most devastating uses of cyberpower can include intellectual property theft, espionage to uncover carefully planned trade strategies, and outright market manipulation through resource and currency values.

Offering eight hypotheses to address this central question, Mark T. Peters II considers every major cyberattack (almost two hundred) over the past ten years, providing both a quick reference and a comparative analysis. He also develops new case studies depicting the 2010 intellectual property theft of a gold-detector design from the Australian Codan corporation, the 2012 trade negotiation espionage in the Japanese Trans-Pacific Partnership preparations, and the 2015 cyberattacks on Ukrainian SCADA systems. All these hypotheses combine to identify new data and provide a concrete baseline of how leaders use cybermeans to achieve economic outcomes.

Contents:

List of Figures

List of Tables

Acknowledgments

Chapter 1. Entering the Cyber Commons • Problem • Research Question • Interdependence and Power • Method Development • Cyber Application and Case Studies • Summary

Chapter 2. Interdependence • Why Use Interdependence Theory? • Interdependent Characteristics of the Virtual State • Defining Interdependent Cyberspace • Cyber Operations • Summary

Chapter 3. Power • Types of Power • Power Application • Power through Economic Cyber Influences • Summary

Chapter 4. Method Development • Method Types • Describing the Data Sources • Categorizing Cyber Events • Case Study Guideline • Summary

Chapter 5. Cyber Applications • Application in Practice • Deciphering the Data • Evaluating the First Four Hypotheses • Summary

Chapter 6. Case Study Analysis • Deciphering Events through Narrative Linkages • Japanese Government Case: Economic Espionage • Ukrainian Power Grid Case: Economic Cyberattack • Codan Case: Intellectual Property Theft • Evaluating the Economic Hypotheses • Summary

Chapter 7. Framing Future Channels • Linking Hypotheses to the Research Question • Future Applications • Final Thoughts

Appendix: Cyber Events

Notes

Bibliography

Index


About the Author:

Mark T. Peters II is assigned to Lackland Air Force Base in Texas. As a career U.S. Air Force intelligence officer and master cyberspace operator, he previously served as squadron commander for the Eighteenth Intelligence Squadron, a space intelligence unit. Peters has a doctorate in strategic studies and more than twenty years of military and intelligence experience.


Target Audience:

People Interested in Cybersecurity.

 

 
Special prices are applicable to the authorised sales territory only.
Prices are subject to change without prior notice.