Title Bytes, Bombs, and Spies
Subtitle The Strategic Dimensions of Offensive Cyber Operations
Author Herbert Lin, Amy Zegart
ISBN 9780815735472
List price USD 45.99
Price outside India Available on Request
Original price
Binding Paperback
No of pages 438
Book size 153 x 229 mm
Publishing year 2019
Original publisher Brookings Institution Press
Published in India by .
Exclusive distributors Viva Books Private Limited
Sales territory India, Sri Lanka, Bangladesh, Pakistan, Nepal, .
About the book Send Enquiry


Offensive cyber operations have become increasingly important elements of U.S. national security policy. From the deployment of Stuxnet to disrupt Iranian centrifuges to the possible use of cyber methods against North Korean ballistic missile launches, the prominence of offensive cyber capabilities as instruments of national power continues to grow. Yet conceptual thinking lags behind the technical development of these new weapons. How might offensive cyber operations be used in coercion or conflict? What strategic considerations should guide their development and use? What intelligence capabilities are required for cyber weapons to be effective? How do escalation dynamics and deterrence work in cyberspace? What role does the private sector play?

In this volume, edited by Herbert Lin and Amy Zegart—co-directors of the Stanford Cyber Policy Program—leading scholars and practitioners explore these and other vital questions about the strategic uses of offensive cyber operations. The contributions to this groundbreaking volume address the key technical, political, psychological, and legal dimensions of the fast-changing strategic landscape.


List of Figures and Tables


Chapter 1. Introduction (Herbert Lin and Amy Zegart)

Chapter 2. Illuminating a New Domain: The Role and Nature of Military Intelligence, Surveillance, and Reconnaissance in Cyberspace (Chris Inglis)

Chapter 3. How Effects, Saliencies, and Norms Should Influence U.S. Cyberwar Doctrine (Henry Farrell and Charles I. Glaser)

Chapter 4. A Strategic Assessment of the U.S. Cyber Command Vision (Max W. E. Smeets and Herbert Lin)

Chapter 5. A Cyber SIOP? Operational Considerations for Strategic Offensive Cyber Planning (Austin Long)

Chapter 6. Second Acts in Cyberspace (Martin C. Libicki)

Chapter 7. Hacking a Nation’s Missile Development Program (Herbert Lin)

Chapter 8. The Cartwright Conjecture: The Deterrent Value and Escalatory Risk of Fearsome Cyber Capabilities (Jason Healey)

Chapter 9. The Cyber Commitment Problem and the Destabilization of Nuclear Deterrence (Erik Gartzke and Jon R. Lindsay)

Chapter 10. Cyber Terrorism: Its Effects on Psychological Well-Being, Public Confidence, and Political Attitudes (Michael I. Gross, Daphna Canetti, and Dana R. Vashdi)

Chapter 11. Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications (Steven M. Bellovin, Susan Landau, and Herbert Lin)

Chapter 12. Rules of Engagement for Cyberspace Operations: A View from the United States
(C. Robert Kehler, Herbert Lin, and Michael Sulmeyer)

Chapter 13. U.S. Offensive Cyber Operations in a China-U.S. Military Confrontation (Adam Segal)

Chapter 14. Disintermediation, Counterinsurgency, and Cyber Defense (David Aucsmith)

Chapter 15. Private Sector Cyber Weapons: An Adequate Response to the Sovereignty Gap? (Lucas Kello)

Chapter 16. Cyberwar Inc.: Examining the Role of Companies in Offensive Cyber Operations (Irv Lachow and Taylor Grossman)



About the Editors:

Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University.

Amy Zegart is a senior fellow at the Freeman Spogli Institute of International Studies (FSI), professor of political science (by courtesy) at Stanford University, and a contributing editor to The Atlantic. She is also the Davies Family Senior Fellow at the Hoover Institution, where she directs the Robert and Marion Oster National Security Affairs Fellows program. She is founder and co-director of the Stanford Cyber Policy Program.

Target Audience:

People interested in Defence and Security.


Special prices are applicable to the authorised sales territory only.
Prices are subject to change without prior notice.