Offensive Cyber Operations: Understanding Intangible Warfare

A. Colasanti
{"title":"Offensive Cyber Operations: Understanding Intangible Warfare","authors":"A. Colasanti","doi":"10.1080/03071847.2022.2154473","DOIUrl":null,"url":null,"abstract":"When it comes to cyber, it is common to hear calls for interdisciplinary approaches, be it in the private sector, policy circles or academia. Daniel Moore is someone capable of marrying technical knowledge on information security with strategic studies proficiency. His Offensive Cyber Operations: Understanding Intangible Warfare is an authoritative account of the tactical exploitation of computer technologies and networks in interstate conflicts. The book is a welcome addition to the broader literature on cyber studies as it successfully moves beyond the many hyperbolic narratives of a debate prone to the technological determinism of the revolutions in military affairs. The central argument of the book is that computer network exploitation represents the latest stage in the evolution of ‘intangible warfare’, all those non-kinetic ‘efforts to undermine transmission, reception, and processing of data’ (p. 8) in the larger theatre of operations. In his account of the tactics of warfare that do not have a physical manifestation, Moore explains that the targeting of information and communication technologies (ICTs) for military and intelligence purposes is the result of gradual counter-innovations to military technologies during the 20th century, from the First World War to the Gulf War.","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The RUSI Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/03071847.2022.2154473","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

When it comes to cyber, it is common to hear calls for interdisciplinary approaches, be it in the private sector, policy circles or academia. Daniel Moore is someone capable of marrying technical knowledge on information security with strategic studies proficiency. His Offensive Cyber Operations: Understanding Intangible Warfare is an authoritative account of the tactical exploitation of computer technologies and networks in interstate conflicts. The book is a welcome addition to the broader literature on cyber studies as it successfully moves beyond the many hyperbolic narratives of a debate prone to the technological determinism of the revolutions in military affairs. The central argument of the book is that computer network exploitation represents the latest stage in the evolution of ‘intangible warfare’, all those non-kinetic ‘efforts to undermine transmission, reception, and processing of data’ (p. 8) in the larger theatre of operations. In his account of the tactics of warfare that do not have a physical manifestation, Moore explains that the targeting of information and communication technologies (ICTs) for military and intelligence purposes is the result of gradual counter-innovations to military technologies during the 20th century, from the First World War to the Gulf War.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
进攻性网络作战:理解无形战争
当涉及到网络时,无论是在私营部门、政策圈还是学术界,都经常听到对跨学科方法的呼吁。Daniel Moore是一个能够将信息安全方面的技术知识与战略研究能力相结合的人。他的《进攻性网络作战:理解无形战争》是一本关于在国家间冲突中战术利用计算机技术和网络的权威著作。这本书是广泛的网络研究文献的一个受欢迎的补充,因为它成功地超越了许多关于军事革命的技术决定论的辩论的夸张叙述。本书的中心论点是,计算机网络的利用代表了“无形战争”演变的最新阶段,所有这些非动能的“破坏数据传输、接收和处理的努力”(第8页)都在更大的作战领域。在他对没有物理表现的战争战术的描述中,摩尔解释说,从第一次世界大战到海湾战争,20世纪军事技术逐渐反创新的结果是将信息和通信技术(ict)用于军事和情报目的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Conservative Thinkers from All Souls College Oxford Those Must be the Guards: The Household Division in Peace and War, 1969–2023 The Rules of Security: Staying Safe in a Risky World Routledge Handbook of NATO The Weaponisation of Social Media, Crowdfunding and Drones
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1