|
|
|||
|
||||
OverviewCyber-security is often a top national security priority. Many states have declared cyber-space a new domain of warfare, seeking to develop a military cyber-strategy. Governments' national risk assessments now frequently put the threat of hostile cyber-attack on a par with natural disasters, international terrorism or nuclear attack. This has provoked much policy talk and concern about the future of conflict, as well as societies' digital vulnerability. Moving into the 2020s, the 'cyber club' of proliferators is losing the exclusivity of the early 2000s. Over forty states have now publicly established a military cyber-command, including many countries in the West - the US, France, Germany, Italy, Spain, the Netherlands, Estonia - and elsewhere - Peru, Brazil, Vietnam, South Korea, Nigeria. At least another dozen have announced plans to establish such capability. '[An] insightful and expansive book for anyone interested in better understanding the present and future of cyber conflict.' - International Affairs 'A refreshing contribution to cyber scholarship that will resonate with military and intelligence professionals. With a methodical analysis of the technical, organizational and policy challenges governments must surmount to employ offensive cyber operations with precise effect, Smeets argues that few states conduct such operations because they are incredibly difficult. Pundits, commentators and policymakers must read this book to temper both their fears and expectations.' - Emily O. Goldman, US Cyber Command 'In the process of answering the book's driving question why do states struggle to develop a military cyber force? the author offers rigorous theoretical and empirical analysis, as well as nuggets of wisdom for the policy community.' - Survival 'If offensive cyber operations are cheap and easy, then cyberweapons should proliferate and cyberwar should escalate. Max Smeets demolishes these myths and reveals a more complicated, and more interesting, reality.' - Jon R. Lindsay, Associate Professor, Georgia Institute of Technology, and author of Information Technology and Military Power Full Product DetailsAuthor: Max SmeetsPublisher: C Hurst & Co Publishers Ltd Imprint: C Hurst & Co Publishers Ltd ISBN: 9781805260332ISBN 10: 1805260332 Pages: 304 Publication Date: 27 July 2023 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of ContentsReviews'A refreshing contribution to cyber scholarship that will resonate with military and intelligence professionals. With a methodical analysis of the technical, organizational and policy challenges governments must surmount to employ offensive cyber operations with precise effect, Smeets argues that few states conduct such operations because they are incredibly difficult. Pundits, commentators and policymakers must read this book to temper both their fears and expectations.' -- Emily O. Goldman, US Cyber Command ‘In the process of answering the book’s driving question – why do states struggle to develop a military cyber force? – the author offers rigorous theoretical and empirical analysis, as well as nuggets of wisdom for the policy community.’ -- Survival 'In No Shortcuts, Smeets does an exceptional job of exploring how truly difficult it is to be successful at cyber operations. It requires thoughtful buildup and vital experience that many countries lack. An important book for an evolving landscape.' -- Daniel Moore, author of Offensive Cyber Operations 'If offensive cyber operations are cheap and easy, then cyberweapons should proliferate and cyberwar should escalate. Max Smeets demolishes these myths and reveals a more complicated, and more interesting, reality. While cyberweapons may not proliferate, No Shortcuts certainly will!' -- Jon R. Lindsay, Associate Professor, Georgia Institute of Technology, and author of Information Technology and Military Power 'No Shortcuts provides an original and empirically-informed framework for understanding the practical work required for offensive cyber operations. Highly recommended for anyone seeking to understand the challenges of cyber effect operations and how those challenges can constrain state behaviour.' -- Rebecca Slayton, Associate Professor, Department of Science and Technology Studies, Cornell University 'A refreshing contribution to cyber scholarship that will resonate with military and intelligence professionals. With a methodical analysis of the technical, organizational and policy challenges governments must surmount to employ offensive cyber operations with precise effect, Smeets argues that few states conduct such operations because they are incredibly difficult. Pundits, commentators and policymakers must read this book to temper both their fears and expectations.' -- Emily O. Goldman, US Cyber Command 'In the process of answering the book's driving question - why do states struggle to develop a military cyber force? - the author offers rigorous theoretical and empirical analysis, as well as nuggets of wisdom for the policy community.' -- Survival 'In No Shortcuts, Smeets does an exceptional job of exploring how truly difficult it is to be successful at cyber operations. It requires thoughtful buildup and vital experience that many countries lack. An important book for an evolving landscape.' -- Daniel Moore, author of Offensive Cyber Operations 'If offensive cyber operations are cheap and easy, then cyberweapons should proliferate and cyberwar should escalate. Max Smeets demolishes these myths and reveals a more complicated, and more interesting, reality. While cyberweapons may not proliferate, No Shortcuts certainly will!' -- Jon R. Lindsay, Associate Professor, Georgia Institute of Technology, and author of Information Technology and Military Power 'No Shortcuts provides an original and empirically-informed framework for understanding the practical work required for offensive cyber operations. Highly recommended for anyone seeking to understand the challenges of cyber effect operations and how those challenges can constrain state behaviour.' -- Rebecca Slayton, Associate Professor, Department of Science and Technology Studies, Cornell University Author InformationMax Smeets is Senior Researcher at the Center for Security Studies, Zurich; Director of the European Cyber Conflict Research Initiative; and an affiliate at Stanford's Center for International Security and Cooperation. He publishes widely on cyber-statecraft, strategy and risk, including in The Washington Post, War on the Rocks and Slate. Tab Content 6Author Website:Countries AvailableAll regions |