Deter, Disrupt, or Deceive: Assessing Cyber Conflict as an Intelligence Contest
Published by: Georgetown University Press
Sales Date: 2023-05-01
Published: May 2023
Page Count: 318 Pages
Illustrations: 2 figures, 3 tables
Dimensions: 6.00 x 9.00
318 Pages, 6.00 x 9.00 x 1.00 in, 2 figures, 3 tables
Temporarily Out Of StockAdd to Wishlist
The idea of "cyber war" has played a dominant role in both academic and popular discourse concerning the nature of statecraft in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition and conflict. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for information advantage below the threshold of war?
In Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue that reframing cyber competition as an intelligence contest will improve our ability to analyze and strategize about cyber events and policy. The contributors to this volume debate the logics and implications of this reframing. They examine this intelligence concept across several areas of cyber security policy and in different national contexts. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts and placing all of it in conversation with the larger fields of international relations and intelligence studies.
Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.
"This unique volume offers compelling explanations of activities in the cyber domain, behavior that seems anomalous when viewed from well-known perspectives of 'war,' 'deterrence,' and 'intelligence.' Deter, Disrupt, or Deceive provides a new look at the nature of cyberspace and how the physical (virtual?) aspects of this domain shape the nature of conflict within it." ? James J. Wirtz, professor, department of national security affairs, Naval Postgraduate School
"Fusing theoretical sophistication with empirical richness, this volume greatly enhances our understanding of cyber conflict. It dissects the relationship between intelligence and cyber operations, challenging assumptions and offering alternative analytical frameworks. In the best intellectual tradition, this is a mature conversation between genuine experts in their fields. Essential." ? Tim Stevens, reader in International Security, King's College London