• Complain

Florian J. Egloff - Semi-State Actors in Cybersecurity

Here you can read online Florian J. Egloff - Semi-State Actors in Cybersecurity full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Oxford University Press, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Florian J. Egloff Semi-State Actors in Cybersecurity
  • Book:
    Semi-State Actors in Cybersecurity
  • Author:
  • Publisher:
    Oxford University Press
  • Genre:
  • Year:
    2022
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Semi-State Actors in Cybersecurity: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Semi-State Actors in Cybersecurity" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

The universe of actors involved in international cybersecurity includes both state actors and semi- and non-state actors, including technology companies, state-sponsored hackers, and cybercriminals. Among these are semi-state actors--actors in a close relationship with one state who sometimes
advance this states interests, but are not organizationally integrated into state functions. In Semi-State Actors in Cybersecurity, Florian J. Egloff argues that political relations in cyberspace fundamentally involve concurrent collaboration and competition between states and semi-state actors. To
understand the complex interplay of cooperation and competition and the power relations that exist between these actors in international relations, Egloff looks to a historical analogy: that of mercantile companies, privateers, and pirates.
Pirates, privateers, and mercantile companies were integral to maritime security between the 16th and 19th centuries. In fact, privateers and mercantile companies, like todays tech companies and private cyber contractors, had a particular relationship to the state in that they conducted
state-sanctioned private attacks against foreign vessels. Pirates, like independent hackers, were sometimes useful allies, and other times enemies. These actors traded, explored, plundered, and controlled sea-lanes and territories across the worlds oceans--with state navies lagging behind, often
burdened by hierarchy.
Today, as cyberspace is woven into the fabric of all aspects of society, the provision and undermining of security in digital spaces has become a new arena for digital pirates, privateers, and mercantile companies. In making the analogy to piracy and privateering, Egloff provides a new understanding
of how attackers and defenders use their proximity to the state politically and offers lessons for understanding how actors exercise power in cyberspace. Drawing on historical archival sources, Egloff identifies the parallels between todays cyber in-security and the historical quest for gold and
glory on the high seas. The book explains what the presence of semi-state actors means for national and international security, and how semi-state actors are historically and contemporarily linked to understandings of statehood, sovereignty, and the legitimacy of the state.

Florian J. Egloff: author's other books


Who wrote Semi-State Actors in Cybersecurity? Find out the surname, the name of the author of the book and a list of all author's works by series.

Semi-State Actors in Cybersecurity — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Semi-State Actors in Cybersecurity" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Semi-State Actors in Cybersecurity - image 1
Semi-State Actors in Cybersecurity

Semi-State Actors in Cybersecurity - image 2

Oxford University Press is a department of the University of Oxford. It furthers the Universitys objective of excellence in research, scholarship, and education by publishing worldwide. Oxford is a registered trade mark of Oxford University Press in the UK and certain other countries.

Published in the United States of America by Oxford University Press

198 Madison Avenue, New York, NY 10016, United States of America.

Florian J. Egloff 2022

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, by license, or under terms agreed with the appropriate reproduction rights organization. Inquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above.

You must not circulate this work in any other form and you must impose this same condition on any acquirer.

Library of Congress Cataloging-in-Publication Data

Names: Egloff, Florian J. (Florian Johannes), author.

Title: Semi-state actors in cybersecurity / Florian J. Egloff.

Description: New York, NY : Oxford University Press, [2022] |

Includes bibliographical references and index.

Identifiers: LCCN 2021037341 (print) | LCCN 2021037342 (ebook) |

ISBN 9780197579282 (paperback) | ISBN 9780197579275 (hardback) |

ISBN 9780197579312 | ISBN 9780197579299 | ISBN 9780197579305 (epub)

Subjects: LCSH: Computer crimes. | Computer securityInternational cooperation. |

Non-state actors (International relations) | Cyberspace operations (Military science)

Classification: LCC HV6773 .E35 2022 (print) | LCC HV6773 (ebook) |

DDC 005.8dc23

LC record available at https://lccn.loc.gov/2021037341

LC ebook record available at https://lccn.loc.gov/2021037342

DOI: 10.1093/oso/9780197579275.001.0001

Contents
Tables
Figures

In the 2020s, as the rollout of the fifth-generation mobile networks is picking up steam, a large Chinese telecommunications technology company, Huawei, has become a national security concern for many states outside China. The risks emanating from technological dependency to a very large technology company with special, perhaps opaque, ties to its home countrys national security agencies feature prominently in national security conversations about cybersecurityand not just with regards to companies domiciled in China.

A second concern is the private offensive outfits operating in the interests of their client states and companies (with some claiming to sell only to governments). For example, in summer 2020, researchers from the Citizen Lab, a University of Torontobased research team, uncovered a massive India-based hack-for-hire operation they labelled Dark Basin, compromising government officials, multiple industries, as well as civil society from six different continents.

A third concern is cybercriminals, particularly when effective law enforcement in their domiciled state is either lacking the capacity to or is unwilling to rein in cybercriminals activities. It appears that some governments have found the existence of sophisticated cybercrime to be advantageous for capability building as well as for deniability for their own operations.

In this book, I will show that these seemingly disconnected concerns are connected: they all involve diverse types of relationships of states to actors with significant cyber capabilities. I examine these relationships in-depth and show that the actors all inhabit a common realm.

Through so doing, the book aids international relations scholars to better understand the global politics of cybersecurity and develops a historically informed perspective on how these actors are connected to the state. We will see that rather than the diffusion of power, an argument often made with regard to cyber capabilities (i.e. that smaller actors profit asymmetrically), relationships between the state and various actors shape each other.actors looked at in this book have historically been, and continue to be, crucial participants in the political contestations on what sovereignty and statehood mean.

The analytic perspective adopted will highlight the fluidity of the legitimacy of the state. I am interested in topics such as private hacking, state interactions with cybercriminals, and large technology companies and their various interactions with states. Are states able to deny access to markets and restrict activities of large technology companies and service providers? Are these corporations depending on peace in cyberspace provided and enforced by states? Is cybercrime just a crime or does it play a different function in international security?

To the cybersecurity scholarship, the book contributes a historical lens with which to analyse changing relationships and tensions between different types of actors and the state. Thereby, the cybersecurity literature already has significant works detailing some of these relationships. For example, some have looked at particular types of actors (states, terrorists, hacktivists, etc.) and characterized their cyber strategies and operations.

I will add a historical perspective of countervailing tensions and a co-presence in a joint security ecosystem of actors with varying proximity to the state. By countervailing, I mean, for example, it is not just the state that uses other actors but sometimes also the reverse. Furthermore, the different types of actors, such as the ones just detailed, exist in the same universe and jointly create an intelligible cyber(in-)security ecosystem that we all inhabit.

Thus, the focus of the book lies in examining complex relationships between different actors in cybersecurity and the state. I introduce nuance to the discussion on how actors are connected to the state and what sort of security challenges and opportunities those relationships entail. To do this, I use a historical analogy to pirates, privateers, and mercantile companies, which I will now briefly introduce.

Pirates, privateers, and mercantile companies were integral to maritime security between the 16th and 19th centuries. They traded, explored, plundered, and controlled sea lanes and territories across the worlds oceans. State navies often lagged behind. Working for a navy was associated with lower pay, more hierarchical organisations, and less flexibility to accommodate other foreign power structures. In contrast, working for another more unconventional actor enabled sailors to thrive in the seams between state powers. The seas thereby offered opportunity and peril. Opportunity because crews expected to profit directly from the journeys. Peril because life on the seas was roughthe business of long-distance trade and violence at sea fraught with the risk of death.

Today, people are again seeking their fulfilment, destiny, and luck with more unconventional actors. As cyberspace is weaved into the fabric of all aspects of society, the provision and undermining of security in digital spaces have become a new arena for digital pirates, privateers, and mercantile companies. This book details their actions at the seams between state powers. Through collaboration and competition with states, these actors thrive due to the ever-increasing extension of human interaction into this newer global domain. Power, money, and the thrill to explore still drive individuals. In different forms of organisations, large technology companies, patriotic hackers, and cybercriminals have all presented difficult political challenges, defying the largely statecentric political paradigms in international politics.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Semi-State Actors in Cybersecurity»

Look at similar books to Semi-State Actors in Cybersecurity. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Semi-State Actors in Cybersecurity»

Discussion, reviews of the book Semi-State Actors in Cybersecurity and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.