You've subscribed to ! We will preorder your items within 24 hours of when they become available. When new books are released, we'll charge your default payment method for the lowest price available during the pre-order period.
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
What a timely, thought provoking study about a subject that will keep the political scientist, elected official and Cybersecurity SME up at night worrying about it. As dynamic as the cyber domain is the evolving use of proxies and surrogates by nation states is raising the complexity level of how the most technically advanced nation in the world is on the horns of a dilemma as it stumbles its way head first into the the gray zone of cyber warfare. This book forces the reader to think unconventionally and consider how proxies and surrogates will evolve and how they will be utilized in the future based off of excellent case studies of past employment. It is not often you can describe a book on cyber as a “page turner” but this one is tough to put down once you get started. As a political scientist and cyber intelligence graduate student I really appreciate how Mr. Maurer has approached this compelling subject in an easily understandable manner for both he social scientist and the Cybersecurity professional. Extremely well written and researched, this book puts the reader in a great position to go on a journey of self discovery with this evolving subject.
This book does an excellent job breaking the mold of current thinking by "cyber" analysts--that is, that there are cybercriminals, and there are APT actors, and you must identify, pursue, and defeat one or the other. Hogwash. Cyber criminals (or contractors, or whatever you want to call them, depending on your perspective in the global arms race for dominance in cyberspace) and APT actors not only operate in the same environment, but often help each other out. They have business relationships, but also personal ones. To track them properly, cyber crime analysis and the hunt for APT actors of COURSE should be part of the same holistic discipline. This book paints an amazing picture of how that's so, with enough of open source citations to make me extremely grateful with every read.
I love the information but the author does not make it relatable. While it seems to be part novel on the hard knuckle future, it lacks a context to place it in. The research is great but lacks more in-depth facts. It was not a bad read, but I would keep looking if you wanted more of a factual book. It is more politically biased.
This book proposes a holistic framework of conceptualization for state-sponsored cyber warfare. Although some of the arguments seem a bit subjective, it is a great jumping off point for political or military scientists who want to research the topic in the future.
Reviewed in the United States on February 13, 2018
The author explains everything in a clear, engaging manner considering the intense and important subject matter. This is an essential read for anyone seeking understanding or inspiration in the digital age.
A compelling, thoughtful, and accessible analysis of the international landscape of cyber threats. A critical read for anyone seeking a better understanding of this frontier of warfare.