The State, Hackers, And Power
Cyber Mercenaries explores how and why states use hackers as proxies to project power through cyberspace.
|Uitgever:||Cambridge University Press|
|Plaats van publicatie:||03|
|NUR:||Strafrecht en strafprocesrecht|
|Afmetingen:||155 x 228 x 17|
Tim Maurer co-directs the Cyber Policy Initiative at the Carnegie Endowment for International Peace. He is a member of several US track 1.5 cyber dialogues and the Freedom Online Coalition's cybersecurity working group. He co-chaired the Advisory Board of the 2015 Global Conference on CyberSpace, participated in the Global Commission on Internet Governance, and supported the confidence-building work of the OSCE. His work has been published by Foreign Policy, The Washington Post, TIME, Jane's Intelligence Review, CNN, Slate, Lawfare, and other academic and media venues. He holds a Master's in Public Policy from the Harvard Kennedy School.
'Tim Maurer has broken important new ground explaining how states project force in cyberspace through proxies, from government contractors to activists to mercenary hackers. He argues persuasively that states' dependence on proxy forces will increase, and that we will see new kinds of collaboration and even competition between state and non-state actors. His book is an important and urgent call to policymakers to start thinking about how to avoid new conflicts that will inevitably arise from these state-proxy relationships.' Shane Harris, author of @War: The Rise of the Military-Internet Complex
Part I. Of Brokers and Proxies: 1. Cyber proxies: an introduction; 2. Proxies: an instrument of power since ancient times; 3. Cyber power: geopolitics and human rights; Part II. Cyber Proxies Up Close: 4. Cyber proxies on a tight leash: the United States; 5. Cyber proxies on a loose leash: Iran and Syria; 6. Cyber proxies on the loose: the former Soviet Union; 7. Change over time: China's evolving relationships with cyber proxies; Part III. Implications: 8. The theory: state responsibility and cyber proxies; 9. The practice: shaping cyber proxy relationships; 10. Conclusion: cyber proxies, the future, and suggestions for further research; Future research; Notes.
Dit product is op dit moment niet op voorraad in een van onze vestigingen.