Cybersecurity
Politics, Governance and Conflict in Cyberspace
Damien Van Puyvelde
Aaron F. Brantly
Polity
Copyright page
Copyright Damien Van Puyvelde, Aaron F. Brantly 2019
The right of Damien Van Puyvelde, Aaron F. Brantly to be identified as Authors of this Work has been asserted in accordance with the UK Copyright, Designs and Patents Act 1988.
First published in 2019 by Polity Press
Polity Press
65 Bridge Street
Cambridge CB2 1UR, UK
Polity Press
101 Station Landing
Suite 300
Medford, MA 02155, USA
All rights reserved. Except for the quotation of short passages for the purpose of criticism and review, no part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the publisher.
ISBN-13: 978-1-5095-2809-7
ISBN-13: 978-1-5095-2810-3(pb)
A catalogue record for this book is available from the British Library.
Library of Congress Cataloging-in-Publication Data
Names: Van Puyvelde, Damien, author. | Brantly, Aaron Franklin, author.
Title: Cybersecurity : politics, governance and conflict in cyberspace / Damien Van Puyvelde, Aaron Brantly.
Description: Cambridge, UK ; Medford, MA, USA : Polity Press, 2019. | Includes bibliographical references and index.
Identifiers: LCCN 2018056638 (print) | LCCN 2018056905 (ebook) | ISBN 9781509528134 (Epub) | ISBN 9781509528097 | ISBN 9781509528103 (pb)
Subjects: LCSH: Internet--Security measures--Government policy. | Computer security--Government policy. | Internet governance. | Internet--Political aspects. | Computer crimes--Prevention. | Security, International.
Classification: LCC TK5105.59 (ebook) | LCC TK5105.59 .V358 2019 (print) | DDC 005.8--dc23
LC record available at https://lccn.loc.gov/2018056638
Typeset in 10.5 on 12 Sabon
by Fakenham Prepress Solutions, Fakenham, Norfolk NR21 8NL
Printed and bound in the UK by CPI Group (UK) Ltd, Croydon
The publisher has used its best endeavors to ensure that the URLs for external websites referred to in this book are correct and active at the time of going to press. However, the publisher has no responsibility for the websites and can make no guarantee that a site will remain live or that the content is or will remain appropriate.
Every effort has been made to trace all copyright holders, but if any have been overlooked, the publisher will be pleased to include any necessary credits in any subsequent reprint or edition.
For further information on Polity, visit our website: politybooks.com
Figures, Tables and Storyboxes
Figures
ENIAC, c.1946
ARPANET in December 1969 and July 1977
Internet users since 1990
The growth of significant cyber incidents, 20062017
Geographic spread of significant cyber incidents by continent, 20062017
The electromagnetic spectrum
Packet-switched v. circuit-switched networks
OSI and DoD models compared
Heartbleed logo
Polymorphic malware sample
Phishing email example
Logo of the Tech of the Islamic State
A dark net weapons market
Tables
Major Internet governance entities
Malware types
Malware features
The Cyber Kill Chain
Kinetic v. cyber capabilities
Storyboxes
The ENIAC
The spade-hacker
Net neutrality
Russian interferences: Hit and miss
Cybotage: From Stuxnet to Operation Olympic Games
Ukrainian blackouts
Leveraging cyberattacks: The Russo-Georgian war of 2008
The ISIS hackers
The greatest transfer of wealth in human history
The global surveillance disclosures of 2013
The EuroMaidan movement
GhostNet
The AppleFBI debate over digital privacy
Acknowledgments
Aaron would like to dedicate this book to his three sons, Andrew, Oliver and Daniel, who patiently waited for him to play or read books to them while he worked on various sections of it. Damien dedicates this book to his wife Ana. He would also like to thank Liam Mcvay for his helpful comments on several chapters.
We would both like to thank Louise Knight who encouraged us to write this book and who, together with Nekane Tanaka Galdos and Sophie Wright, provided valuable assistance throughout its preparation.
We hope this book inspires future cybersecurity scholars and practitioners in their efforts to address the many challenges ahead.
Abbreviations
ABC | AtanasoffBerry Computer |
AI | Artificial Intelligence |
ANSSI | Agence Nationale de Scurit des Systmes dInformation (France) |
APT | Advanced Persistent Threat |
ARPA | Advanced Research Projects Agency (United States) |
ARPANET | Advanced Research Projects Agency Network |
BGP | Border Gateway Protocol |
C2 | Command and Control |
CCD COE | Cooperative Cyber Defense Centre of Excellence (NATO) |
CENTCOM | Central Command (United States) |
CERN | European Council for Nuclear Research |
CERT | Computer Emergency Response Team |
CIA | Central Intelligence Agency (United States) |
CIA triad | Confidentiality, Integrity and Availability |
CPU | Central Processing Unit |
CSIS | Center for Strategic and International Studies |
DARPA | Defense Advanced Research Projects Agency (United States) |
DDoS | Distributed Denial of Service |
DHCP | Dynamic Host Configuration Protocol |
DISA | Defense Information Systems Agency (United States) |
DNC | Democratic National Committee (United States) |
DNS | Domain Name System |
DoD | Department of Defense (United States) |
DoS | Denial of Service |
DPRK | Democratic Peoples Republic of Korea (North Korea) |
EFF | Electronic Frontier Foundation |
ENIAC | Electronic Numerator, Integrator, Analyzer and Computer |
EPO | Entry Point Obfuscator |
EU | European Union |
FBI | Federal Bureau of Investigation (United States) |
FSB | Federal Security Service (Russia) |
FTP | File Transfer Protocol |
GDPR | General Data Protection Regulation (European Union) |
GPU | Graphics Processing Unit |
GRU | General Staff Main Intelligence Directorate (Russia) |
GUI | Graphical User Interface |
HTTP | Hypertext Transfer Protocol |
IAEA | International Atomic Energy Agency |
IANA | Internet Assigned Numbers Authority |
IBM | International Business Machines |
ICANN | Internet Corporation for Assigned Names and Numbers |
IDPS | Intrusion Detection and Prevention System |
IDS | Intrusion Detection System |
IETF | Internet Engineering Task Force |
IGF | Internet Governance Forum |
IMP |
Next page